摘要:
Each layer in the magnetic multilayer film is a closed ring or oval ring and the magnetic moment or flux of the ferromagnetic film in the magnetic unit is in close state either clockwise or counterclockwise. A metal core is put in the geometry center position in the close-shaped magnetic multilayer film. The cross section of the metal core is a corresponding circular or oval. A MRAM is made of the closed magnetic multilayer film with or without a metal core. The close-shaped magnetic multilayer film is formed by micro process method. The close-shaped magnetic multilayer film can be used broadly in a great variety of device that uses a magnetic multilayer film as the core, such as MRAM, magnetic bead in computer, magnetic sensitive sensor, magnetic logic device and spin transistor.
摘要:
Each layer in the magnetic multilayer film is a closed ring or oval ring and the magnetic moment or flux of the ferromagnetic film in the magnetic unit is in close state either clockwise or counterclockwise. A metal core is put in the geometry center position in the close-shaped magnetic multilayer film. The cross section of the metal core is a corresponding circular or oval. A MRAM is made of the closed magnetic multilayer film with or without a metal core. The close-shaped magnetic multilayer film is formed by micro process method. The close-shaped magnetic multilayer film can be used broadly in a great variety of device that uses a magnetic multilayer film as the core, such as MRAM, magnetic bead in computer, magnetic sensitive sensor, magnetic logic device and spin transistor.
摘要:
Technology for protecting a digital content including a first content protection system capable of decrypting the digital content, the digital content including an inclusion list; a linkable library providing access for an application to the functionality of the first content protection system, the application including a second content protection system; and a means for evaluating the second content protection system to determine if the second content protection system is on the inclusion list.
摘要:
Technology for protecting a digital content including a first content protection system capable of decrypting the digital content, the digital content including an inclusion list; a linkable library providing access for an application to the functionality of the first content protection system, the application including a second content protection system; and a means for evaluating the second content protection system to determine if the second content protection system is on the inclusion list.
摘要:
A method of establishing a protected environment within a computing device including validating a kernel component loaded into a kernel of the computing device, establishing a security state for the kernel based on the validation, creating a secure process and loading a software component into the secure process, periodically checking the security state of the kernel, and notifying the secure process when the security state of the kernel has changed.
摘要:
A method of establishing a protected environment within a computing device including validating a kernel component loaded into a kernel of the computing device, establishing a security state for the kernel based on the validation, creating a secure process and loading a software component into the secure process, periodically checking the security state of the kernel, and notifying the secure process when the security state of the kernel has changed.
摘要:
An exemplary method for protecting web browsers from spam includes providing a multi-layer model that includes a doorway layer, a redirection domain layer, an aggregator layer, a syndicator layer and an advertiser layer; identifying domains as being associated with at least one of the layers; and, based at least in part on the identifying, taking one or more corrective actions to protect web browsers from search spam. An exemplary method for identifying a bottleneck layer in a multi-layer spam model includes providing a multi-layer spam model, collecting spam advertisements, associating a block of IP addresses with the collected spam advertisements and identifying a bottleneck layer based on the block of IP addresses. Other methods, systems, etc., are also disclosed.
摘要:
Defeating click-through cloaking includes retrieving a search results page to set a browser variable, inserting a link to a page into the search results page and clicking through to the page using the inserted link. Investigating cloaking includes providing script associated with a suspected spam URL, modifying the script to de-obfuscate the script and executing the modified script to reveal cloaking logic associated with the script.
摘要:
Defeating click-through cloaking includes retrieving a search results page to set a browser variable, inserting a link to a page into the search results page and clicking through to the page using the inserted link. Investigating cloaking includes providing script associated with a suspected spam URL, modifying the script to de-obfuscate the script and executing the modified script to reveal cloaking logic associated with the script.
摘要:
Defeating click-through cloaking includes retrieving a search results page to set a browser variable, inserting a link to a page into the search results page and clicking through to the page using the inserted link. Investigating cloaking includes providing script associated with a suspected spam URL, modifying the script to de-obfuscate the script and executing the modified script to reveal cloaking logic associated with the script.