Patent application number | Description | Published |
20080211676 | SYSTEM FOR TAMPER DETECTION - The present invention relates to a system for tamper detection. A tamper detection system in accordance with an embodiment of the present invention includes: a passive electronic sensor including a circuit having first, second, and third nodes; a load connected between the first and second nodes of the circuit; a friable electrical connection element connected between the second and third nodes of the circuit; and a storage unit, connected to the second node of the circuit, for storing an identification code of the sensor; wherein in use a voltage is applied across the first and third nodes of the circuit, and when the friable electrical connection element is intact, the second node of the circuit is at a first voltage, and when the friable electrical connection element is broken, the second node of the circuit is at a second voltage. | 09-04-2008 |
20080281618 | METHOD AND SYSTEM FOR THE TRACKING OF ARTICLES - Detecting whether an article has been loaded or unloaded for example from a ship by tracking the movements of a transducer such as an RFID tag attached to the article in space, and comparing the tracked movements with a trajectory envelope characterizing the movements associated with a load or unload action, and in the case where the movements of the article are found to comply with the trajectory envelope, registering the article as present in the predetermined volume. | 11-13-2008 |
20090015371 | SYSTEM AND METHOD OF CONTROLLING ACCESS TO SERVICES - The subject matter described herein generally relates to methods and systems for controlling access to services and more specifically relates to a method and a system for controlling access to a variety of services within security sensitive sites. In one embodiment, the invention provides a system for controlling access to a plurality of services within an area, each service of the plurality of services being associated with a service identifier identifying the service, the system comprising: at least one service device storing a service identifier for identifying a service among the plurality of services, each service device covering a proximity zone within the area and being capable of activating the service identifier stored by the service device for the user, in response to the detection of a user in the proximity zone; and an access control subsystem to control the access of a user to a service identified by a service identifier activated for the user. | 01-15-2009 |
20090045911 | USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H | 02-19-2009 |
20090121018 | VOTING METHOD - A voting method. A ballot paper is received. The received ballot paper includes a recorded vote. The recorded vote includes candidate/party information for an election held on a voting day in a jurisdiction. The ballot paper includes a burnable radio frequency identification (RFID) tag including an on-tag fuse that is not blown. The recorded vote is not revealable while the fuse is not blown and is revealable in response to the fuse being subsequently blown. After the ballot paper is received, the ballot paper is authenticated and the fuse is blown to reveal the recorded vote, followed by counting the ballot paper and directing the ballot paper to a candidate box. | 05-14-2009 |
20090121019 | VOTING SYSTEM AND BALLOT PAPER - A ballot paper and a voting system. The paper ballot is initially a voted ballot paper including: a recorded vote including candidate/party information for an election on a voting day in a jurisdiction, a burnable radio frequency identification (RFID) tag including a fuse not blown, and a basic RFID tag storing the jurisdiction's signature. The recorded vote is not revealable while the fuse is not blown and is revealable responsive to the fuse being blown. The voting system includes a ballot box and a ballot counting machine. The ballot box is configured to receive and authenticate the voted ballot paper and to generate a verified ballot paper. The ballot counting machine is configured to receive and authenticate the verified ballot paper, to effectuate a blowing of the fuse to reveal the recorded vote and to subsequently count the ballot paper and direct the ballot paper to a candidate box. | 05-14-2009 |
20090121840 | METHOD AND APPARATUS FOR LOCATING TIRES USING RFID - A method and apparatus for determining the position of four tires on corresponding four wheels in a vehicle. Each wheel has an axis of rotation. Each tire has an embedded Radio Frequency IDentification (RFID) tag. The RFID tags embedded in the four tires have respective identifiers denoted as ID | 05-14-2009 |
20090157772 | SYSTEM FOR EXTENDING THE FILE SYSTEM API - A computing system and computer readable medium storing computer instructions are disclosed, which when the computer instructions are executed, enables a computer system to manage data using a file name on a computer system having a graphical user interface and a file system storing files with a file hierarchy. The computer instructions comprise, in part, entering a command from an application to create a file; displaying the file hierarchy; allowing a user to select at least one folder; saving data in a first file having a file name in one selected folder; in each of the other selected folders, creating a shortcut file having the same file name and containing a pointer to the first file; and creating a hidden file in the folder containing the first file, the hidden file containing a list of pointers to the shortcut files. | 06-18-2009 |
20090169019 | METHOD AND SYSTEMS USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for generating data for generating an authenticity certificate to be stored on a media. The authenticity certificate authenticates an object. A request for a step certificate includes a media identifier, a media key block, an object identifier, a requester entity type, and a requester identity certificate. The object identifier is hashed. A created signature includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A generated hashing result is a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate including the hashing result is generated and encrypted. The encrypted step certificate and an encrypted random key are sent to a requester of the step certificate. The object may be determined to be an authentic object, a counterfeited object, or a stolen object. | 07-02-2009 |
20090201154 | APPARATUS FOR SECURING A LAND SURVEYOR'S MARK BASED ON THE USE OF A RADIO FREQUENCY IDENTIFIER TAG - A surveyor's mark and a method for forming the mark. The mark includes a stick and a head assembled to the stick. The stick is configured to be planted in a ground and the head is configured to be above the ground. The head includes a tag having an identification number. The identification number has a value which is a first code value. The stick includes a tinny wire configured as an electrical conducting loop and connected to the tag. If the stick is planted in the ground and the head is above the ground, then pulling the head in an attempt to pull up the mark from the ground results in the head being disassembled from the stick and the tinny wire breaking so as to open the loop which changes the value of the identification number from the first code value to a second code value. | 08-13-2009 |
20090315720 | SELF-POWERED RFID TAG ACTIVATED BY A FLUID AND METHOD FOR USING SUCH RFID TAGS - The present invention describes a RFID tag and a system and method involving a plurality of RFID tags. Each RFID tag is attached to an object (or to a structure or a person) on which the presence of a predefined fluid is monitored.
| 12-24-2009 |
20100074420 | PHONE CALL MANAGEMENT - A method of operating a phone is provided and includes receiving input to set a phone in a do-not disturb mode and to set a time period during which the do-not-disturb mode is activated and setting the phone accordingly, upon reception of an incoming call from a caller during the time period, activating a caller ID function of the phone, detecting a caller ID of the caller and searching for the caller ID in black- and white-lists. In an event the caller ID of the caller is stored in the blacklist, the voicemail function is activated or the incoming call is ended. In an event the caller ID of the caller is stored in the whitelist, an input of the password associated with the caller ID is requested, and, in an event the caller inputs the password, the ringing function is activated. | 03-25-2010 |
20100097184 | METHOD AND APPARATUS FOR READING SHORT DISTANCE EMISSION RFID TAGS TO LOCATE ITEMS IN A CONTAINER - The present invention is directed to a method and apparatus for reading short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: initiating a reading sequence of a plurality of first RFID tags, wherein each first RFID tag is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in a vicinity of the first RFID tag; interrogating the plurality of second RFID tags to obtain the captured IDs; and determining a physical location of an item in the container based on the captured IDs. | 04-22-2010 |
20100097185 | RFID TAG POSITIONAL ADDRESSING - The present invention is directed to a method and apparatus for radio frequency identification (RFID) tag positional addressing. A method in accordance with an embodiment of the present invention includes: activating a plurality of first RFID tags, wherein each first RFID tag emits an identification (ID) and a position; capturing the IDs and positions emitted by the first RFID tags using a plurality of second RFID tags, wherein each second RFID tag captures the IDs and positions emitted by the first RFID tags located in a vicinity of the second RFID tag, and wherein each second RFID tag determines its physical location based on the captured IDs and positions; and sending a read command including a position of a targeted one of the second RFID tags that is to be read, wherein only the targeted second RFID tag located at the position in the read command responds to the read command. | 04-22-2010 |
20100097196 | METHOD AND APPARATUS FOR VISUALLY LOCATING SHORT DISTANCE EMISSION RFID TAGS TO LOCATE ITEMS IN A CONTAINER - The present invention is directed to a method and apparatus for visually locating short distance emission RFID tags to locate items in a container. A method in accordance with an embodiment of the present invention includes: initiating a reading sequence of a plurality of first RFID tags, wherein each first RFID tag is associated with a respective item located in the container, and wherein each first RFID tag emits an identification (ID); capturing the ID emitted by each first RFID tag using a plurality of second RFID tags located in the container, wherein each second RFID tag is coupled to a respective illumination source; addressing one of the first RFID tags; and activating the illumination source coupled to each second RFID tag that captured the ID of the addressed first RFID tag. | 04-22-2010 |
20100123580 | TAMPER DETECTION, MEMORIZATION, AND INDICATION FOR PACKAGING - The present invention is directed to tamper detection, memorization, and indication for packaging. A method in accordance with an embodiment of the present invention includes: detecting when the package is opened and closed; and generating an alarm if the package is opened more than once after it is initially closed to indicate that the package has been tampered with. | 05-20-2010 |
20100159953 | Method and System to Locate an Object - A computer-implemented method, system, and computer program product for handling identification information emitted by a radio frequency device, and a radio frequency device for emitting identification information. The method receives and stores identification information transmitted by the radio frequency device, retrieves the identification information from the first mobile communication device, and inserts the identification information into the communication. The system includes a first mobile communication device, a second communication device, and an inserting means. The computer program product includes computer program instructions for carrying out the steps of the method. The radio frequency device includes an antenna adapted to operate in UHF frequency bands, an energy storage means adapted to be charged with energy captured through the antenna, an information storage means adapted to store information, and a transmission means adapted to transmit the information using the energy from the energy storage means. | 06-24-2010 |
20110064383 | METHOD AND SYSTEM OF CIRCUMVENTING CONTENT FILTERS - A method, computer program, and system for enabling remanence-based advertisement that is not likely to be blocked by adblockers. A method of converting a master image, such as an advertisement or a logo, into a master video, according to an embodiment, includes: dividing the master image into a plurality of sub-images; generating a plurality of video frames defining a master video, the video frames having dimensions of the master image; and inserting the plurality of sub-images into the plurality of video frames, such that a playing of the master video defined by the video frames visually renders the master image. | 03-17-2011 |
20110112748 | SYSTEM AND METHOD FOR EXCHANGING POSITIONING INFORMATION BETWEEN VEHICLES IN ORDER TO ESTIMATE ROAD TRAFFIC - The present invention discloses a method, system and computer program embarked in a vehicle, for estimating traffic conditions based on positioning information exchanged with other vehicles using wireless communication. A method in accordance with an embodiment of the invention includes: receiving positioning information repeatedly broadcast by at least one vehicle, the positioning information for each vehicle including: information related to a current location of the vehicle; and information identifying the vehicle; calculating based on at least two successive locations of a same identified vehicle, a current speed and a current direction for the vehicle; and estimating current traffic conditions based on current location, speed and direction of identified vehicles. | 05-12-2011 |
20120119915 | SELF-POWERED RFID TAG ACTIVATED BY A FLUID - RFID tag and a system and method involving a plurality of RFID tags. Each RFID tag is attached to an object on which the presence of a predefined fluid is monitored. In a first state, (absence of the monitored fluid), the tag acts as a passive RFID tag, and the information it holds can be read with a proximity reader. This operation is performed when the RFID tag is attached to the object to be monitored. In a second state, whenever the monitored fluid appears on the tagged object, a fluid activated battery generates the electrical power which is used to power the RFID tag. The RFID tag then acts as an active RFID tag and starts to emit messages which can be received by a RFID reader. | 05-17-2012 |
20120242452 | USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H | 09-27-2012 |
20120326872 | SECURING A LAND SURVEYOR'S MARK BASED ON USE OF A RADIO FREQUENCY IDENTIFIER TAG - A surveyor's mark and a method of forming the mark. A tag is embedded in a head. The head is removably assembled to a stick. The head is configured to be above a ground when the stick is planted in the ground. The head includes a tag. The tag in the head includes an identification number whose value identifies the tag and indicates if the head is disassembled from the stick. If the stick is planted in the ground and the head is above the ground, then pulling the head in an attempt to pull up the mark from the ground results in changing the value of the identification number in the tag from a first code value to a second code value that differs from the first code value. | 12-27-2012 |
20130230166 | USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for generating data for use in generating an authenticity certificate. A request is received for a step certificate that authenticates an involvement of the requester entity about an object. The request includes a media identifier, a media key block, an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted using a random key. The encrypted step certificate and an encrypted random key are sent to the requester entity for subsequent writing the step certificate and the encrypted random key on a media. | 09-05-2013 |
20130230167 | USING IDENTIFIER TAGS AND AUTHENTICITY CERTIFICATES FOR DETECTING COUNTERFEITED OR STOLEN BRAND OBJECTS - A method and system for ascertaining an object status of an object associated to an authenticity certificate. A first hashing result of an object identifier encoded within a decrypted first encrypted step certificate is extracted. A second hashing result is obtained from hashing the object to be authenticated. A third hashing result of an object identifier encoded within a decrypted second encrypted step certificate is extracted. A fourth hashing result is obtained from hashing the object to be authenticated. It is determining that the first hashing result is equal to the second hashing result and that the third hashing result is equal to the fourth hashing result, from which it is ascertained the object status of the object is that the object is an authentic object, a counterfeited object, or a stolen object. The ascertained object status is displayed on a screen of an authenticity verification equipment. | 09-05-2013 |
20150058635 | GENERATING AND PROCESSING AN AUTHENTICATION CERTIFICATE - A method and system for generating and processing an authenticity certificate. A request for a step certificate is received from a requester entity. The step certificate authenticates an involvement of the requester entity about an object. The request includes an object identifier, a requester entity type of the requester entity, and a requester identity certificate of the requester entity. The object identifier is hashed. A signature is created and includes the hashed object identifier, the requester entity type, a certifier identity certificate, and the requester identity certificate. A hashing result is generated by hashing a concatenation of the object identifier, the requester entity type, the certifier entity certificate, the requester identity certificate, and the signature. The step certificate is generated and includes the hashing result. The step certificate is encrypted. The encrypted step certificate is sent to the requester entity for subsequently storing the step certificate on a media. | 02-26-2015 |