Patent application number | Description | Published |
20090045911 | USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H | 02-19-2009 |
20090121018 | VOTING METHOD - A voting method. A ballot paper is received. The received ballot paper includes a recorded vote. The recorded vote includes candidate/party information for an election held on a voting day in a jurisdiction. The ballot paper includes a burnable radio frequency identification (RFID) tag including an on-tag fuse that is not blown. The recorded vote is not revealable while the fuse is not blown and is revealable in response to the fuse being subsequently blown. After the ballot paper is received, the ballot paper is authenticated and the fuse is blown to reveal the recorded vote, followed by counting the ballot paper and directing the ballot paper to a candidate box. | 05-14-2009 |
20090121019 | VOTING SYSTEM AND BALLOT PAPER - A ballot paper and a voting system. The paper ballot is initially a voted ballot paper including: a recorded vote including candidate/party information for an election on a voting day in a jurisdiction, a burnable radio frequency identification (RFID) tag including a fuse not blown, and a basic RFID tag storing the jurisdiction's signature. The recorded vote is not revealable while the fuse is not blown and is revealable responsive to the fuse being blown. The voting system includes a ballot box and a ballot counting machine. The ballot box is configured to receive and authenticate the voted ballot paper and to generate a verified ballot paper. The ballot counting machine is configured to receive and authenticate the verified ballot paper, to effectuate a blowing of the fuse to reveal the recorded vote and to subsequently count the ballot paper and direct the ballot paper to a candidate box. | 05-14-2009 |
20090121840 | METHOD AND APPARATUS FOR LOCATING TIRES USING RFID - A method and apparatus for determining the position of four tires on corresponding four wheels in a vehicle. Each wheel has an axis of rotation. Each tire has an embedded Radio Frequency IDentification (RFID) tag. The RFID tags embedded in the four tires have respective identifiers denoted as ID | 05-14-2009 |
20090121843 | METHOD AND SYSTEMS FOR LOCALIZING OBJECTS USING PASSIVE RFID TAGs - Method and system for localizing an object in a stack of objects. A passive radio frequency identification (RFID) tag is attached to each object. Each RFID tag includes a unique identifier of the object to which the RFID tag is attached. A RFID reader has multiple antennas. Each antenna is positioned to transmit a signal that can be detected by different RFID tags attached to the objects within a reading range of the transmitted signal from each antenna. The antennas are sequentially selected and powered to transmit to the stack a read signal including object's identifier for the object to be localized. If a response to the read signal is received by a selected and powered antenna from a RFID tag that matched the object's identifier with its unique identifier, then a light emitting diode (LED) is lighted to identify a location of the object being localized. | 05-14-2009 |
20090160603 | LOCATING RFID TAGS - A method and RFID tag for locating RFID tags. A passive RFID tag A receives a polling command transmitted from a RFID reader and addressed to another passive RFID tag B. The RFID tag A determines that the polling command is not addressed to the RFID tag A and consequently, at time t | 06-25-2009 |
20090160622 | DIVIDING TAGGED ITEMS INTO SUBSETS - A method and system for dividing a set of tagged items into subsets. Each tagged item is tagged with a passive RFID tag. A RFID reader is instructed to poll the RFID tags of all tagged items in a specified region having fixed boundaries to generate information including, for each tagged item, a spatial location of each tagged item and a list of all other tagged items in the region which are adjacent to each tagged item. The region is split into a plurality of subregions. For each subregion, a central tagged item having more adjacent tagged items in each subregion than any other tagged item in each subregion is determined, utilizing the generated information. A virtual boundary is outlined around the central tagged item to enclose the central tagged item and a portion of the tagged items in each subregion which are adjacent to the central tagged item. | 06-25-2009 |
20090189457 | METHOD AND SYSTEM FOR READING A TRANSPONDER - A transponder, a method for powering the transponder, and a system relating to the method. The transponder includes at least two electrical coils, a dipole antenna, and a chip electrically connected to the dipole antenna and the electrical coils, wherein the electrical coils surround the dipole antenna and the chip. The transponder is surrounded with a wiring loop. An alternating current is generated in the wiring loop. The alternating current generates a magnetic field at the electrical coils. The electrical coils receive energy from the magnetic field and transfer the received energy to the chip for powering the transponder. The dipole antenna is configured to transmit an output signal to a reader and to receive an input signal from the reader. | 07-30-2009 |
20090315679 | LOCATION LOCALIZATION METHOD AND SYSTEM - A location localization method and system. The method includes transmitting by an RFID tag reader, a request for locating a passive RFID tag in a facility. The RFID tag reader receives from a first group of active RFID tags, a first date/time associated with first data. The RFID tag reader transmits to the first group of active RFID tags, a request for retrieving the first data. The first data comprises distances between each active RFID tag of the first group and the passive RFID tag. The RFID tag reader receives the first data. The RFID tag reader receives a map of the facility and locations on the map for the first group of active RFID tags. The RFID tag reader determines a location within the facility for the passive RFID tag based on the first data, the map, and the locations on the map. The RFID tag reader transmits the first location to a user. | 12-24-2009 |
20090315685 | METHODS AND SYSTEMS FOR RFID TAG GEOGRAPHICAL LOCATION USING BEACON TAGS AND LISTENING TAGS - RFID method and system are provided. A reader transmits a reader signal to beacon tags and a listening tag. The beacon tags transmit beacon signals including a beacon identification and a beacon distance to the reader. The listening tag receives the beacon signals. Neighbor distances are calculated for the beacon tags based on when the beacon signals are received, when the listening tag receives the reader signal, and a constant processing time. The neighbor distances are the individual distances from the listening tag to the beacon tags. A list is stored including the beacon identification for the beacon tags, the beacon distance, and the neighbor distances. The listening tag transmits the list and a listening tag identification to the reader. A geographical position of the listening tag is calculated based on the beacon distance, beacon coordinates, and a listening tag distance which is from the reader to the listening tag. | 12-24-2009 |
20090315720 | SELF-POWERED RFID TAG ACTIVATED BY A FLUID AND METHOD FOR USING SUCH RFID TAGS - The present invention describes a RFID tag and a system and method involving a plurality of RFID tags. Each RFID tag is attached to an object (or to a structure or a person) on which the presence of a predefined fluid is monitored.
| 12-24-2009 |
20100004816 | SYSTEM AND METHOD FOR GATHERING AND SUBMITTING DATA TO A THIRD PARTY IN RESPONSE TO A VEHICLE BEING INVOLVED IN AN ACCIDENT - A system and associated method for gathering and submitting data to a third party in response to a vehicle being involved in an accident. First an information manager stores data regardless of the vehicle being involved in an accident. Next the event detection manager stores data in response to detecting the vehicle being involved in an accident. Next the information manager stores state data pertaining to the vehicle's current state. Then an adjacent identifier manager requests, receives, and stores data from surrounding vehicles in memory. Next a report is generated and encrypted. Finally, the encryption and transmission manager stores the report in memory. | 01-07-2010 |
20100023586 | SYSTEM AND METHOD FOR CORRELATING QUESTIONS AND ANSWERS IN AN INSTANT MESSAGING ENVIRONMENT - A system and method for correlating questions and answers in an instant messaging environment. First creating an instant messaging client at least two zones, each zone of the at least two zones corresponding to a unique end user, each zone of further comprising at least one textbox. After creating the instant messaging client, providing the instant messaging client to each end user of at least two end users. Receiving a message from an end user, the message comprising a first value and a second value and text. Finally, sending the text received in the message to each instant messaging client not being controlled by the sending end user, the text therein being displayed in a textbox having the second value and being located in a zone corresponding to the sending end user. | 01-28-2010 |
20100066513 | VEHICLE AUTHORIZATION METHOD AND SYSTEM - A vehicle authorization method and system. The method includes transmitting, by a computing system in a vehicle, a first request for enabling the vehicle for a driver. The computing system receives vehicle identification data associated with the vehicle. The computing system identifies the driver. The computing system transmits a second request for information associated with the driver. The computing system receives driver's license data associated with the driver, a list comprising authorized drivers for the vehicle, and insurance data associated with the driver and the vehicle. The computing system analyzes the vehicle identification data, the driver's license data, the list, and the insurance data. The computing system performs specified functions associated with the vehicle. The computing system generates and stores a report indicating the specified functions. | 03-18-2010 |
20100106417 | SYSTEM AND METHOD FOR IDENTIFYING A TRAJECTORY FOR EACH VEHICLE INVOLVED IN AN ACCIDENT - A method for identifying a trajectory for each vehicle involved in an accident. The method begins by plotting on a Cartesian Coordinate Plane GNSS locations corresponding to a vehicle involved in the accident. Next, the method identifies GNSS locations on the Cartesian Coordinate Plane where the vehicle was speeding. Next, the method marks those GNSS locations on the Cartesian Coordinate Plane where the vehicle involved in the accident was skidding. The process of plotting and identifying speeding as well as skidding is repeated for all vehicles involved in the accident. The Cartesian Coordinate plane then having all vehicle trajectories residing therein is sent to an output device. | 04-29-2010 |
20100109852 | EXPIRATION MANAGEMENT METHOD AND SYSTEM - An expiration management method and system. The method includes transmitting by an RFID tag reader within an enclosure, a plurality of continuous timing signals. The enclosure comprises a container comprising a product and an RFID tag. The RFID tag comprises data indicating a first state for the RFID tag and a first time period. The RFID tag reader receives the data and generates a first time stamp. The RFID tag reader transmits a first message commanding the RFID tag to enter a second state. The RFID tag reader transmits the first time stamp and generates a second time stamp. The RFID tag reader transmits the second time stamp. The RFID tag reader receives results from a comparing process performed by the RFID tag. The RFID tag reader performs a function indicating the results. | 05-06-2010 |
20100131410 | PURCHASING DATA MANAGEMENT METHOD AND SYSTEM - A data management method and system. The method includes retrieving by a computing system, first identification data associated with a buyer of a product. The computing system retrieves product data associated with the product. The product data is compared to campaign data associated with a campaign. The campaign is associated with an entity associated with the product. The computing system determines that the product is associated with the campaign. The computing system generates second identification data comprising the first identification data, an identification code for the product, a campaign code indicating that the product is associated with the campaign, and a date of purchase for the product. The computing system generates encrypted data comprising the second identification data in an encrypted format. The encrypted data is transmitted to a secure database system. | 05-27-2010 |
20100135331 | SYSTEM AND METHOD FOR SYNCHRONIZING COMMUNICATING ENTITIES IN A DECENTRALIZED NETWORK - A method for synchronizing communicating entities in a decentralized network. The method begins with a recipient entity receiving data comprising a first timestamp and a first distance. The first timestamp being the time the first data was broadcast; the first distance being a distance from the sender's synchronization time. Next the recipient entity receives data comprising a second timestamp and a second distance. The second timestamp being the time the second data was broadcast; the second distance being a distance from the sender's synchronization time. Based on the first and second timestamps and distances, the recipient entity calculates a new synchronization time. Next, the recipient entity broadcasts to at least one entity in the decentralized network data comprising a third timestamp and a third distance. The third timestamp being the time the third data was broadcast; the third distance being a distance from the recipient entity's synchronization time. | 06-03-2010 |
20110112748 | SYSTEM AND METHOD FOR EXCHANGING POSITIONING INFORMATION BETWEEN VEHICLES IN ORDER TO ESTIMATE ROAD TRAFFIC - The present invention discloses a method, system and computer program embarked in a vehicle, for estimating traffic conditions based on positioning information exchanged with other vehicles using wireless communication. A method in accordance with an embodiment of the invention includes: receiving positioning information repeatedly broadcast by at least one vehicle, the positioning information for each vehicle including: information related to a current location of the vehicle; and information identifying the vehicle; calculating based on at least two successive locations of a same identified vehicle, a current speed and a current direction for the vehicle; and estimating current traffic conditions based on current location, speed and direction of identified vehicles. | 05-12-2011 |
20110127342 | NANO TIMER CONTROL SYSTEM - The invention provides a pressure controlled device and a system for managing the heating time of a pressure controlled device. The system includes a sensing device that allows the timing of a heating period for the pressure controlled device based on temperature and/or pressure values sensed inside the pressure controlled device. A RFID tag is coupled to the sensing device and is operable for generating timing information. The sensing device and the RFID tag are powered by a nano electromechanical (NEM) device that is operable by a source of pressurized air. | 06-02-2011 |
20110145568 | HANDLING OF THE USAGE OF SOFTWARE IN A DISCONNECTED COMPUTING ENVIRONMENT - A method, computer program product and system of handling usage of software in a disconnected computing environment. A digital certificate including time frame constraints is generated, signed by a certificate authority and associated to the software. To be executed, the digital certificate previously signed must be validated by the certificate authority by checking public keys and the time frame constraints must be simultaneously satisfied in the disconnected computing environment. The use of software is controlled in disconnected computing environments and/or read-only computing environments, i.e. environments which are not modifiable or in which brought modifications are not persistent. The data collected by the software may be further encrypted and thus be controlled. | 06-16-2011 |
20120059936 | MASTERLESS SLOT ALLOCATION - A masterless time slot allocation technique that collaboratively synchronizes, at a time slot level, devices communicating in an ad hoc network. Responsive to determining a current time slot allocated to a first device is occurring, the first device transmits a map to the other devices. The map includes an allocation of time slots to the devices, including indicators for whether each time slot is free, busy or overbooked, devices that own the time slots, and how recently information associated with each time slot was updated. After receiving the map, a second device determines a conflict in which the same time slot is allocated to the second device and to another device. The conflict is resolved by allocating another time slot to the second device and the result of resolving the conflict is each slot is allocated to no more than one device. | 03-08-2012 |
20120070279 | CYCLIC BLADE SPEED CONTROL APPARATUS AND METHOD - A blade speed control apparatus and method. The apparatus includes a rotor assembly a first blade assembly movably attached to the rotor assembly at a first initial position, a second blade assembly movably attached to the rotor assembly at a second initial position, and a movement mechanism configured to move the rotor assembly in a first lateral direction along a y-axis such that a first angle exists between the first blade assembly with said respect to the second blade assembly. The movement mechanism is configured to move a portion of the rotor assembly in a first lateral direction along a y-axis such that a first angle exists between the first blade assembly with said respect to the second blade assembly. The first angle does not comprise an angle of 180 degrees. | 03-22-2012 |
20120119915 | SELF-POWERED RFID TAG ACTIVATED BY A FLUID - RFID tag and a system and method involving a plurality of RFID tags. Each RFID tag is attached to an object on which the presence of a predefined fluid is monitored. In a first state, (absence of the monitored fluid), the tag acts as a passive RFID tag, and the information it holds can be read with a proximity reader. This operation is performed when the RFID tag is attached to the object to be monitored. In a second state, whenever the monitored fluid appears on the tagged object, a fluid activated battery generates the electrical power which is used to power the RFID tag. The RFID tag then acts as an active RFID tag and starts to emit messages which can be received by a RFID reader. | 05-17-2012 |
20120218088 | LOCATION LOCALIZATION - A location localization method and system. The method includes transmitting by an RFID tag reader, a request for locating a passive RFID tag in a facility. The RFID tag reader receives from active RFID tags, a first date/time associated with first data. The RFID tag reader transmits to the active RFID tags, a request for retrieving the first data. The first data comprises distances between each active RFID tag and the passive RFID tag. The RFID tag reader receives the first data. The RFID tag reader receives a map of the facility and locations on the map for the active RFID tags. The RFID tag reader determines a location within the facility for the passive RFID tag based on the first data, the map, and the locations on the map. The RFID tag reader transmits the first location to a user. | 08-30-2012 |
20120242452 | USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H | 09-27-2012 |
20120282090 | HYDRAULIC CYCLIC BLADE SPEED CONTROL APPARATUS AND METHOD - A hydraulic blade speed control apparatus and method. The apparatus includes a rotor assembly comprising a shaft; a first blade assembly pivotably attached to the shaft at a first initial position; a second blade assembly pivotably attached to the shaft assembly at a second initial position opposite to the first initial position; and a hydraulic movement mechanism. An initial angle of 180 degrees exists between the first blade assembly with said respect to the second blade assembly. The rotor assembly is configured to rotate the first blade assembly and the second blade assembly in a first direction and a second direction opposite to the first direction. The hydraulic movement mechanism is configured to pivotably move the first blade assembly in different angular positions with respect to the rotor assembly and the second blade assembly. | 11-08-2012 |
20130048266 | AIR PRESSURE MEASUREMENT BASED COOLING - A cooling management system including component racks, a cooling system, pressure measurement devices, and a computing system within a structure. Each component rack includes an exothermic apparatus. The structure includes warm air aisle spaces and cold air aisle spaces located between the component racks. The cooling system feeds cold air into each cold air aisle space. The cold air flows through the component racks resulting in displacement of warm air from each exothermic apparatus. The warm air flows into the warm air aisle spaces and is directed back to the cooling system. The pressure measurement devices measure differential pressure values between the cold air aisle spaces and the warm air aisle spaces. The computing system monitors the differential pressure values, perform calculations associated with the differential pressure values, and control a fan speed of at least one fan within the cooling system based on the calculations. | 02-28-2013 |
20130322984 | ANTI-TAMPER SYSTEM - An anti-tamper system including: a fixing device and an anti-tamper detection device; the fixing device comprising a body and a head whereby the head having a larger cross section then the body for enabling a tool to engage and drive the body into a first material layer thereby makes a firm connection with the anti-tamper detection device between the head and the first material layer; the fixing device further comprising a lock wherein the head is locked to the body by the lock where there is no external magnetic field and wherein the head becomes disengaged from the body when the lock is unlocked by an external magnetic field; and whereby the anti-tamper detection device detects and records a change the connection when the head becomes disengaged. | 12-05-2013 |
20140030041 | ANTI-TAMPER SYSTEM - An anti-tamper system including: a fixing device and an anti-tamper detection device; the fixing device comprising a body and a head whereby the head having a larger cross section then the body for enabling a tool to engage and drive the body into a first material layer thereby makes a firm connection with the anti-tamper detection device between the head and the first material layer; the fixing device further comprising a lock wherein the head is locked to the body by the lock where there is no external magnetic field and wherein the head becomes disengaged from the body when the lock is unlocked by an external magnetic field; and whereby the anti-tamper detection device detects and records a change the connection when the head becomes disengaged. | 01-30-2014 |
20140248830 | AIR PRESSURE MEASUREMENT BASED COOLING - A cooling management system including component racks, a cooling system, pressure measurement devices, and a computing system within a structure. Each component rack includes an exothermic apparatus. The structure includes warm air aisle spaces and cold air aisle spaces located between the component racks. The cooling system feeds cold air into each cold air aisle space. The cold air flows through the component racks resulting in displacement of warm air from each exothermic apparatus. The warm air flows into the warm air aisle spaces and is directed back to the cooling system. The pressure measurement devices measure differential pressure values between the cold air aisle spaces and the warm air aisle spaces. The computing system monitors the differential pressure values, perform calculations associated with the differential pressure values, and control a fan speed of at least one fan within the cooling system based on the calculations. | 09-04-2014 |
20140309962 | ANALYSIS OF PEDESTRIAN CONGESTION - A method, system and computer program product are disclosed for providing a measure of pedestrian congestion in a given area. In one embodiment, the method comprises collecting data from a pedestrian moving in the area, and using the data to determine one or more specified parameters representing a pattern of movement of the pedestrian in the area. These specified parameters are used to determine a sinuosity of pedestrian traffic in the given area. In one embodiment, the pattern of movement is a walking pattern of the pedestrian, and the data collected from the pedestrian identifies a multitude of positions of the pedestrian's feet. In an embodiment, the specified parameters include a lateral gap between the feet of the pedestrian, and a length of a stride of the pedestrian. A sequence of values may be collected for each of these parameters. | 10-16-2014 |
20150082202 | UTILIZATION OF AN INSTANT MESSAGING ENVIRONMENT - A method and system for utilizing an instant messaging environment. An instant messaging client is created in association with each respective end user of at least two end users. Each instant messaging client in association with its respective end user includes at least two zones. Each zone corresponds exclusively to a unique end user. Each zone of the at includes at least two textboxes contiguously distributed within each zone. The at least two zones of each instant messaging client is configured to include a write-only zone specific to the respective end user and a read-only zone specific to each end user of all other end users exclusive of the respective end user. Each instant messaging client is provided to each respective end user of the at least two end users. | 03-19-2015 |