sec

Continuous production process of tertiary alcohols by radical addition of secondary alcohols to alkenes

A process is disclosed for producing tertiary alcohols by radical addition of secondary alcohols to alkenes. The reaction is carried out as a continuous process in the presence of an organic peroxide as a radical initiator and during a mean contact time of the reaction mixture of up to a maximum of 1 hour.




sec

Electronic postage meter system having plural clock system providing enhanced security

A system includes a system time counter associated with a micro controller and a secure clock module having a real time clock and an elapsed time counter. The system synchronizes operation between the secure clock module and the system time counter. The synchronized time entered into the system time counter is utilized in the operation of the system. The real time clock time can be caused to be entered into the elapsed time counter at certain point in the operation of the system. The relationship of the time provide enhanced systems security.




sec

Electronic device, control method for electronic device, recharge-rate estimating method for secondary battery, and charging control method for secondary battery

A first circuit having a first coil electrically charges a second circuit having a second coil through electromagnetic coupling of the two coils. When data signals are to be transferred between the first and second circuits, signal transfer is started only after the second circuit has been charged for a predetermined period of time. The position relationship between the coils is also detected, and a charging/transfer selector changes a duty ratio between charge transfer and data transfer in accordance with the detected result. The charge is transferred in an intermittent manner, and the charging rate is adjusted according to the difference between the voltage of a secondary battery observed during a charging phase and the voltage of the secondary battery observed a certain time after interruption of the charging phase, or vice versa.




sec

Writing of new data of a first block size in a raid array that stores both parity and data in a second block size

A Redundant Array of Independent Disks (RAID) controller receives new data that is to be written, wherein the new data is indicated in blocks of a first block size. The RAID controller reads old data, and old parity that corresponds to the old data, stored in blocks of a second block size that is larger in size than the first block size. The RAID controller computes new parity based on the new data, the old data, and the old parity. The RAID controller writes the new data and the new parity aligned to the blocks of the second block size, wherein portions of the old data that are not overwritten by the RAID controller are also written to the blocks of the second block size.




sec

Writing of new data of a first block size in a raid array that stores both parity and data in a second block size

A Redundant Array of Independent Disks (RAID) controller receives new data that is to be written, wherein the new data is indicated in blocks of a first block size. The RAID controller reads old data, and old parity that corresponds to the old data, stored in blocks of a second block size that is larger in size than the first block size. The RAID controller computes new parity based on the new data, the old data, and the old parity. The RAID controller writes the new data and the new parity aligned to the blocks of the second block size, wherein portions of the old data that are not overwritten by the RAID controller are also written to the blocks of the second block size.




sec

Implementing security measures for authorized tokens used in mobile transactions

Security measures for tokens comprise storing security rules associated with a generated token in a memory. A processor, communicatively coupled to the memory, accesses the security rules associated with the generated token and determines whether to encrypt the generated token by applying at least a portion of the security rules to the generated token. The processor encrypts the generated token. An interface, communicatively coupled to the processor, communicates the encrypted token to a mobile device associated with a user.




sec

Systems and methods for data security

A system comprises a basic-input-output-system (“BIOS”), a disk drive, and a security system configured to prevent unauthenticated access to the disk drive. For each of at least two users out of a plurality of users, the BIOS authenticates the user based on the user's token. The BIOS also accesses secured data based on the authentication, and provides the secured data to the security system without input from the user.




sec

Security enclave processor power control

An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access to the SEP may be strictly controlled by hardware. For example, a mechanism in which the CPUs/APs can only access a mailbox location in the SEP is described. The CPU/AP may write a message to the mailbox, which the SEP may read and respond to. The SEP may include one or more of the following in some embodiments: secure key management using wrapping keys, SEP control of boot and/or power management, and separate trust zones in memory.




sec

Network security appliance

Methods, devices, and systems that may be used to secure networked devices are provided. One method includes receiving, at a security device, encrypted configuration data from a management server connected to a data network, from packets addressed to a networked device. The method further includes managing, by the security device, packets between the networked device and other devices accessible through a network based upon the configuration data. The method further includes sending, by the security device, a plurality of encrypted heartbeat messages to the management server utilizing an address associated with the networked device as the originating address for packets in which the encrypted heartbeat messages are transmitted.




sec

Variable domain resource data security for data processing systems

The variable domain data access control system and method described herein use the same variable domain to describe a data security model and a variable domain data model, such as a product configuration model. A variable domain is a set of resource data that can be described using a logical relationship data structure. The variable domain utilizes logical relationship expressions, such as a Boolean logic language, to define resource data in terms of parts, rules and/or attributes, and any other property that can be accessed for viewing, manipulation, or other purposes. The data security model represents an access control list (ACL) that includes security attributes as resource data and uses the same data structure and logical relationship expressions as an associated variable domain data model. An application, such as a configuration engine, can be used to create controlled access to the variable domain data model using the data security model.




sec

Apparatus for controlling processor execution in a secure environment

Various embodiments described herein relate to apparatus for executing software in a secure computing environment. A secure processor can be used and configured to request a context swap from a first context to a second context when switching execution from a first portion of software to a second portion of software. A context manager, which can be in communication with the secure processor, can be configured to receive and initiate a requested context swap. A trust vector verifier, which can be in communication with the secure processor and the context manager, can be configured to load a trust vector descriptor upon command from a context manager.




sec

Secured wireless access system and related method

The disclosure is directed to a system and method for establishing a secured wireless connection allowing the exchange of information between a wireless device and aircraft equipment. The secured wireless access system may require a user controlling the wireless device to interact with an onboard interface to initiate a connection. The user may be further required to enter a randomly generated security passcode to pair the mobile device to the aircraft equipment. Further security measures may be implemented, such as tiered user access levels restricting certain equipment and/or information based upon a user identity of the user requesting access.




sec

Organoxysilane compounds having silyl-protected secondary amino group and making method

A silane compound having a secondary amino group protected with a specific silyl group is useful as silane coupling agent, resin additive, textile treating agent, surface treating agent, paint additive, and adhesive.




sec

5-sec-butyl-2-(2-4-dimethyl-cyclohex-3-enyl)-5-methyl-[1,3]dioxane and process for making the same

The present invention is directed to 5-sec-butyl-2-(2,4-dimethyl-cyclohex-3-enyl)-5-methyl-[1,3]dioxane and a novel process for making the same.




sec

Insecticidal N-substituted (6-haloalkylpyridin-3-yl)-alkyl sulfoximines

N-Substituted (6-haloalkylpyridin-3-yl)alkyl sulfoximines are effective at controlling insects.




sec

Pesticidal composition comprising sulphur, an insecticide and an agrochemical excipient

The present invention relates to an pesticidal composition comprising an effective amount of a sulphur; an effective amount of at least one insecticide selected from the group consisting of cartap fipronil, pirimicarb, buprofezine, thiachloprid, acetamiprid, clothianidin, diafenthiuron, novaluron, flubendiamide, spirotetramat, thiamethoxam, imidacloprid or salts thereof, and at least one agrochemically acceptable excipient.




sec

Locking system for axially securing a rotor onto a rotatably mounted shaft

A locking system for axially securing a rotor onto a rotatably mounted shaft. The arrangement includes a plurality of locking levers which are each pivotably mounted about axes extending perpendicularly to the shaft between a locking position and an unlocking position in planes containing the axes. The locking levers can each be automatically transferred between an unlocking position and a locking position depending on rotational speed. The locking levers are mounted on the rotor and an annular groove is provided on the shaft and engages with the locking levers in the locking position, wherein the locking levers are prestressed in the unlocking position. Advantageously, the rotor can be both installed and removed without tools by merely placing the rotor onto or removing the rotor from the shaft, in each case depending on rotational speed.




sec

Colour laser marking of articles and security document precursors

A method of color laser marking an article having a polymeric foil with at least one colorless layer containing an infrared absorber, a polymeric binder and a color forming compound; including the steps of:—laser marking the colorless layer with an infrared laser using a first laser operation mode to generate a blue or cyan color; and—laser marking the same colorless layer with an infrared laser using a second laser operation mode to generate a black color, wherein the first laser operation mode applies less energy to the colorless layer than the second laser operation mode. Also disclosed is an article, such as a security document, including a polymeric foil and a colorless layer containing laser marked graphical data having a blue or cyan color and laser marked information having a black color.




sec

Colour laser marking methods of security documents

A security document precursor including, in order: a) at least one transparent biaxially stretched polyester foil; b) one colorless color forming layer containing at least an infrared absorber, a colorless dye-precursor and a polymeric binder; and c) a polymeric support; wherein the polymeric binder is copolymer including at least 90 wt % of a chlorinated ethylene and 1 wt % to 10 wt % of vinyl acetate both based on the total weight of the binder. Methods for making the security document precursor are also disclosed.




sec

Colour laser marking of articles and security documents

A method for preparing a color laser marked article comprising the steps of: a) infrared laser marking a security element including a polymeric support and a color forming layer comprising a color forming compound, an infrared dye and a polymeric binder comprising vinyl acetate and at least 85 wt % of vinyl chloride based on the total weight of the binder; and b) exposing the laser marked security element with light having a wavelength higher than 440 nm. The light exposure of step b) hinders the falsification of an issued security document without significant increase of background density.




sec

Security documents and colour laser marking methods for securing them

A security document precursor including, in order, at least: a) a transparent biaxially stretched polyethylene terephthalate foil; b) a colorless color forming layer containing at least an infrared absorber, a color forming component and a polymeric binder; and c) a polymeric support; wherein the colorless color forming layer contains at least one component forming a compound having a melting temperature of less than 20° C. upon laser marking the colorless color forming layer with an infrared laser. Methods for securing a security document using the security document precursor are also disclosed.




sec

Secondary assembly drive of an internal combustion engine and method for operating same

A secondary assembly drive of an internal combustion engine and a method for operating same are provided. The secondary assembly drive includes: a first drive wheel (1) which can be rotatably connected to a crank shaft (CR) of the internal combustion engine, an electric machine which can be operated either as a generator (AL) of as a motor (M) and a second drive wheel (2) which can be rotatably connected to the electric machine (AL, M), an air-conditioning compressor (A/C) and a third drive wheel (3) which can be rotatably connected to the air-conditioning compressor, a traction element (4) which rotates infinitely and which wraps around the drive wheels, and an actuable clutch (7) for disconnecting the drive of the electric machine and of the air-conditioning compressor from the crankshaft when necessary. In addition, the air-conditioning compressor is designed for operation in both rotational directions, and a reversal of the rotational direction between the generator operating mode and the motor operating mode of the electric machine is provided.




sec

Secondary assembly drive of an internal combustion engine and method for operating same

A secondary assembly drive of an internal combustion engine and a method for operating same are provided. The secondary assembly drive includes, in two drive planes, an assembly drive (2) and a starter drive (12) and permits, in addition to a normal operating mode, the following operating modes: —starting of the internal combustion engine, —boosting of the internal combustion engine, —air-conditioning, and —deactivation of the assembly drive (2).




sec

Mixing device for creating an output mixture by mixing a first material and a second material

A mixing device for mixing a first and second material together to create an output mixture. The device includes a first chamber containing the first material coupled to a mixing chamber defined between a rotor and a stator. The rotor is disposed inside the stator and rotates therein about an axis of rotation. The first chamber houses an internal pump configured to pump the first material from the first chamber into the mixing chamber. The pump may be configured to impart a circumferential velocity into the first material before it enters the mixing chamber. At least one of the rotor and stator have a plurality of through-holes through which the second material is provided to the mixing chamber. Optionally, a second chamber is coupled to the mixing chamber. The second chamber may house an internal pump configured to pump the output material from the mixing chamber into the second chamber.




sec

Run-off securing device

A run-off securing device, in particular a run-off securing device of a handheld power tool, is configured to avoid running off of a clamping element and/or a tool from a spindle. The device has at least one transmission unit, which is removably coupled to the spindle and has at least one first transmission element and at least one second transmission element. The at least one second transmission element is movable in relation to the at least one first transmission element. The transmission unit has at least one movement changing unit, which at least partially transforms a first relative movement between the at least one first transmission element and the at least one second transmission element into a second relative movement in a braking mode.




sec

Lubricating oil composition for sliding section comprising aluminum material, and lubricating method

Provided are a lubricant composition capable of reducing friction between sliding parts at least one of which contains an aluminum-based material in a lubrication section, and a method for lubricating an aluminum-based member with the composition. The lubricant composition is for use in a lubrication section having sliding parts at least one of which contains an aluminum-based material, and contains a lubricant base oil and at least one of a phosphorus-containing carboxylic compound and a metal salt thereof (component (A)) at 0.001 to 1 mass % of the composition in terms of phosphorus. The composition may suitably be used as lubricant such as drive train lubricant for automatic or manual transmissions, grease, wet brake oil, hydraulic actuation oil, turbine oil, compressor oil, bearing oil, refrigerant oil, and the like used in apparatus having the sliding parts.




sec

Section member drilling or milling machine

A section member drilling or milling machine comprises a machine bed for supporting a workpiece to be drilled, the machine bed including guides for controllably sliding thereon a support comprising precision vertical guides thereon a platform is engaged, the platform comprising parallel horizontal guides slidably supporting a carriage, in turn supporting a cantilever arm, including a driving motor for controllably driving a drilling and milling tool along parallel guides of the cantilever arm.




sec

Optical network terminal management control interface-based passive optical network security enhancement

A network component comprising at least one processor coupled to a memory and configured to exchange security information using a plurality of attributes in a management entity (ME) in an optical network unit (ONU) via an ONU management control interface (OMCI) channel, wherein the attributes provide security features for the ONU and an optical line terminal (OLT). Also included is an apparatus comprising an ONU configured to couple to an OLT and comprising an OMCI ME, wherein the OMCI ME comprises a plurality of attributes that support a plurality of security features for transmissions between the ONU and the OLT, and wherein the attributes are communicated via an OMCI channel between the ONU and the OLT and provide the security features for the ONU and the OLT.




sec

Method for securing a display diagnostic device to a display

An apparatus for securing a diagnostic tool proximate to and in front of a display device between the corners thereof. A harness is adapted to releasably hold the diagnostic tool, a restraining bracket extends from the harness, and there is at least one elastic cord having a first end, an intermediate portion and a second end. The cord is threaded through the restraining bracket and is sized so as to impart elastic tension to the corners of the display device while concomitantly protecting the front surface from pressure due to the position of the harness and diagnostic tool.




sec

Secure control mechanism for distributed photovoltaic system

A system for controlling photovoltaic electricity production equipment having photovoltaic modules each equipped with a DC/DC microconverter connected to a DC bus, a DC bus manager, and an inverter for converting the direct current from the photovoltaic panels into alternative current intended for an electrical distribution network. Power is injected into the DC bus when the voltage of the DC bus is less than a minimum voltage until the minimum voltage is reached. Each of the microconverters injects a maximum power from the photovoltaic modules into the DC bus when the voltage of the DC bus is between a first voltage and a second voltage. The injecting of power from the photovoltaic modules into the DC bus is stopped when the voltage of the DC bus is less than a low threshold voltage or greater than a high threshold voltage.




sec

Plasmon generator having flare shaped section

The present invention relates to a plasmon generator, in which a surface plasmon is excited by application of light. The plasmon generator extends along one direction. The plasmon generator includes a first end surface that is positioned on one end in the one direction and at which near-field light is generated along with the excitation of the plasmon; and a second cross section that is substantially parallel to the first end surface and is away from the first end surface. The first end surface has a polygonal shape that does not have a substantially acute inner angle. The second cross section has an upper part that has a shape substantially the same as or similar to that of the first end surface and a flare shaped lower part that is connected to the upper part and has a width that increases as it is far from the upper part.




sec

Device and method for securing sutures and the like

A bandage and method for securing a tension member comprising a central body and a plurality of tabs disposed about the central body. A tension member may be disposed across or through a slit or aperture of the central body. A body adhesive on the lower surface of the central body may secure the bandage to the patient. The tension member may then be pulled across the upper surface of the central body and a first tab may be folded over and adhered to the tension member and central body. The tension member may then be pulled back across the first tab and a second tab may be folded over and adhered to the tension member and first tab. Likewise, the tension member may then be pulled back across the second tab and a third tab may be folded over and adhered to the tension member and second tab.




sec

Method of securing a medical device onto a balloon and system thereof

A method for securing an implantable medical device onto a balloon which includes applying a coating, which includes a film-forming polymer and at least one solvent, to the outer surface of the balloon. The solvents can include alcohol, water, ether and combinations thereof. The film-forming polymer can include a zwitterionic polymer, such as, for example a phosphorylcholine polymer. The coating can be applied to the entire balloon surface or a portion of the surface. The implantable medical device is then positioned on the outer surface of the balloon and secured. The film-forming polymer is then allowed to cure in order to define an adhesive layer between an inner surface of the implantable medical device and the outer surface of the balloon. This method prevents or reduces the leaching or redistribution of any therapeutic agents dispersed within or on the surface of the implantable medical device.




sec

Low temperature melting furnace and metal sector using an external cooling passage

A low temperature melting furnace using an external cooling passage includes a wall including a plurality of metal sectors, each metal sector including a cooling passage formed along a longitudinal direction thereof, and an extension tube provided outwardly from the wall and connected to the cooling passage.




sec

Methods for producing secreted polypeptides having biological activity

The present invention relates to methods for producing a polypeptide having biological activity, comprising: (a) cultivating a fungal host cell in a medium conducive for the production of the polypeptide, wherein the fungal host cell comprises a first polynucleotide encoding the polypeptide operably linked to a second polynucleotide encoding a variant signal peptide or a variant prepropeptide; and (b) isolating the secreted polypeptide having biological activity from the cultivation medium.




sec

Insect resistant protein and insect-resistance gene encoding the insect-resistant protein

An insect-resistant protein exhibiting a sufficient resistance to insects; an insect-resistance gene encoding the insect-resistant protein; a recombinant vector containing the insect-resistance gene; a host cell and a plant cell having the recombinant vector transfected thereinto; a transformant transformed by the insect-resistance gene and a method for producing the same; a protein recovered thereby; and an insect-resistant agent comprising them as active ingredients. In accordance with the present invention, the insect-resistant protein is derived from a plant.




sec

Device for securing animal carcass for butchering

A device for use in suspending an animal carcass in an elevated condition includes a device body having an upper section which is integral with a lower section by way of a compound bend. The upper section is formed with a protrusion and the lower section includes a plurality of arms. The animal carcass includes a pelvic bone and the device is constructed and arranged to be positionable within the animal carcass such that the protrusion engages the pelvic bone in order to suspend the animal carcass in the elevated condition.




sec

Connecting structure for secondary battery and battery pack including the same

A connecting structure for a secondary battery for electrically connecting a core pack where two or more unit cells are electrically connected and a protection circuit module made of the unit cells of the core pack and a PCB substrate. The connecting structure includes a metal plate having an electrode connecting unit connected to an electrode of each unit cell of the core pack and a circuit connecting unit connected to the protection circuit module; and a circuit terminal unit electrically connected to the circuit connecting unit by being located in a connection hole formed in the PCB substrate of the protection circuit module so that the upper and lower portions of the PCB substrate communicate with each other. The circuit connecting unit is coupled and electrically connected to the circuit terminal unit by means of a connection method which allows selective connection and separation.




sec

Cable-type secondary battery and preparation thereof

The present disclosure provides a cable-type secondary battery, comprising: an inner electrode; and a sheet-form laminate of separation layer-outer electrode, spirally wound to surround the outer surface of the inner electrode, the laminate being formed by carrying out compression for the integration of a separation layer for preventing a short circuit, and an outer electrode. According to the present disclosure, the electrodes and the separation layer are compressed and integrated to minimize ununiform spaces between the separation layer and the outer electrode and reduce the thickness of a battery to be prepared, thereby decreasing resistance and improving ionic conductivity within the battery. Also, the separation layer coming into contact with the electrodes absorbs an electrolyte solution to induce the uniform supply of the electrolyte solution into the outer electrode active material layer, thereby enhancing the stability and performances of the cable-type secondary battery.




sec

Cap assembly and rectangular type secondary battery having the cap assembly

In a cap assembly and a rectangular type secondary battery having the cap assembly, the cap assembly includes a cap plate made of a metallic or nonmetallic material, a hollow, low-melting point glass metal tube inserted into a hole formed in the cap plate, and a metallic or nonmetallic pin inserted into the hollow glass metal tube, wherein the cap plate, the glass metal tube and the pin are atomically bonded with one another at their contact areas by high-temperature heating.




sec

Positive electrode active material particles for lithium ion secondary batteries, positive electrode using the same, and lithium ion secondary battery

Positive electrode active material particles for lithium ion secondary batteries include: a core particle including a first olivine-structured, lithium-containing phosphate compound which includes Fe and/or Mn and Li; and a shell layer attached to the surface of the core particle. The shell layer includes a second olivine-structured, lithium-containing phosphate compound which includes Fe and/or Mn and Li. At least the core particle includes a phosphorous compound represented by the formula (1): MemPnOp, where Me is Fe and/or Mn, 0




sec

Composite material tape for lithium secondary battery and lithium secondary battery using the same

A composite material tape and a lithium secondary battery using the same are provided. The composite material tape includes an organic base and at least one inorganic element dispersed within the organic base. The composite material tapes of the present invention exhibit improved Insulative and heat-resistant characteristics.




sec

Non-aqueous electrolyte and lithium secondary battery using the same

The present invention provides non-aqueous electrolyte solution for a lithium secondary battery, comprising an ester-based compound having a branched-chain alkyl group and an ester-based compound having a straight-chain alkyl group; and a lithium secondary battery using the same.




sec

Document security method utilizing microdrop combinatorics, ink set and ink composition used therein, and product formed

Disclosed are sets of ink components, and ink compositions, useful for printing markings, on security documents, that are relatively resistant to counterfeiting. Also disclosed are the security documents formed, a method of printing and a method of authenticating the printed material. The markings, formed of the ink compositions have a spectral response that deviates from a predicted spectral response when linearly additively combining spectral responses of components of the ink composition, so that it becomes difficult to reverse-engineer the ink composition from the markings. Use of plural different markings, with each marking being a microdot, increases difficulty in counterfeiting. By forming a template of spectral responses of the original pattern, spectral responses of a pattern on an unknown document can be compared to the spectral responses on the template for determining whether the unknown document is authentic. Formation of the markings is facilitated using an inkjet printer.




sec

Laminate sheet for security booklets and method for making same

A hard laminate sheet for security booklets and method of making the same. The laminate sheet comprises at least two hard core layers (e.g. of polycarbonate) and a flexible component (e.g. nylon) there between and extending beyond an outer edge of the core layers to form a flexible band. The flexible component may be provided as an intermediate layer also comprising a hard component (e.g. of polycarbonate) juxtaposed with the flexible component and laminated to the adjacent core layers. The flexible component comprises a plurality of apertures within which material of the adjacent core layers is laminated together and affixes the flexible component to the laminate sheet. Additional hard core layers may be laminated to the core layers which sandwich the intermediate layer. Optionally, the laminate sheet may be used for a travel document (such as a passport) and may be laser engraved. Also, optionally, the laminate sheet may comprise a hard core inlay layer configured for containing a contactless integrated circuit chip and antenna or other electronic hardware.




sec

Methods and architecture for cashless system security

Apparatus and method for secure transactions between gaming machines and portable devices are described. The secure transactions may include a transfer of an amount of an indicia of credit with a cash value from the portable device to the gaming machine or a transfer of an amount of an indicia of credit with a cash value from the gaming machine to the portable device. A logic device, separate from a master gaming controller on the gaming machine and placed in the gaming machine, may be operable to authenticate a portable device, such as a smart card, and authorize transactions involving transfers of indicia of credit between the portable device and the gaming machine. The logic device may be operable to send authentication information relating to the portable device to a remote host where a value amount of transactions involving the portable device authorized by the logic device may be higher when the logic device and the remote host authenticate the portable device as opposed to when the portable is only authenticated by the logic device.




sec

Suspension with divided positive and negative write trace sections, and head gimbal assembly and disk drive unit with the same

A suspension includes a positive write trace and a negative write trace. The positive write trace is separated into at least two positive write trace sections located at two different layers respectively, and the negative write trace is separated into at least two negative write trace sections located at two different layers respectively. Each positive write trace section and each negative write trace section are alternately arranged along a longitudinal direction on two different layers, and the positive write trace sections at different layers are connected together via conductive crossovers, and the negative write trace sections are connected together via conductive crossovers. The present invention can obtain balanced propagation time in the stacked trace structure to reduce signal distortion, and obtain widened frequency bandwidth.




sec

Disk drive adjusting a defect threshold when scanning for defective sectors

A disk drive is disclosed including a disk having a plurality of sectors, and a head actuated over the disk. A defect threshold is initialized, and a first sector is read to generate a first read signal. The first read signal is processed to detect a defect in the first sector relative to the defect threshold. After detecting the defect, the defect threshold is adjusted and the first sector is reread to generate a second read signal. The second read signal is processed to detect the defect in the first sector relative to the adjusted defect threshold.




sec

Methods and apparatus for constructing a secure and flexible operating system

The present disclosure provides methods and apparatus for constructing a secure and flexible operating system. The presently disclosed system executes different user applications in different operating systems on different virtual machines. Each user application communicates with other processes via the hypertext transfer protocol (HTTP). In particular, each user application's user interface is implemented in a web browser that is running in its own operating system on its own virtual machine, and each user application interacts with the user interface by exchanging HTTP messages between the virtual machines.




sec

Method and system for performing security monitoring on file downloading

The present invention discloses method and system for performing security monitoring on file downloading, and a non-transitory computer-readable medium that stores instructions for performing security monitoring on file downloading. The method includes upon detecting a file downloading operation, performing security detection on a downloaded file to determine whether the downloaded file is secure; if the downloaded file is secure, determining whether a downloading tool adopted when the file is downloaded is instant messenger (IM) software; and if the adopted downloading tool is IM software, modifying a filename extension of the downloaded file to ensure that the downloaded file is capable of being directly opened or run.