Patent classifications
G06F2221/2121
Processes for distribution and use of a mobile RFID container
A mobile RFID container, such as a case, cargo container, vehicle, etc., includes an RFID detector configured to conduct an RFID scan to generate scan data concerning the items carried in the mobile RFID container, and location determining circuitry for generating location data concerning the location of the mobile RFID container. A method for distributing RFID-tagged items using the mobile RFID container includes placing a plurality of RFID-tagged items in the mobile RFID container, conducting one or more RFID scans to generate scan data concerning the contents of the RFID container, and processing the scan data and location data to determine the location of the mobile RFID container at times when the contents of the RFID container have changed. The RFID scans may be performed, for example, in response to (a) sensing that the contents of the container have been accessed, (b) a request from a remote device, and/or (c) the location of the RFID container relative to geofence boundary corresponding to a particular geographical location.
METHOD OF RESTORING A SECURE ELEMENT TO A FACTORY STATE
The invention is a method for restoring to a factory state a secure element which is embedded in a first device and which comprises a set of data. The method comprises the steps of: classifying data of the set in three independent categories, retrieving from a second device a first entity configured to provide factory value of data of the first category, restoring all current data of the first category (C1) by factory value, retrieving from a third device a second entity configured to provide factory value of data of the second category, restoring factory value of data of the second category.
Out-of band tokens for rights access
Access to content may be administered by storing content, the content comprising one or more selections, accessing a passive optical out-of-band token associated with the content, determining an access right for the content based on the passive optical out-of-band token, and enabling access to the content in accordance with the access right.
Mobile RFID container and distribution method
A transportable container is enabled with radio frequency identification (RFID) technologies to maintain automated inventory levels of those items that are inside the container. The inventory data is communicated via wireless methods, such as cellular or Wi-Fi, to a remote device such as enterprise resource planning (ERP) system. The ERP system may use the inventory data received from the remote device to automatically update appropriately and generate appropriate records (e.g., container inventory, restocking, invoicing, etc.). In some embodiments, automated RFID scans are triggered when the container is opened and subsequently closed. The container may include RF containment/screening to prevent inadvertent scanning of RFID tags outside of the container. The container may also include a location device to allow the location of the container to be readily determined.
WEARABLE ELECTRONIC DEVICE HAVING HETEROGENEOUS DISPLAY SCREENS
Particular embodiments described herein provide for a wearable electronic device, such as a bracelet, watch, wristband or armband. One particular example implementation of a wearable electronic device may include a first display screen, a second display screen, and logic. At least a portion of the logic is implemented in hardware. The logic is configured to receive a communication over a wireless network, and to display, in the first display screen, a communication alert. The communication alert can be a graphic design. The logic is also configured to receive input data indicative of a screen transition input to view information associated with the communication, and to display, in the second display screen, the information associated with the communication. In further embodiments, the graphic design includes a notification pattern indicating one or more attributes of the communication. In further embodiments, the first and second display screens form a single display screen.
Point of sale computer system delivering composited two- and three-dimensional images
A point of sale computer system that allows a customer to select and consummate a sale himself. The system may include graphics storage media configured to store two- and three-dimensional graphics data relating to the sale, as well as business rules storage media, configured to store business rules that specify the graphics that should be displayed during the selection and consummation process based on input received from the customer. The technology allows a presentation to be made to the customer that is entertaining and that maintains the attention of the customer throughout the sale selection and consummation process.
Apparatus and method for notifying of security information in electronic device and computer-readable recording medium for the same
An apparatus and a method for displaying information required to be secured in a wireless communication terminal are provided. The method includes recognizing generation of notification information of one or more processes activated in a first operation mode among a plurality of operation modes including the first operation mode and a second operation mode; and notifying a user of a part of the notification information when a current operation mode is the second operation mode.
Distributed and autonomous data security agent
The present invention is a distributed and autonomous digital data security agent that secures stored data and the storage device itself, from remote manipulation. The present system is an agent in that it acts independently in the accomplishment of its objects and is distributed in that its functionality is resides on firmware resident at disparate hardware locations. The agent is autonomous in that it cannot be remotely compromised. The system includes server having a dedicated Private link with a Chip Administrator, and a Data Link between a first-Chip, a second: Chip of said security agent. The first-Chip is resident and operable to control Write/Read calls and data transfers between the server and the second: Chips of the data storage. The Chip Administrator, first-Chip and second-Chip in combination with their associated Firmwares provide said distributed and autonomous data security agent.