摘要:
Systems and methods applicable, for instance, in session provision. A node and/or other computer may, for example, dispatch to one or more servers and/or the like a message including a provided value and a value obtained, for instance, from a storage element. The one or more servers and/or the like may, for example, having performed various registration checks, act to create a token for provision to the node and/or other computer. Messages sent by the node and/or other computer including the token could, for instance, be considered to be associated with a session.
摘要:
Systems and methods applicable, for instance, in session provision. A node and/or other computer may, for example, dispatch to one or more servers and/or the like a message including a provided value and a value obtained, for instance, from a storage element. The one or more servers and/or the like may, for example, having performed various registration checks, act to create a token for provision to the node and/or other computer. Messages sent by the node and/or other computer including the token could, for instance, be considered to be associated with a session.
摘要:
A terminal for interacting with a signaling tag includes a controller capable of selecting a signaling tag and thereafter receiving a tag type from the signaling tag at least partially over an air interface. The controller is also capable of determining if the terminal is actively operating an application. In this regard, the controller is capable of performing a predefined action based upon the tag type, such as based upon a tag type of “Read Only,” “Read/Write” or “Transceiver in Show Mode.” And when the controller is actively operating an application, the controller is capable of performing the predefined action further based upon the application and a state of the application.
摘要:
The present invention provides systems, methods and computer program-product of obtaining information from radio frequency identification (RFID) transponder tags with a mobile device having a radio frequency (RF) transceiver incorporated therein. The mobile device uses one or more visible light sources that may illuminate the RFID transponder tag under consideration, assist in the orientation and position of the RF transceiver, and provide indication to the user that information has been obtained from the RF transponder tag under consideration, by use of the one or more visible light sources. Control of the one or more visible light sources occurs through an application operating on a controller within the mobile device.
摘要:
The present invention provides systems, methods and computer program-product of obtaining information from machine-readable indicia with a mobile device having an indicia reader incorporated therein. The mobile device uses one or more light sources that may illuminate the indicia under consideration, assist in the orientation and position of the indicia reading device, and provide indication to the user that information has been obtained from the indicia under consideration, by use of the one or more light sources. Control of the one or more light sources occurs through an application operating on a controller within the mobile device.
摘要:
A wireless communication device is implemented with a smart card module to secure the transmission of sensitive or confidential information. The user of the device must request permission to activate an application on the smart card module from a remote source. After this first level of security is satisfied, the application on the smart card module enables the user to scan data via a machine-readable medium in order to make a data request to the remote source. If a second level authorization is met in regard to the data request, the remote source will transmit the requested sensitive or confidential information to the user to view and/or update.
摘要:
Systems and methods applicable, for instance, in the supervision of workers. A worker device may, for example, be employed to access a storage element associated with a workplace location, and/or a sensor may capture. The worker device might, for example, provide to another device dispatch including, for instance, sensor output and/or data read from the storage element.
摘要:
A terminal for interacting with a signaling tag includes a controller capable of selecting a signaling tag and thereafter receiving a tag type from the signaling tag at least partially over an air interface. The controller is also capable of determining if the terminal is actively operating an application. In this regard, the controller is capable of performing a predefined action based upon the tag type, such as based upon a tag type of “Read Only,” “Read/Write” or “Transceiver in Show Mode.” And when the controller is actively operating an application, the controller is capable of performing the predefined action further based upon the application and a state of the application.
摘要:
A terminal for interacting with a signaling tag includes a controller capable of selecting a signaling tag and thereafter receiving a tag type from the signaling tag at least partially over an air interface. The controller is also capable of determining if the terminal is actively operating an application. In this regard, the controller is capable of performing a predefined action based upon the tag type, such as based upon a tag type of “Read Only,” “Read/Write” or “Transceiver in Show Mode.” And when the controller is actively operating an application, the controller is capable of performing the predefined action further based upon the application and a state of the application.
摘要:
A terminal for interacting with a signaling tag includes a controller capable of selecting a signaling tag and thereafter receiving a tag type from the signaling tag at least partially over an air interface. The controller is also capable of determining if the terminal is actively operating an application. In this regard, the controller is capable of performing a predefined action based upon the tag type, such as based upon a tag type of “Read Only,” “Read/Write” or “Transceiver in Show Mode.” And when the controller is actively operating an application, the controller is capable of performing the predefined action further based upon the application and a state of the application.