G06K7/10297

SYSTEMS AND METHODS FOR AUTHENTICATION
20230273988 · 2023-08-31 ·

An authentication method for a tag device includes exchanging authentication codes between the tag device and an authentication server to perform mutual authentication. A reader device acts as a communications bridge between the tag device and the authentication server. The reader device may observe mutual authentication between the tag device and the authentication server as an indicator that the tag device is authentic. A failure of mutual authentication indicates that the tag device is not authentic.

PHASE VALUE DETERMINATION FOR AN NFC CARD EMULATING DEVICE UTILIZING ACTIVE LOAD MODULATION

There is described a method of determining a phase value for an NFC card emulating device that enables said NFC card emulating device to communicate in phase with an NFC reader device while utilizing active load modulation, wherein the NFC card emulating device comprises a card antenna and the NFC reader device comprises a reader antenna, the method comprising receiving a reader signal from the NFC reader device at the NFC card emulating device through coupling of the card antenna and the reader antenna, the reader signal comprising a subcarrier modulation; estimating a resonance frequency of a system corresponding to the coupled card antenna and reader antenna based on the received communication signal; and determining the phase value based on the estimated resonance frequency and a set of parameters that represents a predetermined reference system. Furthermore, an NFC card emulating device, an NFC system, and a computer program are described.

CARD READER AUXILIARY DEVICE AND WORKING METHOD THEREOF
20230274105 · 2023-08-31 · ·

A card reader auxiliary device and a working method thereof, which relate to the field of card readers. The card reader auxiliary device detects whether a card exists based on contactless field of the card reader, when detecting that the card exists, the card reader auxiliary device opens its own contactless field and provides field strength enough for a fingerprint card to enable the fingerprint card to complete fingerprint comparison, the card reader auxiliary device obtains a current time of a timer, determines whether the current time is more than a first preset time, if yes, the card reader auxiliary device closes its own contactless field. According to the embodiments, the fingerprint comparison can be done by a card without updating the card reader, which can make the card communicate smoothly with the card reader.

RFID DATA COLLECTING DEVICE, AND RFID DATA COLLECTION SYSTEM
20230274107 · 2023-08-31 ·

To provide a safe RFID data collecting device and an RFID data collection system with which there is no leakage of information being written to an RFID tag or information being read from the RFID tag, even if communication with the RFID tag is intercepted. This RFID data collecting device includes an RFID reader 10, a wired and wireless LAN connecting unit 20, a portable telephone communication unit 30, and a system control unit 40 including a processor 41 and a memory 42, wherein: the system control unit 40 is provided with a common key system encryption/decryption function; data written to an RFID tag 80 are encrypted before being written; data read from the RFID tag 80 are decrypted after being read; and a common key for encryption/decryption is saved in a SIM card 32 provided in the portable telephone communication unit.

MONITORING FOR SECURITY THREATS ASSOCIATED WITH MOBILE DEVICES THAT HAVE BEEN IDENTIFIED AND LOGGED
20220167170 · 2022-05-26 ·

A system includes a database, a sensor, and a hardware processor communicatively coupled to the sensor. The database stores an identifier assigned to a mobile device. The presence of the identifier in the database indicates that a user of the mobile device is associated with a security breach. The mobile device is configured to transmit the identifier over a wireless network. The sensor has a range and is configured to obtain the identifier transmitted by the mobile device when the mobile device is located within the range. The hardware processor receives the identifier from the sensor. The processor also determines that the identifier is stored in the database. In response to determining that the identifier is stored in the database, the processor initiates a security protocol.

NEAR FIELD COMMUNICATION INFORMATION SHARING
20220164899 · 2022-05-26 ·

A user information sharing system and method provide instantaneous contact-free communication of a providing user's information with another user through use of an electronically readable tag employing proximity communications, such as a near field communications (NFC), or through an interface, such as a quick response (QR) code interface. A portable electronic device of a receiving user may include a processor configured to receive information from such a tag or interface and, in response, request information from a system or server that stores information related to a user associated with the tag. Such information may include information typically found on a business card, social media profile(s), or other information the providing user wishes to share.

Delivery of Bioactive Molecules in Protective Coatings or Surface Layers of Organically Enhanced Inorganic Fertilizers

The invention is directed to fertilizers and manufacturing methods using organically enhanced inorganic fertilizer granules that incorporate a coating of one or more layers containing a bioactive agent in a carrier. The bioactive agent may be an herbicide, pesticide, plant growth regulator, microorganism, or beneficial element. Manufacture of conventional fertilizers involves stresses such as pH, heat, and pressure that are overcome by providing a protective carrier that facilitates and extends functional survival/effectiveness. Many carriers, such as liquefied dried milk, bind actively to the granule surface and contribute to the total carbon base. The release of the bioactive agent from the coating and or the surface of the fertilizer granule preferably results in a two-phased release, a first fast release and a second extended or slow-release into the soil metering the bioavailability of the bioactive agent for crop growth or protection, and/or for controlling unwanted vegetation or pests.

Method and device for detecting unauthorized tranfer between persons
11341393 · 2022-05-24 ·

A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.

Systems and methods for delivery of online orders

A method for delivering online orders to customers via a fully unmanned system includes replenishing the pod by using inventory carriers carrying containers via a replenishment hatch, moving an inventory carrier attached to carrier base with a mobile robotic unit in a room of adequate temperature. Additionally, the method includes transferring an inventory carrier at a mini load station and loading the order containers on a delivery carrier. The method further includes transferring a delivery carrier and attaching it to a delivery hatch so that the customer, following authentication, is able to pull the drawers and pick the ordered items.

Consumable characteristic identification

A consumable characteristic identification method is provided. The method comprises the following steps: detecting a consumable package (210); identifying a characteristic about a consumable associated with the consumable package (215); modifying a device setting according to the identified characteristic (220); and appending a log entry associated with the consumable package to a user activity log (225). A consumable characteristic identification apparatus and no-transitory machine-readable storage medium are also provided.