H04Q1/00

Visible light communication of an access credential in an access control system
10643461 · 2020-05-05 · ·

Methods and systems relating to communication of authentication information in an access control system are disclosed. The authentication information is transmitted to an electronic locking device configured to restrict access to an entry point of the access control system. In various embodiments, a smart device comprises a light-emitting diode (LED) and a wireless networking radio for exchanging access control information with a remote server. The smart device may receive information from the remote server that configures the LED to present authentication information as an optical signal. According to various embodiments, the smart device may comprise a user interface display. Presentation of the authentication information may include rendering a webpage comprising a dynamic visual feature that changes visual content appearing on the user interface display so as to convey the authentication information as the optical signal emitted by the user interface display.

TELEPHONE CONNECTOR TO AUDIO CONNECTOR MAPPING AND LEVELING DEVICE
20200124670 · 2020-04-23 ·

A system and methods for adaptive bi-direction audio wiring, in which a circuit may be attached via a headset port using RJ9 pin configurations in a phone handset, and dynamically test many different phone handset configurations for optimal audio pathing and processing for speaker and microphone audio generation with minimal noise, static, or power fluctuation.

In-vehicle device, recording medium, and keyless entry system

An in-vehicle device includes transmitting antennas, an in-vehicle device transmitter configured to transmit request signals from the respective transmitting antennas, an in-vehicle device receiver configured to receive, from a portable device, an answer signal that includes received signal strengths of the respective request signals, and an in-vehicle device controller configured to calculate a distance from the portable device to each of a plurality of areas, based on both the received signal strengths of the respective request signals included in the answer signal and reference values for the request signals, and to identify an area to which the portable device belongs based on the distance. In a case where there is a request signal whose received signal strength is not included in the answer signal, the in-vehicle device controller calculates the distance by utilizing a corresponding reference value for the request signal as the received signal strength of the request signal.

Barrier operator feature enhancement

A barrier operator feature enhancement device is designed to provide one or more features found in modern barrier operator devices and to incorporate those features into a previously installed barrier operator system. To facilitate ease of use, the barrier operator feature enhancement device can communicate with a large variety of barrier operators. Such communication may be wireless or wired, depending on the communication protocol implemented by a particular previously installed barrier operator. To facilitate the ease of installation, the device is designed to configure itself to operate with the communication protocol of the previously installed barrier operator. Once configured to be able to communicate with the previously installed barrier operator, the feature enhancement device works with the barrier operator to provide one or more additional features to enhance the capabilities of the previously installed barrier operator.

Secured electronic communication system

Systems and methods are described for detecting that a potential renter of a property is being fraudulently impersonated by a third party during electronic communications with an owner or lessor of the property. Data representing an exchange of electronic messages between an inquirer and a responder are obtained, and may be anonymized to prevent the parties from learning one another's identity prior to completing the transaction. The data may be compared to historical inquiries sent by the inquirer, historical inquiries received by the recipient, or other content of the electronic messages to determine a degree of risk that the inquirer's account has been compromised or is otherwise being fraudulently represented. The degree of risk may be communicated to the recipient, and may be acted upon by, e.g., blocking messages from an inquirer whose degree of risk exceeds a threshold.

Hot-pluggable connection for data communications
10555435 · 2020-02-04 · ·

Provided is a patch panel, comprising: a circuit board; and an SFP, SFP+, or QSFP+ connector connected to a plurality of radio frequency coaxial (RF coaxial) connections via conductive traces of the circuit board, the RF coaxial connections configured to extend functionality of the SFP, SFP+, or QSFP+ socket of a computing device coupled to the patch panel from a rear end of the computing device to a front end of the computing device.

On-demand modular fog computing resources

In one embodiment, an autonomous carrier transports a fog computing module to an enclosure at a location determined to be in need of a particular fog computing resource, and aligns and anchors the fog computing module to the enclosure, where the aligning and anchoring is based on mating mechanical connectors on the fog computing module and enclosure. One or more electronic components of the fog computing module may then interface to the enclosure due to the anchoring, and the fog computing module activates at the location, accordingly. In one particular embodiment, the particular fog computing resource of the fog computing module is an additive resource to an existing fog computing resource module at the enclosure, and the existing fog computing resource module provides the mechanical connectors and interfaced electronic components of the enclosure.

On-demand modular fog computing resources

In one embodiment, an autonomous carrier transports a fog computing module to an enclosure at a location determined to be in need of a particular fog computing resource, and aligns and anchors the fog computing module to the enclosure, where the aligning and anchoring is based on mating mechanical connectors on the fog computing module and enclosure. One or more electronic components of the fog computing module may then interface to the enclosure due to the anchoring, and the fog computing module activates at the location, accordingly. In one particular embodiment, the particular fog computing resource of the fog computing module is an additive resource to an existing fog computing resource module at the enclosure, and the existing fog computing resource module provides the mechanical connectors and interfaced electronic components of the enclosure.

Modular switch and a method for scaling switches
11936570 · 2024-03-19 · ·

A modular switch and a method that includes (a) first tier switching elements that comprise input output (IO) ports; and (b) second tier switching elements that are coupled to the first tier switching elements in a non-blocking manner. The first tier switching elements are configured to perform traffic management of traffic, and perform substantially all egress processing and ingress processing of the traffic; wherein the traffic management comprises load balancing, traffic shaping and flow-based reordering. The second tier switching elements are configured to (a) provide a shared memory space to the first tier switching elements, (b) perform substantially all of the queuing of traffic and (c) send, to the first tier switching elements, status information related to the status of shared memory resources. The first tier switching elements are configured to perform the traffic management based, at least in part, on the status information.

Wireless network detection apparatus and method for detecting non-predetermined electronic apparatus
11917717 · 2024-02-27 · ·

The present invention discloses a wireless network detection apparatus. A storage circuit stores virtual wireless communication apparatus information. A wireless signal transmission circuit communicates using a wireless communication protocol. A processing circuit executes software or firmware executable commands to perform a wireless network detection method including the steps outlined below. Whether a wireless signal including non-predetermined electronic apparatus identification information being received is determined. When the wireless signal is received, an existence signal is broadcasted accordingly. A first-time pairing information that is transmitted from a non-predetermined electronic apparatus based on the existence signal is received to perform the first-time pairing and store the non-predetermined electronic apparatus identification information in the storage circuit. When an active communication signal or a passive response signal from the non-predetermined electronic apparatus is received, the non-predetermined electronic apparatus is identified and determined to be within a detection range. A predetermined function is executed.