Patent classifications
H04Q2213/13095
RADIO FREQUENCY NOISE MANAGEMENT
A payment terminal has a clock management unit for providing clock signals to components of the payment terminal. The payment terminal also has a wireless communication interface for communicating wireless signals. A processing unit of the payment terminal may monitor clock signals provided by the clock management unit and determine a phase and frequency difference between a clock signal provided to a component producing RF noise and a clock signal provided to a wireless communication interface of the payment terminal. When RF noise present in the received wireless signal falls below a threshold, the processing unit may sample the received wireless signal.
Systems and methods to determine motion parameters using RFID tags
Systems and methods to determine motion parameters of physical objects using radio frequency identification (RFID) tags attached to the objects. In one embodiment, a method implemented in a radio frequency identification (RFID) system includes determining a motion parameter of the RFID tag based on detecting a Doppler frequency shift in a radio frequency signal received from the RFID tag.
ENHANCED COMMUNICATION PLATFORM AND RELATED COMMUNICATION METHOD USING THE PLATFORM
- Simon James Joyce ,
- Prafulla C. Gupta ,
- Manohar Sitaram Vaidya ,
- Rajesh Alla ,
- Ashok Kumar Reddy Eanuga ,
- Sreeramamurty Ayalasomayajula ,
- Richa Gupta ,
- Alok Kaushal ,
- Varma Laxmi Jagannadha Siva Kumara Jampana ,
- Prasad Naganianeya Vara Undavalli ,
- Kondal Rao Nallajerla ,
- Sivaramayya Bonagiri ,
- Krishna Mohan Sistla ,
- Amba Prasad Gudipati ,
- Biswajit Sundar Ray ,
- Raghuram Govindacharyula ,
- Penumatsa Janakirama ,
- Veerabhadra Rao Kalluri ,
- Ravi Devi Venkata Sathi ,
- Ramkumar Katchapeswaran Mambakkam ,
- Surya Sekhar Lakshmi Velpuri ,
- Bhanu Murthy Nallagonda
Pre-authorized communication services and/or transactions are provided via a plurality of networks in response to a request received from a user to provide at least one of a communication service, a transaction and user account information via a plurality of networks of different types. Prior to processing the request, there is verification of the user's authorization to receive the at least one of the communication service, the transaction, and the user account information, and that an account associated with the user has a sufficient amount currently available for payment of the at least one of the communication service and the transaction. After verification, an authorized account associated with the user is charged in real time as the at least one of the communication service and the transaction is provided.
Set buffer state instruction
Input/output (I/O) operation requests from pageable storage mode guests are interpreted without host intervention. In a pageable mode virtual environment, requests issued by pageable storage mode guests are processed by one or more processors of the environment absent intervention from one or more hosts of the environment. Processing of the requests includes manipulating, by at least one processor on behalf of the guests, buffer state information stored in host storage. The manipulating is performed via instructions initiated by the guests and processed by one or more of the processors.
Conjoined class-based networking
A data communication network includes two logically distinct class-based networks conjoined by at least one common node that has membership in each of the respective classes of the two logically distinct class-based networks. Optionally, three or more class-based networks may be conjoined to form a data communications network.
ROTARY RFID SWITCH
Various methods and apparatus embodiments involving RFID are disclosed. One method embodiment, among others, includes receiving an excitation signal at a rotary switch associated with a plurality of radio frequency identification (RFID) tags and a radio frequency (RF) masking material, and orienting the RF masking material with respect to all RFID tags such that a RFID tag is rendered detectable by a nearby RFID reader.
Exit-code-based RFID loss-prevention system
Methods and systems are described for authorizing an item with an RFID tag to leave a facility. In one embodiment, a mobile device receives or determines an exit code (EC) to write into the tag in response to providing authorizing information. The EC may be based on information stored in the tag such as the tag's item identifier or other tag information (collectively an item identifier or II), a ticket value, other information such as the OC, a mobile identity or location, or any other suitable information. Upon verification of the EC, the tagged item is allowed to leave the facility. In another embodiment, the mobile device stores an item identifier (II) associated with the tag and provides authorizing information. Upon verifying the authorizing information and confirming that the stored II corresponds to the tagged item's II, the tagged item is allowed to leave the facility.
Proxy-based reader authentication by trusted authority
A Radio Frequency Identification (RFID) system including an RFID reader and a reader proxy authenticates itself to a verification authority. The proxy receives a proxy challenge from a verification authority and determines a proxy response based on the proxy challenge and a proxy key known to the proxy. The proxy response is then sent to the verification authority along with an identifier for the reader. The reader then authenticates an RFID tag by sending a tag response to the verification authority, which determines whether the reader is authentic based on the authenticity of the proxy response.
Enhanced communication platform and related communication method using the platform
- Simon James Joyce ,
- Prafulla C. Gupta ,
- Manohar Sitaram Vaidya ,
- Rajesh Alla ,
- Ashok Kumar Reddy Eanuga ,
- Sreeramamurty Ayalasomayajula ,
- Richa Gupta ,
- Alok Kaushal ,
- Varma Laxmi Jagannadha Siva Kumara Jampana ,
- Prasad Naganianeya Vara Undavalli ,
- Kondal Rao Nallajerla ,
- Sivaramayya Bonagiri ,
- Krishna Mohan Sistla ,
- Amba Prasad Gudipati ,
- Biswajit Sundar Ray ,
- Raghuram Govindacharyula ,
- Penumatsa Janakirama ,
- Veerabhadra Rao Kalluri ,
- Ravi Devi Venkata Sathi ,
- Ramkumar Katchapeswaran Mambakkam ,
- Surya Sekhar Lakshmi Velpuri ,
- Bhanu Murthy Nallagonda
Pre-authorized communication services and/or transactions are provided via a plurality of networks in response to a request received from a user to provide at least one of a communication service, a transaction and user account information via a plurality of networks of different types. Prior to processing the request, there is verification of the users authorization to receive the at least one of the communication service, the transaction, and the user account information, and that an account associated with the user has a sufficient amount currently available for payment of the at least one of the communication service and the transaction. After verification, an authorized account associated with the user is charged in real time as the at least one of the communication service and the transaction is provided.
SENSOR FOR ABSORBENT ARTICLE
An absorbent structure, including a sensor system, can sense and measure the level of wetness contained within the absorbent structure as well as sense and measure environmental conditions. The sensor system may include passive RFID sensors or tags, RFID readers, antenna, a tuning module, a processing module, a memory module and a wireless communication module. The absorbent structure may further include two or more sensors, with a first sensor placed in a first area most likely to first be exposed to liquid and a second sensor spaced apart from the first sensor in an area likely to be exposed to liquid only after the absorbent structure has become more saturated.