Abstract:
In embodiments of hardware verification with RFID-stored build information, a device includes hardware components and a wireless radio tag to store build information for hardware verification of the hardware components in the device. A bootloader can interrogate the wireless radio tag to obtain the build information and compare the build information to current information of the hardware components in the device. The bootloader can then determine whether the current information matches the build information. If the current information does not match the build information, then the build information for the hardware components can be stored in the wireless radio tag, and functionality of the hardware components in the device is limited.
Abstract:
Device testing using radio-frequency identification (RFID) is described herein. The testing uses one or more RFID readers that interrogate an RFID tag on a mobile device and, in response to the interrogation, receive data from the RFID tag. The one or more RFID readers, in response to receipt of the data from the RFID tag, transmit a command to execute a test program on the mobile device. The results of the test program are then provided by the mobile device.
Abstract:
In embodiments of on-demand RFID tag activation, an RFID tag is configured so as to enable a person to activate the RFID tag if or when the person wishes. An RFID tag includes an integrated circuit (IC), an antenna coupled to the IC, activation circuitry, and a detachable disable tab. For an example implementation, the RFID tag is in an active state if the IC is capable of responding to an interrogation signal and is in an inactive state if the IC is incapable of responding to an interrogation signal. The activation circuitry is configured to establish the inactive state if the disable tab is attached to the RFID tag or to establish the active state if the disable tab is detached from the RFID tag. The disable tab, if attached to the RFID tag, may impose a short-circuit linkage against the activation circuitry to prevent operation of the tag.
Abstract:
A communication device, method, and computer program product provide higher confidence in person detection by augmenting sensing with carbon dioxide sensing and contextual information. The communication device determines a current carbon dioxide level in a space in which the communication device is located. A processor of the communication device compares the current carbon dioxide level to a carbon dioxide baseline threshold that is indicative of presence of a person in the space. In response to determining that the current carbon dioxide level is greater than the carbon dioxide baseline threshold, the processor further determines whether at least one target is sensed within the space. In response to determining that at least one target is sensed in the space, the processor infers the presence of a person in the space and sets a control mode of the communication device that correlates to the presence of the person.
Abstract:
In embodiments of hardware verification with RFID-stored build information, a device includes hardware components and a wireless radio tag to store build information for hardware verification of the hardware components in the device. A bootloader can interrogate the wireless radio tag to obtain the build information and compare the build information to current information of the hardware components in the device. The bootloader can then determine whether the current information matches the build information. If the current information does not match the build information, then the build information for the hardware components can be stored in the wireless radio tag, and functionality of the hardware components in the device is limited.
Abstract:
In embodiments of on-demand RFID tag activation, an RFID tag is configured so as to enable a person to activate the RFID tag if or when the person wishes. An RFID tag includes an integrated circuit (IC), an antenna coupled to the IC, activation circuitry, and a detachable disable tab. For an example implementation, the RFID tag is in an active state if the IC is capable of responding to an interrogation signal and is in an inactive state if the IC is incapable of responding to an interrogation signal. The activation circuitry is configured to establish the inactive state if the disable tab is attached to the RFID tag or to establish the active state if the disable tab is detached from the RFID tag. The disable tab, if attached to the RFID tag, may impose a short-circuit linkage against the activation circuitry to prevent operation of the tag.
Abstract:
In certain embodiments of radio frequency identification (RFID) operational capability removal, different stages of a life cycle of an RFID integrated circuit (IC) are supported. In one stage, an RFID IC is coupled to an RFID antenna and uses the RFID antenna to communicate wirelessly. In another stage, an operational capability of the RFID IC is removed by coupling a component thereto. For example, a circuit board includes an RFID IC and an RFID antenna operably coupled thereto. During a manufacturing stage of a device, the RFID IC can communicate using the RFID antenna. As part of the device assembly, a device component is mated to the circuit board. Respective electrical connection parts of the circuit board and of the device component are coupled together as part of a mating procedure. The coupling removes an operational capability of the RFID IC, such as a capability to use the RFID antenna.
Abstract:
In embodiments of person-centric RFID tag activation, an RFID tag is configured so as to be active or inactive based on proximity to a person. An RFID tag includes an integrated circuit (IC), an antenna coupled to the IC, and skin proximity activation circuitry. For example embodiments, the skin proximity activation circuitry is configured to establish an active state for the RFID tag if proximate to skin and an inactive state if not proximate to skin. For an example implementation, an RFID tag is placed in an operationally active state in which an interrogation signal is detectable by an IC if at least one skin contact point is touching skin. For another example implementation, an RFID tag is placed in a communicatively active state in which a received interrogation signal may trigger the sending of a response signal if a detected temperature comports with a human-appropriate range of temperatures.
Abstract:
In embodiments of RFID-based device wireless updates, a RFID reader interrogates a RFID tag of a device, and receives a response that indicates device software is not a latest version. The RFID reader communicates wireless network connection information and a file location of a device software update to the RFID tag of the device, and RFID tag memory maintains the file location and the wireless network connection information that is associated with a wireless network. The RFID reader communicates a power-up command to the RFID tag to initiate enabling an interrupt line to power the device on. A bootloader application executing on the device determines that the device software update is available. The bootloader application then obtains the wireless network connection information and configures the device for communication via the wireless network. The bootloader application also obtains the file location and downloads the device software update via the wireless network.
Abstract:
In embodiments of hardware verification with RFID-stored build information, a mobile device includes hardware components and a radio-frequency identification (RFID) tag to store build information for hardware verification of the hardware components in the mobile device. A bootloader can interrogate the RFID tag to obtain the build information and compare the build information to current information of the hardware components in the mobile device. The bootloader can then determine whether the current information matches the build information. If the current information does not match the build information, then a message can be displayed on the mobile device indicating that unauthorized hardware is installed in the mobile device.