Frederick W. Rowe - Raleigh NC, US John K. Senegal - Durham NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 17/30
US Classification:
707792, 707769
Abstract:
The present invention includes a method for managing serialization of ELECTRONIC PRODUCT CODES (EPCs). The method can include a step of identifying a software system for managing Tag Data Specification (TDS) compliant EPCs. The software system can include a database containing two or more related tables. A tuple can be included for each unique nonserialized portion of an EPC ID URN. The database can utilize the nonserialized portion to manage a serialized portion of the EPC. In one embodiment, the database can use the nonserialized portion of an EPC to automatically generate the serialized portion of the EPC. Different sets of sequentially increasing (or sequentially decreasing) serial numbers (that are assigned to the associated unique nonserialized portions of the EPCs) can be associated with different nonserialized values.
Manifest Integrity Management Via Radio Frequency Identification (Rfid)
Vijay Kumar Bhadriraju - Durham NC, US Thomas Tim Hanis - Raleigh NC, US Frederick William Rowe - Raleigh NC, US John Kenneth Senegal - Durham NC, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04Q 5/22
US Classification:
340 1052
Abstract:
Embodiments of the invention provide a method, system and computer program product for manifest integrity management via radio frequency identification (RFID). A manifest integrity management method can include scanning different RFID tags affixed to different objects for placement in a container. The method also can include determining both common data for all of the different RFID tags, and unique data for each of the different RFID tags. Finally, the method can include encoding an RFID tag for the container with an entry for the common data for the different RFID tags, and each unique data for each of the different RFID tags. In this way, a manifest can be created for the objects in the container.
John Ross - Atlanta GA, US Frederick Rowe - Raleigh NC, US Gregory Smith - Raleigh NC, US Paul Vanderlei - Grand Rapids MI, US
International Classification:
H04K 1/00
US Classification:
380255000
Abstract:
An RFID tag includes a transceiver for communicating with a tag reader; memory for storing a deactivation string, an encrypted deactivation string created externally to the tag by encrypting the deactivation string, and a trial string created externally to the tag by decrypting the encrypted deactivation; and logic for comparing the deactivation string and the trial string to determine whether they are the same, and, if they are the same, configuring the tag to permit deactivation. A method executed by the RFID tag includes comparing the trial string with the deactivation string to determine whether they are the same, and if they are the same, configuring the tag to permit deactivation. The trial string may be created externally to the tag by decrypting, using a first key, an encrypted deactivation string that is created externally to the tag by encrypting the deactivation string using a second key.
- Armonk NY, US Jayaprakash Rajasekaran - Chennai, IN Frederick W. Rowe - Raleigh NC, US
International Classification:
G06F 9/455 G06F 9/50
Abstract:
Managing memory allocation for application deployment on a J2EE server. The server receives applications for processing. The server also receives defined memory boundaries of the application. A custom memory-aware classloader is generated on the server and tracks memory allocated to the application during application processing. Excess memory usage characteristic of the application is detected, and an out of memory exception is thrown, without affecting other applications on the server. A responsive action is taken without affecting other applications processed by the server.
- Armonk NY, US Jayaprakash Rajasekaran - Chennai, IN Frederick W. Rowe - Raleigh NC, US
International Classification:
G06F 9/50 G06F 9/455
Abstract:
Managing memory allocation for application deployment on a J2EE server. The server receives applications for processing. The server also receives defined memory boundaries of the application. A custom memory-aware classloader is generated on the server and tracks memory allocated to the application during application processing. Excess memory usage characteristic of the application is detected, and an out of memory exception is thrown, without affecting other applications on the server. A responsive action is taken without affecting other applications processed by the server.