摘要:
An inventory control system and method that tracks inventories of items with RFID tags, includes a reader unit and an intelligent station that tracks RFID tags to determine item information of items to be inventoried. The reader unit transmits and receives RF signals. The intelligent station includes a first RF antenna connected to the reader unit by a first transmission cable through a first switch, and one or more additional RF antennae connected to the reader unit by the same first transmission cable through additional switches. An inventory control processing unit receives item information from the intelligent stations to update inventory information regarding the items to be inventoried.
摘要:
An inventory control system and method that tracks inventories of items with RFID tags, includes a reader unit and an intelligent station that tracks RFID tags to determine item information of items to be inventoried. The reader unit transmits and receives RF signals. The intelligent station includes a first RF antenna connected to the reader unit by a first transmission cable through a first switch, and one or more additional RF antennae connected to the reader unit by the same first transmission cable through additional switches. An inventory control processing unit receives item information from the intelligent stations to update inventory information regarding the items to be inventoried.
摘要:
In one embodiment, a network control module permits any or all of power signals, traffic signals and controller command signals to be carried on as few as one wire or cable to a first port of the network control module. In another aspect, a “peripheral array” includes a network control module (in any one of a number of different possible embodiments), with one or more peripheral devices, such as antennas, attached to or coupled with the network control module outputs. In one embodiment, RFID “smart shelving” may be fabricated in sections, with several (for example, 4, 8 or 16) antennas in each section, and as few as one cable coupling adjacent sections. Additional embodiments are described and claimed.
摘要:
In accordance with a preferred embodiment of the invention, an antenna structure is provided having one or more antennae arranged so as to read all possible orientations of a randomly placed tag. Also provided in accordance with a preferred embodiment of the invention, is a method of configuring one or more antennae composed of the steps of: identifying the “dead zones” of each discrete antennae used, and orienting each antennae such that there are no “dead zones” common to all antennae. The unique antenna structure (and corresponding method) has particular application in tag reader antenna systems for use in RFID (radio frequency identification) applications (13.56 MHz) and the like. In accordance with an exemplary embodiment, multiple RF (radio frequency) antennae are utilized as part of an intelligent station to track items tagged with radio frequency identification (RFID) tags.
摘要:
Disclosed are techniques that render a graphical user interface on a display device for performing transactions with a security system. The techniques include listening by a user device for a beacon from the security system, the beacon including a message and imitating by the user device the transaction with the security system in response to the message, with the message causing the user device to render a graphical user interface that has fields for entering an email address and a password to register the user device with a security server, with the graphical user interface rendering on the display a public key stored in a user digital wallet and a user digital wallet identification and sending in response to the message, a user's public key that is stored in the user's wallet and which is embedded in a code.
摘要:
Described are techniques for security access and control. The techniques use a system that includes a card reader system including a processor and memory. The card reader system is configured to execute a security application that configures the card reader system to receive an embedded electronic credential from an access badge, with the embedded electronic credential carried by the access badge and being associated with a user, determine whether the credential indicates an authorized access, generate a message according to a result of the determination, and send the message to a distributed ledger that logs the result in the distributed ledger.
摘要:
Apparatuses, systems for, and methods of transporting digital signals and radio-frequency (“RF”) signals are disclosed. In accordance with a preferred embodiment of the invention, an intelligent network (e.g., a combination router) and corresponding method are provided for transporting RF signals to, for example, an RFID antenna and transporting digital signals to, for example, a controller. In a preferred embodiment, the intelligent network is implemented with a manager unit for controlling a plurality of network devices to facilitate the efficient management of RFID-enabled devices. The network devices may include a combination router/switch, which has the capability of switching both digital data and RF data, RFID readers, RFID reader/writer pads, and other devices. In accordance with preferred embodiments, the intelligent network allows enhanced flexibility in controlling systems for interrogation of RFID antennae.
摘要:
Disclosed are techniques that use mixed reality, e.g., augmented reality and virtual reality technologies to improve analysis of security situations. These techniques merge the physical world embodied in security systems with the virtual world of policies and analytics. Upon receiving an assertion of an alarm condition from a security system that processes sensor signals a server sends messages to determine nearby sensors to turn on and start sending data back to the servers. Further implementations have the servers modify operation of the sensors to collect more relevant sensor data according to the alarm condition. The servers control a mixed reality device on which information such as a video feed is rendered on a display associated with the device, as well as data determined by the servers based on analysis of the received sensor data.
摘要:
Disclosed are techniques that use mixed reality, e.g., augmented reality and virtual reality technologies to improve analysis of security situations. The techniques allow a guard (or other user in a facility) to observe persons in a facility and determine merely by looking at such persons through a mixed reality device whether those persons are authorized to be in the facility or not, irrespective of whether those persons are required or not required to publically display some credentials, such as a badge or the like.
摘要:
Disclosed are techniques that use devices with corresponding identity wallet applications that execute on an electronic processor device of the devices, and which identity wallets store identity information and encrypt the stored identity information. A distributed ledger system, and a broker system that interfaces to the wallet and the distributed ledger are used for various information exchange cases pertaining to access to facilities. In particular, disclosed is a registration process to register an identity wallet with a facility.