摘要:
In one embodiment of the present invention, a source point of a supply chain secures shipment of an object by devising an encryption key and encrypting a message using the encryption key to produce an encrypted message. A portion or portions of the encryption key and the encrypted message are included or incorporated within the object to be shipped, packaging surrounding the object, and/or labels affixed to the object or packaging, prior to shipping the object to a destination point within the supply chain. Upon receipt of the object from the supply chain, the destination point can extract the portion or portions of the encryption key and the encrypted message from the object, packaging surrounding the object, and/or labels affixed to the object or packaging, obtain the remaining portion of the encryption key directly from the source point, reassemble the encryption key, and decrypt the encrypted message to produce a computed message. The destination point can then obtain the original message from the source point and compare the original message to the decrypted message in order to determine whether or not the shipment is authentic.
摘要:
A cell of a spreadsheet is automatically updated and a comment is determined to have a command associated with the update. In response to detecting the command, the command is processed.
摘要:
A method, system, and apparatus for improving performance of multi-threaded computer programs that re-establishes the lock structure that enables access to a portion of the computer memory and thereby reduces contention for computer memory. The present invention analyzes the references to computer memory and re-structures the memory access lock structure and thereby improves the use of regions of computer memory that are found to be mutually exclusive.
摘要:
A generational garbage collection tool and method for a computer system that pre-allocates computer resources during compile-time for later use by a generational garbage collector at run-time. The invention reduces the overall cost of dealing with long-lived objects and thereby allows a generational garbage collector to focus deallocation efforts on young objects, which are more likely to be dead. The present embodiment reduces pause time to a level that does not disturb interactive users. The embodiment allocates space for interior pointers at compile-time when the location of interior pointers is known and thereby facilitates generational garbage collection. By enabling the use of threaded interior pointers during generational garbage collection, live object relocation is improved by requiring an update to one pointer instead of updating each pointer that references an object. The present embodiment identifies the pointers that may be updated due to generational garbage collection, and by selectively allocating space to only those pointers that may be accessed during generational garbage collection and not all pointers, computer resources are saved. Further, the present embodiment may include locking information in the pointer to determine whether the object is presently being updated and is therefore locked.
摘要:
In one embodiment of the present invention, a source point in a supply chain generates a secret and devises a secret sharing scheme that parcels the secret into a number of secret shares. The source point retains at least one secret share, and distributes the remaining secret shares to trusted, intermediate points in the supply chain. The source point then ships a shipment comprising are least one object, and frequently including at least one level of packaging, to a destination point in the supply chain, labeling the object or objects and/or packaging enclosing the object or objects with the retained secret share. Each intermediate point incorporates the secret share obtained by the intermediate point from the source point into the object, packaging enclosing the object, or a label on the object or packaging. At the destination point, the recipient of the object can use the secret shares incorporated into the object, packaging enclosing the object, or a label on the object or packaging to reconstruct the secret initially generated by the source point, and compares the reconstructed secret to the original secret forwarded from the source point.
摘要:
Methods and systems of the present invention employ perturbation techniques for configuring RFID-tag-reader networks in order to achieve increased overall efficiency of a network of RFID-tag readers. According to described embodiments of the present invention, individual RFID-tag readers within a multi-RFID-tag-reader network may be removed or shut down, or RFID-tag readers may be displaced relative to one another, in order to remove interferences between RFID-tag readers and to increase the interrogation efficiency of the multi-RFID-tag-reader network.
摘要:
In a method of authenticating a package, an origin noise level of the package is determined based upon one or more identifying characteristics, where the origin noise level is a deviation from a normal condition caused by the one or more identifying characteristics. In addition, the package is authenticated based upon the origin noise level of the package.
摘要:
In one embodiment of the present invention, a source point, or security management entity, within a supply chain labels a shipment to be shipped through the supply chain with numbers, text strings, or other type of label information. Different label information may be placed at each of multiple levels of packaging as well as on objects within the packaging. The source point devises an encryption-key chain via a one-way function, and encrypts combinations of the label information incorporated within the packaging and objects using encryption keys from the encryption-key chain to produce one or more encrypted label tags. The one or more encrypted label tags are affixed to the shipment by the source point, and the shipment is sent into the supply chain for eventual delivery to a destination point. At pre-selected intervals of time, the source point reveals encryption keys within the encryption-key chain. In one embodiment of the present invention, revealing of encryption keys allows intermediate points or the destination point in the supply chain at which the shipment resides to extract label information and apply the most recently revealed encryption key to compute a label-tag value, and to then compare the computed label-tag value to a label tag affixed to, or incorporated within, the shipment.
摘要:
Methods and systems of the present invention are directed to clustering RFID-tag readers of a multi-RFID-tag-reader network in order to obtain a set of RFID-tag readers with high probability of detecting an event, but with low probability of collisions and with an acceptable cost. The cost may be determined by any of numerous cost functions of the RFID-tag readers in the set of RFID-tag readers, and may represent a cost in power, long-term reliability, and other such metrics that may be applied to an RFID-tag network.
摘要:
A power control circuit is used to control the power supplied to a circuit from a power source. The power control circuit is operable to connect and disconnect the power source from the circuit. The power control circuit connects the power source to the circuit in response to an externally applied magnetic field.