Abstract:
A method and computing systems for refreshing, from a server, objects locally stored by a client device remotely connected through a communicating means to said server. The client device send a request for refresh message and a list of object identifiers and the digest of the object itself stored in its local storage. The server, after checking the deals the client device has subscribed to, sends back a refresh answer message with the objects stored locally in the client device and which needs to be refreshed. According to the deals to which the client device has subscribed, the server will also send new objects and will send a special code to specify to the client device to delete objects which are no more part of the deals.
Abstract:
A method is disclosed to create files in a file system hierarchy in a way which facilitates their retrieval. The method of the preferred embodiment allows to manage a file by creating , retrieving, deleting, copying and moving the file in a file hierarchy as displayed through the graphical user interface provided with the operating system. The file is saved in one folder under a file name and a possibility is given to the user to save the file under the same file name or different file names in different folders which are all in relation with the context of the file creation. The user will multiply his chances to retrieve the file in different folders when he desires access it later on. The principle is to create a real file in a first designated folder and to create shortcut files in the other folders. The list of shortcut files is saved as a hidden file in the same directory as the real file. The advantage of the invention is to take benefit of the shortcut function available in most operating systems.
Abstract:
An expiration management method and system. The method includes transmitting by an RFID tag reader within an enclosure, a plurality of continuous timing signals. The enclosure comprises a container comprising a product and an RFID tag. The RFID tag comprises data indicating a first state for the RFID tag and a first time period. The RFID tag reader receives the data and generates a first time stamp. The RFID tag reader transmits a first message commanding the RFID tag to enter a second state. The RFID tag reader transmits the first time stamp and generates a second time stamp. The RFID tag reader transmits the second time stamp. The RFID tag reader receives results from a comparing process performed by the RFID tag. The RFID tag reader performs a function indicating the results.
Abstract:
A method for authenticating an item comprising an RFID having a memory for storing an identifier and a secret key, and a built-in hashing function, is disclosed. According to the method of the invention, the output of the RFID of the item to be authenticated is compared with the output of the RFID of a genuine item. To that end, a random number is transmitted to the item to be authenticated with zero as parameters. The RFID 's identifier, the random number, and the secret key are concatenated and use as input of the built-in hashing function that result is output with the RFID identifier. The RFID 's identifier and the random number are then transmitted to the RFID of the genuine item that returns its identifier and the output of the built-in hashing function computed with the RFID 's identifier of the item to be authenticated, the random number, and the secret key. If the results of both built-in hashing functions are identical, the item is authenticated else, it is counterfeiting.
Abstract:
A method and computing systems for refreshing, from a server, objects locally stored by a client device remotely connected through a communicating means to said server. The client device send a request for refresh message and a list of object identifiers and the digest of the object itself stored in its local storage. The server, after checking the deals the client device has subscribed to, sends back a refresh answer message with the objects stored locally in the client device and which needs to be refreshed. According to the deals to which the client device has subscribed, the server will also send new objects and will send a special code to specify to the client device to delete objects which are no more part of the deals.
Abstract:
A system for scheduling electric power consumption cycles is provided. A consumption cycle is a time period of human scale, minutes or hours typically, rather than an electrical cycle. The system includes an electric-powered device driven by power supplied by an electric power network. The system also includes a consumption cycle data (CCD) requesting module communicatively linked to the electric-powered device. The link may use electric power lines via methods such as Broadband over Power Line, or may be wireless. The CCD requesting module is configured to generate a CCD request requesting allocation of electric power from the electric power network. Additionally, the system includes an electric power network node electrically connected to the electric-powered device from which electric power is conveyed to the electric-powered device. The system also includes a CCD responding module communicatively linked to the CCD requesting module. The CCD responding module is configured to determine whether the request for allocation of power can be granted subject to a predetermined capacity constraint.
Abstract:
PROBLEM TO BE SOLVED: To provide a dynamic remote storage system for a software object. SOLUTION: This dynamic remote storage system comprises a mobile device having an object manager and a local storage means, a remote storage means, and a radio communication network. The object manager stores an object in the remote storage means via the radio communication network or the local storage means. The object manager is provided with an object table for securing information about the object stored in the remote storage means or the local storage means, and in response to a request from a user, access from the local storage means or the remote storage means to the information is allowed. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a wireless service purchase system that allows customers to access services without carrying cash, operating a payment card, or waiting in line to use a payment booth. SOLUTION: The wireless service purchase system includes a service provider server 20 that receives a request from a service controller booth if the booth has received an identification number from an RFID tag; that, if a reader has received the identification number from the RFID tag in order to verify whether an account associated with a user has a balance sufficient to access the service requested, receives a request from the reader so as to verify whether the account associated with the user has a balance sufficient to access the service requested; and that sends a reply to the reader indicating whether or not the user's access to the service is permitted, depending on whether or not the account has the sufficient balance. COPYRIGHT: (C)2006,JPO&NCIPI
Abstract:
A method and system to selectively secure the display of advertisements on web browsers, defining a particular displayed area of said interpreted markup file, obtaining the DOM tree of said interpreted markup file, said DOM tree comprising parent and child nodes; each node being associated with displayable elements, identifying in the DOM tree a set of child nodes whose displayable elements comprise said particular displayed area, identifying in the DOM tree a first parent node comprising said set of child nodes, converting displayable elements associated with said identified first parent node to an image, generating a second parent node comprising said image, modifying the DOM tree into a modified DOM tree by deleting said identified set of child nodes and by replacing the identified first parent node by the second parent node.
Abstract:
A computing system and computer readable medium storing computer instructions are disclosed, which when the computer instructions are executed, enables a computer system to manage data using a file name on a computer system having a graphical user interface and a file system storing files with a file hierarchy. The computer instructions comprise, in part, entering a command from an application to create a file; displaying the file hierarchy; allowing a user to select at least one folder; saving data in a first file having a file name in one selected folder; in each of the other selected folders, creating a shortcut file having the same file name and containing a pointer to the first file; and creating a hidden file in the folder containing the first file, the hidden file containing a list of pointers to the shortcut files.