b

Aluminum extrusion heat sink structure and corresponding backlight module

The present invention relates to an aluminum extrusion heat sink structure and a corresponding backlight module. The aluminum extrusion heat sink structure comprises a light source connecting portion, a back plate connecting portion and a light guide plate support portion. The manufacture cost of the aluminum extrusion heat sink structure is lower, and the heat dissipation effect is better, so as to solve the technology problem that the volume of a traditional aluminum extrusion heat sink structure is larger caused the cost of the aluminum extrusion heat sink structure and the corresponding backlight module is higher.




b

Backlight unit with reflection structure formed on light guide plate and display device thereof

Embodiments of the invention disclose a backlight unit, including: a light guide plate, a light source member, a reflection film, wherein: the light guide plate (LGP) includes a light incident side, a light emission side and a bottom side opposite to the light emission side, the light guide plate is for emitting light entered from the light incident side through the light emission side; the light source member is disposed on the light incident side of the LGP and light emitted by the light source member enters the LGP through the light incident side of the LGP; the reflection film is at least disposed on the bottom side of the LGP and is for reflecting light back into the LGP; wherein a reflection structure is disposed on the bottom side of the LGP and a microstructure is disposed on the light emission side of the LGP.




b

Light guide plate and backlight assembly including the same

A backlight assembly includes a first light source unit including n light emitting members; and a light guide plate including a first side adjacent to the first light source unit, and a first groove adjacent to a first end of the first side.




b

Backlight module and display device

A backlight module and a display device are provided. The backlight module includes a light guide, a bottom frame, and a first light bar. The light guide has a first light incident surface. The bottom frame has a clip portion, a first hole, and a first tongue piece, wherein the light guide is disposed in the bottom frame and clipped by the clip portion. A driver board is locked to the first tongue piece, and the first tongue piece is folded from the first hole. The first light bar is disposed between the first light incident surface of the light guide and the bottom frame, and the first light bar has a first connector. The first connector passes through the first hole, so that the first connector is outside the bottom frame.




b

Dimmable light source with temperature shift

An illumination device (1) comprises: input terminals (2) for coupling to AC mains;a LED string (10) connected in series with the input terminals;a rectifier (30), having input terminals connected in series with the LED string;a controllable voltage source (40), having input terminals coupled to the rectifier output terminals;a series arrangement of at least one auxiliary LED (51) and a second ballast resistor (52) connected to the output terminals of the controllable voltage source. The voltage source comprises: a series arrangement of an adjustable first resistor (46) and a second resistor (47) connected in parallel to the input terminals;a tuneable Zener diode (49) connected in parallel to the output terminals, having a control input terminal (48) connected to the node between the two resistors; wherein positive output terminal is connected to positive input terminal and negative output terminal is connected to negative input terminal.




b

Lighted lid for beverage container

A lid for a beverage container or travel mug is provided that has one or more visual indicators to identify the location of the pour spout opening of the container or mug in low light conditions.




b

Ambient lighting jig assembly and method

An ambient lighting jig assembly generally includes a support assembly, a trim panel, an insert panel, and a light source. The support assembly defines an inner support cavity. The trim panel is configured to be coupled to the support assembly and at least partly defines a jig opening. The insert panel is configured to be rotatably coupled to the support assembly within the jig opening and has a reflective surface. The light source is configured to emit a light stream. Further, the light source is configured to be rotatably coupled to the support assembly within the inner support cavity at a plurality of angular positions so that the light stream is projected onto the reflective surface for use in determining an optimal angle for the insert panel and the light source.




b

LED assembly having a refractor that provides improved light control

An LED assembly that includes optics and optical arrangements for light emitting diodes (LEDs). In some embodiments, a reflector is provided within a void between the lens and the LED. This reflector can reflect light emitted by the LED in a non-preferred direction back toward the preferred direction. In other embodiments, an optical element is formed or otherwise provided in the lens cavity and shaped so that, when the lens is positioned above the LED, the refractor bends the emitted light in a preferred direction. In some embodiments, both a reflector and optical element are provided in the LED assembly to control the directionality of the emitted light. Such embodiments of the invention can be used to increase the efficiency of an LED by ensuring that generated light is being directed to the target area of choice.




b

Self-powered light bar

An emergency system for a vehicle integrates many disparate equipment into single housing, including the power supply for the equipment. In one embodiment of the invention, the emergency system is a light bar. The light bar houses a power source comprising solar cell panels, a Lithium-Ion battery pack and a connection to an external supply such as the vehicle's electrical power. Energy for operating the light bar is provided by one or more of the power sources, depending on operating conditions of the light bar and each of the power sources.




b

Surgical instrument with ratcheting rotatable shaft

An ultrasonic surgical instrument comprises a reusable housing including an internal transducer and an internal end effector rotation assembly. An exemplary rotation assembly is a ratchet and pawl assembly, which allows the transducer to rotate in a first direction but not in a second, opposite direction. The end effector, including an integral torque wrench, is attached to the transducer to form a single unit that is rotatable relative to the housing. The transducer attaches to a stationary cable via slip rings. The cable communicates with a generator, which provides electrical power to the transducer. The transducer converts the electrical power into ultrasonic vibrational energy, which is transmitted to the end effector.




b

Surgical forceps including blade safety mechanism

A forceps includes first and second jaw members and at least one handle movable between an open position and a closed position for moving the jaw members between a spaced-apart position and an approximated position. A ratchet mechanism includes first and second ratchet components configured to engage one another upon movement of the at least one handle to the closed position to retain the jaw members in the approximated position. A knife is selectively movable between a retracted position and an extended position, wherein the knife extends between the jaw members to cut tissue therebetween. A safety mechanism is configured to inhibit extension of the knife when the jaw members are disposed in the spaced-apart position. Movement of the ratchet components into engagement with one another to retain the jaw members in the approximated position disengages the safety mechanism, thereby permitting extension of the knife.




b

Implantable biodegradable wound closure device

A biodegradable device for maintaining the alignment of the edges of a trocar defect, consisting of two bases joined by a connector, a first base to be positioned below the defect and a second base above. The first base has a threaded hole from its upper surface but not through the lower surface. The connector attached to the bases such that there is a hole aligned with the threaded hole in the first base allowing a device to mate with the threads in the first base. The second base has a hole aligned with the hole in the connector and wide enough to allow a device to mate with the threads in the first base. The device is arranged so the distance between the lower surface of the second base and upper surface of the first base holds but does not compress the fascia around the trocar defect.




b

Bone anchor systems

Embodiments of the invention relate generally to tissue anchors and methods of delivering same to the intervertebral disc or other sites within the body. In some embodiments, the anchors provide pull-out resistance, stability and/or maximize contact with tissue involving a minimum amount of penetration. In some embodiments, delivery methods are minimally invasive and include linear, lateral, and off-angle implantation or driving of anchors along, against or within tissue surfaces.




b

Systems and methods for posterior dynamic stabilization of the spine

Devices, systems and methods for dynamically stabilizing the spine are provided. The devices include an expandable spacer having an undeployed configuration and a deployed configuration, wherein the spacer has axial and radial dimensions for positioning between the spinous processes of adjacent vertebrae. The systems include one or more spacers and a mechanical actuation means for delivering and deploying the spacer. The methods involve the implantation of one or more spacers within the interspinous space.




b

Spinal plate assembly

The present invention is directed to implantable devices for stabilizing or fusing bone structures within the spine. More specifically, the present invention is a spinal plate assembly that includes an automatic mechanism for blocking the pathway of a bone fastener once inserted to prevent unwanted backwards migration of the bone screw.




b

One-piece variable angle locking washer

A variable angle locking washer comprising a body having an outer surface circumferentially disposed between a top surface and a bottom surface, a central bore extending between the top and bottom surfaces, the central bore having a threaded portion and an unthreaded portion, and a plurality of radial slots peripherally positioned along the body, each slot defining a channel that extends between the outer surface of the body and the central bore.




b

Methods and apparatuses for flow restoration and implanting members in the human body

A medical device for blood flow restoration and/or for use as an implantable member in a human vessel includes a self-expanding member, a guidewire, and a connection mechanism. The self-expanding member includes a plurality of cells and filaments having specific ranges of thicknesses, widths, and heights. The self-expanding member can take on a volume-reduced coiled form with overlapped edges, and can generate optimal radial forces against a vessel wall and/or thrombus when deployed and expanded.




b

Method and inserter for interbody fusion

An elongate inserter has a distal end releasably connected to an expandable interbody fusion device and a proximal end including a trigger actuator. The interbody fusion device comprises a superior endplate and an inferior endplate that are movable in an expansion direction relative to each other in the intradiscal space. The inserter includes a lifting platform and an elevator that define cooperatively engaging ramps and ramps surfaces that upon operation of the trigger actuator cause the superior and inferior endplates to move relatively away from each other. A driver is supported by the inserter for pushing an insert into the expanded device between the superior and inferior endplates.




b

Composite vertebral spacers and instrument

An intervertebral fusion cage that is adapted to contain an inserter within its inner volume during insertion of the cage.




b

Anchoring device and system for an intervertebral implant, intervertebral implant and implantation instrument

Various embodiments of intervertebral implants, anchoring devices for intervertebral implants, and implantation instrumentation are provided, along with various embodiments of methods for using one or more of the devices. Some embodiments of an anchoring device have a body comprising at least one curve and a rigid plate elongated along a longitudinal axis so that its front end enters at least one vertebra while its rear end remains in the passage of an implant. In some embodiments, the plate comprises at least one longitudinal slot separating at least one posterior portion of the plate into two branches, with at least one branch comprising at least one withdrawal stop configured to retain the device in the implant.




b

High-strength microwave antenna assemblies

Various high-strength microwave antenna assemblies are described herein. The microwave antenna has a radiating portion connected by a feedline to a power generating source, e.g., a generator. The antenna is a dipole antenna with the distal end of the radiating portion being tapered and terminating at a tip to allow for direct insertion into tissue. Antenna rigidity comes from placing distal and proximal radiating portions in a pre-stressed state, assembling them via threaded or overlapping joints, or fixedly attaching an inner conductor to the distal portion. The inner conductor is affixed to the distal portion by, e.g., welding, brazing, soldering, or by adhesives. A junction member made from a hard dielectric material, e.g., ceramic, can be placed between the two portions and can have uniform or non-uniform shapes to accommodate varying antenna designs. Electrical chokes may also be used to contain returning currents to the distal end of the antenna.




b

Medical device with orientable tip for robotically directed laser cutting and biomaterial application

A medical device used in a medical robotic system has a conduit and an orientable tip. An optical fiber coupled to a laser source and/or a catheter coupled to one or more biomaterial sources extends through the conduit and tip so that the tip of the medical device may be robotically directed towards a target tissue for laser and/or biomaterial application as part of a medical procedure performed at a surgical site within a patient. A protective sheath covers the fiber as it extends through the conduit and tip. A first coupler adjustably secures at least the sheath to the medical device and a second coupler adjustably secures the fiber to at least the sheath. A similar dual coupler mechanism may be used to secure the sheathed catheter to the medical device.




b

Multiplanar bone anchor system

The present teachings provide one or more surgical implements for repairing damaged tissue, such as in the case of a spinal fixation procedure. A bone anchor is provided. The anchor can include a bone fastener. The bone fastener can include a head and a second end adapted to engage an anatomy. The bone fastener can extend along a longitudinal axis. The anchor can also include a coupling arrangement coupled to the head of the bone fastener so that the bone fastener is rotatable about the longitudinal axis to define a first plane of motion. The anchor can further include a saddle, which can be coupled to the coupling arrangement. The saddle can be movable relative to at least one of the bone fastener and the coupling arrangement to define a second plane of motion.




b

Apparatus and method of user interface with alternate tool mode for robotic surgical tools

In one implementation, a method is disclosed in which a lock sensing mode is entered for a robotic surgical instrument. In the lock sensing mode, the degrees of freedom of movement in the robotic surgical instrument are switchably reduced. Further in the lock sensing mode, one or more end effectors of the robotic surgical instrument are switchably clamped together in the robotic surgical instrument. An increased level of torque may also be applied to the end effectors to increase a gripping force applied by the one or more end effectors in response to the reduced degrees of freedom of movement in the robotic surgical instrument.




b

Cutting or scoring balloon and apparatus therefor

A cutting or scoring balloon (26) is provided with a plurality of cutting or scoring elements (34) and is wrapped onto a balloon catheter (12) such that the cutting or scoring elements (34) overlie the balloon wall (36) with the balloon wall (36) pleated underneath the cutting or scoring elements (34). The cutting or scoring elements (34) remain exposed when the balloon (26) is pleated and wrapped onto the balloon catheter (12) and in a tightly wrapped configuration.




b

Method and apparatus for a radiolucent and MRI compatible cranial stabilization pin

A substantially radiolucent cranial stabilization pin is adapted for use with a fixture for immobilizing a patient's head during a medical procedure. The pin includes a tip and a body, which are secured together to form the pin. The tip and body are constructed from non-ferrous, non-magnetic materials that are biocompatible. The tip and body are safe for use with, and compatible with, imaging techniques including MR imaging and CT imaging. In some examples the tip is a titanium insert and the body is molded within and around at least a portion of the tip. In some versions, the tip includes a hollow portion and one or more openings providing access to the hollow portion. The molded body flows into and around portions of the tip creating a secure pin suitable to withstand torque and axial forces observed in use.




b

Tissue ablation system with energy distribution

A microwave ablation system includes an energy source adapted to generate microwave energy and a power splitting device having an input adapted to connect to the energy source and a plurality of outputs. The plurality of outputs are configured to be coupled to a corresponding plurality of energy delivery devices. The power splitting device is configured to selectively divide energy provided from the energy source between the plurality of energy devices.




b

Flexible harmonic waveguides/blades for surgical instruments

In one embodiment, a surgical instrument comprises an articulable harmonic waveguide. The articulable harmonic waveguide comprises a first drive section comprising a proximal end and a distal end. The proximal end of the first drive section may be configured to connect to an ultrasonic transducer. The articulable harmonic waveguide further comprises a first flexible waveguide coupled to the distal end of the first drive section. An end effector extends distally from the first flexible waveguide. The surgical instrument further comprises an articulation actuator to flex the first flexible waveguide.




b

Data distributing and accessing method and system

A data distributing and accessing method for sharing a file via a network system includes steps of: dividing the file into a plurality of blocks; distributing the blocks in a plurality of data hosts interconnected via the network system; one of the data hosts receiving a file-reading request from a user host and issuing collecting requests to other data hosts to collect the blocks from the data hosts; and transferring the collected blocks from the data hosts to the user host to be combined into the file.




b

Mobile electronic device configured to establish secure wireless communication

The invention relates to a method for configuring a mobile device capable of reproducing, for a user, multimedia content previously provided by a remote content server. The invention relates to using a client installed on said electronic device to relay authentication requests between a card, preferably complying with the provisions of the Mobile Commerce Extension standard, and an authentication server that is accessible via an access point.




b

Network-based revocation, compliance and keying of copy protection systems

A method of authenticating a device involves establishing a local connection between a local target device and a local source device; at the source device, obtaining credentials of the target device via the local connection; at the source device, sending the credentials to a cloud authentication server via a secure communication channel; at the cloud authentication server, checking the credentials of the target device against a database of known good devices; at the source device, receiving a message from the cloud authentication server via the secure communication channel, said message indicating that the target device is authenticated; and delivering content from the source device to the target device on the condition that the target device is authenticated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.




b

Device and method for obfuscating visual information

A device is described for the hiding and subsequent recovery of visual information. The device comprises two or more tokens (1), each containing a mask (2,3) of coloured pixels (4), are overlaid (5), so that when the pixels are aligned, hidden information, invisible in the individual tokens. The hidden information consists of one or more recognisable alphabetic, numerical or pictorial characters (6). During token overlay and alignment, the information becomes recognisable because it is made up of pixels whose colour is differentiated from the other pixels in the overlay. The information is hidden by adding pixels of certain colours. When the tokens are overlaid and the pixels aligned, the added pixels are effectively subtracted, revealing the hidden information. The tokens may be printed on various media, or may be displayed on an electronic device.




b

Network communications using quantum key distribution

A method and apparatus for forming and distributing quantum encryption keys. A first quantum signal generated by a number generator in a communicator is transmitted through an aperture in the communicator to a receiving communicator. A second quantum signal is received through the aperture at the communicator from a transmitting communicator. The first quantum signal is isolated from the second quantum signal such that the first quantum signal is transmitted from the communicator in response to the first quantum signal passing through the aperture and such that the second quantum signal is received at a number detector in the communicator in response to the second quantum signal passing through the aperture.




b

Broadcast receiving apparatus and control method thereof

The present invention provides a broadcast receiving apparatus that receives a broadcast wave containing multiple channels. The apparatus comprises, among other things, a selecting unit that selects a channel from the broadcast wave; a determination unit that determines, for all channels that can be selected by the selecting unit, whether or not the obtaining unit can obtain an encrypted second-type encryption key that can be decrypted by the decrypting unit using the updated first-type encryption key; and an updating unit that updates the computer program stored in the memory to the updated program in the case where the determination unit has determined that the obtainment is possible for all the channels.




b

System and methods for UICC-based secure communication

A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed.




b

Method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise

A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.




b

Apparatus and methods for managing messages sent between services

Disclosed are methods and apparatus for managing services within a computer network. In one embodiment, a message interchange network for exchanging application-level messages between services, which are located outside the message interchange network, is provided. At the message interchange network, a plurality of application-level messages, which each specify which one or more receiving services are to receive the each application-level message, are received. Each received application-level message is forward towards the one or more receiving services. Correlation information regarding each application-level message that is received into message interchange network is retained. The application-level messages are sent between pairs of the services, and the retained correlation information for each application-level message pertains to each application-level message and any other application-level messages related to the each application-level message. A query can then be received, at the message interchange network from a first service, to search the retained correlation information for specific one or more portions of the retained correlation information. A response to the query, which includes the specific one or more portions of the retained correlation information, is sent to the first service.




b

System and method for obtaining certificate status of subkeys

Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of the subkeys are different in the acquired key, then the key is replaced.




b

Method for reproducing content data and method for generating thumbnail image

A content data reproducing method includes: decrypting encrypted data to generate plain-text data; dividing the plain-text data into decrypted content data and reproduction management information; sending the reproduction management information to a user space; storing the decrypted content data in a secret buffer; obtaining the decrypted content data as reproduction target data from the secret buffer and transmitting the reproduction target data to a decoder; and decoding the reproduction target data by the decoder.




b

Controlling resource access based on resource properties

Described is a technology by which access to a resource is determined by evaluating a resource label of the resource against a user claim of an access request, according to policy decoupled from the resource. The resource may be a file, and the resource label may be obtained by classifying the file into classification properties, such that a change to the file may change its resource label, thereby changing which users have access to the file. The resource label-based access evaluation may be logically combined with a conventional ACL-based access evaluation to determine whether to grant or deny access to the resource.




b

Method for arbitrary-precision division or modular reduction

A method in a portable data carrier for executing a cryptographic operation on security-relevant data comprises a step of determining a remainder (r) of a dividend (a) modulo a divisor (b). In so doing, the remainder (r) is determined iteratively by means of a division device of the data carrier. In each iteration there is carried out a Montgomery multiplication with the divisor (b) as the modulus and an additive linkage of an output value of the Montgomery multiplication with a coefficient (ai) derived from the dividend (a) and associated with the respective iteration. The Montgomery multiplication is carried out here by means of a multiplication device of the data carrier, preferably a corresponding coprocessor. The Montgomery multiplication of a subsequent iteration receives a result of a preceding iteration as an input value.




b

Apparatus and method for converting random binary sequence into random integer

An apparatus and method for converting a random binary sequence into a random integer is provided. The present invention converts a random binary sequence into a random integer, and determines whether the corresponding random integer falls within a preset integer interval. Further, if it is determined that the random integer generated from the random binary sequence does not fall within the preset integer interval, the present invention repeatedly updates a random binary sequence until a random integer falling within the corresponding integer interval is obtained, thus outputting uniformly distributed random integers which fall within the preset integer interval.




b

Level-two encryption associated with individual privacy and public safety protection via double encrypted lock box

Computationally implemented methods and systems are described herein that are designed to, among other things, receiving a level-one encrypted output of a surveillance device; encrypting at least a part of the level-one encrypted output of the surveillance device with a level-two encryption key whose decryption key is inaccessible by a level-two encryption entity; and transmitting a level-two encrypted output of the surveillance device.




b

Methods and apparatus for base station assisted peer discovery through aggregation of expressions

A method, an apparatus, and a computer program product for wireless communication are provided in which a UE is equipped to generate an expression associated with a wireless device for use in a peer discovery signal, generate an expression set from the expression, a first temporal frequency, and a first time duration, and transmit the generated expression set to a base station to allow the base station to broadcast each of the expressions included in the expression set at the first temporal frequency over the first time duration. Another method, apparatus, and computer program product for wireless communication are provided in which a base station is equipped to receive an expression set from a wireless device, process the received expression set to determine each of one or more instances of an expression, and transmit each of the one or more instances of the expression.




b

Methods, apparatus, and articles of manufacture to encode auxilary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data

Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data are disclosed. An example method to embed auxiliary data into text data includes assigning source data to one of a plurality of groups, the source data comprising text data, identifying a symbol to be added to the source data based on an assigned group of the source data, and generating encoded data by including in the source data a text character representative of the symbol.




b

On-demand download of partial encrypted content for partial super distributed content

A request to render content associated with a first super distributed content file is detected by a content rendering device. At least one portion of the content associated with the first super distributed content file is determined to be missing from the first super distributed content file. A second file including the at least one portion of the content missing from the first super distributed content file is obtained from a server. The at least one portion of the content of the second file includes partial encrypted portions of the content associated with an encryption system of the content rendering device. A content output stream including decrypted partial encrypted portions of the content of the second file and the content associated with the first super distributed content file is generated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.




b

Method and apparatus for authenticating public key without authentication server

Provided is a method in which a first device authenticates a public key of a second device. The method includes: receiving a first value generated based on the public key of the second device and a password displayed on a screen of the second device and the public key of the second device, from the second device; generating a second value based on the public key of the second device and a password input to the first device by a user of the first device according to the password displayed on the screen of the second device; and authenticating the public key of the second device based on the first value and the second value.




b

Method and server for providing a mobility key

A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to the network, the authentication server extracts a subscriber identification contained in said message and generates a corresponding mobile key, which is stored together with the respective extracted subscriber identification. Upon subsequent receipt of a key request message (key request) that is transmitted when a subscriber registers, the authentication server extracts a mobile identification of the subscriber contained in said message and searches for an identical mobile identification, which can be derived in accordance with a configurable derivation function from a subscriber identification that is stored in the authentication server. Once a derived mobile identification that is identical or can be uniquely assigned to the extracted mobile identification has been found, the authentication server provides the stored corresponding mobile key that has been generated, to cryptographically protect the mobile signaling messages of the registered subscriber.




b

Mobile host using a virtual single account client and server system for network access and management

A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.




b

Method for producing photonic wire bonds

A method for making optical connections with optical waveguides includes mounting the optical waveguides or a device comprising the optical waveguides, on a component carrier. A partial region of the optical waveguides is embedded in a volume of resist material. Positions of the optical waveguides to be connected are detected with reference to a coordinate system using a measuring system. Favorable, three-dimensional geometries are determined for optical waveguide structures for connecting the optical waveguides to each other at predetermined connecting locations and the optical waveguide structure geometries are converted to a machine-readable dataset. The optical waveguide geometries in the volume of the resist material are three-dimensionally structured using a direct-writing lithography device operating on the basis of the machine-readable dataset. The structured resist material is treated using physical or chemical methods to form at least one optical waveguide structure having ends connected to predetermined connecting locations of the optical waveguides.