摘要:
The contemplated embodiments of the invention provide a method for implementing a mandatory integrity control (MIC) system that provides access control for each and every object and subject that need access control, but in a way that allows legacy operating systems to continue with little modification. The invention provides a novel method that selects an integrity level designator for a subject, when the subject logs onto the computer system. The selected integrity level designator is then added to an existing data structure in the computer system. The existing data structure may be a part of a security descriptor stored in a system access control list of an object. The existing data structure may be a part of a list of security permissions that constitute an access token for a process executing as a subject.
摘要:
An operating system for a computing device has a first session for a user that includes a first base process that has a first privileges token attached thereto. The first privileges token includes substantially a full set of privileges of the user on the operating system. The operating system also has a second session for the user that includes a second base process that has a second privileges token attached thereto. The second privileges token is derived from the first privileges token and includes only a minimum set of privileges of the user on the operating system. Thus, the second, limited token does not have all privileges associated with the first, full token but instead has a limited set of privileges and not extra privileges that could be employed to take actions that would be harmful, deceptive, or malicious.
摘要:
What is disclosed is a sheetrock corner bead that features an elongated core and paper flange extension for the elongated core. The flanges provide a layered tapered appearance that allow for less mud to be used and fewer mud applications required for installing the corner. The sheetrock corner bead provides for an improved method of installation that generally requires less mud and less time spent in installation.
摘要:
The present invention relates to a system and methodology to facilitate security for data items residing within (or associated with) a hierarchical database or storage structure. A database security system is provided having a hierarchical data structure associated with one or more data items. The system includes a security component that applies a security policy to the data items from a global location or region associated with a database. Various components and processes are employed to enable explicit and/or inherited security properties to be received by and propagated to the data items depending on the type of data structure encountered or processed.
摘要:
The present invention is a dermal incisor for use in cutting a section from the skin of an individual for examination. The incisor has a housing in which an endless, flexible blade is disposed. The blade is connected to a handle that is rotatable with regard to the housing. Upon rotation of the handle, the blade also rotates in order to cut into the skin. The handle is also slidable with regard to the housing, such that the handle can be used to urge the blade into the skin while being rotated. The housing includes a pair of apertures engaged with a stop pin on the handle to limit the movement of the handle and the blade with respect to the housing in both the horizontal and vertical directions. The housing also includes a lower surface including a number of teeth thereon that securely engages the housing with the skin to prevent slippage of the skin while being cut to provide a smooth incision with few irregularities.
摘要:
A mass isolation joint for electrically isolating a downhole tool includes a first joint section having a distal end in which a first thread is formed, a second joint section, and an insulating composite structure coupling the first joint section to the second joint section, wherein at least one of the first and second joint sections is adapted for coupling to the downhole tool. The insulating composite structure includes a first composite layer formed on the second joint section. The first composite layer has a second thread which engages the first thread on the distal end of the first joint section.
摘要:
In aspects, interactions between processes of a desktop are allowed or denied based on security data. The security data may comprise a first bitmap that indicates whether a requesting process is allowed to cause an action to occur, a second bitmap that indicates whether a process is protected from having an action occur, and a third bitmap that indicates whether the requesting process may override protection, if any, in causing the action to occur.
摘要:
An electromagnetic logging tool is disclosed that includes a support; and at least one four-coil array disposed on the support, wherein the at least one four-coil array comprises: a transmitter, a bucking coil, a receiver, and a trim coil. A method for balancing an induction array is disclosed that includes applying an alternating current to a transmitter of the induction array that comprises the transmitter, a bucking coil and a receiver; measuring a mutual coupling between the transmitter and the receiver; and adding an extra bucking coil, if the mutual coupling exceeds a selected criterion.
摘要:
A schema-based service for Internet access to per-user services data, wherein access to data is based on each user's identity. The service includes a schema that defines rules and a structure for each user's data, and also includes methods that provide access to the data in a defined way. The services schema thus corresponds to a logical document containing the data for each user. The user manipulates (e.g., reads or writes) data in the logical document by data access requests through defined methods. In one implementation, the services schemas are arranged as XML documents, and the services provide methods that control access to the data based on the requesting user's identification, defined role and scope for that role. In this way, data can be accessed by its owner, and shared to an extent determined by the owner.
摘要:
The self-attaching female fastener of this invention includes a re-entrant groove having a V-shaped bottom wall including relatively inclined bottom faces of equal width having an arcuate apex centered beneath the restricted opening to the groove. A die drives a panel portion through the restricted groove opening against the bottom faces, driving the panel portion into the apex and inwardly beneath the inclined inner side wall and outwardly beneath the inclined outer side wall of the groove, resulting in a better installation and accommodating a wider range of panel thicknesses. The V-shaped bottom wall also centers and balances the rolls during the rolling process resulting in a more accurate cross-section of the fastener.