摘要:
Systems (100) and methods for network node security configuration. The methods involve: performing operations by a mobile communication device (104) to obtain a unique identifier from a network node (108) to be installed at a customer facility (102) via a first short range communication link (110); communicating a signal comprising the unique identifier from the mobile communication device to a remote server (118) via a first long range communication link (112); verifying by the remote server that a correct type of network node is being installed at a first location within the customer facility according to a respective work order; and communicating security information, useful for configuring security functions of the network node, from the remote server to the network node via the mobile communication device, without presenting the security information to a user of the mobile communication device or storing the security information in the mobile communication device.
摘要:
Systems (100) and methods for network node security configuration. The methods involve: performing operations by a mobile communication device (104) to obtain a unique identifier from a network node (108) to be installed at a customer facility (102) via a first short range communication link (110); communicating a signal comprising the unique identifier from the mobile communication device to a remote server (118) via a first long range communication link (112); verifying by the remote server that a correct type of network node is being installed at a first location within the customer facility according to a respective work order; and communicating security information, useful for configuring security functions of the network node, from the remote server to the network node via the mobile communication device, without presenting the security information to a user of the mobile communication device or storing the security information in the mobile communication device.
摘要:
Systems (100) and methods (200) for dynamically managing Functional Configurations (“FCs”) of network nodes (104, 134-138). The methods involve performing operations by a First End Node (“FEN”) in accordance with a first FC. FEN (104) has a first Software Module (“SM”) stored thereon specifying the first FC. The first SM (122) comprises a total set of codes/functions which determine how a network node is to behave. The first EN detects a trigger event for triggering a transition from the first FC to a second FC. In response to the trigger event, the FEN automatically and dynamically obtains, from a remote network node (134, 136, 138 or 144), a second SM (124 or 126) that is different than the first SM. The first SM (stored on FEN) is then replaced with the second SM. The FEN executes the second SM such that it operates in accordance with the second FC.
摘要:
Method for managing mobile point of sale (mPOS) operations using a wireless network to detect location data includes capturing video data of one or more customers within a retail store premises. The video data is analyzed to determine one or more customer behavior indicators potentially indicating a need for mPOS services. The location data is used to correlate the customer behavior indicators with the one or more customers. The method also involves determining a probability that at least one of the customers will be requesting mPOS services within a predetermined interval of time.
摘要:
Systems (100) and methods (1100) for activating an Electronic Article Surveillance (“EAS”) element deactivator. The methods involve: obtaining customer-related data from a customer of a business organization who is attempting to deactivate an EAS element of at least one item; obtaining transaction data contained in a receipt issued upon completion of a checkout transaction for the customer; communicating the customer-related data, transaction data and a unique identifier for an EAS element deactivation system to a remote computing device; processing the customer-related data and transaction data to obtain confirmation that the customer has recently successfully completed the checkout transaction for the item and the EAS element of the item has not yet been deactivated; and activating the EAS element deactivator of the EAS element deactivation system subsequent to when the confirmation is obtained.
摘要:
Systems (100) and methods (1100) for activating an Electronic Article Surveillance (“EAS”) element deactivator. The methods involve: obtaining customer-related data from a customer of a business organization who is attempting to deactivate an EAS element of at least one item; obtaining transaction data contained in a receipt issued upon completion of a checkout transaction for the customer; communicating the customer-related data, transaction data and a unique identifier for an EAS element deactivation system to a remote computing device; processing the customer-related data and transaction data to obtain confirmation that the customer has recently successfully completed the checkout transaction for the item and the EAS element of the item has not yet been deactivated; and activating the EAS element deactivator of the EAS element deactivation system subsequent to when the confirmation is obtained.
摘要:
A method and computer for responding to an assistance request message. An assistance request message from a requester mobile device associated with a requester is received at a response computer. The assistance request message includes at least one input parameter. A responder is determined, from multiple potential responders, to respond to the assistance request message. The responder is associated with responder data corresponding to the at least one input parameter. An availability inquiry message to a responder device associated with the responder is transmitted. A response to the availability inquiry message is received from the responder device. When the response to the availability inquiry message indicates that the responder is available to respond to the assistance request message, the requester mobile device is notified that the responder is available.
摘要:
Systems (100) and methods (500, 600) for adaptively managing power for an Energy Harvesting System (“EHS”). The methods involve: measuring a light intensity level available in a surrounding environment; wirelessly communicating a first wireless signal from the EHS (100) to a remote device (700) for causing the light intensity level to be increased by remotely turning on a light source (106, 108) or opening a cover preventing light emitted from the light source from reaching the EHC, when the light intensity level is below a pre-specified level; using an Energy Harvesting Circuit (“EHC”) to recharge a rechargeable battery (310) when the light intensity level rises above the pre-specified level; and wirelessly communicating a second wireless signal from the EHS to the remote device for causing the light source be turned off or the cover to be closed, when the capacity or state-of-charge of the rechargeable battery reaches a pre-specified value.
摘要:
Systems (100) and methods (500, 600) for adaptively managing power for an Energy Harvesting System (“EHS”). The methods involve: measuring a light intensity level available in a surrounding environment; wirelessly communicating a first wireless signal from the EHS (100) to a remote device (700) for causing the light intensity level to be increased by remotely turning on a light source (106, 108) or opening a cover preventing light emitted from the light source from reaching the EHC, when the light intensity level is below a pre-specified level; using an Energy Harvesting Circuit (“EHC”) to recharge a rechargeable battery (310) when the light intensity level rises above the pre-specified level; and wirelessly communicating a second wireless signal from the EHS to the remote device for causing the light source be turned off or the cover to be closed, when the capacity or state-of-charge of the rechargeable battery reaches a pre-specified value.
摘要:
Systems (100) and methods (500, 600) for adaptively managing power for an Energy Harvesting System (“EHS”). The methods involve: measuring a light intensity level available in a surrounding environment; wirelessly communicating a first wireless signal from the EHS (100) to a remote device (700) for causing the light intensity level to be increased by remotely turning on a light source (106, 108) or opening a cover preventing light emitted from the light source from reaching the EHC, when the light intensity level is below a pre-specified level; using an Energy Harvesting Circuit (“EHC”) to recharge a rechargeable battery (310) when the light intensity level rises above the pre-specified level; and wirelessly communicating a second wireless signal from the EHS to the remote device for causing the light source be turned off or the cover to be closed, when the capacity or state-of-charge of the rechargeable battery reaches a pre-specified value.