摘要:
Control apparatus (30), systems and methods for enabling access to one or more information systems (36) by one or more entities (34) on a path across a supply network to be controlled, access to the or each information system (36) being policed by means of an access-policer (38), the network comprising: at least one token-issuer (32) operable to issue an access pre-authorization token, the access pre-authorization token having associated therewith an information identifier and a digital signature, and to forward the access pre-authorization token towards one or more entities (34) on a path across the network; and at least one receiver entity (34) operable to receive an access pre-authorization token issued by the at least one token-issuer (32).
摘要:
Apparatus and system for verifying a route taken during movement of an RFID tag, comprising a trusted platform module; sealed storage (80) comprising one or more stores (50, 52) for storing a public key (64), a private key (68) and a policy (62); and processors arranged to: receive data (60) read-out from the RFID tag (4) and comprising an RFID tag identity and an encrypted signature (9); use the public key (64) to decrypt the encrypted signature (9); verify that the decrypted signature (9) corresponds to a first entity from which, according to the policy (62), a second entity is authorised to receive the given RFID tag (4); use the private key (68) to provide an encrypted signature (9); and forward data comprising the encrypted signature (9) to an RFID tag writer (22).
摘要:
Data collected by sensors (10, 30) is transmitted to data collection points (31, 61) over a network using an epidemic protocol in which data received by a relay (3) is forwarded to a randomly-selected group of further relays (4, 5, 6) unless the same data has been previously received by the relay (3) or the data is time-expired. Data received by a relay (3) from different sources (1, 2, 30) in the same time-frame is aggregated using a Bloom filter process so that in each time frame only a single Bloom filter message is transmitted by each relay.
摘要:
Methods and systems for use in enabling verification by entities on a path across a supply network of an item identification means traversing said path, the network comprising: at least one supplier entity able to introduce into the network an item identification means having stored therein an item identifier and a digital signature associated with said supplier entity, and to forward said item identification means along a path across said network; at least one intermediate entity able to receive said item identification means from said at least one supplier entity or from another intermediate entity in said network and forward said item identification means along said path; and at least one receiver entity able to receive said item identification means from an intermediate entity in said network.
摘要:
Data collected by sensors (10, 30) is transmitted to data collection points (31, 61) over a network using an epidemic protocol in which data received by a relay (3) is forwarded to a randomly-selected group of further relays (4, 5, 6) unless the same data has been previously received by the relay (3) or the data is time-expired. Data received by a relay (3) from different sources (1, 2, 30) in the same time-frame is aggregated using a Bloom filter process so that in each time frame only a single Bloom filter message is transmitted by each relay.
摘要:
An RFID device such as an RFID tag (2) and method comprising: storing a current read key and a current ownership key; receiving, from the RFID reader system (4), a change read key command and an indication that the RFID reader system (4) holds the current ownership key; and in response, replacing the current read key with a new current read key enabling the RFID device (2) to be read by an RFID reader system (4) holding the new current read key. Also, an RFID reader system (4) and method for an RFID reader system (4) to process an RFID device (2), comprising: issuing a take ownership command to an RFID device (2); receiving a new ownership key from the RFID device (2); applying for authorisation of the new ownership key; and receiving from the authorisation apparatus (6) the new ownership key and an acknowledgement that may be communicated to the tag as evidence of authorisation.
摘要:
Control apparatus (30), systems and methods for enabling access to one or more information systems (36) by one or more entities (34) on a path across a supply network to be controlled, access to the or each information system (36) being policed by means of an access-policer (38), the network comprising: at least one token-issuer (32) operable to issue an access pre-authorisation token, the access pre-authorisation token having associated therewith an information identifier and a digital signature, and to forward the access pre-authorisation token towards one or more entities (34) on a path across the network; and at least one receiver entity (34) operable to receive an access pre-authorisation token issued by the at least one token-issuer (32).
摘要:
One or more users of a present state are notified of at least one property of an entity. A request message is received from a user over a first communications channel, the message containing information indicative of at least one property of an entity in which the user is interested. The present state of the at least one property is determined, as is an identifier of a second communications channel onto which future messages containing information relating to future changes of state of the at least one property of the entity will be transmitted. A reply message is transmitted to the user, the reply message containing information indicative of the present state of the at least one property and of the identifier of the second communications channel.
摘要:
Methods and systems for use in enabling verification by entities on a path across a supply network of an item identification means traversing said path, the network comprising: at least one supplier entity able to introduce into the network an item identification means having stored therein an item identifier and a digital signature associated with said supplier entity, and to forward said item identification means along a path across said network; at least one intermediate entity able to receive said item identification means from said at least one supplier entity or from another intermediate entity in said network and forward said item identification means along said path; and at least one receiver entity able to receive said item identification means from an intermediate entity in said network.
摘要:
A network channel is used as a waiting channel, wherein members of a group other than a first member join the waiting channel while performing an action or process, and then leave the waiting channel once the action or process has been performed. Once all of the members have left the waiting channel the first member of the group then performs an action or process. In order to indicate to the first member that all of the other members have left the waiting channel, a protocol such as the Multicast Source Notification of Interest Protocol (MSNIP) may be used.