Abstract:
An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of a computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token.
Abstract:
An energy absorber for a high pressure and velocity fluid jet emanating from a nozzle is disclosed. An energy absorbing ball is freely rotatably supported in an energy absorbing chamber between seat faces. The high pressure and velocity fluid enters the energy absorbing zones and strikes the ball, causing it to rotate. The energy of the fluid is thereby substantially reduced. Since the ball is constantly in motion, a new surface is continually being brought into contact with the high energy fluid stream. This insures uniform wear of the ball as well as a long life. The ball and seats are disposed in a first end of a fluid flow conduit whose second end is carried in an adjustable support block which is in fluid communication with a fluid return line. The support block allows the spacing between the nozzle and the energy absorber to be varied to accommodate varying thicknesses of materials being cut by the high pressure fluid stream.
Abstract:
Techniques are provided to authenticate components in a system. Users may enter credentials into an input device and the credentials may be authenticated and/or securely transmitted to the components. The components may then provide the credentials to a server in the system. Strong authentication may thus be provided to the effect that credentials associated with specific users have been received from specific components in the system. The server may then enable the components to access selected services.
Abstract:
Access to secured services may be controlled based on the proximity of a wireless token to a computing device through which access to the secured services is obtained. An authorized user may be provided access to a service only when a wireless token assigned to the user is in the proximity of the computing device. A user's credential may be stored on an RFID token and an RFID reader may be implemented within a security boundary on the computing device. Thus, the credential may be passed to the security boundary without passing through the computing device via software messages or applications. The security boundary may be provided, in part, by incorporating the RFID reader onto the same chip as a cryptographic processing component. Once the information is received by the RFID reader it may be encrypted within the chip. As a result, the information may never be presented in the clear outside of the chip. The cryptographic processing component may cryptographically encrypt/sign the credential received from the token so that assurance may be provided to a service provider that the credentials came from a token that was proximate to the computing device. An RFID reader, cryptographic processing components and a wireless network controller may be implemented on a single chip in a mobile device.
Abstract:
Techniques are provided for users to authenticate themselves to components in a system. The users may securely and efficiently enter credentials into the components. These credentials may be provided to a server in the system with strong authentication that the credentials originate from secure components. The server may then automatically build a network by securely distributing keys to each secure component to which a user presented credentials.
Abstract:
An automated cutting and kitting system for preimpregnated composite material and method by which a layup of a plurality of plies of at least two types of preimpregnated composite material is cut and stored. Each ply of a given type of preimpregnated composite material is aligned in the order in which it is positioned in the layup, cut in accordance with a predetermined shape and stored such that the top ply in the layup is stored first. The different types of preimpregnated composite material are supported on a supply which is indexed to present the particular type of material required by the layup.
Abstract:
An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.
Abstract:
Techniques are provided to authenticate components in a system. Users may enter credentials into an input device and the credentials may be authenticated and/or securely transmitted to the components. The components may then provide the credentials to a server in the system. Strong authentication may thus be provided to the effect that credentials associated with specific users have been received from specific components in the system. The server may then enable the components to access selected services.
Abstract:
An input device with an integrated security module communicates with a processing component over an insecure medium. The insecure medium may be a wireless network, software stack, or the like. According to one embodiment, the security module is integrated into an existing chip of the input device. Data generated by the input device is encoded and/or authenticated by the security module prior its transmission to the processing device. The processing device receives the input data and processes it within its own security boundary for providing selected services or information to a user or application associated with the input device.
Abstract:
A compliant tape dispensing and compacting head and method by which tape is dispensed and compacted onto a contoured surface. Tape is dispensed from a plurality of tape supply reels onto the contoured surface and subject to the action of a compacting head. The compacting head is capable of being biased in the compaction direction, i.e., against the contoured surface, and adjusted by the biasing force to follow the contour of the contoured surface so that each discrete tape strip has a compacting force applied thereto which is normal to the contoured surface at the tape strip location.