摘要:
A network channel is used as a waiting channel, wherein members of a group other than a first member join the waiting channel while performing an action or process, and then leave the waiting channel once the action or process has been performed. Once all of the members have left the waiting channel the first member of the group then performs an action or process. In order to indicate to the first member that all of the other members have left the waiting channel, a protocol such as the Multicast Source Notification of Interest Protocol (MSNIP) may be used.
摘要:
The invention provides the concept of a network channel which is used as a waiting channel, wherein members of a group other than a first member join the waiting channel whilst performing an action or process, and then leave the waiting channel once the action or process has been performed. Once all of the members have left the waiting channel the first member of the group then performs an action or process. In order to indicate to the first member that all of the other members have left the waiting channel, a protocol such as the Multicast Source Notification of Interest Protocol (MSNIP) may be used.
摘要:
One or more users of a present state are notified of at least one property of an entity. A request message is received from a user over a first communications channel, the message containing information indicative of at least one property of an entity in which the user is interested. The present state of the at least one property is determined, as is an identifier of a second communications channel onto which future messages containing information relating to future changes of state of the at least one property of the entity will be transmitted. A reply message is transmitted to the user, the reply message containing information indicative of the present state of the at least one property and of the identifier of the second communications channel.
摘要:
Methods and devices for enabling a user to obtain item information relating to an item (10), the item having associated therewith an item identification means (12) and an RFID response means (14) arranged to provide a predetermined response on being subjected to a currently applicable trigger signal; the method comprising steps of: establishing from the item identification means (12) item identification information; using the item identification information to determine from an item information source (30) a currently applicable trigger signal for the RFID response means (14); subjecting the RFID response means (14) to the currently applicable trigger signal; receiving a predetermined response from the RFID response means (14); and using the predetermined response to obtain item information from the item information source (30); wherein the RFID response means (14) is arranged to generate a new currently applicable trigger signal and a new predetermined response associated therewith following subjecting of the RFID response means (14) to the currently applicable trigger signal.
摘要:
Control apparatus (30), systems and methods for enabling access to one or more information systems (36) by one or more entities (34) on a path across a supply network to be controlled, access to the or each information system (36) being policed by means of an access-policer (38), the network comprising: at least one token-issuer (32) operable to issue an access pre-authorization token, the access pre-authorization token having associated therewith an information identifier and a digital signature, and to forward the access pre-authorization token towards one or more entities (34) on a path across the network; and at least one receiver entity (34) operable to receive an access pre-authorization token issued by the at least one token-issuer (32).
摘要:
Apparatus and system for verifying a route taken during movement of an RFID tag, comprising a trusted platform module; sealed storage (80) comprising one or more stores (50, 52) for storing a public key (64), a private key (68) and a policy (62); and processors arranged to: receive data (60) read-out from the RFID tag (4) and comprising an RFID tag identity and an encrypted signature (9); use the public key (64) to decrypt the encrypted signature (9); verify that the decrypted signature (9) corresponds to a first entity from which, according to the policy (62), a second entity is authorised to receive the given RFID tag (4); use the private key (68) to provide an encrypted signature (9); and forward data comprising the encrypted signature (9) to an RFID tag writer (22).
摘要:
Data collected by sensors (10, 30) is transmitted to data collection points (31, 61) over a network using an epidemic protocol in which data received by a relay (3) is forwarded to a randomly-selected group of further relays (4, 5, 6) unless the same data has been previously received by the relay (3) or the data is time-expired. Data received by a relay (3) from different sources (1, 2, 30) in the same time-frame is aggregated using a Bloom filter process so that in each time frame only a single Bloom filter message is transmitted by each relay.
摘要:
An RFID device such as an RFID tag (2) and method comprising: storing a current read key and a current ownership key; receiving, from the RFID reader system (4), a change read key command and an indication that the RFID reader system (4) holds the current ownership key; and in response, replacing the current read key with a new current read key enabling the RFID device (2) to be read by an RFID reader system (4) holding the new current read key. Also, an RFID reader system (4) and method for an RFID reader system (4) to process an RFID device (2), comprising: issuing a take ownership command to an RFID device (2); receiving a new ownership key from the RFID device (2); applying for authorization of the new ownership key; and receiving from the authorization apparatus (6) the new ownership key and an acknowledgement that may be communicated to the tag as evidence of authorization.
摘要:
Methods and apparatus are disclosed for enabling selection of a remote service node from a plurality of possible nodes, each capable of providing a service, and each associated with a service node control entity. The method comprises: receiving a user request in respect of a service required by a user, the request containing a first user device routing identifier relating to the location in the network of the user device, and a service indication indicative of an appropriate service provider; identifying from the service indication a service node control entity associated with the service provider; sending to the service node control entity a service node request containing a second user device routing identifier differing from the first user device routing identifier but selected at least partly in dependence thereon; receiving from the service node control entity an indication of a remote service node capable of providing the required service; and providing an indication of the remote service node to the user device.
摘要:
A policy store associated with a policy decision point of an access control system is updated. The policy decision point is arranged to provide, in response to received decision requests, access control decisions in dependence on one or more policies stored in the policy store, each policy specifying a predetermined access control decision to be provided in response to a particular access request made in respect of a particular attribute or combination of attributes. The policy decision point is associated with at least one policy enforcement point arranged to implement access control in accordance with access control decisions provided by the policy decision point in response to decision requests submitted by the policy enforcement point, the policy enforcement point having associated therewith an attribute store providing data relating to attributes in respect of which access requests have previously been made via the policy enforcement point.