摘要:
The illustrative embodiments provide a computer implemented method, an apparatus, and a computer program product for testing a radio frequency identification reader. The radio frequency identification reader transmits a test signal to a diagnostic tag during a diagnostic period. Responsive to receiving a return signal from the diagnostic tag, the radio frequency identification reader compares the return signal with an expected return signal to form a comparison. The radio frequency identification reader identifies an operational status for the radio frequency identification reader using the comparison.
摘要:
A method, system and computer program product for detecting false purchases is disclosed. The method includes detecting a motion across a product identifier in a self-service terminal and monitoring for a product identifier. In response to failing to detect the product identifier, an alert signal is transmitted.
摘要:
According to one embodiment of the present disclosure, an approach is provided in which a product request is received that corresponds to a point-of-sale (POS) device, which is located at a merchant facility. In addition to identifying a product location corresponding to the product, an employee location of an employee in proximity to the product location is also identified. In turn, an electronic message is sent to the employee's mobile device that includes a request to transport the product from the product location to the POS device.
摘要:
A location-based service includes detecting the relative motion of an on-site resource, detecting the absolute position of the on-site resource, and tracking the position of the on-site resource. The position is tracked by deriving a deduced position based on the detected relative motion and adjusting the deduced position as a function of and in response to the detected absolute position. According to one embodiment, the on-site resource can be a shopping cart and the tracking includes recording a travel pattern of the shopping cart as it moves through a site floor plan such that the travel pattern is reproducible. Preferably, the recorded travel pattern includes travel patterns within an aisle in the site floor plan such that the recorded patterns include travel along the length of the aisle and travel having components which are perpendicular to the length of the aisle.
摘要:
The illustrative embodiments provide a method, an apparatus, and a computer usable program product for authenticating a transaction. A confirmation device receives an authentication data pattern from a data processing system, wherein the authentication data pattern is generated in response to completing a transaction processed by the data processing system. Responsive to receiving the authentication data pattern from the data processing system, the confirmation device monitors a transmission comprising the data pattern from a wireless mobile device. Responsive to receiving the transmission comprising the data pattern from the wireless mobile device, the confirmation device authenticates the data pattern from the wireless mobile device using an authentication form.
摘要:
A method and system for wirelessly coupling a computer with a peripheral device. The peripheral device is initially docked to a docking port in the computer. Detecting the docking event, the computer then turns on the docked peripheral device and listens for identifiers from all peripheral devices within range of the computer, including the identifier for the peripheral device that is presently docked with the computer. The computer then instructs the docked peripheral device to turn off, thus preventing the docked peripheral device from broadcasting its identifier. By a process of deduction, the computer is able to identify the docked peripheral device. In a preferred embodiment, the docked peripheral device subsequently is wirelessly associated only with the computer to which that peripheral device was initially docked.
摘要:
A location-based service includes detecting the relative motion of an on-site resource, such as a shopping cart, in addition to detecting the absolute position of the on-site resource, and displaying information on the on-site resource. The displayed information is based upon the detected relative motion and the detected absolute position. The relative motion is tracked and a position on a floor plan is deduced. This deduced position is adjusted, for example, synchronized or reset, as a function of and in response to the detected absolute position.
摘要:
A method and system for wirelessly coupling a computer with a peripheral device. The peripheral device is initially docked to a docking port in the computer. The computer then listens for identifiers from all peripheral devices within range of the computer, including the identifier for the peripheral device that is presently docked with the computer. The computer then instructs the docked peripheral device to stop sending its identifier. By a process of deduction, the computer is able to identify the docked peripheral device. The step of stopping the docked peripheral device from sending the peripheral device's identifier is preferably controlled by monitoring whether the computer is charging a battery in the docked peripheral device. Thus, the docked peripheral device transmits its identifier only when it is charging its battery.
摘要:
An apparatus comprising a single memory device providing data storage, a controller for controlling data transfer to and from the data storage, and first and second bus connector plugs, wherein each plug has contacts for connecting with the power, ground, and data contacts of a port of a host system. The power and ground contacts of the first and second plugs are coupled together to provide power to the apparatus through either or both plugs. Data from either or both plugs is communicated with the controller depending upon which plugs are coupled to a port. The controller is responsible for controlling the read and write operations of the data storage. The apparatus may be any type of external memory device, such as a flash drive, or a peripheral device having a high data transfer rate, such as a digital video camera.
摘要:
Theft of protected items of user data from intrusion and theft, e.g. phishing in protected by maintaining a first listing, associated with said with a user display terminal, of protected user data items; and maintaining a second listing, associated with the display terminal, of the addresses of trusted network sites to which each of said protected user data items may be transmitted. The when a there is an initiation of a transmission of a protected item from said user display terminal to a selected non-trusted network site as determined by comparison of the two lists, the user is given an alert of his proposed transmission to a non-trusted site. The transmission is prohibited until the user decides to either cancel or proceed with the transmission.