Patent application number | Description | Published |
20090248720 | GENERALISED SELF-REFERENTIAL FILE SYSTEM - Embodiments of an unrestricted binary unambiguous file or memory mapped object are disclosed along with descriptions of corresponding reading and writing processes. The file or object may be used to store data of any type. ‘Binary unambiguous’ refers to a quality whereby the binary data stored within the datastore (file or memory map) is always and uniquely identified by a binary type identifier readily discerned from the self same map. Similarly, the term ‘unrestricted’ refers to the capacity of the protocol to accept data of any type, nature, format, structure or context, in a manner that retains the binary unambiguous nature of the invention for each data item. A storage object so created may be easily read by dedicated software, as it is of simple definition and is durable in nature. Its generality removes the need for repeated updates and versions of the underlying protocol. | 10-01-2009 |
20100146013 | GENERALISED SELF-REFERENTIAL FILE SYSTEM AND METHOD AND SYSTEM FOR ABSORBING DATA INTO A DATA STORE - Embodiments of an unrestricted binary unambiguous file or memory mapped object are disclosed along with descriptions of corresponding reading and writing processes. The file or object may be used to store data of any type. ‘Binary unambiguous’ refers to a quality whereby the binary data stored within the datastore (file or memory map) is always and uniquely identified by a binary type identifier readily discerned from the self same map. Similarly, the term ‘unrestricted’ refers to the capacity of the protocol to accept data of any type, nature, format, structure or context, in a manner that retains the binary unambiguous nature of embodiments of the disclosed technology for each data item. A storage object so created may be easily read by dedicated software, and as well as with the provision of appropriate metadata, be transferred between data stores without requiring intervention from a computer user or administrator. | 06-10-2010 |
Patent application number | Description | Published |
20130205579 | PHYSICAL LAYER MANAGEMENT (PLM) SYSTEM FOR USE WITH AN OPTICAL DISTRIBUTION FRAME HAVING TRAYS WITH SELECTABLE PATCH SIDE - One embodiment is directed to a tray for use in a subrack of a rack. The tray comprises a printed circuit board configured so that a plurality of connections can be made at a plurality of positions on the printed circuit board, each of the plurality of connections involving at least one connector positioned on a patch side of the plurality of positions and the least one connector having a device associated therewith in which information is stored. The tray is configured so that either side of the positions can be used as the patch side. The tray is configured so that the devices associated with the connectors involved in making the connections at the patch side can be read via the tray. The devices associated with the connections can be implemented, for example, using RFID tags or connection point identifier (CPID) storage devices (such as EEPROMs). | 08-15-2013 |
20130207782 | PHYSICAL LAYER MANAGEMENT (PLM) SYSTEM FOR USE WITH AN OPTICAL DISTRIBUTION FRAME USING RFID ANTENNAS WITH LOCALIZED FIELDS - One embodiment is directed to a tray for use in a subrack of a rack, the tray comprising a printed circuit board configured so that a plurality of connections can be made at a plurality of positions on the printed circuit board. Each of the plurality of connections involves at least one connector having an RFID tag associated therewith. The tray further comprises a plurality of RFID antennas integrated into the printed circuit board, each the RFID antennas associated with a respective one of the positions. The printed circuit board is configured to localize a field emitted from each RFID antenna so that only the RFID tag associated with that RFID antenna is energized and read. | 08-15-2013 |
20130306723 | PHYSICAL LAYER MANAGEMENT (PLM) SYSTEM FOR USE WITH AN OPTICAL DISTRIBUTION FRAME IN WHICH TRAYS CAN BE SELECTIVELY REMOVED AND RE-ATTACHED - One embodiment is directed to a subrack comprising a backplate and at least one tray configured so that a plurality of connections can be made at a plurality of positions on the tray. Each of the plurality of connections involves at least one connector having information stored in a device associated therewith that can be read. The backplate and the tray are configured so that the tray can be selectively attached and removed from the backplate. The backplate and the tray are configured so that the devices associated with the connectors involved in making the connections can be read via the tray. The devices associated with the connections can be implemented, for example, using RFID tags or connection point identifier (CPID) storage devices (such as EEPROMs). | 11-21-2013 |
20140138431 | SYSTEM AND METHOD FOR PROVIDING POWER AND COMMUNICATION LINK FOR RFID MANAGED CONNECTIVITY USING REMOVABLE MODULE - One embodiment is directed to a interconnection system comprising at least one port at which an interconnection between at least two cables can be made, an RFID reader configured to read an RFID tag attached to at least one of the cables interconnected at the port, and an interface to connect a removable module to the system. The removable module comprises a rechargeable battery to power the system. The removable module is configured to provide a communication link to communicate data read by the RFID reader to a device outside of the interconnection system. Other embodiments are disclosed. | 05-22-2014 |
20140139320 | METHOD AND SYSTEM FOR PERFORMING A SINGLE LOCALIZED READ TRANSACTION IN WHICH MULTIPLE RFID TAGS ARE READ - One embodiment is directed to a method of reading RFID tags in an interconnection system comprising at least one port. The method comprises initiating a localized read transaction to read any RFID tag attached to a first connector and any RFID tag attached to a second connector inserted into the port. The method further comprises, as a part of the localized read transaction, reading any RFID tag configured to respond to a first type of RFID interrogation signal, wherein the first connector comprises an attached RFID tag that is configured to respond to the first type of RFID interrogation signal; and, as a part of the localized read transaction, reading any RFID tag configured to respond to a second type of RFID interrogation signal, wherein the second connector comprises an attached RFID tag that is configured to respond to the second type of RFID interrogation signal. Other embodiments are disclosed. | 05-22-2014 |
20140141649 | LOCALIZED READING OF RFID TAGS LOCATED ON MULTIPLE SIDES OF A PORT FROM A SINGLE SIDE USING RFID COUPLING CIRCUIT AND PORTABLE RFID READER - One embodiment is directed to an adapter comprising a coupling circuit configured so that a portable RFID reader can be positioned near a first part of the coupling circuit associated with a first side of the adapter in order to perform a localized read of both an RFID tag attached to a first connector inserted into a first jack of the adapter and an RFID tag attached to a second connector inserted into a second jack of the adapter, wherein the coupling circuit is used to enhance a read range of the portable RFID reader when performing the localized read. These embodiments can be used in the outside plant of a telecommunications network. Other embodiments are disclosed. | 05-22-2014 |
Patent application number | Description | Published |
20150195288 | SYSTEM AND METHOD FOR AUTHORIZING ACCESS TO ACCESS-CONTROLLED ENVIRONMENTS - Systems and methods are provided for authorizing a user to access an access-controlled environment. The system includes a system server platform that communicates with fixed PC's, servers and mobile devices (e.g., smartphones) operated by users. The systems and methods described herein enable a series of operations whereby a user attempting to access an access-controlled environment is prompted to biometrically authenticate using the user's preregistered mobile device. Biometric authentication can include capturing images of the user's biometric features, encoding the features as a biometric identifier, comparing the biometric identifier to a previously generated biometric identifier and determining liveness. In addition, the authentication system can further authorize the user and electronically grant access to the access-controlled environment. In this manner the secure authentication system can, based on biometric authentication, authorize a user's access to devices, online services, physical locations or any networked environment that require user authorization. | 07-09-2015 |
20150363986 | SYSTEM AND METHOD FOR FACILITATING USER ACCESS TO VEHICLES BASED ON BIOMETRIC INFORMATION - Systems and methods are provided for authorizing a user to access an access-controlled environment. The system includes a system server platform that communicates with mobile devices (e.g., smartphones) and on-board vehicle computing devices accessed by users. The embodiments enable a series of operations whereby a user accessing a vehicle is prompted to biometrically authenticate using the user's smartphone or on-board vehicle computer. In addition, the system can further authorize the user and electronically facilitate access to the vehicle as well as perform other authorized operations relating to the use of the vehicle. In addition the vehicle access system integrates with various computing devices and computer-based services accessible to the user. The systems and methods also facilitate active monitoring of the vehicle occupants and environmental conditions using optical sensors and the like so as to enhance security, convenience and safety of the occupants during use of the vehicle. | 12-17-2015 |
20160057138 | SYSTEM AND METHOD FOR DETERMINING LIVENESS - Systems and methods are provided for recording a user's biometric features and determining whether the user is alive (“liveness”) using mobile devices such as a smartphone. The systems and methods described herein enable a series of operations whereby a user using a mobile device can capture a sequence of images of a user's face. The mobile device is also configured analyze the imagery to identify and determine the position of facial features within the images and the changes in position of features throughout the sequence of images. Using the change in position of the features, the mobile device is further configured to determine whether the user is alive by identifying gestures and comparing the identified gestures to a prescribed combination of facial gestures that are uniquely defined for the particular user. | 02-25-2016 |
20160117544 | SYSTEMS AND METHODS FOR PERFORMING IRIS IDENTIFICATION AND VERIFICATION USING MOBILE DEVICES - Technologies are presented herein in support of a system and method for performing iris identification and verification using mobile devices. Embodiments of the present invention concern a method for authenticating a user with a mobile device that includes steps for capturing imagery of a user's face, analyzing the imagery to identify the portion of the image depicting the user's eyes and segmenting the eye image to isolate the iris image data and encoding the iris image data in iris template. The present disclosure further describes authenticating the user based on the encoded iris template and additional techniques for preventing erroneous authentication caused by spoofing. In some examples, the anti-spoofing techniques may include capturing one or more images of a user's eyes and analyzing the captured images for indications of liveness based on reflection characteristics depicted in the imagery. | 04-28-2016 |