Abstract:
The present invention provides an RFID transponder that includes a state holding cell that maintains the present state of the RFID transponder during temporary losses of power. After power is restored to the RFID transponder, the state holding cell restores the present state to the RFID transponder so that transactions with an RFID interrogator can continue without having re-transmit redundant commands. The RFID transponder further comprises an RF front end adapted to receive an interrogating RF signal. An analog circuit is coupled to the RF front end and is adapted to recover analog signals from the received interrogating RF signal. The analog circuit provides state information defining a desired state of the RFID transponder corresponding to the analog signals. A digital state machine is coupled to the analog circuit and adapted to execute at least one command in accordance with the state information. A memory is coupled to the digital state machine and is adapted to store and retrieve digital data responsive to the at least one command executed by the digital state machine. A power capacitor is coupled to the RF front end and derives a voltage rectified from the interrogating RF signal to charge the power capacitor. The power capacitor thereby provides electrical power for the analog circuit, the digital state machine and the memory. The state holding cell is coupled to the analog circuit and the digital state machine and is adapted to maintain the state information during a loss in power provided by the power capacitor due to lapse in receipt of the interrogating RF signal by the RF front end.
Abstract:
Vehicle mounted Radio Frequency Identification (RFID) systems and associated methods are provided. An example vehicle mounted RFID system is configured to operate an RFID system in a high-power mode. The example vehicle mounted RFID system is further configured to determine that an operating state of a vehicle switched from an active charging state to an inactive state. The example vehicle mounted RFID system is further configured to, in response to determine that the operating state of the vehicle switched from the active charging state to the inactive state, initialize a timer for a period of time. The example vehicle mounted RFID system is further configured to, in response to an elapse of the period of time, switch the RFID system to a low-power mode.
Abstract:
A printing apparatus is described that comprises an antenna configured to intercept radio waves modulated with printing data; a receiver configured to recover the printing data from the intercepted radio waves; a printing module configured to generate a printed output on a printing medium based on the printing data; and a housing for the printing apparatus, wherein the housing encloses the antenna, the receiver, and the printing module, and further wherein the antenna is integrated with an interior surface of the housing.
Abstract:
Various corporate, industry, and regulatory guidelines, best practices and standards are used in establishing acceptable levels of accuracy for volume dimensioning systems used in commerce. A volume dimensioning system can determine at least one distortion value that is indicative of an amount of distortion present in the system and responsive to the amount of distortion, autonomously alter or adjust the units of accuracy of information reported by the system. Such alteration or adjustment of units of accuracy may be performed based on an assessment of the distortion relative to a number of distortion thresholds. Responsive to the assessment, the volume dimensioning system can adjust a unit of accuracy in a representation of volume dimensioning related information.
Abstract:
A system and method of selectively reading sensor data from a memory device is able to search the memory device for an indicator that identifies the sensor data, and read only the sensor data identified by the indicator from the memory device. In this way, interrogating devices are able to sort through sensor data stored in a network of memory devices, such as an RFID network, and report specific data of interest despite the existence of a variety of data types in the network. In some embodiments, flags are stored and associated with specific types of data, such as various sensor data, thereby allowing numerous memory devices and sensors to operate and be read efficiently in the same environment.
Abstract:
A method of addressing one or more RFID devices within a group of RFID devices includes transmitting a command to respond to the group at a first modulation depth. The method further includes receiving a response from a first sub-group of RFID devices in the group that have a minimum modulation depth less than or equal to the first modulation depth. The method further includes transmitting the command to respond to the group at a second modulation depth higher than the first modulation depth. The method further includes receiving a response from a second sub-group of RFID devices within the group that have a minimum modulation depth less than or equal to the second modulation depth. The method is also directed to authenticating RFIDs by comparing a measured minimum modulation depth to a known minimum modulation depth.
Abstract:
A network device performs a delayed registration in connection with phone call setup, if the network device does not know a phone number of a user in question at the time of updating the location updating. In addition, the network device performs user authentication and creates and maintains an encrypted and secure network connection between the network device and an IP multimedia subsystem by using data security mechanisms of a terminal of the IP multimedia subsystem and the authentication and data security parameters of the terminal received from the IP multimedia subsystem.
Abstract:
A method of addressing one or more RFID devices within a group of RFID devices includes transmitting a command to respond to the group at a first modulation depth. The method further includes receiving a response from a first sub-group of RFID devices in the group that have a minimum modulation depth less than or equal to the first modulation depth. The method further includes transmitting the command to respond to the group at a second modulation depth higher than the first modulation depth. The method further includes receiving a response from a second sub-group of RFID devices within the group that have a minimum modulation depth less than or equal to the second modulation depth. The method is also directed to authenticating RFIDs by comparing a measured minimum modulation depth to a known minimum modulation depth.
Abstract:
A reconfigurable antenna element is controlled using a wirelessly powered and wirelessly activated switch, where the antenna element is part of an antenna or antenna array. A control signal for reconfiguring the antenna element is embedded into a wirelessly transmitted data signal for transmission by the antenna.
Abstract:
A communication protocol and system is disclosed for network communications between a data service residing on a client that provides network communications between one or more mobile applications on a mobile computing device and a network based on a process number. The shared data service communicates with a data service plug-in on the server side associated with the process number, in order to handle requests from the mobile applications that access a plug-in associated with the process number through the data service. The communication connection between the mobile application and the data plug may be managed by a set of rules defined for that network communication.