A foldable table for steering wheel with features and devices that include: a table angle control ( ), a springing strip ( ), a limit stopper ( ) and reinforcing rib ( ) on the support ( ) to restrict the foldable table not to fall apart in fold-up position for easy carrying and storage; different ways of easily and rigidly mounting the foldable table on a steering wheel which can be removed just as easily as mounting; and a oblong slot on the surface of the foldable table for storage of pens, utensils, etc.
Method And Apparatus For Scanning Semiconductor Wafers Using A Scanning Electron Microscope
Jack Y. Jau - Los Altos CA Zhong Wei Chen - San Jose CA
Assignee:
Hermes Microvision, Inc. - San Jose CA
International Classification:
G01N 2304
US Classification:
250311, 250310, 250306, 250307, 2504911
Abstract:
An apparatus and method for scanning the surface of a specimen is disclosed for defect inspection purposes. Scanning Electron Microscope (SEM) is used to scan the surface of a specimen. The scanning method employed by the SEM comprises the steps of: generating a particle beam from a particle beam emitter, and scanning the surface of the specimen by deflecting the particle beam at an angle with respect to the surface of the specimen, wherein the particle beam traverses an angle that is not parallel or perpendicular to the orientation of the specimen. The specimen being scanned is a semiconductor wafer or a photo mask.
Method And Apparatus For Resource Locator Identifier Rewrite
John E. Gmuender - San Jose CA, US Huy Minh Nguyen - Fountain Valley CA, US Joseph H. Levy - Salt Lake City UT, US Michael B. Massing - San Jose CA, US Zhong Chen - Fremont CA, US David M. Telehowski - Sunnyvale CA, US
A method for resource locator identifier rewrite in which a network security proxy insures that a resource locator identifier of a response indicates a resource access protocol that should govern a corresponding request. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client.
Zhuangzhi Duo - Milpitas CA, US Zhong Chen - Fremont CA, US
Assignee:
SonicWALL, Inc. - Sunnyvale CA
International Classification:
H04B 7/00 H04L 12/26 H04L 12/56
US Classification:
3703102, 370229, 3702301, 370400, 455453
Abstract:
A centralized wireless LAN load balancing mechanism is described herein. In one embodiment, in response to a request for entering a wireless network from a wireless station and forwarded from multiple access points (APs) of the wireless network, a network access device coupled to the multiple APs determines a load for each of the APs. The network access device then selects one of the APs based on the determined loads of the APs and instructs the selected AP to associate with the wireless station. The network access device further instructs the remaining APs to reject the request. Other methods and apparatuses are also described.
Method And Apparatus For Resource Locator Identifier Rewrite
John E. Gmuender - San Jose CA, US Huy Minh Nguyen - Fountain Valley CA, US Joseph H. Levy - Salt Lake City UT, US Michael B. Massing - San Jose CA, US Zhong Chen - Fremont CA, US David M. Telehowski - Sunnyvale CA, US
A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client.
Wireless Extender Secure Discovery And Provisioning
Zhuangzhi Duo - Fremont CA, US Zhong Chen - Fremont CA, US John Gmuender - Sunnyvale CA, US
Assignee:
Sonicwall, Inc. - San Jose CA
International Classification:
H04L 12/28
US Classification:
370401, 370338, 4554221
Abstract:
According to embodiments of the invention, a first wireless access point discovers a second wireless access point, the first wireless access point tunes its radio and privacy settings, without user input, based upon parameters automatically exchanged in response to the discovery of the second wireless access point, and a secure direct wireless connection is established between the first and second wireless access points using the radio and privacy settings. Adding the first wireless to an existing mesh network includes a determination of the best available direct wireless connection.
Method And Apparatus For Resource Locator Identifier Rewrite
John E. Gmuender - San Jose CA, US Huy Minh Nguyen - Fountain Valley CA, US Joseph H. Levy - Salt Lake City UT, US Michael B. Massing - San Jose CA, US Zhong Chen - Fremont CA, US David M. Telehowski - Sunnyvale CA, US
Assignee:
eWinWin, Inc. - Tampa FL
International Classification:
G06F 15/16
US Classification:
709246, 726 2, 726 26
Abstract:
A method and apparatus for resource locator identifier rewrite have been presented. A security device receives from a resource host over a non-secure hypertext transfer protocol (HTTP) session a response to a request received from a client over a secure HTTP session. The response includes a uniform resource locator (URL) that is supposed to be for a resource host, but the URL does not designate a secure resource access protocol and the resource host requires the secure resource access protocol. The URL is located in the response and modified to designate the secure resource access protocol. After modification, the response is transmitted via the secure resource access protocol session to the client.
Wireless Extender Secure Discovery And Provisioning
Zhuangzhi Duo - Fremont CA, US Zhong Chen - Fremont CA, US John Gmuender - Sunnyvale CA, US
Assignee:
SonicWALL, Inc. - San Jose CA
International Classification:
H04L 12/28
US Classification:
370401, 370338, 4554221
Abstract:
According to embodiments of the invention, a first wireless access point discovers a second wireless access point, the first wireless access point tunes its radio and privacy settings, without user input, based upon parameters automatically exchanged in response to the discovery of the second wireless access point, and a secure direct wireless connection is established between the first and second wireless access points using the radio and privacy settings. Adding the first wireless to an existing mesh network includes a determination of the best available direct wireless connection.