Abstract:
A method and computing systems for refreshing, from a server, objects locally stored by a client device remotely connected through a communicating means to said server. The client device send a request for refresh message and a list of object identifiers and the digest of the object itself stored in its local storage. The server, after checking the deals the client device has subscribed to, sends back a refresh answer message with the objects stored locally in the client device and which needs to be refreshed. According to the deals to which the client device has subscribed, the server will also send new objects and will send a special code to specify to the client device to delete objects which are no more part of the deals.
Abstract:
A method is disclosed to create files in a file system hierarchy in a way which facilitates their retrieval. The method of the preferred embodiment allows to manage a file by creating , retrieving, deleting, copying and moving the file in a file hierarchy as displayed through the graphical user interface provided with the operating system. The file is saved in one folder under a file name and a possibility is given to the user to save the file under the same file name or different file names in different folders which are all in relation with the context of the file creation. The user will multiply his chances to retrieve the file in different folders when he desires access it later on. The principle is to create a real file in a first designated folder and to create shortcut files in the other folders. The list of shortcut files is saved as a hidden file in the same directory as the real file. The advantage of the invention is to take benefit of the shortcut function available in most operating systems.
Abstract:
A method for authenticating an item comprising an RFID having a memory for storing an identifier and a secret key, and a built-in hashing function, is disclosed. According to the method of the invention, the output of the RFID of the item to be authenticated is compared with the output of the RFID of a genuine item. To that end, a random number is transmitted to the item to be authenticated with zero as parameters. The RFID 's identifier, the random number, and the secret key are concatenated and use as input of the built-in hashing function that result is output with the RFID identifier. The RFID 's identifier and the random number are then transmitted to the RFID of the genuine item that returns its identifier and the output of the built-in hashing function computed with the RFID 's identifier of the item to be authenticated, the random number, and the secret key. If the results of both built-in hashing functions are identical, the item is authenticated else, it is counterfeiting.
Abstract:
A method and computing systems for refreshing, from a server, objects locally stored by a client device remotely connected through a communicating means to said server. The client device send a request for refresh message and a list of object identifiers and the digest of the object itself stored in its local storage. The server, after checking the deals the client device has subscribed to, sends back a refresh answer message with the objects stored locally in the client device and which needs to be refreshed. According to the deals to which the client device has subscribed, the server will also send new objects and will send a special code to specify to the client device to delete objects which are no more part of the deals.
Abstract:
PROBLEM TO BE SOLVED: To obtain a data transmission system which exchanges packetized data through an IP network as a medium between an arbitrary IP host in a cluster of IP hosts and a plurality of workstations. SOLUTION: Each IP host has at least an IP layer and a network layer. The IP host is connected to the IP network by a pair of routers 26 and 28 and a network dispather 34, through a layer-2 network 24 as the interface of the IP network 22. The network dispatcher 34 receives all incoming flows from workstations and dispatches them between host clusters. This system includes a monitor device including a means which is included in the host cluster and monitors at least the availability of the routers and a means which broadcasts availability information on the routers to individual hosts in the host cluster through the network dispatcher.
Abstract:
PROBLEM TO BE SOLVED: To provide a data transmission system including an IP network where an IP host directly selects a default router so as to enhance load balance thereby enhancing the availability of the system. SOLUTION: In the data transmission system, packetized data from an IP host 10 having an least an IP layer 34 a network layer are transmitted to a plurality of work stations 12, 14 through a medium that is an IP network 16. The IP host is connected to the IP network via a layer 2 network 18 interfacing the IP network by a set of routers 20, 22, 24. The IP host has a multiple address resolution protocol(MARP) layer 36 between the IP layer and the network layer, and the MARP layer selects any of the routers in response to a succeeding hop IP address fed to the MARP layer with the IP layer when a data packet is transmitted to any of the work stations from the IP host.
Abstract:
A computing system and computer readable medium storing computer instructions are disclosed, which when the computer instructions are executed, enables a computer system to manage data using a file name on a computer system having a graphical user interface and a file system storing files with a file hierarchy. The computer instructions comprise, in part, entering a command from an application to create a file; displaying the file hierarchy; allowing a user to select at least one folder; saving data in a first file having a file name in one selected folder; in each of the other selected folders, creating a shortcut file having the same file name and containing a pointer to the first file; and creating a hidden file in the folder containing the first file, the hidden file containing a list of pointers to the shortcut files.
Abstract:
A method of transmitting digitized voice signals as packets of bits in a digital transmission network to which a plurality of terminals acting as sources of voice signals are attached. The method includes, at the transmitting end and for each source, the steps of: a dividing the signal into successive, digitally-coded segments; performing a so-called source activity detection; and assembling the bits resulting from the coding operation into packets, each packet being provided with a header containing, in particular, a parity bit whose logic value is modified whenever an inactivity or long pause is detected. At the receiving end, detection of a change in the value of said parity bit causes the delivery of a packet of bits to the decoder/synthesizer to be delayed by a given time interval called retention delay.
Abstract:
Packets input to a buffer register (10) increment the contents of two counters (12,20). At 40ms intervals a real-time clock resets one counter (12) to zero after transferring its contents to a logic circuit (14) which addresses a memory (16). One output from the memory defines the buffer content (L), monitored by the other counter (20), at which the oldest packets in the buffer are suppressed by a cancelling device (22). Another output from the memory stipulates the number (x) of old packets which are to be suppressed. The real-time clock may be replaced by a comparator comparing the buffer output packet count with a fixed quantity.