摘要:
The invention relates to a method for evaluating or accessing a network address, comprising the steps of: receiving a network address (50); generating derivatives (60) of the received network address (50); assigning a trust level to the generated derivatives (60) and the received network address (50); comparing the trust levels of the derivatives (60) with the trust level of the received network address (50); and issuing a response based on the comparison.
摘要:
The invention relates to a method for checking for the presence of control statements in a data value, comprising providing at least one first data value (8) from a trustworthy source (3), receiving at least one second data value (9) from an untrustworthy source (4) and marking the second data value (9) as untrustworthy, performing a computation on the first and second data value (8, 9) resulting in a third data value (10) and marking all parts (11) of the third data value (10), which are derived from the second data value (9), as untrustworthy, and checking the parts (11) of the third data value (10) marked as untrustworthy for the presence of control statements. The invention further relates to a computer arrangement, a computer program, and a computer program product adapted to perform a method in accordance with the invention.
摘要:
The invention relates to a method for evaluating or accessing a network address, comprising the steps of: receiving a network address (50); generating derivatives (60) of the received network address (50); assigning a trust level to the generated derivatives (60) and the received network address (50); comparing the trust levels of the derivatives (60) with the trust level of the received network address (50); and issuing a response based on the comparison.
摘要:
An apparatus and method are disclosed for enabling controlled access to resources at a resource provider server. The invention may encrypt or decrypt a portion of a uniform resource identifier (URI), according to a stateless method for hiding resources and/or providing access control support. Upon receipt of a URI having an encrypted portion, the invention decrypts the encrypted portion using a predetermined key to obtain a decrypted segment, extracts additional information from the decrypted segment and forms a decrypted URI, before the decrypted URI is forwarded to a resource producer server. The invention may also encrypt a URI from a resource provider server before it is sent to a client in response to a client request.
摘要:
A needleless injector includes an injector body, a nozzle at one end of the body, a medicine inlet for receiving medicine into the injector body, a rod disposed within the injector body for driving the medicine towards the nozzle, and a sensor for monitoring operation of the needleless injector. The sensor may be a position sensor. The sensor may be a slide potentiometer. The sensor may provide for monitoring firing of the rod and/or monitoring length of a stroke of the rod. An intelligent control operatively may be operatively connected to the sensor. An RFID reader may also be operatively connected to the intelligent control for associating RFID data with operations of the needleless injector. A keypad may be operatively connected to the intelligent control and a display may be operatively connected to the intelligent control.