H04Q5/22

REDUCTION OF UNMODULATED AMBIENT BLOCKERS IN REFLECTED DATA LINKS THROUGH MANIPULATION OR REPLICATION OF THE TRANSMITTING SIGNAL SOURCE

Communication between a wireless base-station and a microwave reflector link are enhanced by feeding back a portion of the transmitter signal, adjusted for phase and amplitude, to cancel ambient reflection blocker signals being received at the base-station. The microwave reflector link does not utilize a transmitter gain stage, but communicates data back to the base-station in response to modulating the reflections of its antenna (e.g., in gain and/or phase). The disclosure aids in the proper amplification and processing of reflection signals from the microwave reflector link, by canceling out the blocking signals which arise as background objects reflect transmitter signal energy back to the base-station.

Business transactions over portable electronic devices with social media filters
09779404 · 2017-10-03 · ·

System and methods for conducting wireless mobile business transactions on electronic hand-held device are disclosed. The electronic hand-held device comprises a dedicated communication component, a social media filter, and at least one functional identifier. The dedicated communication component communicates with at least one transceiver when the electronic hand-held device is located within a predetermined proximity of the at least one transceiver. The social media filter filters good or service offerings based on a user's desire. The at least one functional identifier is activatable for at least one good or service by a user when the communication is established between the electronic hand-held device and the at least one transceiver and a business transaction for the at least one good or service is initiated on the application server in a secure, user-authorized manner. The business transaction for the at least one good or service is authenticated by a social media provider.

RADIO BASE STATION AND SYSTEM HAVING SAID RADIO BASE STATION
20170279481 · 2017-09-28 ·

The invention relates to a base station or a radio access point having a plurality of radio modules, of which one communicates with electronic price indication signs. If a plurality of radio modules use the same frequencies and communicate simultaneously, disturbances can occur in the form of interference. The invention solves this problem in that the radio modules (21, 22, 23) are coupled (24) such that a radio module (22) can influence another radio module (21, 23) with regard to the radio activity of said other radio module. In particular, the radio module that communicates with the electronic price indication signs (22) can silence the other radio modules (21, 23) by means of a radio activity control signal (FS).

Ultra-high-frequency, UHF, radio frequency identification, RFID, reader

In one embodiment a UHF RFID reader is adapted to operate in either a reader mode or in a tag emulation mode, wherein in the reader mode the UHF RFID reader communicates with at least one RFID tag to access the at least one tag's memory contents and in the tag emulation mode the UHF RFID reader communicates with at least one other UHF RFID reader to share memory content with the at least one other UHF RFID reader. Furthermore, an RFID network and a method for communication in an RFID network are described.

Silent RFID state and restore back
09740894 · 2017-08-22 · ·

Silent radio frequency identifier (RFID) state and restore back is described herein. An RFID tag enters a silent state by receiving a sleep command from an RFID reader. While the RFID tag is in the silent state, only an awake command will restore back normal operation of the RFID tag. Other received commands or interrogations from the RFID reader are ignored and responses are not transmitted to the RFID reader.

Electronic device, user input apparatus controlling the same, and control method thereof

An electronic device executing an application through communication with a user input apparatus, the electronic device is provided. The electronic device includes: a communication unit that is configured to communicate with the user input apparatus; an information generation unit that generates information about an exclusive controller that controls the application and is executed in the user input apparatus; and a controller that controls the information generation unit to generate the information about the exclusive controller when the electronic device is paired with the user input apparatus, and controls the communication unit to transmit the generated information about the exclusive controller to the user input apparatus.

Method for preventing unauthorized diversion of NFC tags

A method, system and apparatus for pairing authorized NFC enabled RFID devices with an intended object or product. The method, system and apparatus can include a primary RFID with a radio frequency identification chip, a coil antenna, a bridge and a substrate; an association of the at least primary RFID device with an object; an integration of a material into one of the at least primary RFID device and the object that provides the RFID device with a predetermined resonant frequency; and the detuning of one or more secondary communication devices located proximate the RFID device.

Method and apparatus for secure asset tracking
09734480 · 2017-08-15 · ·

An approach is provided for providing a secure and energy efficient method of asset tracking using BLE tags. The security module determines identification criteria associated with at least one scanning device. The security module processes and/or facilitates a processing of the identification criteria to cause, at least in part, a transmission of at least one scan response to the at least one scanning device including, at least in part, asset data associated with at least one tag. The security module causes, at least in part, a modification of one or more advertising packets of the at least one tag based, at least in part, on the transmission of the asset data.

Tamper credential

Readers are associated with a number of access credentials and, once authenticated by the reader, may grant the holder of the access credential access to a secured asset. Readers may become the target of attack, such as when an unauthorized party attempts to gain access to the interior of the reader or removes the reader from an installed location. Once removed the reader may be reinstalled in another location or a counterfeit reader used in its place. By providing a paired tamper credential, the reader may deny otherwise authorized access to the secured asset if the tamper credential fails to respond appropriately. The tamper credential may fail to respond due to distance, such as when the reader alone is relocated, or the tamper credential is damaged, such as during an attempt to gain access the interior of the reader and/or remove the reader from its installed location.

System and method for tracking

A tracking system comprising: a transmitter configured to steer an RF beam across a detection range, a passive RFID tag configured to be enabled for locating substantially when located in the center of the RF beam of the transmitter, and an RFID reader configured to detect the tag 104 once enable.