Abstract:
Described herein are systems and methods for configuring access control devices. In overview, some embodiments provide for a method whereby a smartcard is used to configure a disconnected access control device. A user presents this smartcard to a connected access control device which, in response to the presentation of this card, allows the user to download to the smartcard one or more aspects of configuration data for a specified disconnected access control device. The user subsequently presents the smartcard to the relevant disconnected access control device, which uploads and selectively applies the one or more aspects of configuration data.
Abstract:
A method, integrated system and in-vehicle Active Poster for processing mobile touch transactions including carpooling transactions. The integration includes a near field contactless or swipe smart card or other portable identification device which may be standalone, affixed to, or part of a mobile or hand held portable wireless communication device, a touch sensitive Active Poster also with swipe or near field contactless communication capability and also incorporating or in communication with GPS or other vehicle location services capability for the vehicle, a car pool management or other service provider's system and application and a host computer with networking capability.
Abstract:
Described herein are systems and methods for commissioning access control devices. In overview, a carrier substrate such as a smartcard is used to commission a plurality of access control devices. Measures are implemented such that the individual access control devices are uniquely commissioned. That is, no two devices apply identical commissioning data, hi some embodiments this is achieved by, as part of the commissioning process at a given access control device, modifying one or more aspects of the data carried by the carrier substrate.
Abstract:
A method, integrated system and Active Poster for processing mobile touch transactions. The integration consists of an RFID or other near field communication enabled device which may be standalone, affixed to, or part of a mobile or hand held portable wireless communication device (optionally using a Contact Less (CL) SIM with near field communication capability), a touch sensitive Active Poster also with near field communication capability, an issuer's or mobile network provider's system and application and a host computer with networking capability.
Abstract:
A method and apparatus providing a battery backup for a dynamic random access memory (DRAM) cache system that senses the V.sub.cc level supplied through the cache controller to the cache memory and, if V.sub.cc falls below a preset threshold level, the battery backup apparatus switches the cache memory array to a backup battery V.sub.cc source, and a backup refresh control generator unit that is also powered by the backup battery V.sub.cc source. The cache DRAM, backup battery, and backup refresh generator are physically contained in a single module that can be disconnected from the cache controller and host computer system while preserving the cache memory contents. The backup system is installed in an operating host system for recovery of the cache memory contents and/or resumption of execution of the program that was running when the V.sub.cc power failure occurred.
Abstract:
A method, integrated system and Active Poster for processing mobile touch transactions. The integration consists of an RFID or other near field communication enabled device which may be standalone, affixed to, or part of a mobile or hand held portable wireless communication device (optionally using a Contact Less (CL) SIM with near field communication capability), a touch sensitive Active Poster also with near field communication capability, an issuer's or mobile network provider's system and application and a host computer with networking capability.
Abstract:
Described herein are systems and methods for commissioning access control devices. In overview, a carrier substrate such as a smartcard is used to commission a plurality of access control devices. Measures are implemented such that the individual access control devices are uniquely commissioned. That is, no two devices apply identical commissioning data, hi some embodiments this is achieved by, as part of the commissioning process at a given access control device, modifying one or more aspects of the data carried by the carrier substrate.
Abstract:
Individual role instance reachability and load balancing are simultaneously provided for role instances of an application running in a hosting environment. Instance endpoints may be assigned to each role instance. Each instance endpoint may comprise a combination of an IP address, a transport protocol, and a unique port number. Additionally, a load balanced endpoint may be assigned to the group of role instances. The load balanced endpoint may comprise a combination of an IP address, transport protocol, and another unique port number. When application messages are issued to the data center, the messages are routed in accordance with endpoints used by the messages. For an instance endpoint, the message is routed to a role instance corresponding with the instance endpoint without load balancing. For the load balanced endpoint, the message is routed to any one of the role instances using load balancing.
Abstract:
An access control system for a secure facility includes an authorization system having an interface, in the form of an interrogator, for receiving the request signal indicative of a user seeking authorization for a predetermined action, such as gaining access through a door. In one example, an authorization system may include an interface for receiving a request signal indicative of a party seeking authorization for a predetermined action. A first processor, that is responsive to the request signal, determines if the authorization is to be granted. If so, the first processor may generate an authorization signal that includes information that is securely coded, and which is indicative of the determination. An operating device, physically spaced from the first processor, may receive the authorization signal, and may decode the securely coded information and subsequently initiating the action, if appropriate.
Abstract:
An embodiment of the invention is directed to reducing search-response latency. The closest intermediate server can be located between a client computing device and a search engine. A search query is sent to the intermediate server in a first packet of a transport protocol handshake. A plurality of packets are received from the intermediate server. The plurality of packets are used to open a window associated with a transport protocol. A response related to the search query is received by the client.