Abstract:
One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an unprotected public area containing status bits, where each status bit identifies whether a location in a RO file contains a valid RO or not. Preferably, there is a one-to-one correspondence between the location for a RO in a RO file and a location in the RO navigation file for the status bit which identifies whether its corresponding location in the RO file contains a valid RO or not. Whether a particular location in a RO file contains a valid RO or not can be found by checking its corresponding status bit in the RO navigation file. By finding out whether a particular location in a RO file contains a valid RO or not in this manner, it is possible to delete ROs without having to go through an authentication process. The process of finding an empty slot in the RO file for storing a new RO is also simplified. This greatly increases the efficiency of RO management. A similar system may be used for management of content encryption/ encryption keys for protecting content files.
Abstract:
A microfluidic system for monitoring or detecting a change in a parameter of an input substance, which includes a microfluidic device having a tissue chamber and a tissue analog placed in the tissue chamber, wherein the tissue analog has a vessel structure mimicking naturally occurring vessel network incorporated in the tissue analog.
Abstract:
A microfluidic system for monitoring or detecting a change in a parameter of an input substance, which includes a microfluidic device having a tissue chamber and a tissue analog placed in the tissue chamber, wherein the tissue analog has a vessel structure mimicking naturally occurring vessel network incorporated in the tissue analog.
Abstract:
One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an unprotected public area containing status bits, where each status bit identifies whether a location in a RO file contains a valid RO or not. Preferably, there is a one-to-one correspondence between the location for a RO in a RO file and a location in the RO navigation file for the status bit which identifies whether its corresponding location in the RO file contains a valid RO or not. Whether a particular location in a RO file contains a valid RO or not can be found by checking its corresponding status bit in the RO navigation file. By finding out whether a particular location in a RO file contains a valid RO or not in this manner, it is possible to delete ROs without having to go through an authentication process. The process of finding an empty slot in the RO file for storing a new RO is also simplified. This greatly increases the efficiency of RO management. A similar system may be used for management of content encryption/ encryption keys for protecting content files.
Abstract:
Methods and apparatus for enabling updates to data structures to be scheduled are disclosed. According to one aspect of the present invention, a method for operating a memory system with a non-volatile memory that includes a plurality of physical blocks and a plurality of data structures including an erase count block involves determining when contents of at least one data structure is to be updated (316). A request to update the contents of the data structure is queued (318) or scheduled when it is determined that the contents are to be updated, and the request is executed (320) when it effectively reaches the top of the queue.
Abstract:
Methods and apparatus for splitting a single logical block into two or more physical blocks are disclosed. According to one aspect of the present invention, a method for associating a plurality of physical blocks of a non-volatile memory with a logical block that includes of logical block elements involves grouping the logical block elements into at least a first logical set and a second logical set. Data associated with the first logical set is provided to a first physical block. And data associated with the second logical set is provided to a second physical block.
Abstract:
Methods and apparatus for efficiently enabling pages within a block to be accessed are disclosed. According to one aspect of the present invention, a method for writing data into a first block in a non-volatile memory which includes pages that are grouped into groups which each include two or more pages involves determining when a first group is available to receive the data. When it is determined that the first group is available to receive the data, the data is written into a first page included in the first group. The method also includes determining when a second group is available to receive the data if it is determined that the first group is not available to receive the data, and writing the data into a second page included in the second group when it is determined that the second group is available to receive the data.
Abstract:
A dry tissue sealant composition is provided, wherein composition includes a matrix scaffold coated with an adhesive layer, which is adherent to a tissue only upon contact with an aqueous solution such as blood or tissue fluid. Also provided are methods of making and using such a dry tissue sealant.
Abstract:
Un procedimiento para gestionar información en una UICC de gran capacidad, comprendiendo: almacenar el contenido de un fichero de un sistema de ficheros de almacenamiento masivo de la UICC de gran capacidad; asociar el fichero del sistema de ficheros de almacenamiento masivo con un fichero de un sistema de ficheros ISO de la UICC, donde el fichero ISO está asociado con los requisitos de seguridad para permitir su acceso; ocultar el contenido del fichero del sistema de ficheros de almacenamiento masivo con el fin de hacerlo inaccesible; y que comprende adicionalmente: solicitar acceso al contenido del fichero del sistema de ficheros de almacenamiento masivo; y, si está oculto, entregar los requisitos de seguridad al sistema de ficheros ISO y determinar si dichos requisitos concuerdan con los del fichero del sistema de ficheros ISO asociado; y, de ser así, revelar el contenido para hacerlo accesible.