Abstract:
PROBLEM TO BE SOLVED: To provide a method and apparatus for performing out-of-band management and monitoring for communications with access points used relating to a wireless local area network. SOLUTION: In a wireless data communication system, there is provided a method for performing out-of-communication band management and other communications with access points. This system operates under a first protocol such as IEEE802.11 protocol to provide a wireless data communication. The access points are provided with a second wireless module for performing a wireless data communication using a second protocol such as 'Bluetooth(R)'. A wireless terminal operating as a 'Bluetooth(R)' master can access a processor in the access point to perform management of communication and other communications relating to the operation of the access point.
Abstract:
PROBLEM TO BE SOLVED: To intuitively locate articles. SOLUTION: An object locator system generates an audio signal, as if it is emanating from the object, as a user varies angular orientation and distance from an object or site to be located within an area. A computer linked to an access transceiver receives transmissions from a user wearing a headset including a transceiver and electronic compass. The compass provides a signal indicative of the user orientation. An access transceiver receives the signal, and calculates the location of the user based on the time difference of arrival of the RF signal and triangulation of the user movement. Based on the angular orientation, as well as horizontal and vertical distance of the object or site relative to the user, the computer maps the location information into sound in the form of pulse amplitude or frequency modulated sound. The audio signal is perceived by the user as emanating from the object or site. COPYRIGHT: (C)2003,JPO
Abstract:
PROBLEM TO BE SOLVED: To provide an arrangement and a method for establishing logical relationship among peripherals in a wireless local area network, the peripherals being in communication with one another and with a system manager for managing the network by a low-output power, wireless, radio frequency, communications protocol. SOLUTION: In this arrangement, there are provided a readable identifier associated with each peripheral and a reader, for reading the identifiers associated with selected peripherals during the set-up mode of system operation; the reader has a transceiver in wireless communication with the system manager for identifying the reader and the selected peripherals, to advise the system manager of the establishment of the logical relationship.
Abstract:
The present disclosure relates to interactive systems and methods for dimensioning with a mobile device. The mobile device can include an accelerometer, imager, and a corresponding algorithm configured to compute dimensions based on a plurality of inputs from the accelerometer, imager, etc. Specifically, the accelerometer allows the mobile device to measure acceleration and time, and the algorithm is configured to convert these measurements into distances. Additionally, with a three-axis accelerometer, the user can move the device off an axis being measured and still receive an accurate measurement, i.e. the algorithm can compensate for off-axis movement. Further, the present invention can incorporate an imager on the mobile device to provide additional compensation supplementing the algorithm and allowing the user additional freedom to be positioned away from the starting and end-point of a measurement.
Abstract:
SECTORIZED WIRELESS COMMUNICATION NETWORK OPERATING UNDER 802.11 SPECIFICATIONS Methods and systems are provided to facilitate communication with a plurality of remote 5 units (12a-12e) in a communication area (10) that includes a plurality of spatial sectors (1 Oa- 1 Oc). The system includes a network controller configured to receive and transmit under IEEE 802.11 specifications, and a plurality of directional antennas (17a-17c) coupled to the network base station (16). Each of directional antennas (1 7a- 1 7c) functions as an access point for a respective spatial sector (1 Oa- I Oc). The directional antennas (1 7a 10 17c) and the network controller are combined as a single base station apparatus (16) in an exemplary embodiment. Further, an exemplary network controller is configured to concurrently transmit a plurality of the data frames to more than one of the spatial sectors (1 7a- 1 7c), and to synchronize the transmissions in a manner whereby all of the concurrently transmitted frames end simultaneously.
Abstract:
The device has an image-processing unit reading encoded data of an image as well as extracting a portion of another image from an imager (12) to generate extracted portion data. The extracted portion corresponds to a person, whose identity is to be authenticated. A processor compares the data with the stored biometric data is located based on the data read from an image of the person. An independent claim is also included for a method for authenticating identity of a person using a portable device.
Abstract:
An object locator system (100) generates an audio signal as if emanating from the object (118) as a user (102) varies angular orientation and distance from an object (118) or site to be located within an area. A computer (106) linked to an access transceiver (110,112) receives transmissions from a user (102) wearing a headset (104) including a transceiver (202) and electronic compass (122). The compass (122) provides a signal indicative of the user orientation. An access transceiver (110,112) receives the signal and calculates the location of the user (102) based on the time difference of arrival of the RF signal and triangulation of the user movement. An accelerometer (204) in the headset (104) continuously tracks user movement. The location of the object (118) in a vertical direction is provided by a directory or other reference source stored in the computer (106). Based on the angular orientation, horizontal and vertical distance of the object (118) or site relative to the user (102), the computer (106) maps the location information into sounds in the form of pulse amplitude or frequency modulated sound. The audio signal is perceived by the user (102) as emanating from the object (118) or site.
Abstract:
Described is a method for detecting a link fault between a first access point and an infrastructure, the first access point providing a wireless connection for a station to the infrastructure and suspending communication between the station and the first access point. A wireless connection is then established between the first access point and a second access point, wherein the second access point has an active link to the infrastructure. Infrastructure frames are received at the first access point from the second access point, the first access point storing the infrastructure frames in a queue. Communication is resumed between the first access point and the station, the first access point transmitting the infrastructure frames to the station.
Abstract:
In a wireless data communications system a method is provided for conducting out-of-band for management and other communications with access points. The system operates under a first protocol, such as IEEE 802.11 protocol to provide wireless data communications. The access points are provided with a second radio module for conducting wireless data communications using a second protocol, such as Bluetooth. A wireless terminal, operating as a Bluetooth master can access the processor in the access point to conduct management and other communications relating to the operation of the access point.
Abstract:
A hierarchical system of tag associations reduces latency and bandwidth consumption in an RFID or other environment. A method of electronically tracking items (such as retail goods) stored in a container includes the bro ad steps of obtaining the electronic identifier for each of the items, computin g a checksum or alternative high entropy data structure as a function of each of the electronic identifiers, and transmitting the checksum or data structure to the container for storage at the container. The stored data structure can be compared against a subsequently-calculated checksum to identify any changes to the items stored in the container.