A2B Tracking Solutions, Inc.
A2B Tracking Solutions, Inc. Patent applications | ||
Patent application number | Title | Published |
---|---|---|
20130257594 | Secure asset tracking system - An asset tracking technology wrings from a scan, event, location, and personal data in combination, immense mounds of useful information about the assets by interacting this information with Points of Data via cloud processing and analytics. The system tracks each asset at each location starting at its initial location and thereafter at each succeeding location, including time taken and steps involved as reported by each player in the supply chain. Each asset and each critical embedded component has a tag or mark that uniquely identifies it. Each tag is registered in a cloud-hosted database. Each sending and each receiving location will input the tag information with a scanner. This data flowing from the tracking model is transmitted to the cloud-hosted database for processing using Big Data Analytics techniques and artificial intelligence expert systems tools to determine the probably of a deviation from a normative established by the expert system based on the collected data. | 10-03-2013 |
20100077116 | System for processing code data - A software application that is installed in a commercially available processor, which application; identifies a keystroke data stream as derived from a code pattern, stores the pattern in system memory, validates the data stream, extracts user identified fields, adds prefixes and suffixes to the fields, and transmits identified fields to the processor operating system as a keystroke emulating data stream. The DOD UID code, and other similar codes, specifies a lead character or characters as a code identifier. When the application of this invention detects this code identifying lead character it directs the processor operating system to store the character and subsequent characters in the system memory rather than process them as entries from a keyboard. The application sets a timer as each character is received. As long as the timer does not time out, each successive character in the stream is treated as part of the code data until a code specified end of data character is detected. | 03-25-2010 |