摘要:
Sifting arrangement for sifting a product stream. The sifting arrangement includes a zigzag sifter having at least one access opening and a sifting chamber that is divided into at least two compartments. The zigzag sifter is substantially vertically oriented. This Abstract is not intended to define the invention disclosed in the specification, nor intended to limit the scope of the invention in any way.
摘要:
The distributor of a cigarette rod making machine employs a zig-zag sifter which receives a mixture of tobacco ribs and shreds from a reservoir by way of a duct or an elevator conveyor. The shreds leave the uppermost stage of the sifter and are conveyed, by a Coanda separator, into an upright gathering duct which discharges shreds for delivery onto the concave surface(s) of one or more guides serving to direct one or more streams of shreds against the underside(s) of one or more foraminous belt conveyors which advance the stream(s) past one or more trimming devices serving to remove the surplus and to thus convert each stream into a rod-like filler which is ready to be draped into a web of cigarette paper. The removed surplus is returned into the reservoir or directly into the zig-zag sifter.
摘要:
A shower of tobacco particles is fed into the upper end of a downwardly sloping and downwardly tapering funnel-shaped part of a conveyor wherein the particles gather into a flow of interlaced particles. Successive increments of the flow are acted upon by one or more jets of air issuing from at least one nozzle which loosens successive foremost increments of the flow prior to admission into a tobacco filler rod forming unit in a cigarette rod making machine.
摘要:
A system, apparatus, method, and machine readable medium are described for implementing privacy classes within an authentication framework. For example, one embodiment of a method comprises: transmitting a query for client information from a server to a client, the client information including information related to authentication devices coupled to the client; analyzing the query to determine an appropriate privacy class to be used for providing client information to the server; providing a subset of client information selected based on the determined privacy class, the subset of client information including the information related to the authentication devices coupled to the client; and using the subset of client information within an authentication framework to provide user authentication services over a network.
摘要:
A system, apparatus, method, and machine readable medium are described for performing eye tracking during authentication. For example, one embodiment of a method comprises: receiving a request to authenticate a user; presenting one or more screen layouts to the user; capturing a sequence of images which include the user's eyes as the one or more screen layouts are displayed; and (a) performing eye movement detection across the sequence of images to identify a correlation between motion of the user's eyes as the one or more screen layouts are presented and an expected motion of the user's eyes as the one or more screen layouts are presented and/or (b) measuring the eye's pupil size to identify a correlation between the effective light intensity of the screen and its effect on the user's eye pupil size.
摘要:
A system, apparatus, method, and machine readable medium are described for implementing a composite authenticator. For example, an apparatus in accordance with one embodiment comprises: an authenticator for authenticating a user of the apparatus with a relying party, the authenticator comprising a plurality of authentication components; and component authentication logic to attest to the model and/or integrity of at least one authentication component to one or more of the other authentication components prior to allowing the authentication components to form the authenticator.
摘要:
A system, apparatus, method, and machine readable medium are described for performing advanced authentication techniques and associated applications. For example, one embodiment of a method comprises: receiving a policy identifying a set of acceptable authentication capabilities; determining a set of client authentication capabilities; and filtering the set of acceptable authentication capabilities based on the determined set of client authentication capabilities to arrive at a filtered set of one or more authentication capabilities for authenticating a user of the client.
摘要:
A system, apparatus, method, and machine readable medium are described for adaptive authentication. For example, one embodiment of an apparatus comprises: an adaptive authentication module to receive a client request to perform a transaction which requires authentication; a risk engine to analyze first data related to a client to determine a risk value associated with the client; an assurance level gain analysis module to determine an assurance level required for allowing the client to complete the transaction and to determine an assurance level gain required to arrive at the assurance level based on the risk value; the adaptive authentication module to select one or more authentication techniques based at least in part on the indication of the assurance level gain.
摘要:
The diameters of successive rod-shaped articles of the tobacco processing industry are ascertained while the articles advance in the flutes of a conveyor, first along a rolling unit which turns successive articles at random through different angles and thereupon past a photoelectronic detector wherein a radiation source emits a narrow beam of radiation which impinges upon successive articles for intervals of time which are dependent upon the diameters of the articles. The transducer of the detector generates signals which are indicative of the monitored diameters, and such signals are transmitted to an evaluating circuit which controls an ejector for unsatisfactory articles and/or displays the monitored diameters on a screen. The articles are partially lifted off the conveyor by cushions of compressed air during transport past the rolling unit.
摘要:
A system, apparatus, method, and machine readable medium are described for implementing a composite authenticator. For example, an apparatus in accordance with one embodiment comprises: an authenticator for authenticating a user of the apparatus with a relying party, the authenticator comprising a plurality of authentication components; and component authentication logic to attest to the model and/or integrity of at least one authentication component to one or more of the other authentication components prior to allowing the authentication components to form the authenticator.