H04Q2213/13095

Intelligent wireless communications for continuous analyte monitoring

Various embodiments relate generally to continuous monitoring of analyte values received from an analyte sensor system. In some example embodiments, there is provided a method that includes receiving sensor information, calculating and storing estimated analyte measurement values based upon the received sensor information. The method also includes determining one or more communication conditions, and instructing a transceiver to advertise to a first display device in accordance with one or more communication variables based upon the one or more communication conditions. The method then transmits the estimated analyte measurement values to the at least first display device. Related systems, methods, and articles of manufacture are also described.

Pin encoded mode selection system

A method and apparatus can include: audio interface pins coupled to swappable connections including a BCLK, an LRCLK, a DIN, and a DOUT; a BCLK determiner configured to identify the BCLK as the swappable connection with a highest frequency; an LRCLK determiner configured to: measure cycle lengths, compare the cycle lengths to a pre-defined multiple, identify the LRCLK as the swappable connections, and output an association between the LRCLK and one of the audio interface pins; and a mode determiner configured to identify and output a mode based on the association of the BCLK to the audio interface pins and the association of the LRCLK to the audio interface pins.

BEVERAGE DISPENSE VALVE CONTROLLED BY WIRELESS TECHNOLOGY

Methods and systems directed to dispensing fluids, such as beverages, using wireless technology are provided. Aspects relate to a beverage dispenser with a dispensing system housing, a valve housing positioned exterior to the dispensing system housing and extending from the dispensing system housing. The valve housing may be configured to dispense a beverage and include self-contained electronics disposed within an interior area of the valve housing. In some embodiments, the beverage dispenser has one or more additional valve housings positioned exterior to the dispensing system housing. The valve housing may be configured to dispense a beverage and include self-contained electronics disposed within an interior area of the valve housing.

Exit-code-based RFID loss-prevention system

Methods and systems are described for authorizing an item with an RFID tag to leave a facility. In one embodiment, a mobile device receives or determines an exit code (EC) to write into the tag in response to providing authorizing information. The EC may be based on information stored in the tag such as the tag's item identifier or other tag information (collectively an item identifier or II), a ticket value, other information such as the OC, a mobile identity or location, or any other suitable information. Upon verification of the EC, the tagged item is allowed to leave the facility. In another embodiment, the mobile device stores an item identifier (II) associated with the tag and provides authorizing information. Upon verifying the authorizing information and confirming that the stored II corresponds to the tagged item's II, the tagged item is allowed to leave the facility.

TECHNIQUES FOR CALL AUTHENTICATION

Various embodiments described herein are directed towards authenticating calls by using one or more keys associated with a specific user. In examples, the user is the sender of a call. In various embodiments, when a call is made, an identifying payload is encrypted using a private key associated with the user. The encrypted identifying payload is appended to the call data stream. The identifying payload may be decrypted with a public key. In embodiments, the identifying payload may be verified. In various embodiments, further authentication methods may be performed by using an object such as a contactless card to provide one or more components of the identifying payload and/or keys. In embodiments, a connection may be made between the sender and the intended recipient of a call based on the verification of the identifying payload.

Enhanced communication platform and related communication method using the platform

Pre-authorized communication services and/or transactions are provided via a plurality of networks in response to a request received from a user to provide at least one of a communication service, a transaction and user account information via a plurality of networks of different types. Prior to processing the request, there is verification of the user's authorization to receive the at least one of the communication service, the transaction, and the user account information, and that an account associated with the user has a sufficient amount currently available for payment of the at least one of the communication service and the transaction. After verification, an authorized account associated with the user is charged in real time as the at least one of the communication service and the transaction is provided.

Conjoined Class-Based Networking
20200314957 · 2020-10-01 · ·

A data communication network includes two logically distinct class-based networks conjoined by at least one common node that has membership in each of the respective classes of the two logically distinct class-based networks. Optionally, three or more class-based networks may be conjoined to form a data communications network.

WIRELESS POWER SYSTEMS INCLUDING DETERMINATION OF CHANNEL TRANSFER FUNCTION FROM BACKSCATTER SIGNALS

Examples described herein utilize a backscatter signal provided by a wirelessly powered device to estimate channel information, (e.g., a channel transfer function) between the wirelessly powered device and a transmitter system. The channel information may be used to optimize MIMO power transfer for linear as well as nonlinear backscatter devices. Examples of die method may shift some or all of the power cost and complexity of coherent channel measurements from the WFD to the transmitters), and allow WPT optimization to milliwatt- or microwatt-class wirelessly powered devices.

Systems and Methods to Determine Motion Parameters using RFID Tags
20200242312 · 2020-07-30 ·

Systems and methods to determine motion parameters of physical objects using radio frequency identification (RFID) tags attached to the objects. In one embodiment, a method implemented in a radio frequency identification (RFID) system includes determining a motion parameter of the RFID tag based on detecting a Doppler frequency shift in a radio frequency signal received from the RFID tag.

Proxy-based reader authentication by trusted authority

A Radio Frequency Identification (RFID) system including an RFID reader and a reader proxy authenticates itself to a verification authority. The proxy receives a proxy challenge from a verification authority and determines a proxy response based on the proxy challenge and a proxy key known to the proxy. The proxy response is then sent to the verification authority along with an identifier for the reader. The reader then authenticates an RFID tag by sending a tag response to the verification authority, which determines whether the reader is authentic based on the authenticity of the proxy response.