1460707605-96d2146c-129c-4bcf-b505-00c8f2707827

1. An inversion apparatus configured to invert a continuous web of recording media moving along a path in an imaging system, the inversion apparatus comprising:
an input configured to receive the continuous web of recording media;
an output, displaced from the input, the output configured to convey the continuous web of recording media after being inverted;
a blower configured to provide a flow of forced air;
a turnbar configured to convey the continuous web of recording media between the input and the output and to enable inversion of the continuous web of recording media, the turnbar defines a first tangent line corresponding to an initial point of contact of the web and the turnbar in the absence of an air gap, a second tangent line corresponding to a last point of contact of the web with the turnbar in the absence of an air gap, and a contacting area disposed between the first tangent line and the second tangent line in the absence of an air gap, the turnbar having an exterior surface defining a first region and a second region, which is substantially devoid of apertures, the first region having a plurality of apertures operatively connected to the blower, the plurality of apertures defining a pattern including a plurality of rows and a plurality of columns, each of the rows being aligned in a longitudinal direction along a length of the turnbar, one of a first row of apertures and a last row of apertures being disposed outside of the contacting area and being rotated approximately ten degrees beyond one of the first tangent line and the second tangent line, the plurality of apertures being configured to direct the forced air from the exterior surface of the turnbar, and the forced air through the second region is not directed from the exterior surface.
2-7. (canceled)
8. The inversion apparatus of claim 1 wherein the first region includes a portion in which forced air is not directed from the exterior surface.
9. The inversion apparatus of claim 8 wherein the portion in which forced air is not directed from the exterior surface is devoid of apertures.
10. The inversion apparatus of claim 1 wherein each of the columns includes a first aperture and a last aperture and the first aperture of each column is aligned along a first circumferential line and the last aperture of each column is aligned along a second circumferential line different than the first circumferential line.
11. The inversion apparatus of claim 10 wherein each of the columns defines a helix.
12. The inversion apparatus of claim 10 wherein the plurality of columns includes a first column and a last column and at least one of the plurality of columns is disposed outside of the contacting area.
13. A method of forming a duplex image on a continuous web of recording media having a first side and a second side, the continuous web moving along a transport path through a printer and a web inverter including a turnbar having a surface defining a plurality of apertures, and a blower operatively connected to the plurality of apertures to provide forced air to the apertures, the method comprising:
imaging the first side of the continuous web of recording media during a first pass through the printer;
directing the second side of the continuous web toward the plurality of apertures;
directing air through the plurality of apertures to provide an air gap between the second side of the continuous web of recording media and the surface of the turnbar, the surface of the turnbar defining a first tangent line corresponding to an initial point of contact of the continuous web with the turnbar in the absence of the air gap and a second tangent line corresponding to a last point of contact of the continuous web with the turnbar in the absence of the air gap, the directed air being confined to a predetermined region of the surface of the turnbar, the predetermined region extending over a first portion of the surface of the turnbar but not over a second portion of the surface of the turnbar, the predetermined region including a first edge and a second edge aligned along a longitudinal axis of the turnbar, the first edge and the second edge being separated by the second portion of the surface of the turnbar and one of the first edge and the second edge respectively extends past one of the first tangent line and the second tangent line such that the distance between the first edge and the second edge is greater than the distance between the first tangent line and the second tangent line taken along the transport path; and
imaging the second side of the continuous web of recording media during a second pass through the printer.
14-15. (canceled)
16. The method of claim 13 wherein one of the first edge and the second edge are rotated approximately ten degrees beyond one of the first tangent line and the second tangent line to reduce at least one of eddy currents, acoustic noise, and higher tension without the web touching the turnbars.
17. An inversion apparatus configured to invert a continuous web of recording media moving along a path in an imaging system, the inversion apparatus comprising:
an input configured to receive the continuous web of recording media;
an output, displaced from the input, the output configured to convey the continuous web of recording media after being inverted; and
a turnbar configured to convey the continuous web of recording media between the input and the output and to enable inversion of the continuous web of recording media, the turnbar includes an exterior surface having an air foil region with a plurality of apertures configured to provide an air gap between the exterior surface of the turnbar and the recording media and a second region substantially devoid of apertures, the exterior surface of the turnbar defines a first tangent line corresponding to an initial point of contact of the continuous web with the turnbar in the absence of the air gap and a second tangent line corresponding to a last point of contact of the continuous web with the turnbar in the absence of the air gap, the air foil region includes a first edge and a second edge aligned along the longitudinal axis of the turnbar and the first edge and the second edge are separated by the second region, one of the first edge and the second edge respectively extends past one of the first tangent line and the second tangent line such that a distance between the first edge and the second edge is greater than a distance between the first tangent line and the second tangent line taken along the transport path.
18-19. (canceled)
20. The inversion apparatus of claim 17 wherein one of the first edge and the second edge are rotated approximately ten degrees beyond one of the first tangent line and the second tangent line.
21. The inversion apparatus of claim 20, the air foil region further comprising:
a portion devoid of apertures.
22. The inversion apparatus of claim 21, the plurality of apertures in the air foil region being arranged in a plurality of columns configured as a cylindrical helix.
23. The inversion apparatus of claim 22, the plurality of apertures arranged in the plurality of columns having a first column and a last column disposed outside the edges of the recording media in the absence of the air gap when the recording media is in contact with the turnbar.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A method for securely transferring a data object from a source application to a destination application on a computing device, the method comprising:
providing a source application and a destination application on a computing device, the source and destination applications each having original, post-compile object code;
modifying, using at least one processor operatively coupled with a memory, the original object code of the source application to create first replacement object code for the source application;
modifying, using the at least one processor operatively coupled with the memory, the original object code of the destination application to create second replacement object code for the destination application;
transferring, from the source application to the destination application, a data object that is encrypted with an object data protection key;
requesting, from the first replacement code of the source application to a security manager application on the computing device, a source application key that is associated with the source application;
decrypting the source application key using a data protection root key from the security manager application;
decrypting, by the first replacement code of the source application, the object data protection key with the decrypted source application key;
encrypting, by the first replacement code of the source application, the object data protection key with a data-sharing key or a destination application key, the destination application key associated with the destination application;
sharing with the destination application the object data protection key that is encrypted with the data-sharing key or destination application key;
decrypting, in the second replacement code of the destination application, the object data protection key that is encrypted with the data-sharing key or destination application key; and
decrypting, in the second replacement code of the destination application, the object data using the unencrypted object data protection key.
2. The method of claim 1, wherein the sharing includes transferring the object data protection key that is encrypted with the data-sharing key or destination application key to the destination application.
3. The method of claim 1, further comprising:
determining, by the security manager application, whether a transfer of the data object between the source and destination applications is constrained.
4. The method of claim 1, further comprising:
verifying, by the security manager application, a signature of the source or destination application.
5. The method of claim 4, wherein the signature is a product of a public key infrastructure (PKI) key.
6. The method of claim 1, further comprising:
generating, by the security manager application, at least one of the source application key, the destination application key, and the data-sharing key.
7. The method of claim 6, further comprising:
generating the source application key upon registration of the source application with the security manager application; or
generating the destination application key upon registration of the destination application with the security manager application.
8. The method of claim 6, further comprising:
prompting the user for a passcode; and
generating the source application key or destination application key using the passcode.
9. The method of claim 6, further comprising:
generating, by the security manager application, the data-sharing key upon a request by the source application.
10. The method of claim 1, further comprising:
encrypting, by the second replacement code of the destination application, the object data protection key with the destination application key.
11. The method of claim 1, wherein the computing device is a mobile device.
12. The method of claim 1, further comprising:
retrieving, to the source application, a policy from a remote server, the policy specifying the encrypting.
13. The method of claim 12, wherein the policy specifies no messaging, no chat, or no printing by the source application.
14. The method of claim 1, wherein the original object code of the source application is selected from the group consisting of a .dylib file, a .so file, and a .dll file.
15. A machine-readable non-transitory storage medium embodying information indicative of instructions for causing one or more machines to perform operations comprising:
providing a source application and a destination application on a computing device, the source and destination applications each having original, post-compile object code;
modifying, using at least one processor operatively coupled with a memory, the original object code of the source application to create first replacement object code for the source application;
modifying, using the at least one processor operatively coupled with the memory, the original object code of the destination application to create second replacement object code for the destination application;
transferring, from the source application to the destination application, a data object that is encrypted with an object data protection key;
requesting, from the first replacement code of the source application to a security manager application on the computing device, a source application key that is associated with the source application;
decrypting the source application key using a data protection root key from security manager application;
decrypting, by the first replacement code of the source application, the object data protection key with the decrypted source application key;
encrypting, by the first replacement code of the source application, the object data protection key with a data-sharing key or a destination application key, the destination application key associated with the destination application;
sharing with the destination application the object data protection key that is encrypted with the data-sharing key or destination application key;
decrypting, in the second replacement code of the destination application, the object data protection key that is encrypted with the data-sharing key or destination application key; and
decrypting, in the second replacement code of the destination application, the object data using the unencrypted object data protection key.
16. The medium of claim 15, wherein the sharing includes transferring the object data protection key that is encrypted with the data-sharing key or destination application key to the destination application.
17. The medium of claim 15, wherein the operations further comprise:
verifying, by the security manager application, a signature of the source or destination application.
18. A computer system executing instructions in a computer program, the computer system comprising:
a processor; and
a memory operatively coupled with the processor, the processor executing program code for:
providing a source application and a destination application on a computing device, the source and destination applications each having original, post-compile object code;
modifying, using at least one processor operatively coupled with a memory, the original object code of the source application to create first replacement object code for the source application;
modifying, using the at least one processor operatively coupled with the memory, the original object code of the destination application to create second replacement object code for the destination application;
transferring, from the source application to the destination application, a data object that is encrypted with an object data protection key;
requesting, by the first replacement code of the source application to a security manager application on the computing device, a source application key that is associated with the source application;
decrypting the source application key using a data protection root key from the security manager application;
decrypting, by the first replacement code of the source application, the object data protection key with the decrypted source application key;
encrypting, by the first replacement code of the source application, the object data protection key with a data-sharing key or a destination application key, the destination application key associated with the destination application;
sharing with the destination application the object data protection key that is encrypted with the data-sharing key or destination application key;
decrypting, in the second replacement code of the destination application, the object data protection key that is encrypted with the data-sharing key or destination application key; and
decrypting, in the second replacement code of the destination application, the object data using the unencrypted object data protection key.
19. The system of claim 18, wherein the sharing includes transferring the object data protection key that is encrypted with the data-sharing key or destination application key to the destination application.
20. The system of claim 18, wherein the processor further executes program code for: verifying, by the security manager application, a signature of the source or destination application.

1460707601-c50ca015-70a2-4e32-b986-c303bc0eb7df

1. A vehicle side mirror, comprising:
a mirror;
a mirror housing in which the mirror is installed; and
a blind spot detection (BSD)-integrated mirror holder which supports the mirror and includes a mounting groove formed in a front surface of the BSD-integrated mirror holder that faces the mirror,
wherein a BSD module configured to provide a warning regarding a danger in a blind spot on a rear lateral side of a vehicle is disposed in the mounting groove.
2. The vehicle side mirror of claim 1, wherein the BSD module includes:
a printed circuit board (PCB) installed on an inner surface of the mounting groove;
one or more light sources mounted on a surface of the PCB to irradiate light; and
a lens installed in front of the light sources to direct light irradiated from the light sources in a predetermined direction.
3. The vehicle side mirror of claim 2, wherein the light sources are light-emitting diodes (LEDs).
4. The vehicle side mirror of claim 2, wherein a tape is attached onto a region of the lens and a region of the mounting groove.
5. The vehicle side mirror of claim 2, wherein the lens further includes:
a guide rib that protrudes toward the PCB.
6. The vehicle side mirror of claim 5, wherein a tip end of the guide rib contacts the PCB.
7. The vehicle side mirror of claim 1, wherein the BSD-integrated mirror holder further includes:
a connector inserted into a connector insertion groove formed in the front surface that faces the mirror to be separated from the mounting groove; and
a wire inserted into a wire insertion groove extending between the mounting groove and the connector insertion groove.
8. The vehicle side mirror of claim 7, wherein the wire has a first end connected to the connector and a second end connected to the PCB.
9. The vehicle side mirror of claim 7, wherein the connector insertion groove further includes:
a plurality of hook protrusions for coupling and fixing the connector.
10. The vehicle side mirror of claim 7, wherein the wire insertion groove further includes:
a plurality of fitting protrusions for coupling and fixing the wire.
11. The vehicle side mirror of claim 10, wherein the tape is attached along the wire insertion groove.
12. The vehicle side mirror of claim 1, wherein the mirror includes a display region formed by etching a region of the mirror.
13. The vehicle side mirror of claim 12, wherein a warning pattern formed by the BSD module is displayed in the display region of the mirror.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A method of making a self-adhesive insulation blanket comprising:
providing an elongated fibrous insulation blanket, the fibrous insulation blanket having:
a length;
a width;
a thickness; and
a first major surface and a second major surface which each extend for the length and width of the fibrous insulation blanket;
applying an adhesive to the first major surface of the fibrous insulation blanket, the adhesive comprising an emulsion of a polymer material and water;
passing the fibrous insulation blanket or board product through an oven so as to evaporate the water of the adhesive such that the adhesive forms a dry layer atop the first major surface, the adhesive forming a polymer matrix atop the first major surface and being nonadherable when in the dry state and re-adherable upon a subsequent application of water; and
rolling the fibrous insulation blanket to form a blanket roll.
2. The method of claim 1, wherein the oven comprises a temperature of 350 degrees Fahrenheit or less.
3. The method of claim 1, wherein the oven comprises an infrared oven.
4. The method of claim 1, wherein the adhesive is applied to the first major surface so as to form a non-continuous and non-uniform coating atop the first major surface.
5. The method of claim 1, wherein the adhesive is applied to the first major surface to form one or more of the following patterns atop the first major surface:
a pattern of wavy lines (an S pattern);
a pattern of straight lines;
a pattern of crisscrossing lines;
a pattern or orthogonal lines;
a honeycomb pattern;
a dot pattern; or
a splat pattern.
6. The method of claim 1, wherein a weight of the dry layer of adhesive is between 2 and 8 percent of the weight of the fibrous insulation blanket.
7. The method of claim 1, wherein the dry adhesive layer becomes re-adherable upon application of water that is applied by between 15% and 30% of the weight of the fibrous insulation blanket.
8. The method of claim 1, wherein upon the subsequent application of water, the adhesive comprises a tacky state that allows the fibrous insulation blanked to be repositioned with respect to an object that the adhesive is applied to, the adhesive being in the tacky state for between 15 seconds and 2 minutes subsequent to the application of water.
9. The method of claim 1, further comprising coupling a facer to the second major surface of the fibrous insulation blanket.
10. The method of claim 1, wherein the adhesive remains nonadherable when subjected to a relative humidity of up to 100%.
11. A method of making a self-adhesive insulation product comprising:
providing a fibrous insulation blanket or board product, the fibrous insulation blanket or board product having:
a length;
a width;
a thickness;
a first major surface and a second major surface which each extend for the length and width of the fibrous insulation blanket or board product; and
a facer coupled with a second major surface, the facer having a length and a width approximately equal to the fibrous insulation blanket or board product;
applying an adhesive to the first major surface of the fibrous insulation blanket or board product, the adhesive comprising an emulsion of a polymer material and water; and
passing the fibrous insulation blanket or board product and facer through an oven so as to evaporate the water of the adhesive applied to the flanges so that the adhesive forms a dry layer atop the first major surface, the adhesive being nonadherable when in the dry state and re-adherable upon an application of water.
12. The method of claim 11, further comprising adhering the fibrous insulation blanket or board product to a wall, ceiling, or floor by:
positioning the fibrous insulation blanket or board product adjacent a wall;
applying water to the adhesive so that the adhesive is adherable; and
pressing the first major surface against the wall a respective stud or joist to adhere the first major surface thereto.
13. The method of claim 11, wherein the adhesive is applied over a substantial surface of the first major surface.
14. The method of claim 11, wherein the self-adhesive insulation product is a fibrous insulation blanket and wherein the method further comprises rolling the fibrous insulation blanket and facer to form a rolled insulation product.
15. A method of making an insulation product comprising:
providing an elongated fibrous insulation blanket or board product, the fibrous insulation blanket or board product-having:
a length;
a width;
a thickness; and
a first major surface and a second major surface which each extend for the length and width of the fibrous insulation blanket or board product;

applying an adhesive to the first major surface of the fibrous insulation blanket or board product so that, when dried, a weight of a dry layer of the adhesive is between 2 and 8 percent of the weight of the fibrous insulation blanket, the adhesive comprising an emulsion of a polymer material and water; and
passing the fibrous insulation blanket or board product through an oven so as to evaporate the water of the adhesive and thereby form the dry layer of the adhesive atop the first major surface, the adhesive forming a polymer matrix atop the first major surface and being nonadherable when in the dry state and re-adherable upon a subsequent application of water.
16. The method of claim 15, wherein the adhesive is applied to the first major surface so as to form a non-continuous and non-uniform coating atop the first major surface.
17. The method of claim 15, wherein the dry adhesive layer becomes re-adherable upon application of water that is applied by between 15% and 30% of the weight of the fibrous insulation blanket or board product.
18. The method of claim 15, wherein upon the subsequent application of water, the adhesive becomes tacky for between 15 seconds and 2 minutes, which allows the fibrous insulation blanket or board product to be repositioned with respect to an object that the fibrous insulation blanket or board product is being adhered to.