Abstract:
In a system having a radio frequency identification (RFID) reader and at least one passive RFID sensor tag, the RFID reader sends a radio frequency interrogation signal from to the passive RFID sensor tag having a sensor that provides a sensor value. The RFID reader receives from the passive RFID tag a backscattered radio frequency signal carrying the sensor value. An interrogation rate of the sensor tag, an accuracy of interrogation and/or a power of the radio frequency interrogation signal transmitted to the sensor tag is controlled based on a statistical analysis of the multiple received sensor values, multiple interrogations and/or a signal-to-noise ratio (60-69).
Abstract:
Disclosed are fibers which contains identification fibers. The identification fibers can contain a plurality of distinct features, or taggants, which vary among the fibers and/or along the length of the identification fibers, a fiber band, or yarn. The disclosed embodiments also relate to the method for making and characterizing the fibers. Characterization of the fibers can include identifying distinct features, combinations of distinct features, and number of fibers with various combinations of distinct features and correlating the distinct features to supply chain information. The supply chain information can be used to track the fibers, fiber band, or yarn from manufacturing through intermediaries, conversion to final product, and/or the consumer.
Abstract:
Extracting card data comprises receiving, by one or more computing devices, a digital image of a card; perform an image recognition process on the digital representation of the card; identifying an image in the digital representation of the card; comparing the identified image to an image database comprising a plurality of images and determining that the identified image matches a stored image in the image database; determining a card type associated with the stored image and associating the card type with the card based on the determination that the identified image matches the stored image; and performing a particular optical character recognition algorithm on the digital representation of the card, the particular optical character recognition algorithm being based on the determined card type. Another example uses an issuer identification number to improve data extraction. Another example compares extracted data with user data to improve accuracy.
Abstract:
Es wird eine Vorrichtung zum Verwalten von N Datensätzen von N zugeordneten Siegeln für Produkte vorgeschlagen. Dabei umfasst das jeweilige Siegel einen dem Siegel zugeordneten und nach einem Brechen des Siegels durch ein Erfassungsgerät erfassbaren Code. Die Vorrichtung weist eine Empfangseinheit, eine Prüfeinheit und eine Sendeeinheit auf. Die Empfangseinheit ist zum Empfangen einer von einem Erfassungsgerät gesendeten Anfragenachricht mit einem einem der N Siegel zugeordneten Code eingerichtet. Die Prüfeinheit ist zum Prüfen des empfangenen Codes auf Gültigkeit und auf ein erstmaligen Brechens des dem empfangenen Code zugeordneten Siegels in Abhängigkeit von dem dem zugeordneten Siegel zugeordneten Datensatz eingerichtet. Die Sendeeinheit ist zum Senden einer in Abhängigkeit von dem Prüfen generierten Antwortnachricht mit einer Statusinformation zum erstmaligen Brechen des dem empfangenen Code zugeordneten Siegels an das Erfassungsgerät eingerichtet. Somit wird sichergestellt, dass der Nutzer des Erfassungsgeräts korrekt und aktuell darüber informiert ist, ob das Siegel erstmalig oder nicht erstmalig gebrochen ist. Ferner werden ein System mit einer solchen Vorrichtung und mit einer Anzahl von Erfassungsgeräten sowie ein Verfahren und ein Computerprogrammprodukt zum Verwalten von N Datensätzen von N zugeordneten Siegeln vorgeschlagen.
Abstract:
A system for monitoring a lockout condition of a component includes a lockout device, a lock unit, and a reader. The lockout device is moveable between a lockout condition blocking operation of the component and an access condition permitting operation of the component. The lock unit is configured to be secured to a lockout interface of the lockout device to secure the lockout device in the lockout condition. One of the lockout device and the lock unit includes a communication module configured to communicate a data signal including an identification code identifying the one of the lockout device and the lock unit. The reader is remote from the one of the lockout device and the lock unit, and is configured to receive the data signal at least when the lockout device is assembled with the component and the lock unit is secured to the lockout interface of the lockout device.
Abstract:
Embodiments of the invention include a platform for using 2D barcodes to establish secure authenticated communication between two computing devices that are in proximity to each other. A two-tier application architecture using a single base app and dynamic add-on applets is used. 2D barcodes can be distinctively visually branded. According to other aspects, the security of mobile payment systems are enhanced by (1) a triangular payment settlement in which the sender and receiver of payment each submit transaction information independently to the same payment server; (2) sensitive information is split into two parts, one of which is stored on a mobile device, and the other of which is stored on a payment server, and the two parts are only combined and exist transiently in the payment server's volatile memory when executing a transaction; and (3) a process to securely update profile pictures associated with payment accounts.