Network structures that require the use of a common database are affected by the risk of processing identification data that are necessary for sharing information and updating and processing data with equal access level between the network nodes. However, this sharing could lead risks of vulnerability when identification data are exchanged between the nodes of the network. The proposed information system involves the exchange of information by encrypting the identification data with an MD5 Hashing procedure (RFC1321).
Technologies
In this section it is possible to view, also through targeted research, the technologies inserted in the PROMO-TT Database. For further information on the technologies and to contact the CNR Research Teams who developed them, it is necessary to contact the Project Manager (see the references at the bottom of each record card).
Displaying results 1 - 2 of 2
The working principle of VTTJ is extremely simple. Two parts (at least one with tube shape) are screwed one into the other with a mechanical interference that creates a metallic seal. One part presents a cylindrical slot, the other presents a conical ring, whose diameter is slightly larger than the one of the cylindrical slot. When the two parts are screwed together, a plastic deformation occurs in the mechanical interference region.