Patent classifications
H04Q2213/13095
Method and apparatus for secure asset tracking
An approach is provided for providing a secure and energy efficient method of asset tracking using BLE tags. The security module determines identification criteria associated with at least one scanning device. The security module processes and/or facilitates a processing of the identification criteria to cause, at least in part, a transmission of at least one scan response to the at least one scanning device including, at least in part, asset data associated with at least one tag. The security module causes, at least in part, a modification of one or more advertising packets of the at least one tag based, at least in part, on the transmission of the asset data.
METHOD AND DEVICE FOR ADJUSTING SIGNALLING OF A FIELD DEVICE
A method and a user device (10) for adapting a signaling of the field device (100) that can be displayed via a signal display (102) of a field device (100) are proposed. For this purpose, an user device (10) is used to define a color tone of at least one display element (104) of the signal display (102) of the field device (100), an attribute is assigned to the defined color tone of the at least one display element (104) of the signal display (102), wherein the attribute represents a meaning of the determined color tone for indicating a state of the field device (100), and a control signal is transmitted from the user device (10) to the field device (100), wherein the control signal contains information regarding the determined color tone and regarding the attribute associated with the determined color tone.
SENSOR FOR ABSORBENT ARTICLE
An absorbent structure, including a sensor system, can sense and measure the level of wetness contained within the absorbent structure as well as sense and measure environmental conditions. The sensor system may include passive RFID sensors or tags, RFID readers, antenna, a tuning module, a processing module, a memory module and a wireless communication module. The absorbent structure may further include two or more sensors, with a first sensor placed in a first area most likely to first be exposed to liquid and a second sensor spaced apart from the first sensor in an area likely to be exposed to liquid only after the absorbent structure has become more saturated.
TECHNIQUES FOR CALL AUTHENTICATION
Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.
INTELLIGENT WIRELESS COMMUNICATIONS FOR CONTINUOUS ANALYTE MONITORING
Various embodiments relate generally to continuous monitoring of analyte values received from an analyte sensor system. In some example embodiments, there is provided a method that includes receiving sensor information, calculating and storing estimated analyte measurement values based upon the received sensor information. The method also includes determining one or more communication conditions, and instructing a transceiver to advertise to a first display device in accordance with one or more communication variables based upon the one or more communication conditions. The method then transmits the estimated analyte measurement values to the at least first display device. Related systems, methods, and articles of manufacture are also described.
Sensor for absorbent article
An absorbent structure, including a sensor system, can sense and measure the level of wetness contained within the absorbent structure as well as sense and measure environmental conditions. The sensor system may include passive RFID sensors or tags, RFID readers, antenna, a tuning module, a processing module, a memory module and a wireless communication module. The absorbent structure may further include two or more sensors, with a first sensor placed in a first area most likely to first be exposed to liquid and a second sensor spaced apart from the first sensor in an area likely to be exposed to liquid only after the absorbent structure has become more saturated.
Techniques for call authentication
Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.
Techniques for call authentication
Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.
Systems and Methods to Determine Motion Parameters using RFID Tags
Systems and methods to determine motion parameters of physical objects using radio frequency identification (RFID) tags attached to the objects. In one embodiment, a method implemented in a radio frequency identification (RFID) system includes determining a motion parameter of the RFID tag based on detecting a Doppler frequency shift in a radio frequency signal received from the RFID tag.
Systems and methods to determine motion parameters using RFID tags
Systems and methods to determine motion parameters of physical objects using radio frequency identification (RFID) tags attached to the objects. In one embodiment, a method implemented in a radio frequency identification (RFID) system includes determining a motion parameter of the RFID tag based on detecting a Doppler frequency shift in a radio frequency signal received from the RFID tag.