摘要:
Managing foreign RFID tags within a secured area involves use of a first RFID portal system to read tag data from an RFID tag present within a first portal zone. A processing device associated with the first RFID portal system is used to determine whether the RFID tag is entering the secured area. The determination is based on an evaluation of a direction of travel of the RFID tag through the first portal zone. Responsive to determining that the RFID tag is in fact entering the secured area, one or more operations are performed to cause a first tag value corresponding to the tag data to be added into a safe to exit (STE) list.
摘要:
An audiovisual subscription system includes means for aperiodically inverting the lines of a transmitted video signal of a frame-by-frame basis and for decrypting encrypted PCM audio information which is transmitted along with the aperiodically inverted video information.
摘要:
Systems and methods for facilitating tag authenticity validation. The methods comprise: detecting a tag's arrival/presence at a waypoint along a supply chain path; obtaining a ChainStart Value and a first ChainEnd Value from the tag; generating a public key and a private key; transforming the first ChainEnd Value into a second ChainEnd Value using the private key; storing in a data store at least a hash of the ChainStart Value, a hash of the second ChainEnd Value, and the public key as a transaction record entry; causing the first ChainEnd Value of the tag to be replaced with the second ChainEnd Value; and validating the tag's authenticity at a second waypoint along the supply chain path using at least the ChainStart Value, the second ChainEnd Value, and the transaction record entry comprising the hash of the ChainStart Value, a hash of the first ChainEnd Value and the public key.
摘要:
Systems and methods for facilitating tag authenticity validation. The methods comprise: detecting a tag's arrival/presence at a waypoint along a supply chain path; obtaining a ChainStart Value and a first ChainEnd Value from the tag; generating a public key and a private key; transforming the first ChainEnd Value into a second ChainEnd Value using the private key; storing in a data store at least a hash of the ChainStart Value, a hash of the second ChainEnd Value, and the public key as a transaction record entry; causing the first ChainEnd Value of the tag to be replaced with the second ChainEnd Value; and validating the tag's authenticity at a second waypoint along the supply chain path using at least the ChainStart Value, the second ChainEnd Value, and the transaction record entry comprising the hash of the ChainStart Value, a hash of the first ChainEnd Value and the public key.
摘要:
Systems and methods for location identification and tracking of a person, object and/or vehicle. The methods involve: obtaining, by a computing system, a video of a surrounding environment which was captured by a portable camera coupled to the person, object or vehicle; comparing, by the computing system, first images of the video to pre-stored second images to identify geographic locations where the first images were captured by the portable camera; analyzing, by the computing system, the identified geographic locations to verify that the person, object or vehicle is (1) traveling along a correct path, (2) traveling towards a facility for which the person, object or vehicle has authorization to enter, or (3) traveling towards a zone or secured area internal or external to the facility for which the person, object or vehicle has authorization to enter; and transmitting a notification from the computing system indicating the results of the analyzing.
摘要:
An audiovisual subscription system includes means for aperiodically inverting the lines of a transmitted video signal on a frame-by-frame basis and for decrypting encrypted PCM audio information which is transmitted along with the aperiodically inverted video information.
摘要:
Systems (100) and methods (600) for determining a location of an object within space. The methods comprise: generating Inertial Reference Measurement Data (“IRMD”); reading RFID inventory tags by an RFID reader; processing IRMD to determine an RFID reader orientation and position estimates at a time of each RFID inventory tag read; defining cones associated with each RFID inventory tag; mapping the cones to a model; analyzing the model to identify a set of cones which overlap each other and are associated with reads for a respective RFID inventory tag; and deriving a position estimate for the respective inventory tag based on intersecting portions of the cones in the set of cones. Each cone has: a vertex which is the RFID reader position estimate at a respective time; and an angle which is in inverse proportion to a signal strength of a signal received from a respective RFID inventory tag.
摘要:
An audiovisual subscription system includes means for aperiodically inverting the lines of a transmitted video signal on a frame-by-frame basis and for decrypting encrypted PCM audio information which is transmitted along with the aperiodically inverted video information.
摘要:
An audiovisual subscription system includes means for aperiodically inverting the lines of a transmitted video signal on a frame-by-frame basis and for decrypting encrypted PCM audio information which is transmitted along with the aperiodically inverted video information.
摘要:
Managing foreign RFID tags within a secured area involves use of a first RFID portal system to read tag data from an RFID tag present within a first portal zone. A processing device associated with the first RFID portal system is used to determine whether the RFID tag is entering the secured area. The determination is based on an evaluation of a direction of travel of the RFID tag through the first portal zone. Responsive to determining that the RFID tag is in fact entering the secured area, one or more operations are performed to cause a first tag value corresponding to the tag data to be added into a safe to exit (STE) list.