Patent classifications
G06K7/10257
DATA COMMUNICATION METHOD AND SYSTEM
The present disclosure relates to a data communication method and system. The method includes: a first terminal continuously generating a communication carrier signal; sending by the first terminal a communication data signal carrying a data packet to be processed, beginning to record the first number of pulses when the first terminal completes sending the data packet to be processed; receiving by the second terminal the communication data signal, beginning to record the second number of pulses when the second terminal completes receiving the data packet to be processed, generating a response data packet; sending, by the second terminal, the response data packet to the first terminal when detecting that the second number reaches a pulse number threshold N; and allowing, by the first terminal, to begin receiving the response data packet when detecting that the first number is within a threshold range.
Protection of personal data contained on an RFID-enabled device
A system for protecting personal data contained on an RFID-enabled device, suitable for use with an RFID system including an RFID reader configured to extract information from an RFID chip associated with the RFID-enabled device, includes a personal data protection system including a personal data protection device configured to prevent reading of the RFID chip associated with an RFID-enabled personal item.
Collecting battery pack state information
Systems of an electrical vehicle and the operations thereof are provided that use identifiers and sensed power source parameters to determine whether a rule, such as a warranty or licensing requirement, has been violated.
Configurable integrity protected link for secure accelerator communication
Systems, methods, and apparatuses associated with data exchanged between a processor and a hardware accelerator are disclosed. In various embodiments, a method comprises receiving, at a first endpoint, a first request to change a current tag frequency used to generate a first authentication tag for one or more transactions of a first transaction window sent over a data link to a second endpoint coupled to a processor core. The method further includes sending a message to the second endpoint that the current tag frequency is to change to a new tag frequency, where a second authentication tag for one or more transactions in a second transaction window is to be generated based on the new tag frequency. The method also includes changing the current tag frequency to the new tag frequency based, at least in part, on receiving an acknowledgement that the second endpoint received the message.
Secure anti-skimmer technology for use with magnetic cards
Detecting and reporting skimming of a magnetic stripe of a magnetic instrument having a magnetic stripe. The magnetic head detector detects a reading of the magnetic stripe from the magnetic instrument and, if the reading is detected, transmits a reporting signal to a microchip indicating the magnetic stripe was read. The microchip receives the reporting signal from the magnetic head detector and transmits a buzzer signal to a microbuzzer. The microbuzzer generates an audible notification when the buzzer signal is received from the microchip. A microbattery powers the magnetic head detector, the microchip, and the microbuzzer.
WEARABLE DEVICE WITH INTEGRATED RFID OR NFC CHIPSET
A wearable device with integrated RFID or NFC chipset, includes: a microchip for management and encryption of radio-frequency communications in RFID or NFC standards; at least one antenna, including metal coils to transmit/receive signals in RFID or NFC standards and/or metal coils to generate the electric current required for operation; a memory chip for storing data and encryption keys, manageable by the microchip; a wearable object, integrating the components of the device; a reversible closing buckle for the wearable object, associated with the opposite ends of the coils of the antenna. The buckle can determine in the coils a point of discontinuity, capable of reversibly inhibiting the respective transmission/reception functions of signals in RFID or NFC standards and of generating electric current via electromagnetic induction, thereby preventing unauthorized transmission by the microchip of the data and of the encryption keys of the same, contained in the memory chip.
Location-based access to RFID tag information
Embodiments are directed to restricting access to Radio Frequency Identification (RFID) tag information based on location. Access to RFID tag information may be restricted at the reader level, at the requester level, and at the network level. When reader-level restrictions exist, devices may be prevented from inventorying tags and retrieving information from tags. When requester-level restrictions exist, a requester or device may be prevented from receiving tag information from inventoried tags or a network. When network-level restrictions exist, a network may discard or otherwise restrict tag information received from devices.
Tag-to-tag communication using RFID readers
Messages may be passed between Radio Frequency Identification (RFID) tags using RFID readers. A first tag with a message intended for a second tag sends the message to an RFID reader. The reader then determines that the destination of the message is the second tag and sends the message to the second tag. The second tag may confirm receipt of the message by sending a receipt confirmation message to the reader for forwarding to the first tag, and/or the reader may itself confirm that the message was sent to the second tag by sending a transmit confirmation message to the first tag.
User-adjusted display devices and methods of operating the same
A device includes a microprocessor and a computer readable medium coupled to the microprocessor. The computer readable medium includes instructions stored thereon that cause the microprocessor to receive output from at least one sensor monitoring an interior space of a vehicle and determine, based on the received output, a condition of an occupant in the interior space of the vehicle. The instructions cause the microprocessor to determine, based on the determined condition of the occupant, to alter a first presentation of information displayed to a display device of the vehicle to a second presentation of the information displayed to the display device. The instructions case the microprocessor to render the second presentation of the information to the display device of the vehicle to replace the first presentation of the information displayed to the display device of the vehicle.
Digital identities for physical items
RFID technology may be used to provide digital identities for physical items. An RFID IC attached to or integrated into a physical item contains an identifier for the physical item. Digital identity information associated with the item, such as ownership information, history, properties, and the like, may be located on one or more networks. An entity, after authenticating itself and/or the item, may use the identifier to locate, retrieve, and/or update the item's digital identity information on the network.