G06K7/06

System and methods to prevent unauthorized usage of card readers
11321719 · 2022-05-03 · ·

A contactless card reader comprises a contactless card reader front-end coupled to a processor. A communications module is coupled to the processor and a set of sensors is coupled to the processor. The set of sensors determines parameters related to the location, orientation and motion of the card reader. The processor receives the parameters from the set of sensors and utilizes the parameters and scenario configuration data to evaluate a rule. The result of the evaluation of the rule results in a limitation on the operation of the card reader. The communications module is configured to intermittently receive the scenario configuration data from external sources.

System and methods to prevent unauthorized usage of card readers
11321719 · 2022-05-03 · ·

A contactless card reader comprises a contactless card reader front-end coupled to a processor. A communications module is coupled to the processor and a set of sensors is coupled to the processor. The set of sensors determines parameters related to the location, orientation and motion of the card reader. The processor receives the parameters from the set of sensors and utilizes the parameters and scenario configuration data to evaluate a rule. The result of the evaluation of the rule results in a limitation on the operation of the card reader. The communications module is configured to intermittently receive the scenario configuration data from external sources.

Cardholder sleeve and near-field communication proxy device for communication with integrated circuit chip cards

A cardholder sleeve and a computing device paired with the cardholder sleeve configured to operate as near-field communication (NFC) proxy devices for one or more integrated circuit (IC) chip cards held in the cardholder sleeve is disclosed. The cardholder sleeve includes at least one pocket to hold an IC chip card and at least one internal card reader adjacent to each pocket, and is configured to wirelessly pair with the computing device via a wireless communication protocol. When the computing device comes in close proximity to an external card reader, the NFC interrogation occurs with the computing device acting as a proxy for the card held in the cardholder sleeve. In this way, the cardholder sleeve and computing device form a repeater network that enables the card to be interrogated remotely on a per-transaction basis.

KEY ENTRY DEVICE
20230281402 · 2023-09-07 · ·

A key entry device including a housing, a keypad array disposed within the housing and including a plurality of keys, a key contact array disposed within the housing below the keypad array and including a plurality of contact pairs, a dome array underlying the keypad array and the key contact array and including a plurality of domes, and a protrusion array underlying the dome array and including a plurality of protrusions, whereby depression of one of the plurality of keys of the keypad array causes a corresponding one of the domes of the dome array to be displaced downwardly and to be deformed by pushing engagement with a corresponding one of the protrusions of the protrusion array into contact with at least one of the contact pairs of the key contact array.

Methods and apparatus to count people

Methods and apparatus to count people are disclosed. Example apparatus disclosed herein are to populate a list with first characteristic datasets obtained from a first plurality of images, respective ones of the first characteristic datasets representative of corresponding faces. Disclosed apparatus are also to perform comparisons of the first characteristic datasets to each other to determine a first number of unique faces, the comparisons limited to the first characteristic datasets obtained during the first period of time. Disclosed apparatus are further to delete the first characteristic datasets from the list after the first period of time has ended, and re-populate the list with second characteristic datasets obtained from a second plurality of images representative of the environment during a second period of time of the media presentation, the second period of time subsequent to the first period of time.

SYSTEM AND METHODS TO PREVENT UNAUTHORIZED USAGE OF CARD READERS
20220391903 · 2022-12-08 · ·

A contactless card reader comprises a contactless card reader front-end coupled to a processor. A communications module is coupled to the processor and a set of sensors is coupled to the processor. The set of sensors determines parameters related to the location, orientation and motion of the card reader. The processor receives the parameters from the set of sensors and utilizes the parameters and scenario configuration data to evaluate a rule. The result of the evaluation of the rule results in a limitation on the operation of the card reader. The communications module is configured to intermittently receive the scenario configuration data from external sources.

SYSTEM AND METHODS TO PREVENT UNAUTHORIZED USAGE OF CARD READERS
20220391903 · 2022-12-08 · ·

A contactless card reader comprises a contactless card reader front-end coupled to a processor. A communications module is coupled to the processor and a set of sensors is coupled to the processor. The set of sensors determines parameters related to the location, orientation and motion of the card reader. The processor receives the parameters from the set of sensors and utilizes the parameters and scenario configuration data to evaluate a rule. The result of the evaluation of the rule results in a limitation on the operation of the card reader. The communications module is configured to intermittently receive the scenario configuration data from external sources.

METHODS AND APPARATUS TO COUNT PEOPLE

Methods and apparatus to count people are disclosed. Example apparatus disclosed herein are to populate a list with first characteristic datasets obtained from a first plurality of images, respective ones of the first characteristic datasets representative of corresponding faces. Disclosed apparatus are also to perform comparisons of the first characteristic datasets to each other to determine a first number of unique faces, the comparisons limited to the first characteristic datasets obtained during the first period of time. Disclosed apparatus are further to delete the first characteristic datasets from the list after the first period of time has ended, and re-populate the list with second characteristic datasets obtained from a second plurality of images representative of the environment during a second period of time of the media presentation, the second period of time subsequent to the first period of time.

Electronic device
11416691 · 2022-08-16 · ·

An electronic device includes a card interface and a processing module. The card interface is electrically connected to the processing module, and a SIM card or a memory card may be inserted into the card interface. The card interface includes 8 springs, where N>1; when a memory card is inserted into the card interface, the memory card is electrically connected to the processing module; and when a SIM card is inserted into the card interface, the SIM card is electrically connected to the processing module, and one metal pin of the SIM card is electrically connected to a first spring in the N springs and one spring adjacent to the first spring. The processing module is configured to determine, based on at least a level of the first spring, that an inserted card is a SIM card or a memory card.

System and method for authenticating before waking an information handling system

A system and method using a system for authenticating a person as an authorized user before waking an information handling system from an inactive state. A sensor receives an input from a person, captures information about the person and a microcontroller unit (MCU) determines if the captured information matches information corresponding to an authorized user. If the MCU determines the captured information corresponds to information corresponding to an authorized user, the MCU sends a command to one of a central processing unit (CPU) or an embedded controller (EC) to change operation of the information handling system to an active state. If the MCU determines the captured information does not correspond to information corresponding to an authorized user, no command is sent to the CPU or EC to change operation of the information handling system.