摘要:
A reader device for locating and tracking multiple tags includes a plurality of closely packed antenna circuits and at least one controller configured to control the plurality of closely packed antenna circuits. The at least one controller is configured to activate one or more of the antenna circuits to generate at least one resonance signal field configured to interrogate at least one tag associated with the one or more active antenna circuits while substantially preventing or reducing cross-coupling of signals between the one or more active antenna circuits and at least one antenna circuit within the at least one resonance signal field to a sufficiently low level, wherein the sufficiently low level substantially prevents misreads from unwanted tags, to thereby track the multiple tags in a substantially controlled manner.
摘要:
A method and system of tracking devices uses imaging and optionally tags. Tracking is performed when the identification information associated with the devices are initially received and exposed towards a scanning bar in an enclosure. This scanning bar scans at one or more predetermined intervals the one or more devices in the enclosure of hardware. The system for tracking devices includes an enclosure capable of receiving one or more devices positioned to expose identification information related to each device and a scanning bar movably coupled to the enclosure that passes over each of the one or more devices and captures images of the identification information exposed by each of the one or more devices.
摘要:
A method and system of tracking devices uses imaging and optionally tags. Tracking is performed when the identification information associated with the devices are initially received and exposed towards a scanning bar in an enclosure. This scanning bar scans at one or more predetermined intervals the one or more devices in the enclosure of hardware. The system for tracking devices includes an enclosure capable of receiving one or more devices positioned to expose identification information related to each device and a scanning bar movably coupled to the enclosure that passes over each of the one or more devices and captures images of the identification information exposed by each of the one or more devices.
摘要:
A reader device for locating and tracking multiple tags includes a plurality of closely packed antenna circuits and at least one controller configured to control the plurality of closely packed antenna circuits. The at least one controller is configured to activate one or more of the antenna circuits to generate at least one resonance signal field configured to interrogate at least one tag associated with the one or more active antenna circuits while substantially preventing or reducing cross-coupling of signals between the one or more active antenna circuits and at least one antenna circuit within the at least one resonance signal field to a sufficiently low level, wherein the sufficiently low level substantially prevents misreads from unwanted tags, to thereby track the multiple tags in a substantially controlled manner.
摘要:
An electronic device includes an enclosure for the electronic device and a duct extending from an interior to an exterior of the enclosure to exhaust airflow from the enclosure. The electronic device further includes an active noise control mechanism. The active noise control mechanism includes an internal sensor, an external sensor, and an acoustic wave generator. The internal sensor is arranged within the enclosure to sense a noise and generate an internal sensor output, and the external sensor is arranged outside of the enclosure to detect sounds and generate an external sensor output. Based on the internal sensor output and the external sensor output, the acoustic wave generator generates an acoustic wave within the duct to reduce the noise.
摘要:
In one embodiment of the present invention, a source point in a supply chain generates a secret and devises a secret sharing scheme that parcels the secret into a number of secret shares. The source point retains at least one secret share, and distributes the remaining secret shares to trusted, intermediate points in the supply chain. The source point then ships a shipment comprising are least one object, and frequently including at least one level of packaging, to a destination point in the supply chain, labeling the object or objects and/or packaging enclosing the object or objects with the retained secret share. Each intermediate point incorporates the secret share obtained by the intermediate point from the source point into the object, packaging enclosing the object, or a label on the object or packaging. At the destination point, the recipient of the object can use the secret shares incorporated into the object, packaging enclosing the object, or a label on the object or packaging to reconstruct the secret initially generated by the source point, and compares the reconstructed secret to the original secret forwarded from the source point.
摘要:
In one embodiment of the present invention, a source point in a supply chain generates a secret and devises a secret sharing scheme that parcels the secret into a number of secret shares. The source point retains at least one secret share, and distributes the remaining secret shares to trusted, intermediate points in the supply chain. The source point then ships a shipment comprising are least one object, and frequently including at least one level of packaging, to a destination point in the supply chain, labeling the object or objects and/or packaging enclosing the object or objects with the retained secret share. Each intermediate point incorporates the secret share obtained by the intermediate point from the source point into the object, packaging enclosing the object, or a label on the object or packaging. At the destination point, the recipient of the object can use the secret shares incorporated into the object, packaging enclosing the object, or a label on the object or packaging to reconstruct the secret initially generated by the source point, and compares the reconstructed secret to the original secret forwarded from the source point.
摘要:
In a method of authenticating a package, an origin noise level of the package is determined based upon one or more identifying characteristics, where the origin noise level is a deviation from a normal condition caused by the one or more identifying characteristics. In addition, the package is authenticated based upon the origin noise level of the package.
摘要:
In one embodiment of the present invention, a source point, or security management entity, within a supply chain labels a shipment to be shipped through the supply chain with numbers, text strings, or other type of label information. Different label information may be placed at each of multiple levels of packaging as well as on objects within the packaging. The source point devises an encryption-key chain via a one-way function, and encrypts combinations of the label information incorporated within the packaging and objects using encryption keys from the encryption-key chain to produce one or more encrypted label tags. The one or more encrypted label tags are affixed to the shipment by the source point, and the shipment is sent into the supply chain for eventual delivery to a destination point. At pre-selected intervals of time, the source point reveals encryption keys within the encryption-key chain. In one embodiment of the present invention, revealing of encryption keys allows intermediate points or the destination point in the supply chain at which the shipment resides to extract label information and apply the most recently revealed encryption key to compute a label-tag value, and to then compare the computed label-tag value to a label tag affixed to, or incorporated within, the shipment.
摘要:
Aspects of the present invention describe a method of tracking an item, comprising. The items is associated with a tag and capable of responding to a query from a tag reader and tag combination. The tag reader and tag combination capable of identifying the item associated with the tag using a tag reader. In operation, a tag reader makes a request to at least one tag reader and tag combination for the identity of an item associated with a tag. The tag reader and tag combination identifies the item associated with the tag and provides the identity of the item and tag to the tag reader.