Fluid exchange machine
    11.
    外观设计

    公开(公告)号:USD1046073S1

    公开(公告)日:2024-10-08

    申请号:US29807250

    申请日:2021-09-09

    摘要: FIG. 1 is a top, left, front perspective view of a fluid exchange machine of the present invention;
    FIG. 2 is a top, right, front perspective view thereof;
    FIG. 3 is a front, side elevation view thereof;
    FIG. 4 is a right, side elevation view; and,
    FIG. 5 is a left, side elevation view thereof.
    The even-length broken lines are for environmental purposes only and depict portions of the fluid exchange machine that form no part of the claimed design.
    A top and bottom plan views, as well as a rear view, have been omitted as they form no part of the claimed design.

    Vehicle
    13.
    外观设计
    Vehicle 有权

    公开(公告)号:USD1044601S1

    公开(公告)日:2024-10-01

    申请号:US29835097

    申请日:2022-04-15

    摘要: FIG. 1 depicts a front, top, left perspective view of a vehicle showing our new design.
    FIG. 2 depicts a rear, top, right perspective view thereof.
    FIG. 3 depicts a front view thereof.
    FIG. 4 depicts a rear side view thereof.
    FIG. 5 depicts a left view thereof.
    FIG. 6 depicts a right view thereof.
    FIG. 7 depicts a top view thereof; and,
    FIG. 8 depicts a bottom view thereof.
    The claimed design is indicated by the relatively dark portions of the vehicle illustrated in the figures. The relatively light portions show portions of the vehicle that form no part of the claimed design. The dash lines depict boundaries of the claimed design and form no part of the claim.

    Automated key and encryption system

    公开(公告)号:US12081662B2

    公开(公告)日:2024-09-03

    申请号:US16065415

    申请日:2018-06-05

    申请人: eBay Inc.

    IPC分类号: H04L9/08

    CPC分类号: H04L9/0891 H04L9/0819

    摘要: An automated encryption system to: store a first key policy in association with a first key, and a second key policy in association with a second key; determine that a remote machine stores a first application that is affected by the first key policy and a second application affected by the second key policy, wherein the first application utilizes the first key to encrypt first data, and the second application utilizes the second key to encrypt second data; determine that the first key of the first application is non-compliant with the first key policy; send a request to deploy a third key in response to determining that the first key of the first application is non-compliant with the first key policy; and receive a response that includes a result of the request to deploy the third key.