11.
    发明专利
    未知

    公开(公告)号:FI102713B1

    公开(公告)日:1999-01-29

    申请号:FI960816

    申请日:1996-02-22

    Abstract: In a radio extension of an ATM network, prior to establishing a given connection the switch of a fixed network enquires access points as to what is the resource situation in said access points. After receiving responses the switch decides to which access point the connection is allocated. During handover, the resource enquiry is accomplished as a response to the handover request sent by the mobile terminal, which request is transmitted either when the connection to the old access point still operates or after the connection is closed; in the latter case, the request is retransmitted through the new access point.

    13.
    发明专利
    未知

    公开(公告)号:AT518208T

    公开(公告)日:2011-08-15

    申请号:AT07820705

    申请日:2007-09-28

    Applicant: IBM

    Abstract: A system and method for identifying specific locations where to attach or detach e-mail attachments based on e-mail storage locations is disclosed. The method allows to search in a mail-attachment connection table all the attachment locations that are in relation to the e-mail where the attachment is to be attached to or to be detached from and to present to a user all attachment locations that have a relevance for the attach/detach operation.

    METHOD AND SYSTEM FOR PLAYING VIDEO ON A MOBILE DEVICE

    公开(公告)号:CA2734073A1

    公开(公告)日:2010-03-25

    申请号:CA2734073

    申请日:2009-08-24

    Applicant: IBM

    Abstract: The invention provides a system and a method for automatically switching from a local storage (120) to a remote storage (105) for recording a broadcast video stream, the switching being triggered by the fact that the local storage (120) is almost full, and for automatically switching from a local storage (120) to a remote storage (105) for playing a broadcast video stream in a delayed manner, the switching being triggered by the fact that the video frames in the local storage (120) are exhausted.

    15.
    发明专利
    未知

    公开(公告)号:AT452325T

    公开(公告)日:2010-01-15

    申请号:AT07728276

    申请日:2007-04-19

    Applicant: IBM

    Abstract: A surveyor's mark and a method of forming the mark. A tag is embedded in a head. The head is removably assembled to a stick. The head is configured to be above a ground when the stick is planted in the ground. The head includes a tag. The tag in the head includes an identification number whose value identifies the tag and indicates if the head is disassembled from the stick. If the stick is planted in the ground and the head is above the ground, then pulling the head in an attempt to pull up the mark from the ground results in changing the value of the identification number in the tag from a first code value to a second code value that differs from the first code value.

    16.
    发明专利
    未知

    公开(公告)号:AT434804T

    公开(公告)日:2009-07-15

    申请号:AT06807312

    申请日:2006-10-16

    Applicant: IBM

    Abstract: A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.

    Method and systems using radio frequency identifier tags for comparing and authenticating items

    公开(公告)号:AU2006326213A1

    公开(公告)日:2007-06-21

    申请号:AU2006326213

    申请日:2006-10-16

    Applicant: IBM

    Abstract: A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.

    A system and method to re-synchronize client devices while refreshing them from a server

    公开(公告)号:AU2003246419A8

    公开(公告)日:2004-01-06

    申请号:AU2003246419

    申请日:2003-05-13

    Applicant: IBM FRANCE

    Abstract: A method and computing systems for refreshing, from a server, objects locally stored by a client device remotely connected through a communicating means to said server. The client device send a request for refresh message and a list of object identifiers and the digest of the object itself stored in its local storage. The server, after checking the deals the client device has subscribed to, sends back a refresh answer message with the objects stored locally in the client device and which needs to be refreshed. According to the deals to which the client device has subscribed, the server will also send new objects and will send a special code to specify to the client device to delete objects which are no more part of the deals.

    19.
    发明专利
    未知

    公开(公告)号:DE3784168T2

    公开(公告)日:1993-09-16

    申请号:DE3784168

    申请日:1987-09-23

    Applicant: IBM

    Abstract: In a packet switching network, voice packets are made to include an EC field whose contents indicates whether the corresponding packet is eligible for clipping if required in a node queue within the network. Should clipping of a non eligible packet be required, then another bit field would be set in the following packet on same link to limit any possible clipping of successive packets an same link.

    METHOD AND SYSTEMS USING RADIO FREQUENCY IDENTIFIER TAGS FOR COMPARING AND AUTHENTICATING ITEMS

    公开(公告)号:CA2633882C

    公开(公告)日:2014-01-28

    申请号:CA2633882

    申请日:2006-10-16

    Applicant: IBM

    Abstract: A method for authenticating an item comprising an RFID having a memory for storing an identifier and a secret key, and a built-in hashing function, is disclosed. According to the method of the invention, the output of the RFID of the item to be authenticated is compared with the output of the RFID of a genuine item. To that end, a random number is transmitted to the item to be authenticated with zero as parameters. The RFID 's identifier, the random number, and the secret key are concatenated and use as input of the built-in hashing function that result is output with the RFID identifier. The RFID 's identifier and the random number are then transmitted to the RFID of the genuine item that returns its identifier and the output of the built-in hashing function computed with the RFID 's identifier of the item to be authenticated, the random number, and the secret key. If the results of both built-in hashing functions are identical, the item is authenticated else, it is counterfeiting.

Patent Agency Ranking