摘要:
A technique for obtaining a key for encryption/decryption/data recovery from an enterprise key management system. In one example embodiment, this is accomplished by connecting a client mobile device to a cryptography key management using a UID, a UDID, the names of one or more data files to encrypt, a password Pswd, and a KeyID to obtain the key for encryption/decryption/data recovery.
摘要:
Systems and methods for improving multicast communications for media services in a network are provided. In this regard, a representative method, among others, includes receiving information related to consumers and at least one routing algorithm associated with the network; generating a multi-hop packet propagation tree based on the receive information related to the consumers and the at least one routing algorithm; receiving a data packet related to the network media services; and encoding the data packet with the multi-hop packet propagation tree.
摘要:
A method for determining locations in a predefined area for placing a Radio Frequency Identification (RFID) reader in order to obtain a full coverage of the predefined area is provided. The method includes arranging a plurality of hexagonal area to form a combined area until the total area of the combined area is equal or larger than the predefined area, aligning the predefined area within the combined area, and determining the hexagonal area which is fully or partially covered by the predefined area. Each hexagonal area represents an area of coverage of the RFID reader, and the center of the hexagonal area which is determined to be fully or partially covered by the predefined area corresponds to one of the locations for placing the RFID reader.
摘要:
A technique that binds encryption and decryption keys using a UID, a UDID, and a Pswd to a client mobile device in an enterprise. In one example embodiment, this is achieved by creating a new user account using the UID and the DPswd in an inactive state and communicating the UID and the DPswd to an intended user using a secure communication medium by an administrator. The intended user then logs into a cryptography key management system using the UID and the DPswd via a client mobile device. The UDID associated with the client mobile device is then hashed to create a H(UDID). The H(UDID) is then sent to the cryptography key management system by a local key management application module. The H(UDID) is then authenticated by the cryptography key management system. An encryption/decryption key is then assigned for the client mobile device.
摘要:
A technique that decrypts data stored on removable media, if the device on which the encryption was performed is lost, unavailable, or the user credentials are lost. In example embodiment, this is achieved by using the administrator UID, the administrator UDID, the removable media, the names of one or more data files to be decrypted, the administrator Pswd, and a KeyID to decrypt data stored on the removable media associated with a lost or unavailable mobile device on which encryption was performed.
摘要:
To provide collaborative business intelligence in an enterprise, an analytics platform is provided to receive an event associated with the enterprise and to perform analysis in response to the event. A virtual collaboration platform is provided to enable plural users to interact with each other and to use resources of the analytics platform.
摘要:
An RFID system includes a pair of guide tracks located on opposite boundaries of at least one zone. A channel is movably attached to the guide tracks and is configured to move along the guide tracks through the at least one zone. A mobile RFID reader is movably attached to the channel and the mobile RFID reader is paused at a plurality of read points to scan for RFID tags located. The read points are determined by an arrangement of a plurality of hexagonal areas which are grouped together to create a combined area, where the combined area is aligned with the predefined area to define locations of the plurality of hexagonal areas, and where substantially central locations of each hexagonal area represent the plurality of read points.
摘要:
A technique for obtaining a key for encryption/decryption/data recovery from an enterprise key management system. In one example embodiment, this is accomplished by connecting a client mobile device to a cryptography key management using a UID, a UDID, the names of one or more data files to encrypt, a password Pswd, and a KeyID to obtain the key for encryption/decryption/data recovery.
摘要:
A technique that binds encryption and decryption keys using a UID, a UDID, and a Pswd to a client mobile device in an enterprise. In one example embodiment, this is achieved by creating a new user account using the UID and the DPswd in an inactive state and communicating the UID and the DPswd to an intended user using a secure communication medium by an administrator. The intended user then logs into a cryptography key management system using the UID and the DPswd via a client mobile device. The UDID associated with the client mobile device is then hashed to create a H(UDID). The H(UDID) is then sent to the cryptography key management system by a local key management application module. The H(UDID) is then authenticated by the cryptography key management system. An encryption/decryption key is then assigned for the client mobile device.
摘要:
A method for managing items distributed in a global supply chain is provided. The method includes sending an identification query to an identification tag attached to an item, receiving identification data from the identification tag, determining a home address corresponding to the identification data, assigning a current address for the identification tag, sending the current address to a home agent at the determined home address, and associating the current address with the home address by the agent. According the current address of the identification tag is returned in response to a request on the location of the identification tag.