Abstract:
A biometric identity confirmation system is based on both pulse wave shape data and spirometric data for the subject. During an initial enrollment mode, pulse wave shape and spirometric data (22) for a known subject (20) are used to generate subject characterization data (23) for the known subject (20) by computing an exemplar and selectively weighting portions of the exemplar based, for example, on repeatability or distinguishing characteristic features over the population of known subjects. During a subsequent identity authentication mode, pulse wave shape and spirometric data (25) for a test subject are analyzed using the subject characterization data (26) to confirm whether the identity of the test subject matches the known subject (20).
Abstract translation:生物统计身份确认系统基于对象的脉搏波形数据和肺量测量数据。 在初始注册模式期间,已知对象(20)的脉搏波形和肺活量数据(22)被用于通过计算示例并且选择性地加权示例的部分来为已知对象(20)生成对象表征数据(23) 例如,基于已知对象群体的可重复性或区别性特征。 在随后的身份认证模式期间,使用对象表征数据(26)分析测试对象的脉搏波形和肺活量数据(25),以确认测试对象的身份是否匹配已知对象(20)。 p >
Abstract:
A multi sensor detection and disabling lock system includes detector cases for holding interchangeable detectors that sample for chemical, biological and radiological compounds, agents and elements, with each detector case disposed in or upon the monitored product whereupon light alarm indicators (color coded) on the detector case light up when a specific compound or agent is detected whereupon the detector case transmits detection information to a monitoring computer terminal and transmits a signal to a lock disabler engaged to the product to lock or disable the product's lock thereby preventing individual's from gaining access to the product, and preventing further contamination of the area. An authorized individual resets the detection system. The detection system can be interconnected to surveillance towers scanning detector cases disposed at seaport docks, freight depots and rail terminals for monitoring containers being prepared for shipment or sitting on docks for long periods of time.
Abstract:
A method for intercepting calls from a remote or mobile device (100) for customer self-support detects when users or subscribers send messages, such as text messages. If the message contains an address that corresponds to a predetermined address (such as a customer support address), the phone may intercept the message and display a list of potential solutions to the subscriber's problems. Various other features and embodiments are disclosed.
Abstract:
Die Erfindung betrifft einen RFID-Chip (1) mit einer Sende-Empfangseinheit (2) zum Senden und Empfangen von Funksignalen (3) wobei er ferner aufweist: einen Speicher (4) zum Speichern und Auslesen mindestens einer Transaktionsnummer, TAN; und eine Vergleichseinheit (5) zur Freischaltung zumindest eines RFID-Ablauf Schritts auf der Grundlage eines Vergleichs einer im Speicher gespeicherten TAN mit einer über die Sende-Empfangseinheit (2) empfangenen TAN.
Abstract:
A preferred embodiment is directed to a method of RFID power ramping (174) for tag singulation that includes activating the trigger control (12) of an RFID reader (2) for engaging power to begin reading RFID tags (4, 40, 41, 42, 43, 44). A user may take a first reading at a low power level (151) of a volume around the RFID reader establishing a first read volume. If the user does not detect a particular RFID tag, the user may then increase the transmitting power from the RFID reader to a second higher power level (152) obtaining a second reading of RFID tags in a second read volume. The user may once again increase the transmitting power from the RFID reader to a third higher power level (153) obtaining a third reading of RFID tags in a third reading volume. Increasing the RFID transmitting power is repeated until there is a final read volume where the operator reads and recognizes the detected RFID tag.
Abstract:
Music and non-music portions in an audio stream are identified. The audio stream is digitized and segmented into frames. Selected frames are passed through a filter bank which includes filters having bandwidths approximately proportional to their center frequencies. The spectral flux for each selected frame is calculated and smoothed. Frames having a smoothed spectral flux below a threshold value are associated with music, and frames having a smoothed spectral flux above a threshold value are associated with non-music.
Abstract:
A method of tracking a vehicle during a transfer process that includes one or more stages. The method involves utilising a tag having a tag data store, and uses a tag reader to determine an identifier from the tag data store, and then uses this to determine transfer information at least partially indicative of an identity of the vehicle and a status of the transfer process. The transfer information is then used to locate the vehicle, confirm that a stage in the transfer is to proceed or determine the status of the transfer.
Abstract:
A keypad security apparatus and security system are provided. The keypad includes a network connector to connect the keypad to a data network, an address tracker to track an address assigned to the keypad, and a data input to receive user input data, including arm/disarm commands and to transmit the data via the data network. The network may be a LAN, such an Ethernet connecting the keypad via a router to an internet. A security control panel may also be connected to the local area network. Audio data may be input to the kepypad and transmitted via the network voice data over data network, such as voice over IP data (VoIP). The address assigned to the keypad may be an IP address or a local area network address. The keypad may be connected as a wireless device.
Abstract:
A rearrangeably nonblocking multicast network in accordance with the invention includes an input stage (110) having r 1 switches (IS) and n 1 inlet links (IL) for each of r 1 switches, an output stage (120) having r 2 switches (OS) and n 2 outlet links (OL) for each of r 2 switches. The network also has a middle stage (130) of m switches (MS), and each middle switch has at least one link connected to each input switch for a total of at least r 1 first internal links and at least one link connected to each output switch for a total of at least r 2 second internal links, where m → n 1 + n 2 . The network has all multicast connections set up such that each multicast connection passes through at most two middle switches to be connected to the destination outlet links.
Abstract:
Cryptographic techniques are provided having a complexity level which permits their implementation in inexpensive radio frequency identification (RFID) tags or other RFID devices. In an RFID system comprising one or more RFID devices and at least one reader that communicates with the devices, a plurality of pseudonyms is associated with a given one of the RFID devices. The RFID device transmits different ones of the pseudonyms in response to different reader queries, and an authorized verifier is able to determine that the different transmitted pseudonyms are associated with the same RFID device.