摘要:
The present invention provides one or more powered wireless transceivers and/or one or more passive wireless transceivers, a reader and interrogator with variable power, one or more antennas connected to a human or robotic hand and/or foot, a method for making same and the method of using these devices for process automation and verification involving one or more items in addition to locating, tracking and identifying these items in a supply chain. In one embodiment, a proximity sensing wireless system is provided which can be used to step the handler or operator through the step of a process and verify that each step in the process has been completed.
摘要:
Techniques for adapting a wireless communication device or system to support a desired functionality of the wireless communication system at an optimized performance and economic benefit are discussed. The desired functionality can be determined by defined criteria such as a maximum range of communication with the wireless communication system, quality of a transmission link in the wireless communication system, capacity of the wireless communication system, power consumption of the wireless communication system, protocols supported in the wireless communication system, modulation techniques used in the wireless communication system and processing techniques for combining signals in the wireless communication system. The system can be adapted by varying one or more of modules (e.g., components or processing techniques) used in the wireless communication system.
摘要:
The present invention relates to a system and method for providing security in an RFID system and provides a secure active RFID architecture that uses a combination of passive and active RFID circuitry and employs authentication and encryption techniques in the processing of data, at rest and over the air. In the method of communicating securely in an RFID system of the present invention, a random number is generated with the passive RFID circuitry. The random number is forwarded to a reader. The reader is authenticated by comparing a first hash value determined from a hash function of the random number generated at the RFID tag and an Authenticated Facility Group ID stored on the RFID tag with a second hash value determined from the hash function of the forwarded random number and an Authenticated Facility Group ID stored in the reader such that if the first hash value matches the second hash value the reader is authenticated. After the reader is authenticated, the tag ID stored at the RFID tag can be revealed. After authentication of the reader, a second layer of security using encryption is provided with the active RFID circuitry.
摘要:
The present invention relates to a method and system for adapting a wireless communication system to support a desired functionality of the wireless communication system at an optimized performance and economic benefit. The desired functionality can be determined by defined criteria such as a maximum range of communication with the wireless communication system, quality of a transmission link in the wireless communication system, capacity of the wireless communication system, power consumption of the wireless communication system, protocols supported in the wireless communication system, modulation techniques used in the wireless communication system and processing techniques for combining signals in the wireless communication system. The system can be adapted by varying one or more of the number of components or processing techniques used in the wireless communication system.
摘要:
Medical devices including a proximal tubular member, a distal tubular member, and an intermediate tubular member connecting the proximal tubular member to the distal tubular member, and related methods.
摘要:
The present invention relates to a method and system for adapting a wireless communication system to support a desired functionality of the wireless communication system at an optimized performance and economic benefit. The desired functionality can be determined by defined criteria such as a maximum range of communication with the wireless communication system, quality of a transmission link in the wireless communication system, capacity of the wireless communication system, power consumption of the wireless communication system, protocols supported in the wireless communication system, modulation techniques used in the wireless communication system and processing techniques for combining signals in the wireless communication system. The system can be adapted by varying one or more of the number of components or processing techniques used in the wireless communication system.
摘要:
A method and system for inventorying wireless transponders, specifically referred to as RFID transceiver devices. To provide higher functionality, a microcontroller is used in the RFID, along with a battery, but the clock frequency of the microcontroller is adjusted, based on external input, to minimize battery requirements. The RFID transceiver device includes at least one sensor coupled to the microcontroller. Data from the at least one sensor is stored in non-volatile memory of the microcontroller if the battery is at a predetermined low level, and is read later when the battery is at a higher level.
摘要:
The present invention provides one or more powered wireless transponders and/or one or more passive wireless transponder devices communicating with a reader/interrogator and the method of efficiently inventorying these devices without the risk of eavesdropping. A reader transmits a random number and transponders generate their own random number. The transponders whose random number matches all or a part of the random number responds. If a collision occurs, the reader's random number can be changed and retransmitted until almost one transponder response is verified in a tree search algorithm. Specifically, the invention concerns a method for inventorying wireless transponders providing anti-eavesdropping anti-collision.
摘要:
The present invention provides a method and system for establishing a highly mobile, long range secure wireless network with dynamic topologies and near full connectivity with acceptable latency using low cost, low power, compact and lightweight devices. One aspect of the system deals with a highly mobile network with dynamic network topologies and a time varying wireless medium that has neither absolute nor readily observable boundaries outside of which radio nodes are known to be unable to receive network frames, although the desirable open field boundary is 1 mile in radius from a base station node. A synchronous frequency hopping technique is used with mobile nodes that can become slave base station nodes to a master base station node to increase the effective range of the master base station without increasing the transmit power. Furthermore, the use of adjustable sleep times for the mobile nodes, as well as a novel clock calibration method, provides a substantial range increase with acceptable battery size and system latency.
摘要:
The present invention provides a method and system for establishing a highly mobile, long range secure wireless network with dynamic topologies and near full connectivity with acceptable latency using low cost, low power, compact and lightweight devices. One aspect of the system deals with a highly mobile network with dynamic network topologies and a time varying wireless medium that has neither absolute nor readily observable boundaries outside of which radio nodes are known to be unable to receive network frames, although the desirable open field boundary is 1 mile in radius from a base station node. A synchronous frequency hopping technique is used with mobile nodes that can become slave base station nodes to a master base station node to increase the effective range of the master base station without increasing the transmit power. Furthermore, the use of adjustable sleep times for the mobile nodes, as well as a novel clock calibration method, provides a substantial range increase with acceptable battery size and system latency.