Patent application number | Description | Published |
20080266062 | PREFETCHING MANIFEST DATA IN AN RFID SYSTEM - In an RFID system having an edge controller and a tag reader that is operably connected to the edge controller, a manifest of items having RFID tags tracked by the RFID system is identified, and data from the manifest is downloaded to the edge controller in anticipation of reading the RFID tags, i.e., the manifest data is prefetched. An RFID edge controller that may be operably connected to a tag reader receives, in anticipation of the tag reader reading RFID tags associated with items, manifest data prefetched from a database that stores manifests of items, and compares the manifest data with data read from the RFID tags to determine whether the items comply with the manifest. | 10-30-2008 |
20090045957 | LOCATING A DEVICE IN A GIVEN STATE - Methods and computer program products for locating devices having a given state by locating a device using an RFID tag associated with the device that responds to queries from an RFID tag reader independently of the state of the device, and determining the state of the device using an RFID tag associated with the device that responds selectively in dependence upon the state of the device. A system for locating devices having a given state comprises an RFID tag reader for locating a device by reading an RFID tag associated with the device that responds independently of the state of the device, and an RFID tag reader for determining the state of the device by reading an RFID tag associated with the device that responds selectively in dependence upon the state of the device. | 02-19-2009 |
20090064324 | NON-INTRUSIVE MONITORING OF SERVICES IN A SERVICE-ORIENTED ARCHITECTURE - A method for monitoring a service provided in a service-oriented architecture may include submitting a subscription request to a plurality of intermediaries in the service-oriented architecture from which to receive monitored data related to the service and determining which ones of the plurality of intermediaries to rely upon for monitoring the service. The method may also include receiving the monitored data from the determined ones of the plurality of intermediaries and presenting the monitored data for monitoring the service. | 03-05-2009 |
20090201130 | RFID TAG WITH USER-CONTROLLED KILL MECHANISM - An inexpensive disabling or kill mechanism is provided for an RFID tag to allow a user to decide when to disable the tag and to initiate the kill process. RFID tag antenna circuitry is partially or wholly covered with an oxidation-retardant coating. The activation-retardant coating includes a grippable pull tab. When a user decides he or she no longer wants a functional RFID tag, the user can use the pull tab to remove the least a selectable area of the oxidation-retardant coating. Removing the selectable area will expose at least part of the antenna to begin an oxidizing process that will eventually disable the antenna. An oxidizing agent may be deposited on the antenna before the oxidation-retardant coating is put in place. When exposed to ambient environment, the oxidizing agent may accelerate the oxidation process that disables the antenna. | 08-13-2009 |
20100238002 | Active/Passive RFID Transponder Control Function - Devices, systems, processes, and articles of manufacture are provided herein. These may include an RFID transponder having a microprocessor, nonvolatile memory, a battery, and an antenna, wherein the microprocessor is configured to operate in a passive mode and a battery operated mode, and wherein, when in the passive mode only a portion of the microprocessor may be powered by energy received from an RFID reader interrogating the RFID transponder. The RFID transponder may further include MEMS sensors coupled to the microprocessor and the microprocessor may be further configured to add physical data, instructions, or a unique identify of the RFID transponder to the nonvolatile memory. | 09-23-2010 |
20110202683 | Inband Data Gathering with Dynamic Intermediary Route Selections - Included are a method to manage subscriptions over a network, where the network may comprise intermediaries, clients, and service providers, and the method may include, receiving a subscription at a network intermediary, the subscription having management application data and having application level header information. The method may further include reviewing the application level header information of the received subscription and redirecting the subscription over the network using the reviewed application level header information. | 08-18-2011 |
20120144029 | NON-INTRUSIVE MONITORING OF SERVICES IN A SERVICES-ORIENTED ARCHITECTURE - A system for monitoring a service provided in a service-oriented architecture may include a computing device configured to submit a subscription request to a plurality of intermediaries in the service-oriented architecture from which to receive monitored data related to the service. An application operating on the computing device may determine which ones of the plurality of intermediaries to rely upon for monitoring the service based at least in part on a probability value associated with each intermediary. The probability value is a function of at least a frequency of messages associated with the service processed by the intermediary and a time period since a last message associated with the service was processed by the intermediary. The system may also include an output device to present the monitored data in response to the monitored data being received by the computing device from the determined ones of the plurality of intermediaries. | 06-07-2012 |
20120166615 | Inband Data Gathering with Dynamic Intermediary Route Selections - Included are a method to manage subscriptions over a network, where the network may comprise intermediaries, clients, and service providers, and the method may include, receiving a subscription at a network intermediary, the subscription having management application data and having application level header information. The method may further include reviewing the application level header information of the received subscription and redirecting the subscription over the network using the reviewed application level header information. | 06-28-2012 |