Patent application number | Description | Published |
20090019514 | METHOD AND SYSTEM FOR ENFORCING PASSWORD POLICY IN A DISTRIBUTED DIRECTORY - The invention describes techniques for enforcing password policy within a distributed directory environment that includes one or more distributed directory servers and a proxy server that acts as an intermediate agent between a client and the distributed directory environment. In one aspect, the proxy server is enhanced to support the passing (from the backend server to the client) of password policy controls. In particular, controls returned from a backend server are parsed and cached (for re-use) for the life of a given client connection. According to another aspect, the proxy server ensures that all compare operations for a single user's password are directed to the same backend server in the distributed directory environment. This insures that a user's most current password is used, and that failed operation counts, resets and operational attributes are up-to-date. According to still another aspect, the proxy server enforces password policy on bind plug-ins and, in particular, through a pair of pre-bind and post-bind extended operations. In particular, pre-bind processing includes checking if an account is locked. Post-bind processing includes checking for expired passwords, grace logins and updating failed/successful bind counters. | 01-15-2009 |
20090019533 | METHOD AND SYSTEM FOR ENFORCING PASSWORD POLICY FOR AN EXTERNAL BIND OPERATION IN A DISTRIBUTED DIRECTORY - The invention describes techniques for enforcing password policy within a distributed directory environment that includes one or more distributed directory servers and a proxy server that acts as an intermediate agent between a client and the distributed directory environment. In one aspect, the proxy server is enhanced to support the passing (from the backend server to the client) of password policy controls. In particular, controls returned from a backend server are parsed and cached (for re-use) for the life of a given client connection. According to another aspect, the proxy server ensures that all compare operations for a single user's password are directed to the same backend server in the distributed directory environment. This insures that a user's most current password is used, and that failed operation counts, resets and operational attributes are up-to-date. According to still another aspect, the proxy server enforces password policy on bind plug-ins and, in particular, through a pair of pre-bind and post-bind extended operations. In particular, pre-bind processing includes checking if an account is locked. Post-bind processing includes checking for expired passwords, grace logins and updating failed/successful bind counters. | 01-15-2009 |
20090178105 | REDUCING OVERHEAD ASSOCIATED WITH DISTRIBUTED PASSWORD POLICY ENFORCEMENT OPERATIONS - A computer implemented method, data processing system, and computer program product for reducing the overhead associated with distributed password policy enforcement operations using a proxy server. when a proxy server provides a request from a client to a backend directory server, the proxy server determines whether a password policy check is required to be performed at the backend directory server. If a password policy check is not required to be performed at the backend directory server, the proxy server sends the client request together with a skip password policy control to the backend directory server. This skip password policy control informs the backend directory server to skip the password policy check on the client request. | 07-09-2009 |
20090178106 | PASSWORD POLICY ENFORCEMENT IN A DISTRIBUTED DIRECTORY WHEN POLICY INFORMATION IS DISTRIBUTED - A computer implemented method, data processing system, and computer program product for password policy enforcement in a distributed directory when policy information is distributed. When a proxy server is providing a request from a client to a backend directory server, the proxy server performs a series of LDAP operations on a targeted set of backend directory servers to collect password policy information applicable to a target user. The password policy information applicable to the target user is partitioned and distributed across the plurality of backend directory servers. When the password policy information for the target user has been collected, the proxy server evaluates the collected password policy information to determine an effective password policy for the target user. The proxy server then sends the request and subsequent requests with the effective password policy to a backend directory server. | 07-09-2009 |
20100070545 | LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) ADMINISTRATOR TASK NOTIFICATION CONTROL - The illustrative embodiments provide for automatically and proactively retrieving administrative maintenance tasks or potential issues from a set of directory servers without direct intervention from an administrator. Responsive to an operation request being sent from a requesting application to the set of directory servers and an administrative maintenance control mechanism being active, an administrative maintenance control is automatically sent to the set of directory servers. Responsive to receiving the response to the administrative maintenance control, an end user application within the data processing system is notified that the at least one of the administrative maintenance tasks or the potential issues have been received. | 03-18-2010 |
20100274769 | MANAGING DELETED DIRECTORY ENTRIES - A method, system, and computer usable program product for managing deleted directory entries are provided in the illustrative embodiments. An instruction to delete the entry is received. A second entry that includes a reference to the entry is identified. A third entry including information to be preserved from the entry is added in a deleted entries subtree. The third entry is modified to include the reference information from the second entry. The third entry is saved such that during a restore of the entry the third entry provides the information to restore the entry and the reference to the entry. The third entry may include a set of attributes that store an identifier of the second entry. The entry is restored from the third entry and made available in the directory. A reference is recreated in the second entry to the restored entry forming a restored second entry. | 10-28-2010 |
20100275059 | PRESERVING REFERENCES TO DELETED DIRECTORY ENTRIES - A method, system, and computer usable program product for preserving references to deleted directory entries are provided in the illustrative embodiments. An instruction to delete an entry is received. A second entry referencing the entry is identified. The second entry is marked as a ghost reference to the entry. The entry is converted to a deleted entry. A ghost attribute with a value of “false” may be added to the entry. A ghost attribute or tag with a value of “false” may be added to the second entry. The ghost tag may correspond to an attribute of the second entry that references the entry. An entry may be deleted by setting a value of a ghost attribute in the entry to true. The second entry may be marked as the ghost reference by setting a value of a ghost attribute or a ghost tag in the second entry to true. | 10-28-2010 |
20120102178 | Lightweight Directory Access Protocol (LDAP) Administrator Task Notification Control - The illustrative embodiments provide for automatically and proactively retrieving administrative maintenance tasks or potential issues from a set of directory servers without direct intervention from an administrator. Responsive to an operation request being sent from a requesting application to the set of directory servers and an administrative maintenance control mechanism being active, an administrative maintenance control is automatically sent to the set of directory servers. Responsive to receiving the response to the administrative maintenance control, an end user application within the data processing system is notified that the at least one of the administrative maintenance tasks or the potential issues have been received. | 04-26-2012 |
Patent application number | Description | Published |
20140286515 | EARMOLDS - This disclosure relates generally to an apparatus for retaining an earpiece in the ear during physical movement and exercise. In various instances, the apparatus may include a thinned region a posterior arch and ribs to allow deformation of the earmold and facilitate securing of the earmold in the concha bowl of the ear. | 09-25-2014 |
20150110320 | Earphone Assembly - This disclosure relates generally to waterproof electronic assemblies, such as earphones, earphone electronic controls, and waterproof connectors, as well as an apparatus for retaining an earpiece in the ear during physical movement and exercise. In various instances, the apparatus may include a thinned region a posterior arch and ribs to allow deformation of the earmold and facilitate securing of the earmold in the concha bowl of the ear. Electronic component assemblies described include electronic components, a cable, and a housing configured to house the electronic components. The housing also includes a cable aperture through which the cable extends, and a compression backstop extending into the interior of the housing. The electronic assembly may also include a gasket holder. The assembly also includes a gasket surrounding the cable, a compression wedge at least partially surrounding the circumference of the cable, and a crimp bead positioned proximate the compression backstop. | 04-23-2015 |
Patent application number | Description | Published |
20120193580 | Enhancement Of Syngas Production In Coal Gasification With CO2 Conversion Under Plasma Conditions - A process and apparatus for enhancement of syngas production (CO and H | 08-02-2012 |
20120253057 | Continuous Production Of Bioderived Esters Via Supercritical Solvent Processing Using Solid Heterogeneous Catalysts - A method for the continuous production of ester based organic compounds from renewable natural products via supercritical solvent processing in the presence of heterogeneous nano-structured catalysts. Fatty acid triglycerides may therefore be transesterified using heterogeneous nano-structured catalysts in the presence of supercritical alcohols to provide alkyl ester compounds and glycerine. | 10-04-2012 |
20130137886 | Extraction Of Lipids From Living Cells Utilizing Liquid CO2 - A process for the extraction of lipids from living cells utilizing liquid carbon dioxide optionally in the presence of a porous inorganic matrix or polymer coating as well as additional solvents to improve extraction efficiency. The cells may also optionally be treated a photosensitive material to promote cellular photosynthesis. | 05-30-2013 |
20140101988 | Fuels And Fuel Additives Production From Glycerol Conversion Using A Monohydric Alcohol And Heterogeneous Catalysis - The present disclosure relates to a method of converting glycerol into organic reaction products. The method may include mixing glycerol with a monohydric alcohol. The mixture of glycerol and monohydric alcohol is then reacted in the presence of a heterogeneous nano-structured catalyst, wherein the monohydric alcohol is present at subcritical/supercritical temperatures and pressures. This converts the glycerol into one or more reaction products, wherein the reaction products include an oxygenated organic reaction product. Ninety percent or greater of the glycerol is converted. | 04-17-2014 |
20150211103 | HYDRIDING OF METALLIC SUBSTRATES - The present disclosure relates to a method for accelerated hydriding of metallic substrates to evaluate the effects of hydrogen adsorption on substrate performance. The method includes applying to the substrate a metal that has an activation energy for hydrogen adsorption that is lower than the substrate activation energy for hydrogen adsorption. This is then followed by hydriding and evaluation of the effects of hydriding on substrate mechanical properties. | 07-30-2015 |
Patent application number | Description | Published |
20130287272 | Methods and Apparatus of Integrating Fingerprint Imagers with Touch Panels and Displays - The present invention provides systems and methods of an apparatus that comprises a layer of fingerprint imagers, an addressing circuit, a fingerprint controller, an electronic storage devices, a layer of touch panel and a display panel. The touch panel behind the layer of fingerprint imagers can sense touch position when touched. The specific fingerprint imagers can be activated according to the touch panel coordinates when touched by a user. After fingerprint is captured, the system evaluates quality of the captured fingerprint and admits fingerprint for recognition when its quality is above a threshold value. User of a computing system can be accepted or rejected based on the comparison between the captured fingerprint and an authorized fingerprint list. | 10-31-2013 |
20140129843 | Methods and Apparatus for Managing Service Access Using a Touch-Display Device Integrated with Fingerprint Imager - The present invention with an apparatus enables biometric based access control to services and/or resources that comprises a crypto processor, a biometric processor, a fingerprint controller, a frame hash engine, a display repeater and/or a display controller, a touch-panel controller and a biometric touch-display panel. The frame hash engine and/or the display controller computes a frame hash of the frame displayed on the biometric touch-display panel. When a fingerprint is captured, in the registration scenario, the biometric processor extracts biometric identity and stores it in a service biometric credential repository identity, and submits a registration proof to the server; in the service access scenarios, the biometric processor verifies user identity by matching fingerprint, and submits an access identity to the server. | 05-08-2014 |
Patent application number | Description | Published |
20090307643 | VECTOR SEQUENCE SIMPLIFICATION FOR CIRCUIT VERIFICATION - One set of illegal vector sequences is manually generated for a circuit design and a symbolic simulator is used to automatically generate another set of illegal vector sequences for the circuit design. For verification purposes, the relationship between the manually generated set and the automatically generated set is determined. Prior to determining this relationship, one or both of the sets are simplified. One simplification technique includes replacing pairs of illegal vector sequences that are the same except at one bit position with a more general illegal vector sequence representative of both illegal vector sequences of the pair. Another simplification technique includes sorting the illegal vector sequences in a list having a sort order from most general to most specific and then identifying illegal vector sequences that are redundant in view of one or more other illegal vector sequences prior in the sort order based on a binary decision diagram (BDD)-based analysis that sequences through the sorted list in its sort order. | 12-10-2009 |
20130297280 | Verification of Design Derived From Power Intent - An approach is provided in which a power design verification system retrieves a power intent data corresponding to a power design, which identifies the power design's power modes and power mode transition conditions. The power design verification system selects one of the power mode transition conditions, which identifies input signals that invoke a transition from a first power mode to a second power mode. In turn, the power design verification system generates simulation stimuli based upon the identified input signals and simulates the power design utilizing the generated simulation stimuli accordingly. | 11-07-2013 |
20130346375 | Equivalence Classes Over Parameter State Space - An approach is provided in which an equivalence class generator selects a configurable module that includes control points and configuration parameters. The configuration parameters define a parameter state space of the configurable module. The equivalence class generator utilizes the control points to generate equivalence classes, which include class representatives that indicate values for the configuration parameters. Next, one of the class representatives are selected and verified from each of the equivalence classes. In turn, the verification of the class representatives verifies the parameter state space of the configurable module. | 12-26-2013 |
20140325463 | Integrated Circuit Design Verification Through Forced Clock Glitches - A technique for determining whether an integrated circuit design is susceptible to glitches includes identifying storage elements in an original register-transfer level (RTL) file of the integrated circuit design and identifying clock signals for each of the storage elements in the original RTL file. The technique also includes generating respective assertions for each of the identified clock signals and identifying potential glitchy logic in respective clock paths for each of the identified clock signals. Finally, the technique includes inserting, at the potential glitchy logic, glitches in each of the respective clock paths of the original RTL file to provide a modified RTL file and executing an RTL simulation using the modified RTL file and the respective assertions. | 10-30-2014 |
Patent application number | Description | Published |
20100026123 | PERMANENT-MAGNET (PM) ROTORS AND SYSTEMS - Permanent-magnet (PM) rotors, rotor components, and machines using PM rotors. | 02-04-2010 |
20100052455 | Permanent-Magnet (PM) Rotors and Systems - Permanent-magnet (PM) rotors, rotor components, and machines using PM rotors, where the PM rotors have internally coupled PM bulks and/or are configured to have a non-uniform air gap between the rotor and a stator. | 03-04-2010 |
20100133941 | Permanent-Magnet (PM) Rotors and Systems - Line-start permanent-magnet (LSPM) rotors, rotor components, and machines using LSPM rotors, where the PM rotors have PM bulks in W-like shapes, vent openings between PM bulks, and/or air gaps at ends of PM bulks in the W-like shapes. | 06-03-2010 |
20110285236 | Rotating machines using trapped field magnets and related methods - Rotors with trapped-field magnet (TFM) bulks, machines with TFM rotors, and methods of activating and/or using machines with TFM rotors. | 11-24-2011 |
20140042855 | Permanent-Magnet (PM) Rotors and Systems - Permanent-magnet (PM) rotors, rotor components, and machines using PM rotors. | 02-13-2014 |