G06K7/10257

Object scanning method based on mobile terminal and mobile terminal

A method performed by one or more processors of a mobile terminal is provided. The method includes: identifying a monitoring object based on a scanning instruction that is entered in an application interface; starting, based on the scanning instruction, a scanning object for scanning the monitoring object; and displaying the scanning object, a scanning range of the scanning object, a scanned monitoring object in the scanning range, and a remaining life value of the scanned monitoring object.

Method, system and apparatus for NFC security
11126803 · 2021-09-21 · ·

A method, system and apparatus for providing security to RFID and NFC systems. In some exemplary embodiments, a smart poster may be utilized to provide appropriate or desired communications with an RFID or NFC-enabled device. Such exemplary embodiments may utilize an authorized NFC tag to communicate with an NFC-enabled device, and upon activation of the authorized NFC tag, may trigger activation or appearance of one or more related items, such as visual cues. Additionally, aspects of NFC security systems which can include regions of security, states of activity and actions performed when security violations are detected.

SECURE RFID COMMUNICATION METHOD
20210203483 · 2021-07-01 ·

A secure communication method between an RFID transponder and an RFID reader. The method includes at least the following steps: the RFID reader sends a series of random numbers A1 to the RFID transponder; the RFID transponder sends a series of random numbers A2 to the RFID reader; the RFID reader sends a result R1 to the at least one RFID transponder; the RFID transponder compares the result R1 with a result R1′. If R1′ is equal to R1, then the RFID transponder switches from a locked communication mode to an unlocked communication mode, and sends a result R2′ to the at least one RFID reader.

Data communication method and system
10979899 · 2021-04-13 · ·

The present disclosure relates to a data communication method and system. The method includes: a first terminal continuously generating a communication carrier signal; sending by the first terminal a communication data signal carrying a data packet to be processed, beginning to record the first number of pulses when the first terminal completes sending the data packet to be processed; receiving by the second terminal the communication data signal, beginning to record the second number of pulses when the second terminal completes receiving the data packet to be processed, generating a response data packet sending, by the second terminal, the response data packet to the first terminal when detecting that the second number reaches a pulse number threshold N; and allowing, by the first terminal, to begin receiving the response data packet when detecting that the first number is within a threshold range.

System and method for automatically triggering the communication of sensitive information through a vehicle to a third party
11005657 · 2021-05-11 · ·

A vehicle is provided that determines a first triggering event in predetermined triggering event information has occurred, in response to a first event, automatically forwards a first communication to a selected third party vendor to preorder a product or service of the selected third party vendor in connection with a transaction with the user, determines a second triggering event in the triggering event information has occurred, and in response to the later second event, automatically sends an authorization to complete the transaction by providing financial information to the selected third party vendor.

METHODS AND SYSTEMS FOR AUTHENTICATING PHYSICAL PRODUCTS VIA NEAR FIELD COMMUNICATION TAGS AND RECORDING AUTHENTICATION TRANSACTIONS ON A BLOCKCHAIN

A method includes receiving, by an application executing on a first computing device, from an NFC reader, a unique identifier of an NFC tag. A second computing device stores an identification of the product and the unique identifier of the NFC tag in a blockchain. The second computing device receives, from a third computing device, a request for a determination of authenticity of the NFC tag. The second computing device requests, from the blockchain, an indication of whether the unique identifier of the NFC tag is stored in association with the identification of the product and an indication of ownership. The second computing device receives confirmation that the unique identifier of the NFC tag is stored in association with the identification of the product and the indication of ownership. The second computing device provides, to the third computing device, the confirmation.

Service implementation using a graphic code including a biometric identifier
10922677 · 2021-02-16 · ·

A display instruction associated with a graphic code is received from a terminal device and at a client computing device. A biometric feature identifier associated with a biometric feature that is verified by a server is obtained by the client computing device. A code string that includes the biometric feature identifier is generated by the client computing device. The graphic code that includes the code string is displayed at the client computing device, to permit completion of a service by the terminal device using the graphic code.

METHOD AND APPARATUS FOR INVOKING RADIO FREQUENCY CARD FUNCTION
20210049332 · 2021-02-18 ·

A method and an apparatus for invoking a radio frequency card function are provided. The method includes: monitoring a feature input event, and obtaining feature information of a user from the feature input event obtained through monitoring; determining, based on a mapping relationship between the feature information and a radio frequency card type, a target radio frequency card type corresponding to the feature information of the user; and invoking a radio frequency card function corresponding to the target radio frequency card type. According to the method, different radio frequency card types may be distinguished based on the feature information of the user, so that the radio frequency card function corresponding to the target radio frequency card type corresponding to the feature information of the user can be invoked based on the feature information of the user. This further improves a card swiping success rate and improves user experience.

SMART CARD PASSWORD MANAGEMENT SYSTEMS AND METHODS FOR MEDICAL SYSTEMS

The invention relates to devices, systems, and methods for controlling smart card authentication for a system. The systems and methods can include a smart card reader for gaining access to a smart card by sending a first password to access the smart card wherein the smart card reader can read a unique ID of the smart card and use an algorithm to generate a second password and store the generated second password directly in the smart card's file directory. The medical systems can include any medical device or machine requiring the transfer of any data such as personal health information (PHI) and therapy parameter data to be used by medical devices in the system. The methods, algorithms, and processes can also be used as a standard for any number of devices and systems for accessing a particular device.

PROTECTION OF PERSONAL DATA CONTAINED ON AN RFID-ENABLED DEVICE
20210004546 · 2021-01-07 ·

A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.