摘要:
The present invention relates to an improved fitness device; specifically, the present invention relates to a stationary fitness machine designed to strengthen multiple muscle groups including the abdominal, chest, intercoastal, latissimus dorsi, rhomboid, deltoid, bicep, forearm, oblique and gluteus maximus muscles using a unique, advanced, combined pull-up, fly movement.
摘要:
Blends of syndiotactic 1,2-polybutadiene and rubbery elastomers are prepared by a process that comprises polymerizing 1,3-butadiene monomer into syndiotactic 1,2-polybutadiene within a rubber cement of an elastomeric terpolymer by using a chromium-based, molybdenum-based, or iron-based catalyst composition. Polymer composition comprising the blend with improved properties is also provided.
摘要:
A secure credit card provides for secure transactions by users other than a holder of the secure credit card by providing storage for additional personal identification numbers (PINs) for authorized users. Transactions for authorized users may be controlled in accordance with individual user profiles stored in the secure credit card and which may be freely and flexibly established in regard to transaction amount, merchant restrictions and the like in response to recognition of a PIN corresponding to a holder of the secure credit card to whom the card is issued.
摘要:
A computer random access memory is divided into first and second partitions. Each partition has its own operating system (OS). The first partition has a conventional OS and is designated for non-Internet use. The second partition is designated for secure Internet access, and has an OS specific for Internet usage. Software in the second partition cannot write or copy files in the second partition. The size of the second partition is fixed and unchangeable while said second partition is open. Each software application in the second partition is allocated a memory region that cannot be changed, thereby preventing memory overflow attacks. A secure memory is designated for temporary storage of software used in the second partition. Cyclic redundancy check (CRC) values are calculated for all files in the secure memory. To detect unauthorized file changes, CRC values are calculated for all files used in the second partition, and checked against values stored in the secure memory. The second partition can write only to a secure memory using a security arrangement such as password protection or a download memory separate from the first partition to allow files stored in the download memory to be examined by scanning and testing from the first partition prior to being stored elsewhere in the computer.
摘要:
During a presentation conducted between a presentation computer and a user/participant computer, synchronization of displayed pages on the presentation computer and a user/participant computer is achieved consistent with allowing the user/participant to browse the presentation pages by storing a page identifier responsive to each page change at the presentation computer and, at each such page change, sending a “go to [page number]” command to the user/participant computer to display the current page, after which browsing may be resumed, if desired. Automatic selection between available communication links for communicating the “go to [page number]” command is also provided including a voice over Internet protocol (VoIP) link separte from the communication link used for conducting the presentation.
摘要:
Multiple computer devices are networked, and one device is designated as a bookmark server. The bookmark server stores and maintains a master bookmark database that is available to all the networked devices. Each bookmark in the bookmark database includes a bookmark time stamp. If a bookmark is added, deleted or changed at any device, then a transaction request is sent to the bookmark server. The transaction request includes a transaction time stamp indicating the time that the transaction request was created. The bookmark server analyzes the transaction requests according to the time stamps. If multiple transaction requests are received for a single bookmark, then only the most recent transaction request is honored and other transaction requests related to the bookmark are ignored. Also, a transaction request is ignored if the transaction time stamp is older than the corresponding bookmark time stamp.
摘要:
A system and method for utilizing RFID tags to manage automotive parts. A system is provided that includes a radio frequency identification (RFID) reader configured to read data from RFID tags affixed to parts located throughout a vehicle, wherein each RFID tag uniquely identifies a part; a data processing system configured to process the data obtained by the RFID reader; and a service application that provides service related information to an end user based on an installation or removal of a part from the vehicle.
摘要:
A near field communication device included in a secure transaction card provides an addition and/or transitional communication link for communicating secure transaction information. The near field communication device may be selectively engaged or disengaged and, when engaged, either active or passive modes of operation of the near field communication device can be selected. in the active mode, secure transaction information is transmitted upon establishment of a communication link with a complementary near field communication device. In the passive mode, secure transaction information is transmitted upon interrogation from a complementary near field communication device. Secure transaction information is generated and stored for transmission in a memory and at least a portion of the memory is erased or nulled upon transmission or upon expiration of a selected period of time.
摘要:
A user designated as a group leader of a group of users manages location information for the group of users using a base device. In particular, a client device is identified for each user in the group of users and an area within which each user in the group of users is to remain is defined. Subsequently, the base device can obtain location information for the client device(s) and process the location information for use by the group leader. For example, the base device can display the current location of one or more users, display the relative location of one or more users with respect to the group leader, and/or determine if one or more users are outside of the area. The group leader can then coordinate the group by communicating with one or more users in the group. In this manner, the group leader can make more informed decisions about the status of each group member and more efficiently coordinate the re-grouping and/or movement of the group of users.
摘要:
A near field communication device included in a secure transaction card provides an addition and/or transitional communication link for communicating secure transaction information. The near field communication device may be selectively engaged or disengaged and, when engaged, either active or passive modes of operation of the near field communication device can be selected. in the active mode, secure transaction information is transmitted upon establishment of a communication link with a complementary near field communication device. In the passive mode, secure transaction information is transmitted upon interrogation from a complementary near field communication device. Secure transaction information is generated and stored for transmission in a memory and at least a portion of the memory is erased or nulled upon transmission or upon expiration of a selected period of time.