Abstract:
A system and method of sorting mineral streams, for example laterite mineral ores, into appropriately classified valuable and waste streams for maximum recovery of value from the mineral stream, e.g., a stream of minerals includes receiving response data indicating reflected, absorbed or backscattered energy from a mineral sample exposed to a sensor, where the mineral sample is irradiated with electromagnetic energy. The system determines spectral characteristics of the mineral sample by performing spectral analysis on the response data of the mineral sample and identifies a composition of the mineral sample by comparing the spectral characteristics of the mineral sample to previously developed spectral characteristics of samples of known composition. The system then generates a sort decision for the mineral sample based on the comparison, where the sort decision is used in diverting the mineral sample to a desired destination e.g. pyrometallurgical treatment stages, or to a waste stream.
Abstract:
A method and system for analyzing user input for security, authentication or other purposes includes displaying an objective for a user to pursue and receiving user input via a user input device as the displayed objective is pursued, wherein the user input includes manual manipulation of a user input device, such as a mouse. The received user input is then compared to a user profile representing prior manual manipulation of the user input device in pursuit of the displayed objective. Other features and functions are also disclosed, including a method to improve security by permitting multilingual users to employ an alternative language when responding to on-screen prompts.
Abstract:
In an exemplary embodiment, the server receives the client's Distinguishing Name (DN), and then searches its directory for identification information and access control rights for this specific context. The server can act as a stand-alone server or in conjunction with other directory services on the network. A client must have a verifiable identity in order for secure communications to continue. A client's identity can be said to be fully verifiable if the server has access to the directory service that maintains that client's DN. The client receives the server's DN, and the client can then determine whether or not to accept a response to a request for information (i.e., trust the response). The client determines the identity of the server using some directory service (the client can act stand-alone or as a client of other directory servers). A server is fully verifiable if the client can identify the directory service that maintains the server's DN. In both cases, determining identity is predicated on being able to identify a directory service. Since servers and clients are issued identities (DN's) from some directory service before they participate in secure communications, they are able to at least identify their “home” directory service. Their “home” directory service communicates with other directory services, each “serving” their lists of electronic identities to each other using secure directory services. In this manner, a client or server can verify the peer identity of a secure communicator by relying on the trusted “home” directory service. Public Key certificates, certificate revocation lists, pending certificate requests, Certification Authority policy, and other information is stored in the directory server. Access to the directory server is through secure communications; this maintains the integrity and privacy of the information.
Abstract:
In an exemplary embodiment, the server receives the client's Distinguishing Name (DN), and then searches its directory for identification information and access control rights for this specific context. The server can act as a stand-alone server or in conjunction with other directory services on the network. A client must have a verifiable identity in order for secure communications to continue. A client's identity can be said to be fully verifiable if the server has access to the directory service that maintains that client's DN. The client receives the server's DN, and the client can then determine whether or not to accept a response to a request for information (i.e., trust the response). The client determines the identity of the server using some directory service (the client can act stand-alone or as a client of other directory servers). A server is fully verifiable if the client can identify the directory service that maintains the server's DN. In both cases, determining identity is predicated on being able to identify a directory service. Since servers and clients are issued identities (DN's) from some directory service before they participate in secure communications, they are able to at least identify their "home" directory service. Their "home" directory service communicates with other directory services, each "serving" their lists of electronic identities to each other using secure directory services. In this manner, a client or server can verify the peer identity of a secure communicator by relying on the trusted "home" directory service. Public Key certificates, certificate revocation lists, pending certificate requests, Certification Authority policy, and other information is stored in the directory server. Access to the directory server is through secure communications; this maintains the integrity and privacy of the information.
Abstract:
Methods and systems for achieving higher efficiencies and capacities in sorting feed material are described herein, such as for separating desirable “good” rock or ore from undesirable “bad” rock or ore in an unsegregated, unseparated stream of feed material. In the disclosure, higher efficiencies are achieved with combinations of multiple sensor/diverter cells in stages in a cascade arrangement. The number and combination of cells in the cascade may be determined through a priori characterization of probabilities involved in sensor/rock and rock/diverter interactions, and mathematical determinations of the optimal number and combination of stages based on this probability. Further, as disclosed herein, desired sorting capacities are achieved through addition of multiple cascades in parallel until the desired sorting capacity is reached.
Abstract:
A system and method for establishing two-factor security using a mobile device comprising authorizing one or more transactions requests received by a server, identifying one or more credentials required before the transaction can be processed, transmitting the list of credentials and a request session ID to a mobile device that stores, or is linked to, one or more required credentials, and pushing (or authorizing a credentials server to push) such credentials to the server that received the request in order to permit the associated transaction and/or upgrade the prior session to a secured or “authorized” connection.
Abstract:
Methods and systems for achieving higher efficiencies and capacities in sorting feed material are described, such as for separating desirable “good” rock or ore from undesirable “bad” rock or ore in an unsegregated, unseparated stream of feed material. Higher efficiencies are achieved with combinations of multiple sensor/diverter cells in stages in a cascade arrangement. The number and combination of cells in the cascade may be determined through a priori characterization of probabilities involved in sensor/rock and rock/diverter interactions, and mathematical determinations of the optimal number and combination of stages based on this probability. Further, desired sorting capacities are achieved through addition of multiple cascades in parallel until the desired sorting capacity is reached.
Abstract:
Systems and methods for recommending offers to a user are implemented via one or more processors operating on one or more server systems. The systems and methods include receiving attribute data associated with one or more target users. An offer is determined for transmittal to the one or more target users. The offer is based at least on at least a portion of the attribute data analyzed by a predictive process including a decision tree combined with a clustering process. An offer is output that is configured to be received by the one or more targeted users.