会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明专利
    • An improved rib-tip holder attachment for sewing machines
    • GB462852A
    • 1937-03-17
    • GB3307235
    • 1935-11-28
    • JOSEPH LEVIN
    • D05B3/12
    • 462,852. Sewing-machines. LEVIN, J. Nov. 28, 1935, No. 33072. [Class 112] A sewing - machine attachment for use in securing rib tips to umbrella covers consists of a clamping device 48, and a holder 29, on which the tip 33 is held by jaws 30, 31, one of which is flexible and controlled by a spring 32. The holder 29, collar 28 and stem 27 are all horizontally adjustable in a pivoted block 23 controlled by a spring 24 which lifts it clear of the plate 20. This movement is limited by the stop 56. The block 23 is attached to the bracket plate 15 which is connected adjustably to pivot arm 13. On this arm is an adjustable slide plate 50, to which is pivotally secured clamp bar 46 and pressure foot 48, the movement of which bar is controlled by the rod 54 pressing downward and the treadle operated chain 53. The cover is placed inside-out over the rib tip, Fig. 9, the chain 53 released which allows rod 54 to lower arm 46 causing the spring finger 51 to push block 23 on to plate 20, which locates cloth on tip 33 and continued movement of arm 46 clamps the cloth 42 around the tip which is then sewn. Pressure on the treadle causes chain 53 to pull arm 46 up, firstly to release pressure foot 48, then allow block to rise, and finally through slotted link 57 to raise bar 13 and break stitching thread.
    • 8. 发明申请
    • Access control in a computer system
    • 计算机系统中的访问控制
    • US20060193467A1
    • 2006-08-31
    • US11355916
    • 2006-02-16
    • Joseph Levin
    • Joseph Levin
    • H04M1/00
    • G06F21/6281G06F21/6218G06F2221/2101G06F2221/2141
    • A technique for controlling a software process's access to securable objects that utilizes the native security mechanisms of an operating system. According to an aspect of the technique (i) a group is created, (ii) rights for the group are defined, (iii) the group is associated with a program image and (iv) the group is assigned to processes created from the program image. Specifically, access tokens associated with processes created from the program image are modified to include the groups associated with the program image. The modified access tokens are used by the operating system's native security mechanisms to determine if the processes, created from the program image, may gain access to securable objects.
    • 一种用于控制软件进程对使用操作系统的本机安全机制的安全对象的访问的技术。 根据该技术的一个方面(i)创建一个组,(ii)定义组的权限,(iii)组与节目图像相关联,并且(iv)将该组分配给从该节目创建的过程 图片。 具体来说,与从程序图像创建的进程相关联的访问令牌被修改为包括与程序图像相关联的组。 修改的访问令牌由操作系统的本机安全机制使用,以确定从程序映像创建的进程是否可以访问安全对象。