摘要:
A secure token includes a processor for protecting a first cryptographic key against unauthorized access, and creating a second cryptographic key from the first key and a message unique to an insecure device. The second key is usable for file decryption by the insecure device.
摘要:
A secure token includes a processor for protecting a first cryptographic key against unauthorized access, and creating a second cryptographic key from the first key and a message unique to an insecure device. The second key is usable for file decryption by the insecure device.
摘要:
A data structure disposed in a computer readable memory provides information corresponding to a location. The data structure includes a first data field for identifying the location and a second data field associated with the first data field containing information corresponding to the location.
摘要:
Data from a data source is received. A location in a spreadsheet is determined for placing at least a portion of the data from the data source based on location information for the data source.
摘要:
Methods and systems of the present invention employ perturbation techniques for configuring RFID-tag-reader networks in order to achieve increased overall efficiency of a network of RFID-tag readers. According to described embodiments of the present invention, individual RFID-tag readers within a multi-RFID-tag-reader network may be removed or shut down, or RFID-tag readers may be displaced relative to one another, in order to remove interferences between RFID-tag readers and to increase the interrogation efficiency of the multi-RFID-tag-reader network.
摘要:
The present invention includes a method and system for dynamically controlling cooling resources in a data center based on the workload of the data center. Accordingly, based on the workload constraints (power consumed, latency, etc.) of the data center, each of a plurality of different types of cooling resources is activated in an optimal fashion. Consequently, a substantial savings in operational costs related to cooling resources is achieved. A first aspect of the present invention is a method for dynamically controlling cooling resources in a data center. The method comprises determining a workload within the data center, determining an amount of heat being generated as a function of the workload and activating each of a plurality of different types of cooling resources within the data center in an optimal fashion based on the amount of heat being generated.
摘要:
A localization method for setting the locale of a configurable device is presented. The first portion of the localization transmits localization selections for a target locale to a configurable device. Localization selections are initially set on an interrogator device and then transmitted wirelessly using RFID or other technologies from the interrogator device to a tag coupled to the configurable device. A second portion of the localization receives localization selections for a target locale on the configurable device. A tag receives from an interrogator device one or more localization selections for the target locale on the configurable device. These localization selections are stored on the tag until the configurable device is powered-on. Device initialization causes another portion of the localization to set a target locale on a configurable device. Firmware accesses localization selections previously stored on the tag and then sets the default localization selections in the firmware for the device.
摘要:
In one embodiment of the present invention, a source point in a supply chain generates a secret and devises a secret sharing scheme that parcels the secret into a number of secret shares. The source point retains at least one secret share, and distributes the remaining secret shares to trusted, intermediate points in the supply chain. The source point then ships a shipment comprising are least one object, and frequently including at least one level of packaging, to a destination point in the supply chain, labeling the object or objects and/or packaging enclosing the object or objects with the retained secret share. Each intermediate point incorporates the secret share obtained by the intermediate point from the source point into the object, packaging enclosing the object, or a label on the object or packaging. At the destination point, the recipient of the object can use the secret shares incorporated into the object, packaging enclosing the object, or a label on the object or packaging to reconstruct the secret initially generated by the source point, and compares the reconstructed secret to the original secret forwarded from the source point.
摘要:
A system and method for identification tag resolution is disclosed. The method discloses the elements of: identifying a set of attributes for a structure; assigning a tag to the structure; scanning the tag with a tag scanner; and modifying the structure's attributes, in response to scanning the tag. The structure's attributes can be modified in response to a value of a variety of variables, including a spatial variable, an orientational variable, a temporal variable, and a trust variable. The method also discloses that devices can be located proximate to the structure and, after a set of attributes identified for the device, the device's attributes can then be modified in response to scanning the tag. Also disclosed is that a set of attributes for the tag scanner can be identified and modified in response to scanning the tag. The system discloses all means for effecting the method.
摘要:
A system for utilizing waste heat to provide power to an electronic device in a data center. The system includes at least one data center component configured to generate heat energy during operation thereof and a converter for receiving the heat energy generated by the at least one data center component. The converter is configured to convert the heat energy to electrical energy. The system also includes a power supply operable to be recharged through receipt of the electrical energy converted by the converter, and where the power supply is configured to deliver the electrical energy to the electronic device.