摘要:
The present invention provides a surface treatment method for magnesium alloy, which comprising the following steps: 1) preparation; 2) fusion and uniformly coating; 3) heat diffusion, and 4) finish; so a coating alloy is placed on a magnesium alloy substrate, and the magnesium alloy substrate is heated so that the coating alloy is uniformly melted on the magnesium alloy substrate; when heating up to a preset temperature, the coating alloy generates heat diffusion on the magnesium alloy substrate; the coating alloy finally forms a corrosion-resistant hard layer on the magnesium alloy substrate. So, this invention features simple treatment process, stable structure and environmental-friendliness in a wide range of applications.
摘要:
The present invention provides a surface treatment method for magnesium alloy, which comprising the following steps: 1) preparation; 2) fusion and uniformly coating; 3) heat diffusion, and 4) finish; so a coating alloy is placed on a magnesium alloy substrate, and the magnesium alloy substrate is heated so that the coating alloy is uniformly melted on the magnesium alloy substrate; when heating up to a preset temperature, the coating alloy generates heat diffusion on the magnesium alloy substrate; the coating alloy finally forms a corrosion-resistant hard layer on the magnesium alloy substrate. So, this invention features simple treatment process, stable structure and environmental-friendliness in a wide range of applications.
摘要:
The present disclosure relates to a verification method and system. The method comprises: applying an encryption algorithm to a secret information so as to generate at least two images; transmitting a first image of the at least two images to a first device; and aligning and overlaying a second image of the at least two images with the first image during the proceeding of a verification process for recovering and revealing the secret information.
摘要:
The present invention relates to a wireless sensor message authentication method, which is characterized by an authentication scheme of any message authentication code applied to any secure message authentication code (MAC); an authentication scheme using the concept of error correcting code (ECC) and applied to any binary ECC to provide different feature; flexible technique tuning required throughput and faulty data detection capability by adjusting the ECC in use; end-to-end authentication; and XOR operation conducted to original MAC to secure light overhead.
摘要:
Apparatus, method, and computer readable medium for generating and utilizing a feature code to monitor a program are provided. The program is run in a secure environment at the beginning. The program calls a function through an application program interface. A return address of the application program interface is used to generate the feature code. When the application runs again at another time, the feature code is utilized to monitor the program. According to the aforementioned arrangement and steps, the application program interface can be monitored dynamically. Consequently, any program can be monitored by this approach, which results in a more secure environment. Further, fewer application program interfaces are required to be monitored, so the required computer resource is less.
摘要:
A network reputation system and its controlling method are provided. A credential and exchange component permits a user to generate credentials and exchange matching items with those persons having a social relationship with the user. A reputation evaluation component enables other users to make evaluations about an estimatee via the sharing of social network information. A query and response component receives a query from a person having a social relationship with the user for requesting an evaluation about the estimatee, and responds with an associated evaluation result to the person having a social relationship with the user, via the sharing of social network information and the evaluations made by the other users about the estimatee.
摘要:
A layer-aware Forward Error Correction (FEC) encoding and decoding method for encoding and decoding an information content, an encoding apparatus, a decoding apparatus, and a system thereof are provided, wherein the information content has a plurality of layer source symbol sets. In the encoding method, source symbols of each layer are encoded into encoding symbols corresponding to the layer by using an FEC encoder. In addition, final encoding symbols of an upper layer are generated by aggregating encoding symbols of both the upper layer and a lower layer. Thereby, the layer-aware FEC encoding method can maintain the encoding/decoding dependency between different layers of data without increasing the complexity of the encoding/decoding operations.
摘要:
A heat sink and heat spreader bonding structure includes a metal heat sink, a metal heat spreader, and an eutectic structure formed between the heat sink and the heat spreader by heating the heat sink and the heat spreader to a specific temperature of the eutectic temperature of the heat sink and the heat spreader but below the respective melting point of the heat sink and the heat spreader to cause the internal metal atoms of the heat sink and heat spreader to be rearranged. This bonding structure maintains the heat transfer efficiency of the bonding layer between the heat sink and the heat spreader, eliminates formation of crevice, heat resistance, and oxidation in the bonding layer.
摘要:
The present disclosure relates to a verification method and system. The method comprises: applying an encryption algorithm to a secret information so as to generate at least two images; transmitting a first image of the at least two images to a first device; and aligning and overlaying a second image of the at least two images with the first image during the proceeding of a verification process for recovering and revealing the secret information.
摘要:
A handover authentication method includes performing, by a wireless network server, a first authentication between a client and the wireless network server via a first network gateway; obtaining first authentication keys for the wireless network server and the client based on the first authentication; determining, by the wireless network server, a need to handover the client from the first network gateway to a second network gateway; deriving, by the wireless network server and from the first authentication keys, a handover authentication key shared by the client and the wireless network server; obtaining, by the wireless network server, second authentication keys for the network server and the client; and serving, by the wireless network server, the client via the second network gateway.