Abstract:
In one aspect where a load or a subset of one or more tags is in motion relative to an RFID reader system, the RFID system obtains tag readings and derives tag scalar or vector motional data e.g. tag velocity, tag acceleration, and/or rate of change of tag acceleration which can be compared to known tag motional information to distinguish true tags of interest from false positives which are unavoidably also within the field of the reader system. An antenna system may also make readings during distinctive movement patterns of true tags, such as vertical or arcuate movement and utilize computed tag motional data based on the tag readings to distinguish true tags from false positives. Two components of the RFID system may communicate information on identified tags, and/or interact (e.g. by silencing tags), so as to cooperate in identifying true positive tags.
Abstract:
Systems and methods are described for communicating private user information from a mobile device to a transaction terminal or other external device. More specifically, systems and methods are described for improving authentication through the use of mobile devices used to facilitate transactions with external devices. The authentication described herein can be adaptive, thereby providing a flexible level of automatic on-the-spot transaction security. Unlike prior art systems, the mobile device is not required to have network connectivity. Additionally, the systems and methods described herein are easily adapted to most current systems.
Abstract:
A voice-enabled document system facilitates execution of service delivery operations by eliminating the need for manual or visual interaction during information retrieval by an operator. Access to voice-enabled documents can facilitate operations for mobile vendors, on-site or field-service repairs, medical service providers, food service providers, and the like. Service providers can access the voice-enabled documents by using a client device to retrieve the document, display it on a screen, and, via voice commands initiate playback of selected audio files containing information derived from text data objects selected from the document. Data structures that are components of a voice-enabled document include audio playback files and a logical association that links the audio playback files to user-selectable fields, and to a set of voice commands.
Abstract:
An apparatus and method are disclosed for creating an integrated access door and switch actuator. The integrated access door and switch actuator are created from a single composite material. The composite material is flexible to allow movement, but is also durable to provide a protective covering. The integrated access door and switch actuator include a living hinge, which allows the access door to move to an open and closed position while the switch actuator is stationary in a fixed position.
Abstract:
A user input device employs a number of legends that are selectively illuminable to indicate an active one of alternative input values of a user selectable key.
Abstract:
A method and apparatus for indicating device and system readiness to a user is disclosed. An indicator is located on one or more devices of a data-handling system. The state of the indicator communicates the status of the device or system. The indicator can be standardized across two or more devices of the data-handling system. The indicator can be comprised of a single element or of multiple elements.
Abstract:
A method for tracking tax payment information includes fixing a unique machine readable identifier to each of a number of taxable items, storing each of the unique machine readable identifiers in a computer readable memory, and storing tax payment information in the computer readable memory for each of the items. The unique machine readable identifier may take the form of a machine readable symbol such as a barcode symbol or as a wireless memory device such as a radio frequency identification (nullRFIDnull) tag. The tax information may include data such as the tax payment status, tax payment authority, a tax payment sum, a tax payment date, identify of a manufacturer, identify of a product or product type, and the identify of a product origin. Tax payment information may include tax payment information from multiple taxing authorities. The method may further include reading the unique machine readable identifier and retrieving the tax payment information based on the identifier to verify that the appropriate taxes have been paid. The computer readable memory may be a centralized database, may be located in a reading device being used to verify compliance, or be located in the RFID tag secured to the taxed good.
Abstract:
Passive wireless transponders can perform transponder-to-transponder communication when illuminated by an interrogation carrier wave. The transponder-to-transponder communication permits each transponder to determine the identity of “other” proximately transponders. The transponder-to-transponder communication optionally permits each transponder to identify a “nearest neighbor” using one or more backscatter signal properties such as received signal strength or time-of-flight. Using this information and one or more externally supplied or internally stored instruction sets transponders can provide neighboring transponder data to an interrogator. Using this “neighbor” data, the interrogator can provide a system user with data indicative of the relative locations of a plurality of tags arranged in a one or two dimensional matrix.
Abstract:
An RFID tag is equipped with an energy sensor for receiving an appropriate energy signal or registering an appropriate temperature/environmental level. The RFID tag only responds to a query from an RFID reader if the sensor receives the appropriate stimulation.
Abstract:
A system for authenticating data acquired by multiple sensors prior to storing the data in a database is described. The system also authenticates users requesting data access and intelligence agents that provide analyses of data stored in the database. As a result, any data or data analysis obtained from the system is traceable and reliable.