EXPIRATION MANAGEMENT METHOD AND SYSTEM
    1.
    发明申请
    EXPIRATION MANAGEMENT METHOD AND SYSTEM 审中-公开
    到期管理方法与制度

    公开(公告)号:WO2010052149A3

    公开(公告)日:2011-06-09

    申请号:PCT/EP2009064087

    申请日:2009-10-26

    CPC classification number: G06Q10/06

    Abstract: An expiration management method and system. The method includes transmitting by an RFID tag reader within an enclosure, a plurality of continuous timing signals. The enclosure comprises a container comprising a product and an RFID tag. The RFID tag comprises data indicating a first state for the RFID tag and a first time period. The RFID tag reader receives the data and generates a first time stamp. The RFID tag reader transmits a first message commanding the RFID tag to enter a second state. The RFID tag reader transmits the first time stamp and generates a second time stamp. The RFID tag reader transmits the second time stamp. The RFID tag reader receives results from a comparing process performed by the RFID tag. The RFID tag reader performs a function indicating the results.

    Abstract translation: 过期管理方法和系统。 该方法包括通过机箱内的RFID标签读取器发送多个连续定时信号。 外壳包括容器,其包括产品和RFID标签。 RFID标签包括指示RFID标签的第一状态和第一时间段的数据。 RFID标签读取器接收数据并生成第一时间戳。 RFID标签读取器发送指示RFID标签进入第二状态的第一消息。 RFID标签读取器发送第一时间戳并生成第二时间戳。 RFID标签读取器传送第二个时间戳。 RFID标签读取器从RFID标签执行的比较处理接收结果。 RFID标签读取器执行指示结果的功能。

    METHOD AND SYSTEMS USING RADIO FREQUENCY IDENTIFIER TAGS FOR COMPARING AND AUTHENTICATING ITEMS
    2.
    发明申请
    METHOD AND SYSTEMS USING RADIO FREQUENCY IDENTIFIER TAGS FOR COMPARING AND AUTHENTICATING ITEMS 审中-公开
    用于比较和认证物品的使用射频识别标签的方法和系统

    公开(公告)号:WO2007068519A3

    公开(公告)日:2007-09-07

    申请号:PCT/EP2006067458

    申请日:2006-10-16

    CPC classification number: H04L9/3271 G06Q20/3674 H04L2209/805

    Abstract: A method for authenticating an item comprising an RFID having a memory for storing an identifier and a secret key, and a built-in hashing function, is disclosed. According to the method of the invention, the output of the RFID of the item to be authenticated is compared with the output of the RFID of a genuine item. To that end, a random number is transmitted to the item to be authenticated with zero as parameters. The RFID 's identifier, the random number, and the secret key are concatenated and use as input of the built-in hashing function that result is output with the RFID identifier. The RFID 's identifier and the random number are then transmitted to the RFID of the genuine item that returns its identifier and the output of the built-in hashing function computed with the RFID 's identifier of the item to be authenticated, the random number, and the secret key. If the results of both built-in hashing functions are identical, the item is authenticated else, it is counterfeiting.

    Abstract translation: 公开了一种用于认证包括具有用于存储标识符和秘密密钥的存储器的RFID和内置散列函数的物品的方法。 根据本发明的方法,将要认证的物品的RFID的输出与真品的RFID的输出进行比较。 为此,将一个随机数字作为参数发送给要被认证的零件。 RFID的标识符,随机数和密钥被连接在一起并用作内置散列函数的输入,该结果与RFID标识符一起输出。 RFID的标识符和随机数然后被传送到真品的RFID中,该真品返回其标识符和内容散列函数的输出,该函数使用待鉴别物品的RFID标识符计算,随机数 ,和密钥。 如果两个内置哈希函数的结果都是相同的,则该项目会被验证,否则它是伪造的。

    Messaging digest
    3.
    发明专利

    公开(公告)号:GB2521637A

    公开(公告)日:2015-07-01

    申请号:GB201322987

    申请日:2013-12-24

    Applicant: IBM

    Abstract: This invention relates to a system, method and computer program product for digesting messages from a complete set of messages comprising: a listener for identifying one or more outgoing user actions performed on a message in a source messaging account; a concept engine for extracting one or more interest concepts from the message as to the meaning of the message; an interest engine for extracting an interest value from the message based on associated outgoing actions and interest concepts; a database for adding the extracted interest concepts and interest values to a body of interest concepts and interest values; a predictive model for deploying the interest concepts and interest values; and a filtered messaging service provided using the predictive model to filter the messages from the source messaging service.

    Anti-tamper system
    4.
    发明专利

    公开(公告)号:GB2517870A

    公开(公告)日:2015-03-04

    申请号:GB201422945

    申请日:2013-05-22

    Applicant: IBM

    Abstract: An anti-tamper system comprises: a fixing device (500) and an anti-tamper detection device (502); said fixing device (500) comprising a body (514) and a head (512) whereby the head (512) having a larger cross section than the body (514) for enabling a tool to engage and drive the body (514) into a first material layer (22) thereby makes a firm connection with the anti-tamper detection device (502) between the head (512) and the first material layer (22); the fixing device (500) further comprising a lock (516) wherein the head (512) is locked to the body (514) by the lock (516) where there is no external magnetic field and wherein the head (512) becomes disengaged from the body (514) when the lock (516) is unlocked by an external magnetic field; and whereby the anti-tamper detection device (502) detects and records a change of the connection when the head (512) becomes disengaged. The anti-tamper system can be less "meter intrusive" than the prior art.

    Manipulationsschutzsystem
    5.
    发明专利

    公开(公告)号:DE112013001695T5

    公开(公告)日:2014-12-11

    申请号:DE112013001695

    申请日:2013-05-22

    Applicant: IBM

    Abstract: Die Erfindung bezieht sich auf ein Manipulationsschutzsystem, das aufweist: eine Befestigungseinheit und eine Manipulationserkennungseinheit; wobei die Befestigungseinheit einen Körper und einen Kopf aufweist, wobei der Kopf einen größeren Querschnitt als das Körper aufweist, damit ein Werkzeug in Eingriff gelangen und den Körper in eine erste Materialschicht vortreiben kann, wodurch bei der Manipulationserkennungseinheit eine feste Verbindung zwischen dem Kopf und der ersten Materialschicht gebildet wird; die Befestigungseinheit ferner eine Verriegelungseinrichtung aufweist, wobei der Kopf durch die Verriegelungseinrichtung an dem Körper verriegelt ist, wenn kein externes Magnetfeld vorhanden ist, und wobei der Kopf von dem Körper gelöst wird, wenn die Verriegelungseinrichtung durch ein externes magnetisches Feld entriegelt wird; und wobei die Manipulationserkennungseinheit eine Änderung der Verbindung erkennt und dokumentiert, ob der Kopf gelöst wird. Das Manipulationsschutzsystem kann „weniger eingriffsintensiv” als Systeme nach dem Stand der Technik sein.

    6.
    发明专利
    未知

    公开(公告)号:BRPI0619974A2

    公开(公告)日:2011-10-25

    申请号:BRPI0619974

    申请日:2006-10-16

    Applicant: IBM

    Abstract: A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.

    Variable air cooling system for data centers

    公开(公告)号:GB2522269A

    公开(公告)日:2015-07-22

    申请号:GB201400979

    申请日:2014-01-21

    Applicant: IBM

    Abstract: The system includes a room or an enclosure in the form of parallel rows of rack servers separated by aisles to be cooled that is suitable for housing hardware components. The cooling system includes a first air input for controllably allowing input of outside air from outside the enclosure, a second air input for controllably allowing input of recycled air from the enclosure, a cooling mechanism, and an air output for allowing output of air into the enclosure. A control system includes a first temperature monitor for monitoring an outside air temperature, a second temperature monitor for monitoring a blowing air temperature of air at the air output, and a control mechanism for controlling an operation of the first air input, the second air input, the air cooling system in dependence on the monitored temperatures. Hygrometry control can be optimised and an override mechanism is provided in response to exceptional conditions outside of the enclosure. An elongate duct may be provided along and above the hardware racks (Figure 5b).

    METHOD AND SYSTEMS USING RADIO FREQUENCY IDENTIFIER TAGS FOR COMPARING AND AUTHENTICATING ITEMS

    公开(公告)号:CA2633882C

    公开(公告)日:2014-01-28

    申请号:CA2633882

    申请日:2006-10-16

    Applicant: IBM

    Abstract: A method for authenticating an item comprising an RFID having a memory for storing an identifier and a secret key, and a built-in hashing function, is disclosed. According to the method of the invention, the output of the RFID of the item to be authenticated is compared with the output of the RFID of a genuine item. To that end, a random number is transmitted to the item to be authenticated with zero as parameters. The RFID 's identifier, the random number, and the secret key are concatenated and use as input of the built-in hashing function that result is output with the RFID identifier. The RFID 's identifier and the random number are then transmitted to the RFID of the genuine item that returns its identifier and the output of the built-in hashing function computed with the RFID 's identifier of the item to be authenticated, the random number, and the secret key. If the results of both built-in hashing functions are identical, the item is authenticated else, it is counterfeiting.

    9.
    发明专利
    未知

    公开(公告)号:DE602006007486D1

    公开(公告)日:2009-08-06

    申请号:DE602006007486

    申请日:2006-10-16

    Applicant: IBM

    Abstract: A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.

    METHOD AND SYSTEMS USING RADIO FREQUENCY IDENTIFIER TAGS FOR COMPARING AND AUTHENTICATING ITEMS

    公开(公告)号:CA2633882A1

    公开(公告)日:2007-06-21

    申请号:CA2633882

    申请日:2006-10-16

    Applicant: IBM

    Abstract: A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H1) of a concatenation of an identifier (Id1) of the first RFID tag, the random number, and a first secret key and sends the hash H1 to the RFID reader which then transmits the identifier Id1 and the random number to a second RFID tag. The second RFID tag uses the hashing function to compute a hash (H2) of a concatenation of the identifier Id1, the random number, and a second secret key and sends the hash H2 to the RFID reader. The authentication status of authentic or counterfeit is determined for the first item based on whether or not H1 is equal to H2.

Patent Agency Ranking