摘要:
A method, useful in computer-aided design, for finding configurations of collections of geometric elements representing shapes of physical objects that satisfy a set of geometric constraints, when these constraints relate to topological properties of the geometric elements. In particular, the invention relates to a method that classifies the geometric elements in terms of degrees of freedom, categorizes topological properties in terms of biases, and synthesizes a solution by progressively reducing the total degrees of freedom in the system.
摘要:
A method, useful in computer-aided design, of identifying possible solutions to an over-constrained system having a collection of entities and constraints. The method represents the entities in terms of degrees of freedom and incrementally assembles the system by adding entities, satisfying constraints and reducing the degrees of freedom of the entities. For an over-constrained system, the method constructs a dependency graph of the system and identifies the set of constraints which over-constrains the system. The over-constraining set includes the constraint which initiated the over-constraint and those constraints back traced in the dependency graph from the initiating constraint. Removal of one or more constraints from the over-constraining set results in a solvable fully or under-constrained system. Intelligent selection of the removed constraint may increase computational efficiency or system stability. The method is useful in diverse constraint satisfaction problems, particularly geometric modeling problems such as describing mechanical assemblies, constraint-based sketching and design, geometric modeling for CAD, and kinematic analysis of robot and linkage mechanisms.
摘要:
A method, useful in computer-aided design, for finding possible configurations of a system having a collection of geometric entities and constraints. The method represents the geometric entities in terms of degrees of freedom and systematically satisfies the constraints reducing the degrees of freedom of the geometric entities. The method uses a number of specialized routines, called plan fragments, which satisfy a particular constraint relating to a particular geometric entity. Each plan fragment changes the configuration of a geometric entity in space--i.e. the location and orientation--satisfying a constraint and reducing a degree of freedom. The series of plan fragments which reduce the degrees of freedom and satisfy the constraints comprise an assembly plan for possible configurations of the system. The method identifies overconstrained, fully constrained, and underconstrained systems to the user and assists in finding possible configurations if the constraints are changed, added, or deleted. The method is useful in solving any geometric constraint problem, such as describing mechanical assemblies constraint-based sketching and design, geometric modeling for CAD, and kinematic analysis of robots and linkage mechanisms. By reasoning symbolically about the geometry of the system, the method provides faster solutions, numerical stability, user feedback, and the ability to handle redundant constraints.
摘要:
Systems and methods for assigning weights to a plurality of objects are defined. Metrics associated with the objects are defined. A cursor is displayed and movement of the cursor is constrained by a control weight shape. Movement of the cursor within the control weight shape defines the weights assigned to the metrics. A display weight shape including a plurality of display weight factors is displayed. Each of the display weight factors corresponds to one of the metrics and their display corresponds to the weights assigned to the metrics.
摘要:
In one embodiment, an architecture that consummates an electronic transaction between a first electronic device, such as an acquirer device, a second electronic device, such as an issuer device, and a plurality of electronic terminals, such as merchant terminals, by establishing a communication between the plurality of devices and terminals and accumulating transactions that are approved by the second electronic device. Then, periodically the plurality of transactions are settled using a transfer of monetary value between the first electronic device and the second electronic device. For example, the present invention uses electronic cash transfer to replace conventional settlement, which requires the use of a third-party settlement service.
摘要:
Secure transmission of data is provided between a plurality of computer systems over a public communication system, such as the Internet. Secure transmission of data is provided from a customer computer system to a merchant computer system, and for the further secure transmission of payment information regarding a payment instrument from the merchant computer system to a payment gateway computer system. The payment gateway system evaluates the payment information and returns a level of authorization of credit via a secure transmission to the merchant which is communicated to the customer by the merchant. The merchant can then determine whether to accept the payment instrument tendered or deny credit and require another payment instrument. An architecture that provides support for additional message types that are value-added extensions to the SET protocol is provided by a preferred embodiment of the invention. A server communicating bidirectionally with a gateway is disclosed. The server communicates to the gateway over a first communication link, over which all service requests are initiated by the server. The gateway uses a second communication link to send service signals to the server. In response to the service signals, the server initiates transactions to the gateway or presents information on an a display device.
摘要:
Systems and methods for assigning weights to a plurality of objects are defined. Metrics associated with the objects are defined. A cursor is displayed and movement of the cursor is constrained by a control weight shape. Movement of the cursor within the control weight shape defines the weights assigned to the metrics. A display weight shape including a plurality of display weight factors is displayed. Each of the display weight factors corresponds to one of the metrics and their display corresponds to the weights assigned to the metrics.
摘要:
Secure transmission of data is provided between a plurality of computer systems over a public communication system, such as the Internet. For example, secure transmission of data is provided between a merchant server and an acquirer gateway using Secure Electronic Transaction (SET) compliant messages. However, gateway-initiated messages are not SET compliant. Accordingly, secure transmission of data using additional messages that are not SET compliant is provided in accordance with one embodiment of the present invention. In one embodiment, a method for virtual point of sale processing using gateway-initiated messages, includes establishing a first communication link (e.g., operating under the Internet Protocol) between an acquirer gateway and a merchant server, the first communication link being initiated by the acquirer gateway, and transmitting a gateway-initiated message (e.g., a Multipurpose Internet Mail Extensions(MIME) -encapsulated PKCS-7 message that includes a request for management information base data of the merchant server) via the first communication link from the acquirer gateway to the merchant server. The method also includes establishing a second communication link (e.g., operating under the Internet Protocol) between the acquirer gateway and the merchant server, the second communication link being initiated by the merchant server, and transmitting a Secure Electronic Transaction (SET) message via the second communication link from the merchant server to the acquirer gateway.
摘要:
A method of dynamic simulation of mechanisms which constructs the lagrangian form of the dynamics equations as pure differential equations in terms of a minimal set of generalized coordinates. The dynamics problem is separated into two parts used in the lagrangian--a kinematic analysis and a kinetics analysis. The kinematic analysis is computed using a degrees of freedom analysis. The velocities required for the kinetic analysis are computed using screw theory. Once constructed, the lagrangian dynamics equations are solved for accelerations, applied to the mechanism, and integrated over time to simulate the dynamics of the mechanism. The kinetic and kinematic analyses are approximately linearly related to the number of components in the mechanism, allowing efficient solution of dynamics problems at interactive rates.
摘要:
A method for securing communications between a server and an application downloaded over a network onto a client of the server is disclosed. A first request is received from the client, and in response a session credential security token is generated and sent to the client. A second request is received from the client to download the application and includes the value of the session credential security token. The server verifies that the value of the session credential security token is valid and, if so, generates a second security token that is tied to the session credential security token. The second token is embedded in application code and then the application code is sent to the client. A subsequent request for data from the application running on the client includes the value of the session credential security token and the value of the embedded security token. Verification of validity of the values of the session credential security token and the second security token received with the data request then occurs at least in part by determining that the values are cryptographically tied to one another. Upon verification, the requested data is sent to the client.