Abstract:
Described is a system and method for resilient coverage in a wireless environment. The system may include a first wireless device having a first wireless transceiver; a second wireless device having a second wireless transceiver; and an envelope detection arrangement ("EDA") coupled to the second device. The second wireless device has a first communication mode and a second communication mode, The second wireless transceiver conducts wireless communications with the first wireless transceiver using a predetermined wireless communication protocol (e.g., IEEE 802.11/16) only when the second wireless device is in the first communication mode. The second wireless transceiver is in a low-power state when in the second communication mode. The EDA screens radio frequency signals for a signal having a predetermined envelope sequence; the signal is generated according to the same predetermined wireless communication protocol. When the EDA receives the signal, the arrangement causes the second wireless device to switch into the first communication mode.
Abstract:
Methods and apparatuses for secure communications of confidential information are provided. In an embodiment, a method of communicating with a population of radio frequency identification tags includes transmitting a first interrogation signal, receiving a response to the first interrogation signal from at least one RFID tag at a first received signal strength including at least a portion of a first identification code, and transmitting a second interrogation signal that includes a request for confidential information, a command to transmit a response to the second interrogation signal at a secure power level, and the first identification code. In another embodiment, a method for communicating with an RFID tag includes receiving an interrogation signal that includes a request for confidential information and transmitting a response to the interrogation signal at a secure power level. The response includes the confidential information.
Abstract:
The location of unmodified wireless assets in a wireless communication network may be identified using time differences of arrivals of a communication sequence at different network receivers. Time-stamping devices may include correlator circuits in parallel with signal decoders to time-stamp communication sequences. Cellular wireless networks may be frequency-multiplexed to increase spatial time-stamping density. Tags may be attached to passive assets to provide location identification information to network devices. Locations of assets broadcasting standard 802.11 radio frequency structures may be identified. Noise inherent in correlating a communication sequence may be reduced by using a selected correlation function.
Abstract:
The location of unmodified wireless assets in a wireless communication network may be identified using time differences of arrivals of a communication sequence at different network receivers. Time-stamping devices may include correlator circuits in parallel with signal decoders to time-stamp communication sequences. Cellular wireless networks may be frequency-multiplexed to increase spatial time-stamping density. Tags may be attached to passive assets to provide location identification information to network devices. Locations of assets broadcasting standard 802.11 radio frequency structures may be identified. Noise inherent in correlating a communication sequence may be reduced by using a selected correlation function.
Abstract:
Methods and apparatuses for secure communications of confidential informa tion are provided. In an embodiment, a method of communicating with a popula tion of radio frequency identification tags includes transmitting a first in terrogation signal, receiving a response to the first interrogation signal f rom at least one RFID tag at a first received signal strength including at l east a portion of a first identification code, and transmitting a second int errogation signal that includes a request for confidential information, a co mmand to transmit a response to the second interrogation signal at a secure power level, and the first identification code. In another embodiment, a met hod for communicating with an RFID tag includes receiving an interrogation s ignal that includes a request for confidential information and transmitting a response to the interrogation signal at a secure power level. The response includes the confidential information.
Abstract:
Described is an arrangement including a receiver (605) and an enveloped detection arrangement (540) . The receiver receives radio frequency signals generated according to a predetermined wireless communication protocol . The envelope detection arrangement screens the radio frequency signals for a predetermined signal which utilizes the predetermined wireless communication protocol and has a predetermined envelope sequence. Upon detection of the predetermined signal, the arrangement transmits a further signal to a computing device (600) coupled thereto. The further signal is an instruction for the computing device to wake up.
Abstract:
Methods, systems, and apparatuses for wireless communication using a Radio Frequency Identification (RFID) protocol are described. The system includes a sensor for sensing a condition and converting it into electrical signals. The sensor is coupled to a near field transceiver. The near field transceiver formats the data collected by the sensor and transmits it wirelessly using an RFID protocol to a tag. A reader uses the RFID protocol to wirelessly read the data from the tag.
Abstract:
Described is system and method for RFID tag communication including transmitting a command signal in a time slot to a plurality of wireless communication devices, the command signal indicating initiation of an identification process for identifying each of the wireless devices, the identification process including a plurality of time slots and computing a probability that a subsequent command signal transmitted in a subsequent time slot will cause only one of the wireless devices to transmit a response signal in the subsequent time slot.