Abstract:
Several improvements on roller ball applicators on glass bottles have been described. A unique mechanical design of the roller ball housing to obtain minimal leak of the bottle ingredients is described. Also described is a hidden tamper evident band.
Abstract:
Methods and apparatus to configure virtual private mobile networks for security are disclosed. A disclosed example method includes identifying, in a wireless network, a communication from a user equipment that matches a security event profile, transmitting, from the wireless network, an instruction to enable the user equipment to be communicatively coupled to a virtual private mobile network, the virtual private mobile network being provisioned for security within the wireless network, and enabling the user equipment to transmit a second communication through the virtual private mobile network securely isolated from other portions of the wireless network.
Abstract:
A method of powerline communications including a first node and at least a second node on a PLC channel in a PLC network. The first node sends a physical layer (PHY) data frame on the PLC channel including a preamble, PHY header, a MAC header and a MAC payload. The PHY header includes a destination address field having a destination address therein. The second node receives the data frame. The second node compares its network address to the destination address before decoding the MAC header and MAC payload, providing power savings by allowing the second node to not decode the MAC header or MAC payload if its network address does not match the destination address in the PHY header of the data frame.
Abstract:
Example methods and apparatus to enhance security in residential networks and residential gateways are disclosed. A disclosed example apparatus includes a transceiver to receive an Internet protocol (IP) packet, a first packet processing module associated with a protected IP address, the first packet processing module to be communicatively coupled to a first network device, a second packet processing module associated with a public IP address, the second packet processing module to be communicatively coupled to a second network device, and a packet diverter to route the received IP packet to the first packet processing module when the IP packet contains the protected IP address and to route the IP packet to the second packet processing module when the IP packet does not contain the protected IP address.
Abstract:
A surface mounted pulse transformer (100) comprising a drum core (1) and a number of coils (3). The drum core includes a core (11), a first flange (12a) and a second flange (12b) disposed on both ends of the core. The number of coils wind around the core to form a primary coil and a secondary coil. A number of electrodes (40) are formed on surfaces of the first and second flanges and to be connected to an external substrate. The ends of the coils are physically and electrically connected to the electrodes. One of the electrodes has an electrode groove (401) for receiving and positioning one end of the coils.
Abstract:
An electronic communication device comprises a first transceiver capable of a bi-directional communication session on a first communication medium; a second transceiver capable of a bi-directional communication session on a second communication medium; and a control logic coupled to the first transceiver and the second transceiver and capable of implementing a convergence layer, wherein the control logic is configured to receive, from the first transceiver, a first signal; and cause, in response to the first signal, data received and transmitted by the first transceiver on the first communication medium as part of a communication session to be received and transmitted instead by the second transceiver on the second communication medium.
Abstract:
Light modulator displays may be illuminated using a light guide comprising diffractive optics that directs light onto the light modulators. The light guide may comprise, for example, a holographic light turning element that turns light propagating within the light guide onto the array of light modulators. In some embodiments, the holographic element has multiple holographic functions. For example, the holographic element may additionally collimate ambient light or diffuse light reflected form the light modulators.
Abstract:
A method of powerline communications including a first node and at least a second node on a powerline communications (PLC) channel in a PLC network. The first node sends a physical layer (PHY) data frame on the PLC channel including a preamble, a PHY header, a MAC header and a MAC payload. The MAC header includes a Cyclic Redundancy Check (CRC) field (MH-CRC field). The second node receives the data frame, parses the MAC header to reach the MH-CRC field, and performs CRC verification using the MH-CRC field to verify the MAC header. If the CRC verification is successful, (i) the second node parses another portion of the MAC header to identify a destination address of the data frame and (ii) to determine whether the data frame is intended for the second node from the destination address.
Abstract:
A system and method to ensure trustworthiness of a remote service provided by a service provider. The method includes monitoring runtime dependencies invoked during execution of a service transaction associated with the remote service, the service transaction being requested by a service requester. The method further includes determining whether a deviation exists between the runtime dependencies and a trusted list of dependencies associated with the remote service. The method also includes blocking execution of the service transaction based on determining that the deviation between the runtime dependencies and the trusted list of dependencies exists.
Abstract:
Devices, systems, and methods are disclosed which utilize lightweight agents on a mobile device to detect message-based attacks. In exemplary configurations, the lightweight agents are included as contacts on the mobile device addressed to an agent server on a network. A malware onboard the mobile device, intending to propagate, unknowingly addresses the lightweight agents, sending messages to the agent server. The agent server analyzes the messages received from the mobile device of the deployed lightweight agents. The agent server then generates attack signatures for the malware. Using malware propagation models, the system estimates how many active mobile devices are infected as well as the total number of infected mobile devices in the network. By understanding the malware propagation, the service provider can decide how to deploy a mitigation plan on crucial locations. In further configurations, the mechanism may be used to detect message and email attacks on other devices.