Uid Architecture Uid Architecture

Total Page:16

File Type:pdf, Size:1020Kb

Uid Architecture Uid Architecture uIDuID ArchitectureArchitecture anan OpenOpen FoundationFoundation forfor UbiquitousUbiquitous computingcomputing Ken Sakamura, Ph.D. Professor, the University of Tokyo Director, YRP Ubiquitous Networking Laboratory (UNL) Chair, T-Engine Forum / uID Center UbiquitousUbiquitous ComputingComputing TechnologyTechnology ■ Very interesting and useful technology ■ Conventional Usage Pattern: ● Closed, proprietary solution in a single organization ■ Our Approach (uID Architecture) ● Not limited to a single organization ● Open Standard ● Works across organizational boundary and national boundary Copyright by Ken Sakamura. 2005 All rights reserved 2 1 BeneficiariesBeneficiaries ofof uIDuID ArchitectureArchitecture ■ The benefit of RFID technology is shared among producers, distributors, and end- consumers and people beyond simple Supply-Chain Management (SCM) ■ Food Traceability Experiment ● later explained ■ Medicine Traceability Experiment ● later explained Copyright by Ken Sakamura. 2005 All rights reserved 3 OutlineOutline ofof Today'sToday's SpeechSpeech 1. Basic uID Architecture 2. Wide applicability of open uID Architecture ●Exemplified by many feasibility study experiments 3. Comparison of approaches taken by uID Architecture / EPCglobal Copyright by Ken Sakamura. 2005 All rights reserved 4 2 BasicBasic uIDuID ArchitectureArchitecture ■The objective of uID Architecture is to recognize many objects and places in our surrounding “Context Awareness” Copyright by Ken Sakamura. 2005 All rights reserved 5 ContextContext Awareness:Awareness: RecognizingRecognizing manymany objectsobjects andand placesplaces ■ Identifying something so that you can tell that it is differentiate from others ■ To make machine identification easy, we store a unique identification number (ucode) in a tag and place it on an object or a location ■ cf. In our approach, creating and managing the unique number is very important ● This is why we have uID Center to manage such requirements Copyright by Ken Sakamura. 2005 All rights reserved 6 3 ComparisonComparison toto BarcodeBarcode ■Similar existing system: optical barcode 1 2 3 4 5 6 7 8 9 10 11 12 13 1~21~2:Country:Country Code 3~73~7:Organization:Organization code 8~128~12:Product:Product code 1313:Check:Check Sum Copyright by Ken Sakamura. 2005 All rights reserved 7 uIDuID vs.vs. BarcodeBarcode ■ The value of barcode is semantic ■ The value can tell us ● the country of origin ● the organization of origin ● product classification code ━ and serial number sometimes by merely looking at it ■ Different packages of a same product line from a company are likely to carry Copyright by Ken Sakamura. 2005 All rights reserved 8 4 BarcodeBarcode isis semanticsemantic ■It has internal structure ■SAME Barcode if serial/model number is not part of barcode ●Semantic code: policy issues arise because allocation must conform to the imposed internal structure ●We can’t easily allocate unused code space of a country to the others Copyright by Ken Sakamura. 2005 All rights reserved 9 ucodeucode:: non-semanticnon-semantic codecode MereMere IdentifierIdentifier ■The value of ucode is a simple identifier ■The value alone can’t tell us much ■Only thing we know about it is its UNIQUENESS ■That is, the value is used only once Copyright by Ken Sakamura. 2005 All rights reserved 10 5 ShortShort Summary:Summary: ■The value of barcode is semantic ■The value of ucode is a simple identifier Copyright by Ken Sakamura. 2005 All rights reserved 11 BasicBasic uIDuID ArchitectureArchitecture DiagramDiagram ucode Resolution Server :=DJNDMHNL 32 1@GM@K :=DJNDMHNL >HFFNGD><M@K :=DJNDMHNL 32 1@GM@K PDMC 1CDI 7,; :=DJNDMHNL 32 @9754 10 7@LHENMDHG . 8@KO@K - :=DJNDMHNL 3GAHKF<MDHG 8@KOD>@ 1@GM@K / 1HGM<>ME@LL 6KH?N>M 3GAHKF<MDHG N>H?@ 9<B >HFFNGD><MDHG 8@KOD>@ UC 8@KO@K 6KH?N>M 1HFFNGD><MDHG =Q @9754 <NMC@GMD><MDHG <G? @G>KQIMDHG IKHMH>HE 1HFFNGD><MDHG =Q ucode Tags D?@GMDAD><MDHG+IKHM@>MDHG IKHMH>HE Copyright by Ken Sakamura. 2005 All rights reserved 12 6 uIDuID ArchitectureArchitecture 1. We put a unique identifier (ucode) into tags z The tag can an RFID tag and optical tag as well 2. Reading of ucode by UC Terminal 3. Resolution: UC learns the position of Information Server 4. Information acquisition: UC fetches data associated with the ucode 5. Display of fetched data on the screen or an audio output on UC Copyright by Ken Sakamura. 2005 All rights reserved 13 RFIDRFID isis notnot essentialessential forfor uIDuID ArchitectureArchitecture ■Tags can be non-RFID, say, Optical 2D barcode system ID 123456 Digit Code RFID 123456 1D Barcode 2D Barcode code Carrier ■Optical barcode is important for inexpensive products Copyright by Ken Sakamura. 2005 All rights reserved 14 7 FeaturesFeatures ofof uIDuID ArchitectureArchitecture ■ucode is a simple identifier, and its value doesn’t carry meaning ■By using servers via network, we can obtain the information associated with ucode from an information server ■This is the basic operation of uID Architecture Copyright by Ken Sakamura. 2005 All rights reserved 15 PromotionPromotion ofof uIDuID ArchitectureArchitecture TT--EngineEngine ForumForum andand uIDuID CenterCenter Copyright by Ken Sakamura. 2005 All rights reserved 16 8 T-EngineT-Engine ForumForum ■ Established T-Engine Forum in 2002 ■ T-Engine Forum is a non-profit Organization ■ Achievements: ● many feasibility experiments in Japan ■ Current status: ● Close to 500 members world-wide ● Executive members from outside Japan: Korea, USA and Europe ■ T-Engine Forum partners: ● R&D people in China, Korea, Singapore, Thailand, Vietnam, Australia, and India have begun working with T-Engine Forum Copyright by Ken Sakamura. 2005 All rights reserved 17 uIDuID CenterCenter ■Established uID Center within T-Engine Forum in 2002 ■T-Engine Forum and uID Center promote uID Architecture as OPEN standard for everyone in the world ■World largest organization in Ubiquitous Computing field. Copyright by Ken Sakamura. 2005 All rights reserved 18 9 VideoVideo World’sWorld’s SmallestSmallest RFIDRFID TagTag ■ Very small and low- cost RFID chip ● Cost: under 10¢ ● Size: 0.4mm x 0.4mm ■ Only memory- function (read-only) ● It can store up to 128 bits of information. Copyright by Ken Sakamura. 2005 All rights reserved 20 10 FRAMFRAM TagTag ■ FRAM RFID chip ● It has 2Kbyte non- volatile rewritable memory area. ■ Features of Ferroelectric RAM ● High-speed access ● High-frequency re- writing, and ● Low-energy consumption Copyright by Ken Sakamura. 2005 All rights reserved 21 ActiveActive TagTag mademade byby UNLUNL ■DICE: active tag ●Weak radio signal communication ●Anti-collision function to discern 1,000 DICEs in vicinity ●Power Source: Solar cell and MEMS generator ■Application ●Inventory management, tracking of goods during transportation Copyright by Ken Sakamura. 2005 All rights reserved 22 11 EndlessEndless ApplicationsApplications ofof uIDuID architecturearchitecture FreeFree MobilityMobility AssistanceAssistance ProjectProject Copyright by Ken Sakamura. 2005 All rights reserved 24 12 FoodFood TraceabilityTraceability ProjectProject Copyright by Ken Sakamura. 2005 All rights reserved 25 MedicalMedical DrugsDrugs TraceabilityTraceability Copyright by Ken Sakamura. 2005 All rights reserved 26 13 UbiquitousUbiquitous ComputingComputing ProjectProject inin HospitalHospital Copyright by Ken Sakamura. 2005 All rights reserved 27 TRONTRON HouseHouse ProjectProject Copyright by Ken Sakamura. 2005 All rights reserved 28 14 SCMSCM forfor AgriculturalAgricultural ProduceProduce Copyright by Ken Sakamura. 2005 All rights reserved 29 TracingTracing InsecticideInsecticide UsageUsage ContainerContainer LocationLocation ManagementManagement inin WarehouseWarehouse Copyright by Ken Sakamura. 2005 All rights reserved 30 15 Recycling Project of Copier Toner Cartridges Copyright by Ken Sakamura. 2005 All rights reserved 31 VideoVideo SummarySummary ■Wide scope of applications of uID Architecture ■Many feasibility study experiments to prove the usefulness of uID Architecture Î on-going Copyright by Ken Sakamura. 2005 All rights reserved 32 16 uIDuID ArchitectureArchitecture // EPCglobal:EPCglobal: DifferentDifferent TargetTarget andand ScopeScope ■ EPCglobal: Only meant for SCM, and for Wal-Mart principally ■ uID Architecture: ● Wide Variety of Applications: ━ SCM ━ Traceability Experiment ━ Location Information Systems to help the aged/handicapped/travelers ● Wide Variety of Beneficiaries: ━ Producer, distributor, end consumers in SCM ━ The aged, the handicapped and travelers in Location Information Systems, etc. ━ Many more Copyright by Ken Sakamura. 2005 All rights reserved 33 uIDuID ArchitectureArchitecture // EPCglobal:EPCglobal: TAGTAG differencedifference ■ The limitation with EPCglobal tag ● EPCglobal tries to use a single tag that uses UHF 900MHz frequency ■ Problem: ● 900 MHz is not easily usable in other countries in Europe, Japan and elsewhere ● single frequency approach doesn't work in the presence of goods that has metal component or high water contents ● EPCglobal tag is large and not appropriate for certain applications uID Architecture covers ■ uID Architecture assumes the existence of many tags from the start Î It is a given Copyright by Ken Sakamura. 2005 All rights reserved 34 17 DetailsDetails ofof FrequencyFrequency bandband IssuesIssues ■ Using 900 MHz frequency range is problematic outside USA since the regulation limits the available bands ● Japan 6 MHz wide (950~956MHz) ● Korea 5.5 MHz wide ● Europe 3 MHz wide ■ USA has 26MHz wide available bandwidth (902~928MHz)
Recommended publications
  • Human-Computer Interaction Technologies in Japan
    Japanese Technology Evaluation Center JTEC JTEC Panel Report on HUMAN-COMPUTER INTERACTION TECHNOLOGIES IN JAPAN James D. Foley (Panel Chair) Ephraim P. Glinert James D. Hollan Robert E. Kraut Thomas B. Sheridan Tim Skelly March 1996 _________________________________________________________________________ International Technology Research Institute Michael J. DeHaemer, JTEC/WTEC Director Geoffrey M. Holdridge, JTEC/WTEC Series Editor Loyola College in Maryland 4501 North Charles Street Baltimore, Maryland 21210-2699 _________________________________________________________________________ JTEC PANEL ON HUMAN-COMPUTER INTERACTION TECHNOLOGIES Sponsored by the National Science Foundation, the Defense Advanced Research Projects Agency, the Department of Commerce, and the Office of Naval Research of the United States Government Dr. James D. Foley (Panel Chair) Dr. Robert E. Kraut Professor of Computer Science Professor of Social Psychology and Director of Graphics, Visualization Human Computer Interaction & Usability Center Carnegie Mellon University Georgia Institute of Technology 1307 Wean Hall 801 Atlantic Pittsburgh, PA 15213 Atlanta, GA 30332-0280 Dr. Thomas B. Sheridan Dr. Ephraim P. Glinert Professor of Engineering and Applied Psychology Professor of Computer Science Massachusetts Institute of Technology Rensselaer Polytechnic Institute Room 3-346 127 Amos Eaton Bldg. Cambridge, MA 02139 Troy, NY 12180-3590 Mr. Tim Skelly Dr. James D. Hollan Microsoft Corporation Professor and Chair 1 Microsoft Way Department of Computer Science Redmond, WA 98052-6399 University of New Mexico Albuquerque, NM 87131-1386 INTERNATIONAL TECHNOLOGY RESEARCH INSTITUTE JTEC/WTEC PROGRAM The Japanese Technology Evaluation Center (JTEC) and its companion World Technology Evaluation Center (WTEC) at Loyola College provide assessments of foreign research and development in selected technologies under a cooperative agreement with the National Science Foundation (NSF).
    [Show full text]
  • TRON Forum Admission Guide
    TRON Forum Admission Guide TRON Forum TRON Forum (Location: Shinagawa, Tokyo, Chair: Ken Sakamura, Dean, Faculty of Information Networking for Innovation and Design (INIAD), Toyo University) has been established in 2002 to promote TRON Project which aims to realize the open IoT (Internet of Things) free from constraints of organizations and applications based on “open source,” “open data” and “open API.” The forum has conducted vigorous activities led by Chair Sakamura focusing on T-Engine Project that aims to improve the development environment of embedded systems and operating Ubiquitous ID Center which promotes and disseminates ubiquitous ID architecture and its component technologies such as ucode. The forum has received good reviews worldwide for its activities. For example, Chair Ken Sakamura was honored with an ITU150 Award (*) in May 2015 for proposing TRON open architecture, the origin of ubiquitous networking and the IoT. He was the only winner in Asia among the six winners that included Bill Gates. In 2018, TRON Forum has contributed to create the real-time OS standard for small embedded systems such as IoT terminal devices, "IEEE 2050-2018" (IEEE is TRON Forum Chair: Ken Sakamura the world's largest organization for electric and electronic engineers). In 2019, it has created "TRON IoT Vulnerability Advisory Center”. Its activity has expanded in many directions. (*)On the occasion of the 150th Anniversary of ITU (International Telecommunication Union, the United Nations specialized agency for ICTs, HQ: Geneva, Switzerland), ITU150 Awards were launched to recognize individuals past and present from government, ICT industry, academia, and civil society that have contributed to improving lives of world citizens through ICT innovations developed, promoted or implemented by ITU.
    [Show full text]
  • Japan's Visible Light Communications Consortium and Its Standardization Activities
    Japan's Visible Light Communications Consortium and Its Standardization Activities Shinichiro Haruyama, Ph.D. Vice Chairman VLCC (Visible Light Communications Consortium) Tokyo, Japan Department of Information and Computer Science, Faculty of Science and Technology, Keio University Yokohama, Japan Shinichiro Haruyama Visible Light Communications Consortium 1 Contents • Why is the standard for visible light communication needed? • Position Detection: One of the important applications of Visible Light Communication • Visible Light Communications Consortium (VLCC) • Standardization Activities in Japan Shinichiro Haruyama Visible Light Communications Consortium 2 Why is the standard for visible light communication needed? Various applications and products of Visible Light Communication are expected to appear. The problem of the mutual interference between different products and the problem and interchangeability are expected if they use different communication methods. Moreover, it is necessary to consider interference of Visible light communication devices against existing infrared devices. Shinichiro Haruyama Visible Light Communications Consortium 3 Contents • Why is the standard for visible light communication needed? • Position Detection: One of the important applications of Visible Light Communication • Visible Light Communications Consortium (VLCC) • Standardization Activities in Japan Shinichiro Haruyama Visible Light Communications Consortium 4 Position Detection Position Detection is one of the important applications of Visible Light Communication. A visible light source such as an A visible light source such as an LED lamp sends a code indicating LED lamp sends a code indicating that its location is “Position 1”. that its location is “Position 1”. It is possible to detect a fairly accurate position using a visible light source if it sends a code indicating its position. When a use moves around, he/she can know an accurate position indoor or outdoor.
    [Show full text]
  • Ken Sakamura
    2014 TRON Symposium. 30th Anniversary TRON Project 30th Anniversary and Its Future Outlook Embedded systems technology to support the utilization of the IoT big data and future plan for T-Engine Ken Sakamura Professor, Graduate School of Interdisciplinary Studies, The University of Tokyo Director of YRP Ubiquitous Networking Laboratory Chair of T-Engine Forum / uID Center 2014 TRON Symposium. 30th Anniversary ① TRON Project The Real-time Operating system Nucleus The 30th anniversary in 2014 One of the longest lasting projects related to Japanese computing Copyright © 2014 by Ken SAKAMURA 2 2014 TRON Symposium. 30th Anniversary What is TRON? RTOS for system control, and has different basic architecture from Windows and Linux RTOS: Real-Time Operating System Copyright © 2014 by Ken SAKAMURA 3 2014 TRON Symposium. 30th Anniversary TRON RTOS Is Embedded in Many Things “HAYABUSA” (MUSES-C), an asteroid explorer “IKAROS, ” Interplanetary Kite-craft Accelerated by Radiation Of the Sun 4 2014 TRON Symposium. 30th Anniversary TRON Project’s Root Is in Embedded Systems 5 2014 TRON Symposium. 30th Anniversary ② 30 Years of TRON Copyright © 2014 by Ken SAKAMURA 6 2014 TRON Symposium. 30th Anniversary Started in 1984 Copyright © 2014 by Ken SAKAMURA 7 2014 TRON Symposium. 30th Anniversary Historical Background at the Time Copyright © 2014 by Ken SAKAMURA 8 I4004 by Intel (1971) 2014 TRON Symposium. 30th Anniversary Alto by Xerox (1973) 2014 TRON Symposium. 30th Anniversary 2014 TRON Symposium. 30th Anniversary ③ Future Design Copyright © 2014 by Ken SAKAMURA 11 2014 TRON Symposium. 30th Anniversary How the Society Will Change Based on Newly Available Computers? Copyright © 2014 by Ken SAKAMURA 12 2014 TRON Symposium.
    [Show full text]
  • Cpaas.Io: an Eujapan Collaboration on Open Smart City Platforms
    CPaaS.io: An EUJapan Collaboration on Open Smart City Platforms Noboru Koshizuka (The University of Tokyo) Stephan Haller (Bern University of Applied Sciences) Ken Sakamura (Toyo University) Abstract Data-driven cities and governments rely significantly on data collec- tion, management, and distribution platforms. In this article, we intro- duce CPaaS.io, a collaborative project between Japan and the European Union with the goal of establishing common smart city platforms for de- ployment in real smart city use cases. 1 INTRODUCTION Today, data are crucial to the functioning of society. In fact, it is sometimes said that the most competitive area in information and communications technology (ICT) is not algorithms but data. The ICT National Strategy of Japan known as Society 5.0 proposes a data-driven society in which data help solve problems in the fields of mobility, supply chains, healthcare, and lifestyle to name a few. This will generate further economic growth and increase quality of life. Conse- quently, both in Japan and the European Union (EU), data have been termed the oil of the 21st century. These data come from a variety of sources: the Internet of Things (IoT) and sensors, open government resources, social media, and industry and business repositories, not to mention the wealth of personal information from individual users. These can be obtained, linked, and analyzed to extract valuable intelligence and transform our society for a better future. In the deployment of smart city services, providing a platform for data collection, management, and distribution is crucial. This manuscript has been published in Computer (Volume: 51 , Issue: 12 , Dec.
    [Show full text]
  • Ken SAKAMURA the Iot in Action
    Copyright © 2016 by Ken SAKAMURA The IoT in Action Ken Sakamura Professor and Director of Institute of Infrastructure Application of Ubiquitous Computing (IAUC), Interfaculty Initiative in Information Studies, Graduate School, the University of Tokyo Director, YRP Ubiquitous Networking Laboratory Chair, TRON Forum / uID Center Copyright © 2016 by Ken Sakamura Building Controlled by Open API ① INIAD HUB-1 Every facility in the building can be controlled via API 2 INIAD HUB-1 (Akabanedai, to be opened in2017) Copyright © 2016 by Ken Sakamura Open API Control API (Application Program Interface) API is a means of passing the command and the command itself for a system to control others automatically The operating status of building facilities, environmental control devices, etc. can be read and they can be controlled via network by means of API. 5 Copyright © 2016 by Ken Sakamura Use pf open API in research and education █ Feasibility study of prototype applications for the IoT research ● Operation of autonomous robot wheelchairs and drones on campus ● Introducing deep learning AI technology for the optimized use of energy or security on campus █ Students can learn how to control their environment by programming in tutorial classes ● Proposal of new business that uses the IoT technology and practicing prototypte creation 6 cf) Daiwa Ubiquitous Computing Research Building Built in May, 2015 on in the Hongo campus of the University of Tokyo Already conducted many experiments to learn knowhows of open IoT building 7 Copyright © 2016 by Ken Sakamura Daiwa Ubiquitous Computing Research Building as a Research Platform Uses the building itself as platform for the research on the IoT environment 10 Copyright © 2016 by Ken Sakamura API for Daiwa Ubiquitous Computing Research Building 1.
    [Show full text]
  • International Telecommunication Union (ITU) 150 Awards Recognize
    Press Release Tokyo, Japan, May 15, 2015 International Telecommunication Union (ITU) 150 Awards recognize Ken Sakamura, Director of YRP Ubiquitous Networking Laboratory (Professor of Graduate School of Interdisciplinary Information Studies, The University of Tokyo) Ken Sakamura, Director of YRP Ubiquitous Networking Laboratory (Professor of Graduate School of Interdisciplinary Information Studies, The University of Tokyo) will be honored with ITU’s 150th Anniversary Award at the commemorative event that will be held at the headquarters of ITU in Geneva on 17 May 2015. Sakamura has contributed to the research and education of computer science for a long time, has conducted the research and development of the computer system of open architecture with high real-time performance named TRON(The Real-time Operating system Nucleus). As the result, he has released and promoted an open software platform (operating system) to the world for free. He has proposed the concept of ubiquitous computing environment or the Internet of Things (IoT) in which many objects in our surroundings are embedded with small computer nodes with sensors and actuators that are connected to the network, communicate with each other and operate in a cooperative manner to offer sophisticated services to human users since the 1980s and has contributed to the achievement. (Comment of the winner) I am honored to be recognized for the results of years of my research activities, and would like to express my most heartfelt gratitude for the award on the occasion of ITU’s 150th Anniversary. I would like to thank people who have helped and supported us for a long time.
    [Show full text]
  • Ken Sakamura
    Open IoT Platform & IoT-Engine Ken Sakamura Professor, Director of Institute of Infrastructure Application of Ubiquitous Computing (IAUC), Interfaculty Initiative in Information Studies, Graduate School, the University of Tokyo Director, YRP Ubiquitous Networking Laboratory Chair, TRON Forum / uID Center Seven semiconductor manufacturers from six countries and regions have already expressed intention to commcericialize IoT- Engine Participating semiconductor manufacturers (at the time of the press conference on April 27, 2016) ■ Toshiba Microelectronics Corporation ■ Renesas Electronics Corporation ■ Cypress Semiconductor Corporatation ■ Imagination Technologies Limited ■ Nuvoton Technology Corporation ■ NXP Semiconductors N.V. ■ STMicroelectronics Sales of IoT-Engine and Development kit ■ Personal Media Corporation ■ Ubiqutious Computing Technology Corporation Copyright © 2016 by Ken Sakamura 2 IoT Internet of Things Copyright © 2016 by Ken Sakamura 3 The IoT Can Change the World Only If It Is Open. The Internet changed society because it is an open network which anyone can use for any purpose. Is the "I" in "IoT" truly the "I" of "Internet"? Copyright © 2016 by Ken Sakamura 4 Governance Is Required in the Age of the Open IoT The advanced management "to use something appropriately" requires advanced judgment. Policy-based group management of access rights and partial exposure of data, changing of access rights based on the ordinary and emergency setting, and automatic/augmented judgment by aritificial intelligence Copyright © 2016 by Ken Sakamura 5 The Pressing Issues of Future Embedded Systems Advanced governance management of data and control will become very important. New governence management requires advanced processing and more database resources than the conservative "don't release anything". Copyright © 2016 by Ken Sakamura 6 Hardship of Embedded Systems in the Age of the IoT Access control, which is not the essential function of the embedded systems, requires large amount of computing resource.
    [Show full text]
  • T-Engine Development Kit T-Engine Development Kit FAQ
    Frequently Asked Questions about T-Engine Development Kit T-Engine Development Kit FAQ 1 What is the flow of product development with T-Engine like? Let's take the case of developing a new cellular phone. If you (finished product) and software that run on T-Engine, you can port start developing the software for controlling hardware after the the software on T-Engine including T-Kernel and the middleware development of the hardware is completed, the overall development you used, to the final hardware. You might need, then, to modify period would be too long. For shorter development period, the the software to comply with the final hardware if there is any hardware and the software need to be developed simultaneously. In detail difference between the hardware, such as memory maps. order to achieve this, before you start developing the software, you The more similar the specifications of the final hardware and need to prepare a piece of prototype hardware (a board for T-Engine are, the easier the modifications will be. feasibility assessment) that has similar configurations to the This method might seem like a lot of work in that the software is finished product (i.e., a board highly compatible with the software), developed on one piece of hardware (T-Engine) and migrate it to regardless of the similarity in physical appearance. The hardware another (finished product). However, developing software on a in this case, also called a breadboard, needs to be prepared quickly. common platform (T-Engine) has a lot of benefits: You can use your It can be used as a general-purpose product, or with only minimal existing middleware, and stockpile your own software to be customizations and/or additional expansion boards or devices developed and development know-how for reuse.
    [Show full text]
  • A Secure and Flexible E-Health Access Control System with Provisions for Emergency Access Overrides and Delegation of Access Privileges
    A Secure and Flexible e-Health Access Control System with Provisions for Emergency Access Overrides and Delegation of Access Privileges M. Fahim Ferdous Khan a, Ken Sakamura ab a Interfaculty Initiative in Information Studies, The University of Tokyo, Tokyo, Japan b YRP Ubiquitous Networking Laboratory, Tokyo, Japan [email protected], [email protected] Abstract— Protecting electronic health records (EHR) from greater patient outreach and improved care. However, since all unauthorized access and data breaches has been a great these IT breakthroughs primarily focused on improving challenge for healthcare organizations in recent times. efficiency, reducing cost and incorporating value-added Controlling access to EHR demands a delicate balance between services, e-health has also introduced a number of crucial security and flexibility: There are emergency cases where the privacy and security issues. As more and more healthcare default access control policy must be circumvented in order to save patients’ life – and cases where management of access organizations are adopting electronic health records (EHR), control rights needs to be delegated to some trusted parties. instances of security breaches are increasing at an alarming Therefore, e-Health access control systems must be robust and rate. According to one recent survey [1], about 80% of US- flexible at the same time. Conventional general-purpose access based healthcare executives have reported compromise of control schemes like role-based access control (RBAC) and its their organizations’ information technology by cyber attacks. derivatives emphasize mainly on the robustness of the access In the first third of 2015 alone, more than 99 million control mechanism, and treat flexibility issues like emergency healthcare records have been reported to be exposed through access overrides and delegation management as addenda.
    [Show full text]
  • Japan's Ubiquitous Computing Architecture Is Ready for Prime Time
    FEATURED IN THIS ISSUE ■ T-Engine: Japan’s Ubiquitous Computing News Architecture Is Ready for Prime Time News contact: Shani Murray ■ [email protected] ■ Virtual Displays and the Future of Mobile and Portable Devices T-Engine: Japan’s Ubiquitous Computing Architecture Is Ready for Prime Time Jan Krikke apan is quietly positioning itself for the • Standard T-Engine (75 mm ´ 120 mm) available for T-Engine. According to J next phase in digital technology: ubiq- for portable information devices with the T-Engine Forum Web site (www. uitous computing. A sign of things to comparatively advanced user interface t-engine.org), it includes network pro- come is T-Engine, arguably the most features, such as smart phones; tocol stacks, filing systems, Japanese advanced ubiquitous computing platform • Micro T-Engine (60 mm ´ 80 mm) for language processing, eTRON-specified in the world. T-Engine enables the dis- devices with relatively basic user inter- security software, a GUI, and audio pro- tribution of software resources, includ- face features, such as home electronic cessing. Other middleware will soon be ing middleware developed on T-Kernel, appliances and musical instruments; added to support speech recognition, its compact, real-time operating system. • Nano T-Engine (coin-sized) for small MP3, and digital watermarks. The plat- The platform also features standardized home electronic appliances; and form has also attracted support from hardware and tamper-resistant network • Pico T-Engine for the smallest units in American software makers. Sun Micro- security. a ubiquitous computing environment, systems ported Java to T-Engine, Mon- Ubiquitous computing (one person, such as switches, lighting equipment, taVista did the same with its real-time many computers) is the third era in com- sensors, and valves.
    [Show full text]
  • CEATEC JAPAN 2015 Exhibition Report
    Exhibition Report Oct. 7 Wed. Oct. 10 Sat. Makuhari Messe ■Sponsors: CEATEC JAPAN Executive Board Japan Electronics and Information Technology Industries Association Communications and Information network Association of Japan Computer Software Association of Japan TOPICS ■ Number of daily visitors increased day by day! t7JTJUPST Total number of visitors*: 133,048 * Total registered visitors, registered press and exhibitors, excluding reentries ■ A unique and comprehensive show of cutting- edge IT and electronics technologies, electronic components, and devices all under one roof Along with IT and electronics technologies and cutting edge component and device technologies that help to paint pictures of future lifestyles, the event showcased usage and application of these technologies in “easy-to-understand” creative manner. t&YIJCJUPST Total number of exhibitors: 531 ■ Various programs that support technologies and innovations Special exhibits, Venture & University Area exhibits, and sessions at the Open Stage gathered visitor interests. Also CEATEC conferences held at the International Conference Room counted more than 110, many of which filled with the maximum capacity. t$POGFSFODF CEATEC conference attendees*: 18,053 * The total number of attendances to sessions held at the International Conference Room. t/&95*OOPWBUJPO"SFB0pFO4UBgF Open Stage conference attendees: 3,896 ■ In the focus of the global media In addition to imaging technologies and ICT, and wide ranging sensor technologies, the Japanese and international media gave their attention to new directions in robotics, wearable devices, and new proposals to next-generation energies. In the international media, BBC World broadcasted live, and many media organizations from around the world proactively and widely covered the show including France 2 broadcasts.
    [Show full text]