Abstract:
Stabilization, via active-feedback positional drift-correction, of an optical microscope imaging system in up to 3-dimensions is achieved using the optical measurement path of an image sensor. Nanometer-scale stability of the imaging system is accomplished by correcting for positional drift using fiduciary references sparsely distributed within or in proximity to the experimental sample.
Abstract:
A continuous process for coating ePTFE with polymer wherein a first coating of fluoropolymer-containing liquid medium is formed on a moving elongate substrate, elongate ePTFE is contacted with the coated substrate to form an inchoate composite structure, and a final coating of fluoropolymer-containing liquid medium is formed on the inchoate composite structure.
Abstract:
A method and apparatus for secure and authenticated access to command controllable computerized equipment is described. The method involves using an access apparatus that prevents access to the command controllable computerized equipment until a user is authenticated as a trusted user authorized to access the command controllable computer equipment. The apparatus may be a secure access controller or a secure access transceiver. Each has a normally disabled data port that prevents the pass-through of data until a user is authenticated as a trusted user. The apparatus may operate under autonomous control or under the control of a network centric control facility. The advantage is secure control of access to command controllable computerized equipment that enables remote access to the equipment by authorized users with substantially no risk of compromise.
Abstract:
A validation phase is performed at an RFID reader, in order to ascertain which of a plurality of potential candidates for authentication, are actual candidates for authentication. Once a candidate has been successfully validated, an authentication phase is initiated with a host computer, to determine whether the information presented by the candidate matches expected information about the candidate. If the authentication is considered successful, a final authorization procedure may be performed, or the authenticated candidate may be granted certain predetermined permissions. By performing the validation phase locally at the reader, the need for accessing a host computer is reduced and unnecessary queries to the host computer are avoided.
Abstract:
A security system and method is provided. An embodiment includes a security access device that includes a first transmitter for transmitting authentication to a computer and a second transmitter for transmitting verification information to a computer. The first transmitter is typically active and consumes power from the access device, while the second transmitter is typically passive, and consumes less or nil power from the access device. When the security access device is initially brought proximal to the computer and activated, the authentication information is sent to the computer and the user is logged in. Periodically, the computer will query the passive transmitter for verification information, to ensure that the security access device is still proximal to the computer.
Abstract:
A system and method for access control is provided. In one embodiment, a system includes a computing device connected to an access server that controls the ability of the computing device to access to a computing resource, such as the Internet. The access server connects to an activation server via a network. The activation server is operable to receive a request for to generate a certificate for the computing device from the activation server. The activation server is operable to generate the certificate and embed a unique identifier of the computing device and/or the access server and/or the like inside the certificate. Once generated, the certificate is installed in the computing device. When the computing device initiates a request to access the computing resource, the computing device initially sends the certificate to the access server. If the certificate received by the access server does not include the expected unique identifier(s), then access to the computing resource is prevented and/or restricted. If the key received by the access server includes the expected unique identifier(s), then access to the computing resource is permitted.
Abstract:
A composite membrane comprised of ePTFE and matrix polymer, the ePTFE being made from polytetrafluoroethylene fine powder having a standard specific gravity (SSG) of no more than about 2.16, a break strength of at least about 5.5 lb force (24.5 N), and a stress relaxation time of at least about 500 sec.
Abstract:
System (10) is disclosed including an acoustic sensor array (20) coupled to processor (42). System (10) processes inputs from array (20) to extract a desired acoustic signal through the suppression of interfering signals. The extraction/suppression is performed by modifying the array (20) inputs in the frequency domain with weights selected to minimize variance of the resulting output signal while maintaining unity gain of signals received in the direction of the desired acoustic signal. System (10) may be utilized in hearing, cochlear implants, speech recognition, voice input devices, surveillance devices, hands-free telephony devices, remote telepresence or teleconferencing, wireless acoustic sensor arrays, and other applications.
Abstract:
The present invention provides a method and system for secure access to computer equipment. An embodiment includes a secure access controller connected to a link between a transceiver (such as a modem) and the computer equipment. Public and private keys are used by the secure access controller and a remote user. The keys are provided to the secure access controller by an authentication server. Once the transceiver establishes a communication link with the user, the access controller uses these keys to authenticate packets issued by the user to the computer equipment. If the packet is authenticated, the access controller passes the packet to the computer equipment. Otherwise, the packet is discarded. Another embodiment includes a secure access controller having a plurality of ports for connection to a plurality of different pieces of computer equipment. The secure access controller thus intermediates communications between the modem and the plurality of different pieces of computer equipment.
Abstract:
A process for reducing fluorosurfactant content of a stabilized fluorosurfactant-containing aqueous fluoropolymer dispersion comprising passing said stabilized fluorosurfactant-containing aqueous fluoropolymer dispersion through a fixed bed of ion exchange resin beads comprising a polymer and functional groups to reduce fluorosurfactant content, the ion exchange resin beads being monodisperse.