摘要:
A knife block system is described which in one embodiment includes a block unit having a magnetic core, a plurality of knives secured to the magnetic core of the block unit, a foot supporting the block unit, and at least one chopping board protruding from a surface of the block unit and removable from the block unit for use, the chopping board configured to fit into a chopping board back support attached to the block unit for storage when not in use, the chopping board having a female module formed therein. The system includes a knife sharpener unit removably attachable to the foot for use, the knife sharpener unit having a product logo on a surface thereof that is sized to mate with the female module on the chopping board to secure the knife sharpener unit to the chopping board as both items are in use.
摘要:
An EPROM emulator makes use of a simple device with a housing connected to a eprom header which serves to connect the device to a circuit board in conjunction with a microprocessor emulator. Inside the housing are paging and data select circuits and a set of SRAM which are used in place of a traditional EPROM to hold the programming information. To program the device, the EPROM simulator is connected to the circuit board in place of an eprom. A switch on the housing is then turned to place the device in programming mode. The same switch also determines how the device is programmed by accessing the appropriate data lines for the number of pages of EPROM memory which are being emulated. After the switch is properly selected, the emulator is programmed by sending the data through the eprom socket on the circuit board via the microprocessor emulator. After the device is programmed, the switch on the housing is turned to place the device in read-only mode so that it can simulate an EPROM. In addition to the external switch, there are internal jumpers which are set to determine the type of EPROM which is to be emulated.
摘要:
Embodiments of an invention for offloading functionality from a secure processing environment are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to initialize a secure enclave. The execution unit is to execute the instruction. Execution of the instruction includes verifying that a signature structure key matches a hardware key that permits functionality to be offloaded.
摘要:
Indicating fit status of a mask in communication with a respiratory assistance device is disclosed. Upon initiating a therapeutic gas delivery from the respiratory assistance device to the mask, one or more measurements from respective one or more sensors of the respiratory assistance device is received. A leakage value from these measurements is derived, and a mask fit index is assigned. This is based at least upon a correlation of the leakage value to a particular sub-range of predetermined leakage values that corresponds to the mask fit index. The particular sub-range of predetermined leakage values is one among a plurality of sub-ranges, which together comprises an overall mask fit range defined at least by an ideal mask fit region, a loose mask fit region, and a tight mask fit region. A mask fit status based upon the assigned mask fit index is output to an indicator interface.
摘要:
A self-authenticating credit card includes an input device for entering a PIN. The PIN is accepted by a micro-controller that uses the entered PIN as an encryption key for decrypting stored account information. A portion of the account information includes data, that when decrypted, contains an image that is rendered on an integral display, with account information sent to a transaction terminal. A timer is used to limit access to account data while in the unlocked state.
摘要:
Indicating fit status of a mask in communication with a respiratory assistance device is disclosed. Upon initiating a therapeutic gas delivery from the respiratory assistance device to the mask, one or more measurements from respective one or more sensors of the respiratory assistance device is received. A leakage value from these measurements is derived, and a mask fit index is assigned. This is based at least upon a correlation of the leakage value to a particular sub-range of predetermined leakage values that corresponds to the mask fit index. The particular sub-range of predetermined leakage values is one among a plurality of sub-ranges, which together comprises an overall mask fit range defined at least by an ideal mask fit region, a loose mask fit region, and a tight mask fit region. A mask fit status based upon the assigned mask fit index is output to an indicator interface.
摘要:
Disclosed is a method of comparing the relative lateral stability among drill bits (that is, the tendency for a bit to whirl). This allows improved bit selection in applications where whirl is apparent. Because there will likely be many different acceptable bit designs produced by the above method, the comparison of the regenerative forces among these bits allows a customer to make a more informed choice between stability and other performance features among a range of bit designs.
摘要:
Embodiments of an invention for secure processing environment measurement and attestation are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive a first instruction associated with a build or a rebuild of a secure enclave. The execution unit is to execute the first instruction. Execution of the first instruction, when associated with the build, includes calculation of a first measurement and a second measurement of the secure enclave. Execution of the first instruction, when associated with the rebuild, includes calculation of the second measurement without calculation of the first measurement.
摘要:
Embodiments of an invention for feature licensing in a secure processing environment are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive an instruction to initialize a secure enclave. The execution unit is to execute the instruction. Execution of the instruction includes determining whether a requested feature is licensed for use in the secure enclave.
摘要:
Embodiments of an invention for secure processing environment measurement and attestation are disclosed. In one embodiment, a processor includes an instruction unit and an execution unit. The instruction unit is to receive a first instruction associated with a build or a rebuild of a secure enclave. The execution unit is to execute the first instruction. Execution of the first instruction, when associated with the build, includes calculation of a first measurement and a second measurement of the secure enclave. Execution of the first instruction, when associated with the rebuild, includes calculation of the second measurement without calculation of the first measurement.