摘要:
Machine-readable codes are read, decoded and resolved by a messaging system in order to perform a desired function. If the code is not native to that (home) messaging system, then a resolution request is made to a central messaging interchange system to determine which other (destination) messaging system is native to and can resolve that code. The messaging interchange system then either returns the appropriate routing information back to the home messaging system (in which case the home messaging system sends the resolution request directly to the destination messaging system) or forwards the resolution request to the destination messaging system itself. The destination messaging system transmits a resolution response message to the home messaging system, either directly or via the messaging interchange system.
摘要:
The present invention is a security system and a method for reliably detecting an intruder without false alarms. The security system includes at least three motion detectors and processor circuitry adapted to collect a plurality of location samples and analyze them to determine if a target has transitioned from a first region to a second region, and when the target has transitioned from a first region to a second region, initiating a predetermined action. Each location sample is determined by: detecting motion from a target with each of the three motion detectors, determining the distance to the target for each of the three motion detectors, and triangulating the three determined distances to produce a two-dimensional location. The security system determines if a target has transitioned from a first region to a second protected region by comparing the plurality of location samples to perimeter location data stored in memory. Different modes of operation cause the security system to take different actions before and after the transition, such as generating an alarm or a warning signal. The security system may also include a display to show the location of one or more targets, which may be the intruder or the occupants of the premises.
摘要:
A user selects a product to be liquidated from a product provider and then designates to the transacting entity that reward points are to be used towards the purchase of the liquidated product. The transacting entity acts to decrease the number of reward points in the user's reward account by the required number of points. The reward account holder conveys consideration to the transacting entity equivalent to the par value of the reward points consumer obtains the product in exchange for reward points having a retail value equivalent to what he would have otherwise paid for the product, while the reward account holder is required to convey only the par value of the points. The product provider is able to liquidate the product and obtain payment equivalent to what it would otherwise have obtained in a prior art liquidation process, auction or trading environment.
摘要:
Remote sensing in an environment having temperatures greater than 300° C., using an optical fiber having a core (10), a cladding (20), and a metallic protective coating (30) on the cladding to protect a surface of the cladding, the cladding having a diameter greater than 150 μm, and a thickness of at least 50 μm. The larger diameter cladding means stress from the metallic protective layer can be reduced, giving lower optical loss and better hydrogen protection. A metal conduit (330) encapsulates the sensing fiber, and a pump evacuates the conduit to reduce hydrogen seepage. Ceramic splice protectors are used. OTDR is used to determine differential loss at different locations along the fiber. A reflective element at the far-end of the fiber eases calibration.
摘要:
A method of operating a security system by generating an instant message at a first location, the instant message including security system data, then transmitting the instant message from the first location over a computer network to a second location via an instant message server computer. The instant message is received at the second location, and a security system function is initiated at the second location based on the security system data from the instant message. Security system configuration data may be provided with an instant message in order to enable remote programming of the security system via the instant messaging channel. Half-duplex audio communications may also be achieved by providing digitized audio files with instant messages that may be communicated between locations.
摘要:
A security system control module with a portable housing including a wireless receiver, control circuitry, nonvolatile memory, and a data connector. The receiver receives data transmissions from at least one wireless security device that monitors a condition of a premises in which the wireless security device is installed. The data connector exchanges data between the control circuitry and an external host device, and it also accepts from the external host device primary operating power for operating the wireless receiver, the control circuitry, and the nonvolatile memory. The control circuitry is adapted to process signals in accordance with a preprogrammed configuration file stored in the nonvolatile memory, the signals received via the wireless receiver from a wireless security device, and to communicate with an external computer located remotely from the external host device via the data connector using a first communications protocol.
摘要:
A method and apparatus for generating an alarm signal upon detecting movement of an object over a time that is greater than a field settable allowed movement time. The method includes the steps of locating a housing with respect to the object, setting the allowed movement time for the object, monitoring the movement of the housing, detecting a movement that exceeds the allowed movement time of the housing, generating an alarm signal, and transmitting by wireless transmission the alarm signal to a remote receiving station. Setting the movement time for the object is achieved by the following steps: powering the apparatus while depressing a tamper switch, initiating a time counter, moving the object an acceptable distance, releasing the tamper switch, stopping the time counter, and reading the allowed movement time from the time counter. Detecting a movement greater than the allowed movement time includes the steps of detecting a movement of the housing, enabling an allowed movement time counter to count down the allowed movement time, enabling a restore counter to count down a restore time, detecting movement of the housing during the restore time, allowing the allowed movement time counter to continue to count down the allowed movement time, and determining when the allowed movement time counter has completed counting the allowed movement time.
摘要:
A method of and system for acquiring data by a data reader from a transponder in which the data from the transponder does not require a preamble to denote the beginning of the data sequence. A radio frequency signal is continuously transmitted by the card reader to generate a radio frequency field. Once a transponder enters the RF field, then response data is generated by the transponder and received by the card reader. The transmission of the radio frequency signal by the card reader is temporarily stopped on detection of the response data from the transponder, and then reinitiated by the card reader after it stops receiving response data from the transponder in order to regenerate the radio frequency field. The response data subsequently received from the transponder in the radio frequency field is then stored in memory.
摘要:
A rod having an embedded optical fiber has a stiff composite outer layer (10) to make the rod self straightening to enable it to be pushed into a pipe or borehole from a spool. This can help enable a reduction of friction between rod and conduit and can enable longer reach. A barrier layer is provided to separate the fiber from the composite layer. The rod can be retrieved after use. The rod can be narrow enough to enable normal flow along the pipe or borehole, and can be injected and retrieved even when the pipe or borehole is pressurized. The fiber can be used for remote sensing of conditions along the conduit. Other tools can be inserted by the rod during the intervention.
摘要:
A system and method for using identification codes found on ordinary articles of commerce to access remote computers on a network. In accordance with one embodiment of the invention, a computer is provided having a database that relates Uniform Product Code (“UPC”) numbers to Internet network addresses (or “URLs”). To access an Internet resource relating to a particular product, a user enters the product's UPC symbol manually, by swiping a bar code reader over the UPC symbol, or via other suitable input means. The database retrieves the URL corresponding to the UPC code. This location information is then used to access the desired resource.