Abstract:
An expiration management method and system. The method includes transmitting by an RFID tag reader within an enclosure, a plurality of continuous timing signals. The enclosure comprises a container comprising a product and an RFID tag. The RFID tag comprises data indicating a first state for the RFID tag and a first time period. The RFID tag reader receives the data and generates a first time stamp. The RFID tag reader transmits a first message commanding the RFID tag to enter a second state. The RFID tag reader transmits the first time stamp and generates a second time stamp. The RFID tag reader transmits the second time stamp. The RFID tag reader receives results from a comparing process performed by the RFID tag. The RFID tag reader performs a function indicating the results.
Abstract:
A method for authenticating an item comprising an RFID having a memory for storing an identifier and a secret key, and a built-in hashing function, is disclosed. According to the method of the invention, the output of the RFID of the item to be authenticated is compared with the output of the RFID of a genuine item. To that end, a random number is transmitted to the item to be authenticated with zero as parameters. The RFID 's identifier, the random number, and the secret key are concatenated and use as input of the built-in hashing function that result is output with the RFID identifier. The RFID 's identifier and the random number are then transmitted to the RFID of the genuine item that returns its identifier and the output of the built-in hashing function computed with the RFID 's identifier of the item to be authenticated, the random number, and the secret key. If the results of both built-in hashing functions are identical, the item is authenticated else, it is counterfeiting.
Abstract:
This invention relates to a system, method and computer program product for digesting messages from a complete set of messages comprising: a listener for identifying one or more outgoing user actions performed on a message in a source messaging account; a concept engine for extracting one or more interest concepts from the message as to the meaning of the message; an interest engine for extracting an interest value from the message based on associated outgoing actions and interest concepts; a database for adding the extracted interest concepts and interest values to a body of interest concepts and interest values; a predictive model for deploying the interest concepts and interest values; and a filtered messaging service provided using the predictive model to filter the messages from the source messaging service.
Abstract:
An anti-tamper system comprises: a fixing device (500) and an anti-tamper detection device (502); said fixing device (500) comprising a body (514) and a head (512) whereby the head (512) having a larger cross section than the body (514) for enabling a tool to engage and drive the body (514) into a first material layer (22) thereby makes a firm connection with the anti-tamper detection device (502) between the head (512) and the first material layer (22); the fixing device (500) further comprising a lock (516) wherein the head (512) is locked to the body (514) by the lock (516) where there is no external magnetic field and wherein the head (512) becomes disengaged from the body (514) when the lock (516) is unlocked by an external magnetic field; and whereby the anti-tamper detection device (502) detects and records a change of the connection when the head (512) becomes disengaged. The anti-tamper system can be less "meter intrusive" than the prior art.
Abstract:
Die Erfindung bezieht sich auf ein Manipulationsschutzsystem, das aufweist: eine Befestigungseinheit und eine Manipulationserkennungseinheit; wobei die Befestigungseinheit einen Körper und einen Kopf aufweist, wobei der Kopf einen größeren Querschnitt als das Körper aufweist, damit ein Werkzeug in Eingriff gelangen und den Körper in eine erste Materialschicht vortreiben kann, wodurch bei der Manipulationserkennungseinheit eine feste Verbindung zwischen dem Kopf und der ersten Materialschicht gebildet wird; die Befestigungseinheit ferner eine Verriegelungseinrichtung aufweist, wobei der Kopf durch die Verriegelungseinrichtung an dem Körper verriegelt ist, wenn kein externes Magnetfeld vorhanden ist, und wobei der Kopf von dem Körper gelöst wird, wenn die Verriegelungseinrichtung durch ein externes magnetisches Feld entriegelt wird; und wobei die Manipulationserkennungseinheit eine Änderung der Verbindung erkennt und dokumentiert, ob der Kopf gelöst wird. Das Manipulationsschutzsystem kann „weniger eingriffsintensiv” als Systeme nach dem Stand der Technik sein.
Abstract:
A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.
Abstract:
The system includes a room or an enclosure in the form of parallel rows of rack servers separated by aisles to be cooled that is suitable for housing hardware components. The cooling system includes a first air input for controllably allowing input of outside air from outside the enclosure, a second air input for controllably allowing input of recycled air from the enclosure, a cooling mechanism, and an air output for allowing output of air into the enclosure. A control system includes a first temperature monitor for monitoring an outside air temperature, a second temperature monitor for monitoring a blowing air temperature of air at the air output, and a control mechanism for controlling an operation of the first air input, the second air input, the air cooling system in dependence on the monitored temperatures. Hygrometry control can be optimised and an override mechanism is provided in response to exceptional conditions outside of the enclosure. An elongate duct may be provided along and above the hardware racks (Figure 5b).
Abstract:
A method for authenticating an item comprising an RFID having a memory for storing an identifier and a secret key, and a built-in hashing function, is disclosed. According to the method of the invention, the output of the RFID of the item to be authenticated is compared with the output of the RFID of a genuine item. To that end, a random number is transmitted to the item to be authenticated with zero as parameters. The RFID 's identifier, the random number, and the secret key are concatenated and use as input of the built-in hashing function that result is output with the RFID identifier. The RFID 's identifier and the random number are then transmitted to the RFID of the genuine item that returns its identifier and the output of the built-in hashing function computed with the RFID 's identifier of the item to be authenticated, the random number, and the secret key. If the results of both built-in hashing functions are identical, the item is authenticated else, it is counterfeiting.
Abstract:
A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.
Abstract:
A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.