Patent application number | Description | Published |
20080290994 | Method For Cryptographically Combining HF and UHF RFID Tags/Smart Cards To Create A Single Multi-Use Credential - A method for creating an enhanced RFID tag. A longer range RFID tag and a relatively shorter range credential are proximately co-located in the same container. The longer range RFID tag is cryptographically bound to the shorter range credential by storing, on the longer range tag, signed data which includes indicia of the shorter range tag. The longer range RFID tag requires authorization via an authentication server to grant access to data stored in the enhanced RFID tag. | 11-27-2008 |
20080290995 | SYSTEM AND METHOD FOR OPTIMIZING COMMUNICATION BETWEEN AN RFID READER AND AN RFID TAG - A method for optimizing communication between an RFID reader and an RFID tag. Initially, an RFID tag is detected, and the tag type is passively determined. An optimization goal is then selected. An optimal parameter set for communicating with the tag, based on the tag type and the optimization goal is then determined. The reader is then reconfigured using the optimal parameter set to communicate with the tag. | 11-27-2008 |
20080291041 | RFID Tagged Item Trajectory And Location Estimation System And Method - A system for predicting a trajectory of an item tagged with an RFID tag. The system includes a network of communicatively coupled RFID readers, each having tag cache memory, and a search engine communicatively coupled with the tag caches in each of the readers. When a tag is within operating range of one of the readers, the tag is interrogated for its data and path information comprising timestamps of reader-tag interactions and related event data, and updated path information is stored in the tag cache memory. The search engine performs a search the tag cache memory in one of one of the readers to locate information corresponding to search criteria including characteristics of the tagged item sought. When the information corresponding to the search criteria is found, the path information is retrieved, and the trajectory of the item is extrapolated using a transit time of the item and average velocity of the item, determined from the timestamps and known distances between locations of each of the reader-tag interactions, along an expected path of the item. | 11-27-2008 |
20080297326 | Low Cost RFID Tag Security And Privacy System And Method - A method for provisioning security for an RFID tag. Initially, a random new tag ID is generated, and a new master key is generated based on an existing master key. Encrypted user data to be placed on the tag is generated utilizing the new tag ID as an IV and the new master key as input to an encryption algorithm. The new tag ID and the encrypted user data are then written to the tag. | 12-04-2008 |
20140082070 | SOCIAL NETWORK SYSTEM WITH SOCIAL OBJECTS - A social network system provides a social network that receives from an application a business object and an associated system of record and generates a social object that corresponds to the business object and that comprises the system of record. The social network assigns one or more members to the social object and associates a wall to the social object. The wall displays changes to the system of record, as well as other activity related to the social object. | 03-20-2014 |
20140136105 | System and method for tracking activities of a customer at a resort area - A system and method monitor skier behavior. An identifier is read from a lift access product when the lift access product is in the vicinity of a lift boarding area and a scan record containing the identifier, location information of the lift boarding area and a time stamp if generated. The scan record is processed to generate a location event record that is stored within a location database. The location database is processed to determine skier behavior based upon the location event records. | 05-15-2014 |
20140136106 | SYSTEM AND METHOD FOR AUTOMATED IDENTIFICATION OF A PHOTOGRAPHED SUBJECT AT A RESORT AREA - A system and method monitor skier behavior. An identifier is read from a lift access product when the lift access product is in the vicinity of a lift boarding area and a scan record containing the identifier, location information of the lift boarding area and a time stamp if generated. The scan record is processed to generate a location event record that is stored within a location database. The location database is processed to determine skier behavior based upon the location event records. | 05-15-2014 |
20140142847 | RFID SKIER MONITORING SYSTEMS AND METHODS - A system and method monitor skier behavior. An identifier is read from a lift access product when the lift access product is in the vicinity of a lift boarding area and a scan record containing the identifier, location information of the lift boarding area and a time stamp if generated. The scan record is processed to generate a location event record that is stored within a location database. The location database is processed to determine skier behavior based upon the location event records. | 05-22-2014 |
20140172729 | SOCIAL NETWORK SYSTEM WITH CORRELATION OF BUSINESS RESULTS AND RELATIONSHIPS - A system that generates a social network and correlates business results within that social network receives, from an enterprise application, a business object, an associated system of record and corresponding enterprise members. The system generates a social object for the social network, where the social object corresponds to the business object. The system assigns social members to the social object and receives any changes to the business object. The system then correlates the change in the business object to each of the enterprise members and social members via the social object. | 06-19-2014 |
20140245443 | Cyber Defense Systems And Methods - Cyber defense systems and methods protect an enterprise system formed of a plurality of networked components. Connectivity and relationship information indicative of connectivity and behavior of the components are collected. A relationship graph is created based upon the connectivity data and the relationship data, wherein nodes of the relationship graph represent the components and edges of the graph represent connectivity and relationships. At least part of the relationship graph is stored to form a chronology. The relationship graph and the chronology are analyzed to predict connectivity and relationship changes within the enterprise system, and a first anomaly is identified when the current connectivity and relationships do not match the prediction | 08-28-2014 |
20150070140 | RFID SKIER MONITORING SYSTEMS AND METHODS - A system and method monitor skier behavior. An identifier is read from a lift access product when the lift access product is in the vicinity of a lift boarding area and a scan record containing the identifier, location information of the lift boarding area and a time stamp if generated. The scan record is processed to generate a location event record that is stored within a location database. The location database is processed to determine skier behavior based upon the location event records. | 03-12-2015 |