G06K19/0725

Wireless access tag system and method
12111905 · 2024-10-08 · ·

A wireless access method, device and system is disclosed that enables remote dynamic configuration of wireless devices which emulate wireless tags, while maintaining compatibility with prior art access systems. This enables wireless tags to be shared in a manner that allows copies of the tags to remain synchronised with each other. The system includes a remote server, configured to selectively provide tag data to the wireless devices to enable the wireless devices to emulate the one or more wireless tags using the selectively provided tag data. In use, the wireless tags are configured to first retrieve tag data from the remote server, and subsequently emulate one or more wireless tags according to the retrieved tag data.

SYSTEMS AND METHODS FOR CAPTURING VISIBLE INFORMATION
20180260678 · 2018-09-13 · ·

A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.

SYSTEMS AND METHODS FOR CAPTURING VISIBLE INFORMATION
20180260679 · 2018-09-13 · ·

A transaction card construction and computer-implemented methods for a transaction card are described. The transaction card has vector-formatted visible information applied by a laser machining system. In some embodiments, systems and methods are disclosed for enabling the sourcing of visible information using a scalable vector format. The systems and methods may receive a request to add visible information to a transaction card and capture an image of the visible information. The systems and methods may capture data representing the image. The systems and methods may also determine an ambient color saturation of the image. Further, systems and methods may translate the image based on the ambient color saturation of the image. The systems and methods may also map the translated image to a bounding box and convert the mapped image into vector format. In addition, the systems and methods may provide the converted image to a laser machining system.

Successive memory writes in an RFID interrogator

A high speed tabletop and industrial printer is disclosed with integrated high speed RFID encoding and verification at the same time. The industrial printer simultaneously prints on and electronically encodes/verifies RFID labels, tags, and/or stickers attached to a continuous web. The industrial printer comprises a lighted sensor array for indexing the printing to the RFID tags; and a cutter powered from the industrial printer for cutting the web that the RFID tags are disposed on. The industrial printer comprises two RFID reader/writers that are individually controlled. Specifically, one of the RFID reader/writers comprises the ability to electronically encode the RFID tags while the web is moving; and the second RFID reader/writer uses an additional RFID module and antenna on the printer for verifying the data encoded to the RFID tags. The printer provides for successive writes to various memory blocks and optimizes the communication sequence between the interrogator and tag.

System and method for implementing a host card emulation (HCE) command stack in a mobile phone

A method for implementing a host card emulation (HCE) service in a remote near field communication (NFC) device is provided. In the method, a first command application protocol data unit (APDU) is received at the remote NFC device from an NFC reader. A first response to the first command APDU is computed. A second command APDU from the NFC reader is predicted that is likely to follow receipt of the first command APDU from the NFC reader. A second response to the predicted second command APDU is computed. A third command APDU is received from the NFC reader. It is determined if the prediction of the second command APDU matches the third command APDU. If the second and third command APDUs match, then the computed second response is send directly to the NFC reader without having to traverse a NFC stack.

Systems and methods for emulating RFID transponders of a plurality of medical devices

A radio frequency identification (RFID) network is presented including a plurality of medical devices each including an RFID transponder and a single RFID transponder emulator configured to emulate functionality of each of the RFID transponders of the plurality of medical devices. The RFID network further includes a plurality of RFID interrogation devices configured to operatively communicate with the single RFID transponder emulator. The single RFID transponder emulator is used for development, testing, evaluation, and validation of each of the plurality of RFID interrogation devices.

MANAGEMENT, AUTHENTICATION AND ACTIVATION OF A DATA CARRIER

A method in a system comprising at least one portable data carrier, an authentication server and at least one reading device of at least one service provider which is couplable to the authentication server. The data carrier is adapted to communicate contactlessly with the reading device and comprises a security marking which can be read contactlessly by the reading device and on the basis of which the data carrier can be authenticated by the authentication server. The method comprises the step of equipping the data carrier with a data-carrier management marking that encodes a piece of data-carrier management information and readable contactlessly by a portable terminal. The method includes contactlessly reading out the data-carrier management marking by a portable terminal, transferring the data-carrier management information encoded in the data-carrier management marking to the authentication server, and managing the data carrier in the system employing the data-carrier management information.

SENSE STIMULATING ARTEFACT

Described herein is an artefact (100) relating to a product including a contactless memory tag (120), CMT, containing at least an identifier of the product, and a sensory stimulation element (140), SSE, reflecting a characteristic of the product. Method for preparing the artefact (100) including: identifying a sensory property of the product, incorporating a sample of the sensory property into the SSE (140), providing the CMT (120), wherein the memory contains an identifier of the product, and providing the artefact (100) containing the SSE (140) and CMT (120).

DETECTION DEVICE AND METHOD OF USING THEREOF
20180218249 · 2018-08-02 · ·

A detection device includes a first antenna configured to receive a first radio wave transmitted from an external device, a second antenna configured to receive the first radio wave transmitted from the external device, and transmit a second radio wave to the external device; and a chip configured to obtain a comparison result between a first electromotive force generated by the first radio wave received by the first antenna and a second electromotive force generated by the first radio wave received by the second antenna, and to send the comparison result to the external device through the second radio waive. When the first antenna is disposed closer than the second antenna to a place where the existence of moisture is to be detected, a change of the first electromotive force is greater than a change of the second electromotive force in response to the existence of moisture.

Cards and devices with multifunction magnetic emulators and methods for using same

A payment card (e.g., credit and/or debit card) is provided with a magnetic emulator operable of communicating information to a magnetic stripe reader. Information used in validating a financial transaction is encrypted based on time such that a validating server requires receipt of the appropriate encrypted information for a period of time to validate a transaction for that period of time. Such dynamic information may be communicated using such an emulator such that a card may be swiped through a magnetic stripe readeryet communicate different information based on time. An emulator may receive information as well as communicate information to a variety of receivers (e.g., an RFID receiver).