摘要:
Latent fingerprints are developed by exposing them to vapors generated from a thin film of a storage stable cyanoacrylate monomer and a thixotropic additive in sufficient amount to render the composition substantially non-flowable. The monomer film should have a surface area of at least 129 sq. cm.An envelope package for the monomer composition has inner polyethylene surfaces. The envelope may be peeled open to expose the inner surfaces coated with a film of the composition.
摘要:
Latent fingerprints are developed by exposing them to vapors generated from a thin film of a storage stable cyanoacrylate monomer and a thixotropic additive in sufficient amount to render the composition substantially non-flowable. The monomer film should have a surface area of at least 129 sq. cm.An envelope package for the monomer composition has inner polyethylene surfaces. The envelope may be peeled open to expose the inner surfaces coated with a film of the composition.
摘要:
A secure-end-to-end communication system for electronic business system and method of operation, e.g., the Internet, includes a web server—vault controller having personal storage vaults in the controller for users, registration and certification authorities. Each personal vault runs programs on the controller under a unique UNIX user ID. Data storage is provided by the controller wherein the storage is owned by the same user ID assigned to the vault. A registration authority running as a software application in the controller processes requests to issue, renew and revoke digital certificates issued by a certification authority using two pairs of public-private keys. The registration authority interacts with the vault controller to decide whether an applicant qualifies to receive a digital certificate. The certification authority running as software application in the controller includes a certificate management system that provides services such as issuing, revoking, suspending, resuming, and renewing a user's right to digital certificates.
摘要:
A process is provided for the presumptive identification of narcotics and drugs of abuse, utilizing a combination of color-producing reagents in a sequence which minimizes the occurrence of false positives, and makes possible the presumptive identification by color matching of virtually all the important narcotics and drugs of abuse found in traffic at the present time.
摘要:
A monitoring system for a waste compactor system comprising: a compacting device; at least one removable waste container; a compactor communications device for transmitting an indication of the fullness level of at least one receptacle or bin; a container communications device attached to the at least one removable waste container; a site monitoring unit to communicate with the container communications device and the compactor communications device.
摘要:
A secure end-to-end communications system provides end users access to vault-based custom applications of an organization for purposes of conducting electronic commerce. The system includes a web-based vault controller running an application, e.g. a registrations application in a vault cryptographically linked to a database and a Certificate Management System (CMS) for generating digital certificates, and at least one remote vault agent coupled to the vault controller for providing vault-based custom applications to end users. An X.500 directory is coupled to the CMS and cryptographically linked to the remote vault agents for storing end user data. The remote vault agent is an application which comprises a collection of Application Programming Interfaces (APIs) which provide a secure interface to the vault controller; a Lightweight Data Access Protocol (LDAP) used to access the X.500 directory; a secure depositor coupled to vault-based custom applications of an organization. The secure depositor includes APIs to perform cryptographic functions in passing communications between vaults used by the vault agent and vaults used by the vault controller or vaults used by other vault agent applications and a secure depositor library which uses functions in the LDAP to access the X.500 directory. The remote vault agent accesses the web based vault controller on a non-web basis to enable remote custom applications to communicate securely with vault-based applications, such as a registration application that administers digital certificates.
摘要:
A vault controller manages resources in a secure environment or vault dedicated to an authorized user(s) for conducting electronic business in a distributed information system, e.g., the Internet. The controller includes a web server and a supervisor in a shared object library which runs as part of an HTTP daemon. The supervisor runs as a multi-threaded process and includes multiple service supervisor (SS) threads; a communication supervisor (CS) thread; a request supervisor (RS) thread; state and data tables and a vault daemon to support launching secure processes mapped to users through digital certificates included in user requests to the controller.
摘要:
A secure-end-to-end communication system for conducting electronic business includes a web server—vault controller having personal storage vaults for users, registration and certification authorities. Each personal vault runs programs on the controller under a unique platform ID, e.g. a UNIX user ID. Data storage is provided by the controller wherein the storage is owned by the same user ID assigned to the vault. User processes running in dedicated vaults are able to communicate with other User processes running in different vaults using a secure depositor running as a module in a vault process in each vault. Messages are sent from a vault process to a specific vault rather than another vault process. There is no direct communication between vault processes. In operation, if a vault process intends for a message to go to another vault, e.g. Vault V, the sending secure depositor performs the mapping from the DN of the owner of Vault V to the DN of Vault V. The secure depositor then obtains the public encryption key of Vault V from the certificate found in the X.500 directory under the DN of Vault V. The secure depositor encrypts the message with the recipient's public key and signs the message with the private signing key in the sender's vault. The secure depositor inserts the encrypted and signed message (including the signing certificate) into a queue for Vault V. On the receiving side, the receiving secure depositor retrieves the message and decrypts the message with the private decryption key in Vault V. The secure depositor verifies the signature with the included certificate, after validating the certificate and checking the appropriate Certification Revocation Lists (CRL) in the X.500 directory. A secure depositor daemon, running either in the controller or on a remote machine, is used for relaying messages between processes running in vaults on different machines.
摘要:
A vault controller manages resources in a secure environment or vault dedicated to an authorized user(s) for conducting electronic business in a distributed information system. The controller includes a web server and a supervisor in a shared object library, which runs as part of an HTTP daemon. The supervisor runs as a multi-threaded process with state and data tables and a vault daemon to support launching secure processes mapped to users through digital certificates. The vault daemon generates a password for a user request based on the user ID. The vault daemon launches a vault process (VP) running in a vault mapped to the user ID. After launching, the VP returns a message to the supervisor including a token identifying the thread. The supervisor sends the user request through a socket to the secure VP mapped to the user ID. The VP receives the request and launches a VP thread to handle the request. The VP thread writes the process data back through the socket to the supervisor thread for return to the user.
摘要:
A secure server in a secure distributed information system isolates interaction from terminals to specific personal vaults including and to only those personal vaults, creating a "virtual logon". The secure server includes a secure connection server coupled to the system and to a vault deposit server having personal vaults in which user specific vault processes execute on dedicated encrypted data, after authentication of the user by a vault supervisor. The supervisor forwards vault process results to the user through the browser.