摘要:
An RFID Probe comprises a pole with a plurality of sensors that indicate RF signal strength attached at regular intervals and marked to indicate distance from an end of the pole. A user employs the RFID Probe by placing the probe between densely packed materials, such as cases on a pallet, and exposing the RFID Probe and packaging to a signal from an REID transceiver. After exposing the RFID Probe to the RFID transceiver signal, the user removes the RFID Probe from the packed materials and observes the sensors on the probe. By noting the location on the probe of the sensors indicating low or no RF signal, the user can identify locations where RF signal strength is insufficient to activate an RFID tag.
摘要:
An RFID Probe comprises a pole with a plurality of sensors that indicate RF signal strength attached at regular intervals and marked to indicate distance from an end of the pole. A user employs the RFID Probe by placing the probe between densely packed materials, such as cases on a pallet, and exposing the RFID Probe and packaging to a signal from a RIFD transceiver. After exposing the RFID Probe to the RFID transceiver signal, the user removes the RFID Probe from the packed materials and observes the sensors on the probe. By noting the location on the probe of the sensors indicating low or no RF signal, the user can identify locations where RF signal strength is insufficient to activate an RFID tag.
摘要:
An RFID Probe comprises a pole with a plurality of sensors that indicate RF signal strength attached at regular intervals and marked to indicate distance from an end of the pole. A user employs the RFID Probe by placing the probe between densely packed materials, such as cases on a pallet, and exposing the RFID Probe and packaging to a signal from a RIFD transceiver. After exposing the RFID Probe to the RFID transceiver signal, the user removes the RFID Probe from the packed materials and observes the sensors on the probe. By noting the location on the probe of the sensors indicating low or no RF signal, the user can identify locations where RF signal strength is insufficient to activate an RFID tag.
摘要:
The Automatic RFID Tuner has one or more RFID repeaters that can travel in the x, y and z axes through a densely packed pallet of goods. The RFID repeater identifies dead spots where RF signals from an RFID transceiver do not penetrate the dense packaging. The RFID repeater calculates a position that ensures the RF signal will reach all passive RFID tags in the dense packaging. The RFID repeater moves to the calculated position so that the RFID transceiver's signal will read all passive RFID tags in the dense packaging.
摘要:
An RFID Probe comprises a pole with a plurality of sensors that indicate RF signal strength attached at regular intervals and marked to indicate distance from an end of the pole. A user employs the RFID Probe by placing the probe between densely packed materials, such as cases on a pallet, and exposing the RFID Probe and packaging to a signal from a RIFD transceiver. After exposing the RFID Probe to the RFID transceiver signal, the user removes the RFID Probe from the packed materials and observes the sensors on the probe. By noting the location on the probe of the sensors indicating low or no RF signal, the user can identify locations where RF signal strength is insufficient to activate an RFID tag.
摘要:
The enhanced power supply adds a control circuit and rechargeable battery to the prior art transformer. The enhanced power supply uses an internal rechargeable battery in standby mode, so that the power supply does not draw AC power when the attached device is not in use. Control contacts on the power supply receptacle act as a communication channel allowing the attached device to power requirements to the power supply. The power supply has the ability to detect the power draw and switch between power modes, even when there is no communication with the attached device.
摘要:
Embodiments of the present invention provide optimization of telephone services through telephone calling plan/card analysis. The least expensive rate is found for telephone calls at any given time and/or date, either through static pre-entry of data, or through dynamic querying of rates via a web-based look-up table, and places calls according to an optimized calling plan. Specifically, in a typical embodiment, an outgoing/target telephone number for an intended telephone call is captured, and a corresponding destination geographic region is identified. Based on the geographic region, a calling plan resulting in a lowest price for the telephone call is identified. This is typically accomplished by consulting at least one table (e.g., call information table) that associates (among other things) calling plans and/or calling cards with geographic regions. Once a calling plan and/or calling card is identified/selected, a corresponding set of dialing instructions will be obtained from the table and used to make/place the telephone call.
摘要:
A method, system, and computer program product for detecting a tailgate event between two vehicles moving in a forward motion is provided. The two vehicles include a first and second vehicle, one of the two vehicles being an offending vehicle and the other of the two vehicles being an affected vehicle. The method includes determining a distance between the two vehicles. The first vehicle is ahead of the second vehicle. The method also includes calculating a safe distance range between the two vehicles based upon one or more of speed, weight, and safe braking range values of at least one of the two vehicles. The method further includes comparing the distance and the safe distance range and activating a recording device on the affected vehicle if the distance is less than the safe distance range indicating an unacceptable range value, the offending vehicle being responsible for causing the unacceptable range value.
摘要:
The invention provides a method, system, and program product for encrypting portions of a document using selective annotation. One method according to the invention includes: defining an annotation border adjacent a portion of a document using a digital pen; applying to the portion of the document an annotation verb specifying that the portion of the document is to be encrypted; entering into the portion of the document information to be encrypted; and encrypting the portion of the document.
摘要:
The invention provides a method, system, and program product for encrypting information. In one embodiment, the invention includes prompting a user for a password associated with a digital signature certificate stored in a digital pen, capturing a handwritten password made using the digital pen, displaying to the user the captured password, and encrypting information entered using the digital pen using the captured password. In some embodiments, the password may be captured from a predefined field on a digital page.