Abstract:
PROBLEM TO BE SOLVED: To implement a cost-reduced security technique, for RFID system, for avoiding defects that a current technique has. SOLUTION: An authentication request including an encrypted access function is received from a demander by an RFID tag and an encrypted secret message based on the received encrypted access function is transmitted to the demander in response to the reception of the authentication request. An access request designating a work area and including an encrypted random number is received from the demander by the RFID tag. The access request is created by the demander in response to the successful authentication of the RFID tag by the demander using the encrypted secret message. A value of the random number sent by the demander is judged and it is verified that the work area is valid for the encrypted access function, so that the RFID tag authenticates the demander. In a case where the authentication is made successful, the RFID tag responds to the access request using the value of the random number as an encryption key. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
Mechanisms are provided for pre-fetching content data (470) and storing the content data (470) in a mobile device (330). An identifier of a mobile device (330) and a location (434) of the mobile device (330) are received. Demographic information (432) about a user (430) of the mobile device (330) is obtained based on the identifier of the mobile device (330). The demographic information (432) of the user (430) is compared with demographic information (412, 422) of other users (410, 420) to identify one or more similar users (410, 420) having similar demographic information to the demographic information (432) of the user (430) of the mobile device (330). Content data (470) to transmit to the mobile device (430) is identified based on the location (434) of the mobile device (330) and the identification of the one or more similar users (410, 420). The content data (470) is transmitted to the mobile device (330) for storage in the mobile device (330).
Abstract:
Techniques, systems and an article of manufacture for caching in a virtualized computing environment. A method includes enforcing a host page cache on a host physical machine to store only base image data, and enforcing each of at least one guest page cache on a corresponding guest virtual machine to store only data generated by the guest virtual machine after the guest virtual machine is launched, wherein each guest virtual machine is implemented on the host physical machine.
Abstract:
A system and method for pervasive enablement of business processes that effectively integrates workflow technology and ad-hoc collaboration tools. Collaboration tools comprise a plurality of native communication devices capable of interacting with the user either using text or voice mechanism. A modality adapter associated with each collaboration tool (or modality) performs the function of translating staff activities to device-specific messages and receiving replies from the users and sending them back to the engine. A Workflow Engine executes the business process and sends out staff activities meant for human users to the Interaction Controller and other activities meant for software agents to Web Services. An Interaction Controller entity utilizes the Context Service and the Address Book to determine the appropriate modality or collaboration tool for a user and sends the staff activity to the appropriate modality adapter. A Context Service that provides context information, user preferences to the Interaction Controller. The Address Book contains a repository of device addresses specific to each modality a user might use. The system enables users to collaborate with each other anytime and anywhere using an appropriate collaboration modality and participate in backend business processes by performing staff activities using their preferred collaboration device.
Abstract:
Techniques, systems and an article of manufacture for caching in a virtualized computing environment. A method includes enforcing a host page cache on a host physical machine to store only base image data, and enforcing each of at least one guest page cache on a corresponding guest virtual machine to store only data generated by the guest virtual machine after the guest virtual machine is launched, wherein each guest virtual machine is implemented on the host physical machine.
Abstract:
Techniques for transmitting data according to at least one quality of service requirement. A message path is calculated specifying a sequence of broker computers selected from a network of interconnected broker computers. The message path is statistically estimated to fulfill the at least one quality of service requirement. Quality of service metrics are received about the network of interconnected broker computers. If the message path is determined not to fulfill the quality of service requirement, a new message path is calculated specifying a new sequence of broker computers selected from the network of interconnected broker computers. The new message path is statistically estimated to fulfill the at least one quality of service requirement.
Abstract:
A system and method for pervasive enablement of business processes that effectively integrates workflow technology and ad-hoc collaboration tools. Collaboration tools comprise a plurality of native communication devices capable of interacting with the user either using text or voice mechanism. A modality adapter associated with each collaboration tool (or modality) performs the function of translating staff activities to device-specific messages and receiving replies from the users and sending them back to the engine. A Workflow Engine executes the business process and sends out staff activities meant for human users to the Interaction Controller and other activities meant for software agents to Web Services. An Interaction Controller entity utilizes the Context Service and the Address Book to determine the appropriate modality or collaboration tool for a user and sends the staff activity to the appropriate modality adapter. A Context Service that provides context information, user preferences to the Interaction Controller. The Address Book contains a repository of device addresses specific to each modality a user might use. The system enables users to collaborate with each other anytime and anywhere using an appropriate collaboration modality and participate in backend business processes by performing staff activities using their preferred collaboration device.
Abstract:
Techniques, systems and an article of manufacture for caching in a virtualized computing environment. A method includes enforcing a host page cache on a host physical machine to store only base image data, and enforcing each of at least one guest page cache on a corresponding guest virtual machine to store only data generated by the guest virtual machine after the guest virtual machine is launched, wherein each guest virtual machine is implemented on the host physical machine.
Abstract:
Techniques for transmitting data according to at least one quality of service requirement. A message path is calculated specifying a sequence of broker computers selected from a network of interconnected broker computers. The message path is statistically estimated to fulfill the at least one quality of service requirement. Quality of service metrics are received about the network of interconnected broker computers. If the message path is determined not to fulfill the quality of service requirement, a new message path is calculated specifying a new sequence of broker computers selected from the network of interconnected broker computers. The new message path is statistically estimated to fulfill the at least one quality of service requirement.
Abstract:
Techniques, systems and an article of manufacture for caching in a virtualized computing environment. A method includes enforcing a host page cache on a host physical machine to store only base image data, and enforcing each of at least one guest page cache on a corresponding guest virtual machine to store only data generated by the guest virtual machine after the guest virtual machine is launched, wherein each guest virtual machine is implemented on the host physical machine.