G06K7/01

ENCODED INFORMATION READING TERMINAL WITH USER-CONFIGURABLE MULTI-PROTOCOL WIRELESS COMMUNICATION INTERFACE

An apparatus may include a microprocessor and a wireless communication interface configured to perform at least one of receiving a first radio signal or transmitting a second radio signal. The microprocessor may be configured to execute at least one of a base-band encoder software program or a base-band decoder software program. The apparatus may be further configured to execute a wireless communication protocol selector software program that may be configured to optimize a value of a user-defined criterion in order to dynamically select at least one of a wireless communication network, a wireless communication protocol, and a parameter of a wireless communication protocol.

ENCODED INFORMATION READING TERMINAL WITH USER-CONFIGURABLE MULTI-PROTOCOL WIRELESS COMMUNICATION INTERFACE

An apparatus may include a microprocessor and a wireless communication interface configured to perform at least one of receiving a first radio signal or transmitting a second radio signal. The microprocessor may be configured to execute at least one of a base-band encoder software program or a base-band decoder software program. The apparatus may be further configured to execute a wireless communication protocol selector software program that may be configured to optimize a value of a user-defined criterion in order to dynamically select at least one of a wireless communication network, a wireless communication protocol, and a parameter of a wireless communication protocol.

Method for authenticating a three-dimensional signature
11556629 · 2023-01-17 ·

An authentication method involves comparing a 2D description of an authentication device, referred to as a subsequent description, with an original 2D description by choosing, from several previously established original 2D descriptions, a 2D description established from a point of view similar to the one used to establish the subsequent 2D description. Advantageously, the optical characteristics of the authentication device vary so little when it is viewed from neighboring points of view that the device can be recognized from most of the points of view, and the original 2D descriptions have been established from neighboring points of view, which form a substantially continuous domain. In an improved version, a three-dimensional description of the authentication device, referred to as a 3D description, is reconstructed from several original 2D descriptions, which makes it possible to predict the appearance thereof from a plurality of different points of view.

System to identify vulnerable card readers

Example embodiments relate to a network-based vulnerability detection system configured to access a database of customer transaction data corresponding to a set of card readers that includes transaction codes, receive an identification of a set of compromised card readers among the set of card readers, identify common transaction codes within the transaction data of the set of compromised card readers, and correlate the common transaction codes to one or more instances of fraud associated with the compromised set of card readers. In some example embodiments, the vulnerability detection system may be applied to monitor one or more card readers, receive transaction data corresponding to transaction conducted through the card readers, identify the common transaction codes correlated to the instances of fraud, and cause display of a notification that includes an indication of the instance of fraud at a client device.

System to identify vulnerable card readers

Example embodiments relate to a network-based vulnerability detection system configured to access a database of customer transaction data corresponding to a set of card readers that includes transaction codes, receive an identification of a set of compromised card readers among the set of card readers, identify common transaction codes within the transaction data of the set of compromised card readers, and correlate the common transaction codes to one or more instances of fraud associated with the compromised set of card readers. In some example embodiments, the vulnerability detection system may be applied to monitor one or more card readers, receive transaction data corresponding to transaction conducted through the card readers, identify the common transaction codes correlated to the instances of fraud, and cause display of a notification that includes an indication of the instance of fraud at a client device.

System and method for bulk RFID tag encoding

A method for bulk encoding of RFID tags. The method may include printing a plurality of unencoded RFID labels, coupling each of the plurality of unencoded RFID labels to each of a plurality of products, packaging like products from the plurality of products coupled with the unencoded RFID labels together in a container, scanning the container holding the products with an RFID antenna, and encoding each of the unencoded RFID labels coupled to each of the plurality of like products in a container simultaneously with identical information for each container.

System and method for bulk RFID tag encoding

A method for bulk encoding of RFID tags. The method may include printing a plurality of unencoded RFID labels, coupling each of the plurality of unencoded RFID labels to each of a plurality of products, packaging like products from the plurality of products coupled with the unencoded RFID labels together in a container, scanning the container holding the products with an RFID antenna, and encoding each of the unencoded RFID labels coupled to each of the plurality of like products in a container simultaneously with identical information for each container.

Imaging device and calibration method

To obtain an imaging device that can improve temperature detection accuracy. An imaging device of the present disclosure includes a processing unit formed on a first semiconductor substrate and capable of performing predetermined image processing on the basis of image data obtained by an imaging unit, a temperature sensor formed on the first semiconductor substrate and capable of generating a detection signal according to a temperature, and a first pad electrode formed on the first semiconductor substrate and electrically insulated from a circuit formed on the first semiconductor substrate.

Imaging device and calibration method

To obtain an imaging device that can improve temperature detection accuracy. An imaging device of the present disclosure includes a processing unit formed on a first semiconductor substrate and capable of performing predetermined image processing on the basis of image data obtained by an imaging unit, a temperature sensor formed on the first semiconductor substrate and capable of generating a detection signal according to a temperature, and a first pad electrode formed on the first semiconductor substrate and electrically insulated from a circuit formed on the first semiconductor substrate.

Serialization of RFID tags
09846832 · 2017-12-19 · ·

Various exemplary embodiments relate to a method performed by an RFID tag, the method including: receiving a request for a EPC serial number; determining whether the EPC serial number has a preset value; when the EPC serial number has the preset value, mapping a transponder ID to the EPC serial number; and providing the EPC serial number in response to the RFID read request.