y

Relay apparatus, program of relay apparatus and transmitting apparatus

A relay apparatus of a video and audio transmitting/receiving system delays a time before transmitting an authentication start instruction after an authentication start video signal being transmitted to a receiving apparatus. Accordingly, a problem that the receiving apparatus receives the authentication start instruction from the relay apparatus before locking the authentication start video signal and cannot perform authentication processing normally, leading to a failure in authentication. A correction time is decided based on a resolution of the authentication start video signal transmitted from the receiving apparatus and a combination of receiving apparatuses and transmitting apparatuses connected to the relay apparatus.




y

Network communications using quantum key distribution

A method and apparatus for forming and distributing quantum encryption keys. A first quantum signal generated by a number generator in a communicator is transmitted through an aperture in the communicator to a receiving communicator. A second quantum signal is received through the aperture at the communicator from a transmitting communicator. The first quantum signal is isolated from the second quantum signal such that the first quantum signal is transmitted from the communicator in response to the first quantum signal passing through the aperture and such that the second quantum signal is received at a number detector in the communicator in response to the second quantum signal passing through the aperture.




y

Private key generation apparatus and method, and storage media storing programs for executing the methods

Disclosed herein are a private key generation apparatus and method, and storage media storing programs for executing the methods on a computer. The private key generation apparatus includes a root private key generation unit and a sub-private key generation unit. The root private key generation unit sets a root master key and predetermined parameters capable of generating private keys, and generates a first sub-master key set capable of generating a number of private keys equal to or smaller than a preset limited number. The sub-private key generation unit generates private keys with the root private key generation unit by receiving the first sub-master key set from the root private key generation unit, to generate a private key corresponding to a user ID using the first sub-master key set, and issues the private key to a user.




y

System and methods for UICC-based secure communication

A system that incorporates the subject disclosure may include, for example, instructions which when executed cause a device processor to perform operations comprising sending a service request to a remote management server; receiving from the management server an authentication management function and an encryption key generator for execution by a secure element and an encryption engine for execution by a secure device processor, sending a request to establish a communication session with a remote device; and communicating with the remote device via a channel established using an application server. The secure element and the secure device processor authenticate each other using a mutual authentication keyset. The secure element, the secure device processor and the device processor each have a security level associated therewith; the security level associated with the secure device processor is intermediate between that of the secure element and that of the device processor. Other embodiments are disclosed.




y

Method and system for enhancing cryptographic capabilities of a wireless device using broadcasted random noise

A secret stream of bits begins by receiving a public random stream contained in a wireless communication signal at a transmit/receive unit. The public random stream is sampled and specific bits are extracted according to a shared common secret. These extracted bits are used to create a longer secret stream. The shared common secret may be generated using JRNSO techniques, or provided to the transmit/receive units prior to the communication session. Alternatively, one of the transmit/receive unit is assumed to be more powerful than any potential eavesdropper. In this situation, the powerful transmit/receive unit may broadcast and store a public random stream. The weaker transmit/receive unit selects select random bits of the broadcast for creating a key. The weaker transmit/receive unit sends the powerful transmit/receive unit the selected bit numbers, and powerful transmit/receive unit uses the random numbers to produce the key created by the weaker transmit/receive unit.




y

Method and system for secured remote provisioning of a universal integrated circuit card of a user equipment

The present invention provides a method and system for secured remote provisioning of a universal integrated circuit card of a user equipment. A system includes a user equipment for initiating a request for remote provisioning of an universal integrated circuit card (UICC) in the user equipment, where the request for remote provisioning includes a machine identifier (MID) associated with the user equipment and a public land mobile network (PLMN) identifier (ID) associated with an network operator. The system also includes at least one shared key management server for dynamically generating security keys and an operator shared key using the security keys, the MID. Moreover, the system includes an operator network for generating a subscription key using the operator shared key and an international mobile subscriber identity (IMSI), and provisioning the IMSI in a secured manner to the UICC of the user equipment using the security keys.




y

System and method for securely communicating with electronic meters

An infrastructure for securely communicating with electronic meters is described, which enables secure communication between a utility and a meter located at a customer, over a communication link or connection such as via a network. This enables messages to be sent from the utility to the meter and vice versa in a secure manner. The network provides a communication medium for communicating via the C12.22 protocol for secure metering. A cryptographic backend is used to cryptographically process messages to be sent to the meter and to similarly cryptographically process messages sent from the meter. By providing appropriate cryptographic measures such as key management, confidentiality and authentication, the meter can only interpret and process messages from a legitimate utility and the utility can ensure that the messages it receives are from a legitimate meter and contain legitimate information.




y

System and method for obtaining certificate status of subkeys

Systems and methods for updating status of digital certificate subkeys. A request is made to a key server to verify if a given key is revoked. If it is not, then the key with its subkeys is acquired from the key server. If one or more subkeys or signatures of the subkeys are different in the acquired key, then the key is replaced.




y

Enhancing data security using re-encryption

A data source may be configured to provide usage data including subscriber identifiers and associated information indicative of subscriber device locations and usage. A data warehouse server may be configured to perform operations including: decrypting subscriber identifiers included in usage data received from the data source using a two-way rolling key groups algorithm; re-encrypting the subscriber identifiers decrypted from the usage data to create secure encrypted identifiers using a one-way secured encryption algorithm; and correlating the subscriber identifiers in the decrypted usage data with the corresponding re-encrypted identifiers.




y

System and method for protecting information and related encryption keys

A system apparatus and method for protecting information are provided. Embodiments of the invention may detect inactivity related to a computing device. Information and encryption key may be removed from a memory. Subsequent activity may be detected. An authentication procedure may be performed, and, contingent on authenticating a relevant entity, a master key may be generated and installed in a memory.




y

Method and system for providing a rotating key encrypted file system

A file system data is divided into two or more data blocks. A unique encryption key is assigned to each data block with the encryption key assigned to each data block being distinct from other encryption keys used to encrypt the other data blocks and each of the data blocks is encrypted using its assigned encryption key. One of the data blocks within the file system is then selected and decrypted using the distinct encryption key assigned to the selected data block and a new encryption key, distinct for the previously assigned encryption key, is assigned to the selected data block and the selected data block is re-encrypted using the new encryption key. This process is then repeated for each data block on a sequential/cyclic and continually rotating basis.




y

Key generation techniques

In one or more embodiments, an integrated circuit includes a programmable memory, a key generation module and a module. The programmable memory is to maintain a first key portion. The key generation module is to generate a key using the first key portion from the programmable memory and a second key portion received via a memory interface. The module is to encrypt or decrypt data using the key.




y

Cryptanalysis method and system

A cryptanalysis method comprising: (A) Performing a ciphertext-only direct cryptanalysis of A5/1 and(B) Using results of Step (A) to facilitate the decryption and/or encryption of further communications that are consistent with encryption using the session key and/or decryption using the session key, wherein the cryptanalysis considers part of the bits of the session key to have a known fixed value, and wherein the cryptanalysis finds the session key. An efficient known plaintext attack on AS/2 comprises trying all the possible values for R4, and for each such value solving the linearized system of equations that describe the output;The solution of the equations gives the internal state of RI, R2, and R3; Together with R4, this gives the full internal state which gives a suggestion for the key.




y

Method for arbitrary-precision division or modular reduction

A method in a portable data carrier for executing a cryptographic operation on security-relevant data comprises a step of determining a remainder (r) of a dividend (a) modulo a divisor (b). In so doing, the remainder (r) is determined iteratively by means of a division device of the data carrier. In each iteration there is carried out a Montgomery multiplication with the divisor (b) as the modulus and an additive linkage of an output value of the Montgomery multiplication with a coefficient (ai) derived from the dividend (a) and associated with the respective iteration. The Montgomery multiplication is carried out here by means of a multiplication device of the data carrier, preferably a corresponding coprocessor. The Montgomery multiplication of a subsequent iteration receives a result of a preceding iteration as an input value.




y

Apparatus and method for generating secret key using change in wireless channel on wireless communication network

A secret key generation apparatus and method are provided. The secret key generation apparatus includes at least one antenna, amplification/phase controllers, a transceiver, and a random signal controller. The antenna receives a wireless signal from a counterpart terminal that performs wireless communication. The amplification/phase controllers control the amplification gain and phase of the wireless signal that is received via at least one antenna. The transceiver measures the status of a wireless channel using the wireless signal having the controlled amplification gain and phase, determines parameters based on results of the measurement, and generates a secret key based on results of the determination. The random signal controller controls the amplification/phase controllers so that the amplification gain and phase are adjusted whenever the transceiver generates a secret key.




y

Apparatus and method for converting random binary sequence into random integer

An apparatus and method for converting a random binary sequence into a random integer is provided. The present invention converts a random binary sequence into a random integer, and determines whether the corresponding random integer falls within a preset integer interval. Further, if it is determined that the random integer generated from the random binary sequence does not fall within the preset integer interval, the present invention repeatedly updates a random binary sequence until a random integer falling within the corresponding integer interval is obtained, thus outputting uniformly distributed random integers which fall within the preset integer interval.




y

Level-two encryption associated with individual privacy and public safety protection via double encrypted lock box

Computationally implemented methods and systems are described herein that are designed to, among other things, receiving a level-one encrypted output of a surveillance device; encrypting at least a part of the level-one encrypted output of the surveillance device with a level-two encryption key whose decryption key is inaccessible by a level-two encryption entity; and transmitting a level-two encrypted output of the surveillance device.




y

Apparatus and method for address privacy protection in receiver oriented channels

Disclosed is a method for address privacy protection for a first wireless device sharing a privacy key with a second wireless device. In the method, a first resolution tag is generated at the first wireless device using a pseudo-random function with the seed value and the privacy key as input arguments. The privacy key is only known to the first and second wireless devices. A privacy address is generated for the first wireless device based on the seed value and the first resolution tag. A packet is transmitted from the first wireless device to the second wireless device. The packet includes the privacy address and the first resolution tag.




y

Methods and apparatus for base station assisted peer discovery through aggregation of expressions

A method, an apparatus, and a computer program product for wireless communication are provided in which a UE is equipped to generate an expression associated with a wireless device for use in a peer discovery signal, generate an expression set from the expression, a first temporal frequency, and a first time duration, and transmit the generated expression set to a base station to allow the base station to broadcast each of the expressions included in the expression set at the first temporal frequency over the first time duration. Another method, apparatus, and computer program product for wireless communication are provided in which a base station is equipped to receive an expression set from a wireless device, process the received expression set to determine each of one or more instances of an expression, and transmit each of the one or more instances of the expression.




y

Managing encryption keys in a computer system

A method and apparatus is disclosed for managing encryption keys in a computer system in which in response to the change of a system key the old key and new key are both maintained for subsequent use.




y

Methods, apparatus, and articles of manufacture to encode auxilary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data

Methods, apparatus, and articles of manufacture to encode auxiliary data into text data and methods, apparatus, and articles of manufacture to obtain encoded data from text data are disclosed. An example method to embed auxiliary data into text data includes assigning source data to one of a plurality of groups, the source data comprising text data, identifying a symbol to be added to the source data based on an assigned group of the source data, and generating encoded data by including in the source data a text character representative of the symbol.




y

On-demand download of partial encrypted content for partial super distributed content

A request to render content associated with a first super distributed content file is detected by a content rendering device. At least one portion of the content associated with the first super distributed content file is determined to be missing from the first super distributed content file. A second file including the at least one portion of the content missing from the first super distributed content file is obtained from a server. The at least one portion of the content of the second file includes partial encrypted portions of the content associated with an encryption system of the content rendering device. A content output stream including decrypted partial encrypted portions of the content of the second file and the content associated with the first super distributed content file is generated. This abstract is not to be considered limiting, since other embodiments may deviate from the features described in this abstract.




y

Instantaneous recommendation of social interactions in a social networking system

As a user of a social networking system views a page that includes information provided by the system, certain types of social interactions are monitored. If an interaction monitored for is detected, at least one recommendation unit is identified to present to user on the page. The recommendation unit is identified based on a description of the interaction. The recommendation unit suggests that the user perform a social interaction in the social networking system. The recommendation unit is transmitted to a device of the user and is presented to the user on the page without having to reload the entire page.




y

Method and apparatus for authenticating public key without authentication server

Provided is a method in which a first device authenticates a public key of a second device. The method includes: receiving a first value generated based on the public key of the second device and a password displayed on a screen of the second device and the public key of the second device, from the second device; generating a second value based on the public key of the second device and a password input to the first device by a user of the first device according to the password displayed on the screen of the second device; and authenticating the public key of the second device based on the first value and the second value.




y

Method and server for providing a mobility key

A method and authentication server provide a mobile key. According to the method, upon receipt of an authentication message (access authentication) that is transmitted when a subscriber logs on to the network, the authentication server extracts a subscriber identification contained in said message and generates a corresponding mobile key, which is stored together with the respective extracted subscriber identification. Upon subsequent receipt of a key request message (key request) that is transmitted when a subscriber registers, the authentication server extracts a mobile identification of the subscriber contained in said message and searches for an identical mobile identification, which can be derived in accordance with a configurable derivation function from a subscriber identification that is stored in the authentication server. Once a derived mobile identification that is identical or can be uniquely assigned to the extracted mobile identification has been found, the authentication server provides the stored corresponding mobile key that has been generated, to cryptographically protect the mobile signaling messages of the registered subscriber.




y

Disk array device and data management method for disk array device

A disk array device comprises a first storage unit that stores encrypted user data, a second storage unit that is different from the first storage unit and locks and stores configuration information including a first encrypted authentication key that unlocks the encrypted user data, a management unit that includes a decoder that decodes the first encrypted authentication key and a control unit that unlocks the locked configuration information using a second authentication key, the management unit managing data using the first and second authentication keys. the management unit includes a configuration information recovery portion that unlocks the locked configuration information by using the second authentication key and recovers the configuration information during booting and a user data unlocking portion that decodes the first encrypted authentication key included in the configuration information and unlocks the encrypted user data stored in the first storage unit by using the first decoded authentication key.




y

Method and system for providing conditional access to encrypted content

A method and system of providing conditional access to encrypted content includes receiving unsolicited multiply encrypted video content and first decryption data over a broadcast network. Partially decrypted video content is obtained by decrypting a first layer of encryption of the encrypted video content using the first decryption data. The partially decrypted video content is stored. A request for viewing the encrypted video content is transmitted and second decryption data is received. A second layer of encryption of the encrypted video content is decrypted using the second decryption data.




y

Access management system

An access rights management system is presented in which a mobile device may be allowed to access corporately held data in a flexible manner but in which the security and integrity of the data is maintained. The mobile device is provided with a rights adjustment module which modifies the access rights for locally stored corporate data in dependence on the connectivity of the mobile device with a corporate server.




y

Mobile host using a virtual single account client and server system for network access and management

A Virtual Single Account (VSA) system and method that provides a mobile user with automatic authentication and connection to a remote network via local access networks with a single password, where the local access networks may be independent of the remote network. A mobile user has a single authentication credential for one VSA that is utilized by a VSA client installed on a mobile computing device. The VSA client provides for automatically authenticating and connecting the user's mobile device to a current local access network, and the target remote network such as the user's office network. All authentication credentials are encrypted using a key generated from the user's VSA password that is generated from the user's single password. The VSA client derives the key from the submitted VSA password and decrypts all authentication credentials that are required in order to connect the mobile device to the current local access network and thereafter to the office network.




y

System and method of lawful access to secure communications

The present disclosure relates to systems and methods for secure communications. In some aspects, one or more values used to generate an encryption key used to encrypt a packet are stored in a header of the packet. The packet is transmitted with the encrypted data portion in a communication. In some aspects, one or more values used to generate an encryption key are received. The encryption key is regenerated using the one or more values.




y

Ceramic article with reduced surface defect density and process for producing a ceramic article

A machined ceramic article having an initial surface defect density and an initial surface roughness is provided. The machined ceramic article is heated to a temperature range between about 1000° C. and about 1800° C. at a ramping rate of about 0.1° C. per minute to about 20° C. per minute. The machined ceramic article is heat-treated in air atmosphere. The machined ceramic article is heat treated at one or more temperatures within the temperature range for a duration of up to about 24 hours. The machined ceramic article is then cooled at the ramping rate, wherein after the heat treatment the machined ceramic article has a reduced surface defect density and a reduced surface roughness.




y

Method for making polyamide particles

This disclosure relates to a method of preparing polyamide particles. The method include spray drying a solution containing a polyamide to form polyamide particles having an average diameter of between about 0.5 μm and about 10 μm and at least about 85% of the polyamide particles having a diameter distribution of no more than about 1.5 μm.




y

Process for producing implants and components by directing shaping

The invention relates to a method for producing implants and components by direct shaping. The method includes the steps of producing a mold for the implants or components to be produced, making allowances for changes in geometry occurring during after-treatment after the implants or components are removed from the mold, and, providing partial areas of the mold with a structured surface for transferring this structure to the surfaces of the implants or components. In the method, raw material is introduced into the mold and, after remaining in the mold for a certain period of time, the hardened raw material is then removed from the mold to allow the implants or components to take on the structured surface of the mold as well as its geometry. The demolded implants or components are finally subjected to any after-treatment that may be necessary.




y

Method of making flexible foaming member from recycled materials

The present invention provides a method of making a flexible foaming member from recycled material. The present invention relates to a production method to recycling wastes containing rubber, plastic and metal materials and pulverize them into scraps under normal temperatures, then roughly separate the various materials contained in the waste scraps into different layers based on the difference of specific gravity, and further take out the scraps of rubber and plastic materials with lower specific gravity from the waste scraps, then conduct multiple heating and pulverizations under different temperatures to produce composite-material scraps, and then using some composite-material scraps to mix flexible materials and foaming agents, then pressing the mixture into a plate-like foaming material, and conduct vulcanization and foam forming for the plates of foam material to become a elastic foam.




y

Method for manufacturing ethylene vinyl acetate copolymer sheet for solar cell encapsulant

Provided is a method for manufacturing a sheet for a solar cell encapsulant which has stability against yellowing after a crosslinking process and thus good appearance with improved productivity in the sheet manufacture process, specifically to a method for manufacturing a sheet for a solar cell encapsulant characterized by melt-mixing a resin composition with an organic peroxide, a co-crosslinking agent and a silane coupling agent at the degradation temperature of the organic peroxide or less, wherein the resin composition is obtained by melt-mixing EVA resin with an antioxidant, an UV absorber and a light stabilizer at 80-220° C., and forming a sheet from the obtained melt-mixed resin composition.




y

Solid imaging systems, components thereof, and methods of solid imaging

There is provided solid imaging methods and apparatus for making three-dimensional objects from solid imaging material. A tray with a film bottom is provided to hold solid imaging material that is selectively cured into cross-sections of the three-dimensional object being built. A coater bar is moved back and forth over the film to remove any uncured solid imaging material from a previous layer and to apply a new layer of solid imaging material. A sensor is provided to measure the amount of resin in the tray to determine the appropriate amount of solid imaging material to be added, from a cartridge, for the next layer. A shuttle, which covers the tray when the exterior door to the solid imaging apparatus is opened for setting up a build or removing a three-dimensional object, can also be used to move the coater bar and to selectively open one or more valves on the cartridge to dispense the desired amount of solid imaging material.




y

System, method, and apparatus for solar heated manufacturing

A system for a thermal manufacturing system including a heliostat and a mold. The heliostat includes at least one reflecting surface, a steering mechanism and a controller. The steering mechanism is coupled to the at least one reflecting surface and capable of directing at least a first portion of the at least one reflecting surface toward a first one of multiple, selectable focal points. The mold is located in a second one of the selectable focal points. A manufacturing method is also disclosed.




y

Method for producing a plastic article and blow mould for carrying out the method

The invention relates to a method for producing a plastics material article, said method including the extruding of a tube-shaped parison and the re-forming of the parison into a hollow body within a blow mold by applying differential pressure. The method includes initially a first expanding and partial shaping of the parison with the blow mold not completely closed. Then at least one opening is provided on the circumference of the pre-expanded parison. In a further step at least one part to be built-in is introduced through the opening into the interior of the partially shaped plastics material article. In a final step the blow mold is closed completely and the blow molding of the plastics material article is completed.




y

Nitrile rubbers which optionally contain alkylthio terminal groups and which are optionally hydrogenated

An improved polymerization and process method allows the production of special nitrile rubbers which are characterized by a specific anion content and an excellent storage stability and allow a particularly good vulcanization rate and moreover result in vulcanized materials that have advantageous properties, especially with regard to the contact with metal components of molded parts based on said vulcanized materials.




y

Holding assembly for a lens

A holding device (1) holds a lens (6) at its lens edge (5) with the aid of an adhesive connection (16, 17). The adhesive connection (16, 17) is applied only at one adhesive point or only at two spaced apart adhesive points (16, 17). Each holding device (1) provided with a lens (6) is positioned on the dip frame in such a manner that the lens (6) is positioned above its holding device (1). A method is provided for finishing lenses (6) wherein the lenses (6) are subjected to various sequential finishing steps of a finishing process and the lenses (6) are cemented to the same holding device during finishing. The application of adhesive is only at one adhesive point or at two spaced apart adhesive points (16, 17).




y

Methods for making layered dental appliances from the outside in

A system and method for making a layered dental appliance. The system can include a first portion comprising a negative of a first layer of a layered dental appliance, and a second portion comprising a positive shape of a second layer of the layered dental appliance. The method can include providing a mold comprising a negative of an outer shape of a layered dental appliance, and positioning a slurry in the mold, forming a first layer of the layered dental appliance. The method can further include providing a solid structure comprising a positive shape of a second layer of the layered dental appliance, and pressing the solid structure into the slurry in the mold.




y

Method of molding gas hydrate pellet

A method is for molding a gas hydrate pellet for improving convenience of handling of a natural gas hydrate during transportation and storage, and thereby improving the practical use of the natural gas hydrate. Gas hydrate slurry is fed in a compression chamber, and pressure and compression are applied to the gas hydrate slurry by advancing a compression plunger. At that time, a stroking speed of the compression plunger is set minimum, preferably less than a value expressed by a stroke length of the compression plunger at compression×10−2 (m/min. By advancing the compression plunger at low speed, binding between particles of the gas hydrate is tightened, thereby the gas hydrate pellet with increased shearing strength can be molded.




y

Method for the production of a layered or stacked inorganic/organic composite material

The invention relates to a method for the production of a layered or stacked inorganic/organic composite material, a predominantly inorganic material being provided and a polymer material being provided, characterized in that the predominantly inorganic material has a glass transition temperature or melting temperature lower than 500° C., that the predominantly inorganic material and the polymer material are each molten, and that the predominantly inorganic material and the polymer material are coextruded from the melt and thus form the composite material.




y

Injection tool for producing components by injection moulding

An injection tool for the production of components by an injection-molding method, the injection tool including several cavities for shaping one respective product, an injection nozzle for injecting plastic materials for each cavity, and an actuating device. The injection nozzle has an injection channel which can be closed by a nozzle needle in order to control the injection process. The actuating device is arranged to move the nozzle needle in an axial direction between a first end position and a second end position, with an adjustable stop being provided which defines the first end position.




y

Retardation compensators of negative C-type for liquid crystal display

Disclosed is a negative C-type retardation compensator for a liquid crystal display. The negative C-type retardation compensator for the liquid crystal display includes polyarlate having a thio group or a sulfur oxide group in a polymer main chain thereof. Accordingly, the retardation compensator has an absolute value of negative retardation that is larger in a thickness direction that a retardation compensator which includes polyarylate having no thio group or sulfur oxide group in a polymer main chain thereof even though the retardation compensator having the thio group or sulfur oxide group and the retardation compensator having no thio group or sulfur oxide group are the same as each other in thickness. Thereby, the negative C-type retardation compensator for liquid crystal displays is capable of being desirably applied to the liquid crystal displays.




y

Renewable polyester compositions having a low density

A thermoplastic composition that contains a rigid renewable polyester and has a voided structure and low density is provided. To achieve such a structure, the renewable polyester is blended with a polymeric toughening additive to form a precursor material in which the toughening additive can be dispersed as discrete physical domains within a continuous matrix of the renewable polyester. The precursor material is thereafter stretched or drawn at a temperature below the glass transition temperature of the polyester (i.e., “cold drawn”). This creates a network of voids located adjacent to the discrete domains, which as a result of their proximal location, can form a bridge between the boundaries of the voids and act as internal structural “hinges” that help stabilize the network and increase its ability to dissipate energy. The present inventors have also discovered that the voids can be distributed in a substantially homogeneous fashion throughout the composition.




y

Compositions of polyesters and fibrous clays

Compositions of thermoplastic polyesters containing dispersed nanoparticles of fibrous clay are made by polymerizing the polyester precursors in the presence of exfoliated fibrous clay that has not been organically modified. The compositions have good physical properties and can be melt molded into various articles. Many of these articles may be coated (painted) and are especially useful for appearance parts such as visible exterior automotive body parts.




y

Spray-drying apparatus and methods of using the same

A spray-drying apparatus includes a drying chamber that has a first end, a second end, and at least one side wall extending between the first and second ends to define an interior of the drying chamber having a center axis. A nozzle can be positioned at the first end of the drying chamber and be configured to atomize liquid and spray the atomized liquid into the interior of the drying chamber at a maximum spray pattern angle relative to the center axis. A ratio of the length between the first end and second end to a maximum width between opposing internal surfaces of the interior of the drying chamber can be at least 5 to 1.




y

Information processing device, information processing method, playback device, playback method, program and recording medium

An information processing device includes first encoding means for encoding an image by placing strip-shaped areas in the upper and lower sides, second encoding means for encoding data of first subtitles displayed in a third area formed by joining at least a part of one area of a first area and a second area together with the other area, first generating means for generating information referred to form the third area, and second generating means for generating the contents including the video stream, a stream of the first subtitles, and the control information.




y

Disc player device

When a disc player device (100) is powered on again, playback information stored in a nonvolatile storage portion (160) is retrieved by a playback information retrieving portion (170) and delivered to a user operation auto-executing portion (180). It is determined whether or not user input instructions are limited, on the basis of user operation mask information obtained by a user operation mask information obtaining portion (130). An information comparing portion (182) compares playlist information, and an information comparing portion (184) compares play item information. Finally, a title including playlist information and play item information last stored in the nonvolatile storage portion (160) before the power-on of the disc player device (100) is searched for, and normal playback of the title is started. Such a configuration allows for quick playback resuming of a BD-J title being played at the time of the power-off, with a Java application running.