G06K7/10227

PROJECTION DEVICE
20170290131 · 2017-10-05 · ·

A projection device comprises a light source, a first attenuator and a second attenuator, a first driver, a second driver, a light receiving element, and a controller. The light source emits light. The first attenuator and the second attenuator attenuate intensity of the light from the light source. The first driver drives the first attenuator. The second driver drives the second attenuator. The light receiving element receives the light distributed by the second attenuator. The controller controls the second driver to control the distribution ratio of the light distributed to the light receiving element by the second attenuator according to control of transmissivity of light at the first attenuator by the first driver.

Data collection system having reconfigurable data collection terminal

There is provided in one embodiment a data collection system including a data collection terminal having an encoded information reader device and a computer spaced apart from the data collection terminal. The data collection terminal in one embodiment can be configured to be responsive to configuration data expressed in an extensible markup language.

RFID-tag reading/writing method and reading/writing device
09734364 · 2017-08-15 · ·

An RFID-tag reading/writing method and reading/writing device improves processing efficiency of wireless data communication and of lowering an error rate of the reading/writing processing while a RFID tag 11 is being transferred are provided. Paying attention to the wireless data communication conducted with the RFID tag 11 along a plurality of device antennas provided on a transfer path 18 of the RFID tag 11, a reading/writing processing time is calculated based on a length of the device antenna faced with an RFID antenna 15 along a direction of the transfer path 18 and a transfer speed of the RFID tag 11 on the transfer path 18, and the wireless data communication is sequentially executed within the reading/writing processing time while the RFID tag 11 is being transferred between a first device antenna 19, a second device antenna 21 or a third device antenna 23 sequentially provided as device antennas on the transfer path 18 from the upstream side toward the downstream side and the RFID tags 11.

Device for retrieving data from wireless devices based on mapping of read request priorities
09729458 · 2017-08-08 · ·

Embodiments of the present invention include systems and methods for providing Quality of service to RFID. In one embodiment the present invention includes a method of providing quality of service in an RFID network comprising storing RFID priority information corresponding to the RFID network, wherein the RFID network comprises one or more tags and one or more readers mapping the RFID priority information into priority information corresponding to a second network.

Modulation index (depth) based grouping, addressing, and fingerprinting RFID tags
09727763 · 2017-08-08 · ·

A method of addressing one or more RFID devices within a group of RFID devices includes transmitting a command to respond to the group at a first modulation depth. The method further includes receiving a response from a first sub-group of RFID devices in the group that have a minimum modulation depth less than or equal to the first modulation depth. The method further includes transmitting the command to respond to the group at a second modulation depth higher than the first modulation depth. The method further includes receiving a response from a second sub-group of RFID devices within the group that have a minimum modulation depth less than or equal to the second modulation depth. The method is also directed to authenticating RFIDs by comparing a measured minimum modulation depth to a known minimum modulation depth.

Systems and methods using single antenna for multiple resonant frequency ranges
11238248 · 2022-02-01 · ·

A radio frequency device utilizing an antenna having a single antenna structure resonant on multiple resonant frequency ranges. The antenna can be configured to operate within multiple frequency ranges for communication according to respective protocols associated with the respective frequency ranges.

Improved method and infrastructure for the duplication of keys
20210370457 · 2021-12-02 ·

A method of obtaining a copy key includes the steps of acquiring characteristic parameters of the original using a detection system; identifying operating instructions to reproduce the characteristic parameters so acquired; requiring authorization to load into a duplicating machine and/or use by a duplicating machine the operating instructions for creating the copy key; only if the authorization is given, loading the operating instructions into the duplicating machine and/or making the operating instruction available for use by the duplicating machine; controlling the duplicating machine so as to obtain, on the basis of the operating instructions previously loaded and/or made available, at least one copy key; and after the at least one copy key is obtained, removing the operating instructions from the duplicating machine.

Controlling access to barcode-reading functionality

The disclosure concerns systems and methods for controlling access to a device with barcode-reading functionality. Enabling the barcode-reading functionality of the device may require providing authenticating information. A user may provide the authenticating information using an identification card with an embedded near field communication (NFC) tag. After the device or a charger of the device validates the embedded NFC tag, the device may enable the barcode-reading functionality but track an amount of time since a last barcode scan of the device. If the amount of time since the last barcode scan reaches a present period, the device may disable the barcode-reading functionality. The device may send a connection request from a portion of a local area network (LAN). A server may receive the request. The server may deny the device access to the LAN if the device is not authorized for use in the portion of the LAN.

Method and infrastructure for the duplication of keys
11351645 · 2022-06-07 ·

A method of obtaining a copy key includes the steps of acquiring characteristic parameters of the original using a detection system; identifying operating instructions to reproduce the characteristic parameters so acquired; requiring authorization to load into a duplicating machine and/or use by a duplicating machine the operating instructions for creating the copy key; only if the authorization is given, loading the operating instructions into the duplicating machine and/or making the operating instruction available for use by the duplicating machine; controlling the duplicating machine so as to obtain, on the basis of the operating instructions previously loaded and/or made available, at least one copy key; and after the at least one copy key is obtained, removing the operating instructions from the duplicating machine.

Configuring Security Tags Based on Directions of Movement of Products Associated with the Security Tags
20230274106 · 2023-08-31 ·

In some implementations, a device may configure security tags. The device may receive, from one or more cameras associated with the device, image data associated with a product moving through a scanning zone of the device. The device may determine, based on the image data, a direction of movement associated with the product moving through the scanning zone of the device. The device may configure, via a reader of the device and based on the direction of movement associated with the product, a setting of a security tag associated with the product.