Abstract:
A method and computing systems for refreshing, from a server, objects locally stored by a client device remotely connected through a communicating means to said server. The client device send a request for refresh message and a list of object identifiers and the digest of the object itself stored in its local storage. The server, after checking the deals the client device has subscribed to, sends back a refresh answer message with the objects stored locally in the client device and which needs to be refreshed. According to the deals to which the client device has subscribed, the server will also send new objects and will send a special code to specify to the client device to delete objects which are no more part of the deals.
Abstract:
A method is disclosed to create files in a file system hierarchy in a way which facilitates their retrieval. The method of the preferred embodiment allows to manage a file by creating , retrieving, deleting, copying and moving the file in a file hierarchy as displayed through the graphical user interface provided with the operating system. The file is saved in one folder under a file name and a possibility is given to the user to save the file under the same file name or different file names in different folders which are all in relation with the context of the file creation. The user will multiply his chances to retrieve the file in different folders when he desires access it later on. The principle is to create a real file in a first designated folder and to create shortcut files in the other folders. The list of shortcut files is saved as a hidden file in the same directory as the real file. The advantage of the invention is to take benefit of the shortcut function available in most operating systems.
Abstract:
A method for authenticating an item comprising an RFID having a memory for storing an identifier and a secret key, and a built-in hashing function, is disclosed. According to the method of the invention, the output of the RFID of the item to be authenticated is compared with the output of the RFID of a genuine item. To that end, a random number is transmitted to the item to be authenticated with zero as parameters. The RFID 's identifier, the random number, and the secret key are concatenated and use as input of the built-in hashing function that result is output with the RFID identifier. The RFID 's identifier and the random number are then transmitted to the RFID of the genuine item that returns its identifier and the output of the built-in hashing function computed with the RFID 's identifier of the item to be authenticated, the random number, and the secret key. If the results of both built-in hashing functions are identical, the item is authenticated else, it is counterfeiting.
Abstract:
A method and computing systems for refreshing, from a server, objects locally stored by a client device remotely connected through a communicating means to said server. The client device send a request for refresh message and a list of object identifiers and the digest of the object itself stored in its local storage. The server, after checking the deals the client device has subscribed to, sends back a refresh answer message with the objects stored locally in the client device and which needs to be refreshed. According to the deals to which the client device has subscribed, the server will also send new objects and will send a special code to specify to the client device to delete objects which are no more part of the deals.
Abstract:
A method and computing systems for refreshing, from a server, objects locally stored by a client device remotely connected through a communicating means to said server. The client device send a request for refresh message and a list of object identifiers and the digest of the object itself stored in its local storage. The server, after checking the deals the client device has subscribed to, sends back a refresh answer message with the objects stored locally in the client device and which needs to be refreshed. According to the deals to which the client device has subscribed, the server will also send new objects and will send a special code to specify to the client device to delete objects which are no more part of the deals.
Abstract:
Packets input to a buffer register (10) increment the contents of two counters (12,20). At 40ms intervals a real-time clock resets one counter (12) to zero after transferring its contents to a logic circuit (14) which addresses a memory (16). One output from the memory defines the buffer content (L), monitored by the other counter (20), at which the oldest packets in the buffer are suppressed by a cancelling device (22). Another output from the memory stipulates the number (x) of old packets which are to be suppressed. The real-time clock may be replaced by a comparator comparing the buffer output packet count with a fixed quantity.
Abstract:
A method and computing systems for refreshing, from a server, objects locally stored by a client device remotely connected through a communicating means to said server. The client device send a request for refresh message and a list of object identifiers and the digest of the object itself stored in its local storage. The server, after checking the deals the client device has subscribed to, sends back a refresh answer message with the objects stored locally in the client device and which needs to be refreshed. According to the deals to which the client device has subscribed, the server will also send new objects and will send a special code to specify to the client device to delete objects which are no more part of the deals.
Abstract:
A method of transmitting digitized voice signals as packets of bits in a digital transmission network to which a plurality of terminals acting as sources of voice signals are attached. The method includes, at the transmitting end and for each source, the steps of: a dividing the signal into successive, digitally-coded segments; performing a so-called source activity detection; and assembling the bits resulting from the coding operation into packets, each packet being provided with a header containing, in particular, a parity bit whose logic value is modified whenever an inactivity or long pause is detected. At the receiving end, detection of a change in the value of said parity bit causes the delivery of a packet of bits to the decoder/synthesizer to be delayed by a given time interval called retention delay.