Class / Patent application number | Description | Number of patent applications / Date published |
340572400 | Specified processing arrangement for detected signal | 52 |
20080198015 | RFID SYSTEM - An RFID system including a battery powered RFID reader configured to detect an RFID tag. The RFID reader include a mounting surface configured to be affixed relative to an external structure, and is capable of being wirelessly coupled to a receiver for transmitting data to the receiver. | 08-21-2008 |
20080198016 | RFID SYSTEM - An RFID system and network including an RFID reader capable of detecting an RFID tag. The RFID system further includes an intermediate device configured to be wirelessly coupled to the RFID reader. A third device is configured to be coupled to the intermediate device for communicating with the RFID reader via the intermediate device. | 08-21-2008 |
20080198017 | Indentification of atennas via cables - A method is provided of identifying an antenna, by the steps of: providing the antenna with an identifying radiofrequency identification RFID circuit, connecting one end of a cable to the antenna, connecting the other end of the cable to a remote unit, sending a trigger signal to the RFID circuit, receiving by the remote unit via the cable a response signal from the RFID circuit, and decoding the response signal so as to identify the antenna. | 08-21-2008 |
20080198018 | EXPANDABLE, MODULAR COMMUNICATIONS APPARATUS WITH WIRELESS INTERCHANGEABLE DEVICE AUTHENTICATION - Communications systems and methods can include wide area network communication capabilities provided by a communications module or device and additional functionality provided by one or more interchangeable devices that interface with the communications module. One or more of the interchangeable devices can communicate with the communications module or device via a short range wireless signal, such as for example that of an RFID, WiFi, or Zigbee system. Authentication of the communication device in combination with the one or more interchangeable devices can be included to provide device compatibility and security verification. | 08-21-2008 |
20080204248 | RFID TAG MANAGEMENT AND OPERATION - In an example embodiment, an apparatus such as an RFID tag, is configured to operate in a first mode that allows the tag to associate with the network and receive configuration data and to operate in a second mode wherein the apparatus is not associated with the network. The apparatus sends announcement packets while in the second mode in accordance with the configuration data received while in the first mode of operation. | 08-28-2008 |
20080218350 | SYSTEM AND METHOD FOR OPTIMIZING RESOURCES IN A SUPPLY CHAIN USING RFID AND ARTIFICIAL INTELLIGENCE - A system and method for optimizing resources in a supply chain and production line using RFID and artificial intelligence which can be adapted to any supply chain or product line, including warehouses, and which is able to optimize a plurality of tools/machinery or processing stations, a plurality of products and even personnel in real time by analyzing real time information about the entities and historic information stored in databases about optimum decisions taken in the past by the system. | 09-11-2008 |
20080218351 | RFID TAG POWER CONSERVATION SYSTEM AND METHOD - Active multi-modal RFID tags, illuminator/tag/reader systems, circuit architecture and operational algorithms for battery power conservation that extends tag battery life from a typical 6 months to >5 years. The inventive system is particularly useful in asset and person tracking/inventory systems where power conservation is critical. The tag is configured with a micro-processor operational instruction set algorithm, modifiable on the fly via RF or IR, to synchronize a periodic tag awaken/sense envelope that overlaps the illuminator trigger pulse cycle and put the tag into deep, power conservation sleep for N periods of illuminator cycles. When the tag sees an illuminator signal with a different ID, or no illuminator signal at all, it transmits that anomaly via RF to a reader. This means the object or person with which the tag is associated has been moved out of the original illuminator field of view, permitting near real time investigation and tracking. | 09-11-2008 |
20080224873 | APPARATUS AND METHOD FOR DETECTING WAKE-UP BURST OF ACTIVE RFID TAG - An apparatus and method for detecting a wake-up burst of an active RFID tag are provided. The apparatus and method, for detecting the wake-up burst of the active RFID tag, are capable of reducing power consumption of the RFID tag by enabling the RFID tag when a RFID reader starts to communicate. | 09-18-2008 |
20080238681 | Scope reduction of RFID medium - This invention reduces communication insecurity caused by the air interface during a typical RFID transaction sequence. The RFID industry wide problems of skimming and eavesdropping are eliminated by providing a hermetically sealed container for the purposes of securely interrogating electro magnetic signals which are transmitted between an RFID transponder and an RFID interrogator. According to this invention chose in action are embedded with a silicon based system on a chip. When presented by the owner of the chose in action to an authorized body, the chose in action is ingested into a hermetically sealed container and then initiated through atmospheric pressure change. The transponder and interrogator communicate with a central database through a prompt and response, split algorithm. According to this invention the RFID transponder has minimal data and security is shifted from the RFID transponder to the computer host of the system. | 10-02-2008 |
20080238682 | RFID TAG READER - A control unit of a reader superimposes a control signal for antenna switching on a high frequency signal outputted into an antenna unit from a high frequency circuit. The antenna unit includes: separators for separating the superimposed signals into high frequency signals and control signals; a switch circuit for switching loop antennas; and a control circuit for controlling the switch circuit based on the control signal separated by the separator. | 10-02-2008 |
20080246612 | Hand-held tester - A hand-held tester includes a testing kit and a measuring machine, wherein the testing kit has, mounted thereon, a wave absorbing material, an emitting antenna, and a RFID tag. The wave absorbing material is mounted around the inner side of the testing kit, and the emitting antenna and the RFID tag are disposed at the opposite sides of the testing kit, and further, the measuring machine and the testing kit are electrically connected, thereby a benefit way to find the best position for adhering the RFID tag can be achieved. | 10-09-2008 |
20080246613 | SYSTEM AND METHOD FOR WIRELESS SECURITY THEFT PREVENTION - A merchandise security system in accordance with one embodiment comprising a security tag configured to be attached to an item; a receiver system configured to receive signals from the security tag and capable of generating location information for the security tag; and a security tag tracking system for receiving location information from the receiver system and determining potential security related problems. A merchandise security system in accordance with another embodiment comprising a security tag configured to be attached to an item; a receiver system configured to receive an alert signal from the security tag upon removal of the security tag from the item; and a security tag tracking system coupled to the receiver system for receiving alert information from the receiver system and determining a potential security related problem. | 10-09-2008 |
20080278329 | Rfid Reader and Rfid System - Provided are an RF reader and an RF system. The RF reader includes: a plurality of antennas; a path selector for selecting a transmit or receive path of an RF signal; an RF processor for processing the RF signal received through the transmit or receive path of the path selector; and a controller for controlling the path selector selecting a path. | 11-13-2008 |
20080284604 | Apparatus And System For Stock Control - An apparatus ( | 11-20-2008 |
20080297354 | Enhanced Security Protocol For Radio Frepuency Systems - This invention relates to security protocols for RFID systems. Systems and methods are presented to protect the system from hackers attempting to compromise the RFID system. Also, methods and systems for improving RFID security are disclosed. The systems utilize mechanisms to determine the authenticity of the RFID tags used in such systems. The systems and methods also reduce unauthorized access to the RFID system. A system and method to make tags more difficult to compromise or counterfeit is also described. | 12-04-2008 |
20090002174 | Wireless tag, wireless tag communication system, wireless tag access device, method of detecting corresponding wireless tags and computer readable medium - A wireless tag includes at least one of a signal radiation unit that radiates a first linking signal based on an instruction from a wireless tag access device, and a signal detection unit that detects a second linking signal that has been radiated and provides the second linking signal to the wireless tag access device. | 01-01-2009 |
20090009334 | Method and System for Identifying Expired RFID Data - For reducing the frequency with which RFID transponders are read in an RFID system, the RFID system logs a timestamp associated with each read of an RFID transponder along with the tag ID and reader identifier. The timestamp associated with each log entry is monitored with respect to an expiration value so that expired log entries may be identified. When a log entry is determined to be expired, other elements of the RFID system are notified of the associated tag ID and reader identifier, and the storage occupied by the expired log entry is freed. | 01-08-2009 |
20090027207 | Method and system for securing movement of an object - A method for securing movement of an object through a secure area includes providing a first electronic tag for the object, the first tag having a first memory and a second electronic tag, having a second memory, for an individual. The first memory stores an attribute of object and information of an individual permitted to move the object. The second memory stores an identifying attribute of an individual and a type of biometric information of the individual. Identifying attributes of the individual stored in the second memory are compared with information of permitted individuals stored in the first memory. Biometric information is obtained from the individual and compared with biometric information stored in the second memory to validate the identity of the individual. | 01-29-2009 |
20090040049 | Method for Processing Data Relating to a Cylinder of Fluid under Pressure - Method for processing at least one piece of data relating to a transportable cylinder of gas under pressure or a set of cylinders of this type (pallet of cylinders), characterized in that the said method comprises stages consisting in:
| 02-12-2009 |
20090051537 | Detection Stabilizing System for RFID System, Detection Stabilizing Method, and Program for Stabilizing Detection - Quantities of movements of human and matter within a detection area are detected, based on the read results of an ID holding unit arranged in the detection area or information obtained from a sensor arranged in the detection area. Parameters are decided in accordance with the detected movement quantity, and by using such parameters, whether the detecting object is within the detection area or not is detected, based on the read results of an ID holding unit attached to a detecting object. A stabilizing process is performed based on the detected movement quantities of human and matter within the detection area by employing such constitution. Thus, detection is stabilized without limiting using environment or using method. | 02-26-2009 |
20090072977 | METHOD AND SYSTEM OF ASSET IDENTIFICATION AND TRACKING FOR ENTERPRISE ASSET MANAGEMENT - A system and method for managing enterprise assets located at geographically distributed sites utilizing wireless tag technologies. The method includes storing in a database information relating to each asset, wherein the stored information includes cost of each asset and cost of service for each asset. The method further includes tracking and storing information relating to servicing of the assets, including the cost of servicing. Information relating to the assets is then displayed to a user of the system. | 03-19-2009 |
20090079571 | Optimizing RFID Reader Duty Cycle Or Power To Preserve Battery Life - The duty cycle of a portable battery-powered RFID tag reader is reduced during time periods when it is less likely to produce a “read” in order to preserve battery life. The reader operates with an aggressive duty cycle during periods of a high probability of a tag read and reduces duty cycle during periods of a low probability of a tag read. In this manner a user does not perceive the reader to be sluggish. An alternative embodiment reduces peak operating power during time periods when a tag is less likely to produce a “read” in order to preserve battery life. | 03-26-2009 |
20090085748 | MITIGATING PROCESSING LATENCY IN RFID EXCHANGES - In a radio frequency identification (RFID) system that requires an RFID reader to receive a response from an RFID tag and then transmit a command to the RFID tag within a certain time period, the RFID reader may place an initial part of the command transmission in the RFID reader's transmit chain before receiving the entire response from the RFID tag, and complete the command transmission after receiving the entire response. | 04-02-2009 |
20090096610 | USING TOUCHES TO TRANSFER INFORMATION TO A DEVICE - A device may receive a signal that includes information about a touch pattern on a surface of the tag, identify the touch pattern based on the received signal, validate tag-specific information in the received signal by comparing the identified touch pattern and information that is stored prior to receiving the signal, and perform an action that is specified by the tag-specific information if the tag-specific information is validated. | 04-16-2009 |
20090153333 | ENTRY AND EXIT CONFIRMATION SYSTEM AND METHOD - A method for confirming entry and/or exit state of a mobile object relative to all entrance of an underground passageway by utilizing Radio Frequency Identification (RFID) technology. At least one RFID tag is physically attached to the mobile object. At least a first RFID reader and a second RFID reader, each having a monitoring range and being in communication with the RFID tag, are disposed at the entrance and a relatively inner position of the passageway respectively. The method comprises generating a first entering-state data if the RFID tag enters the monitoring range of the first RFID reader and a first exiting-state data if the RFID tag exits the monitoring range of the first RFID reader, generating a second entering-state data if the RFID tag enters the monitoring range of the second RFID reader and a second exiting-state data if the RFID tag exits the monitoring range of the second RFID reader, and processing the first entering-state and exiting-state data and the second entering-state and exiting-state data to generate an output data indicating the entry and/or exit state of the mobile object relative to the entrance of the passageway. | 06-18-2009 |
20090184826 | EMBEDDED SYSTEM ARCHITECTURE FOR RFID TAG EMULATION - An apparatus for emulating multiple RFID tags in a supply chain/logistics network, comprising: an RFID transceiver for receiving an RF command from an interrogator, a controller for converting the received RF command into a digitized message, an RFID emulation unit for retrieving or storing identification data with respect to the multiple differing RFID tags, wherein the RFID emulation unit retrieves or stores identification data in one or more ID repositories with respect to one or more product RFID tags, one or more case RFID tags and a pallet RFID tag and the controller responding to the interrogator with a single ID retrieved from the one or more ID repositories contain information as to the one or more product RFID tags, one or more case RFID tags and a pallet RFID tag, wherein the RFID emulation unit retrieves or stores the identification data on a remote server over the Internet or locally in non-volatile memory of each apparatus. In addition, the apparatus can contain a housing, a handle and a display screen and an input device to allow a user at any point in the supply chain/logistic network to quickly determine information on the products, cases or pallet. | 07-23-2009 |
20090231138 | RFID Technology - A method of selectively waking up a plurality of RFID tags includes (a) providing a first RFID tag; (b) programming the first RFID tag to respond and wake up only to signals at a first sub-carrier frequency or with a first code; (c) providing a second RFID tag; and (d) programming the second RFID tag to respond and wake up only to signals at a second sub-carrier frequency or with a second code. A method of operating an RFID tag positioning system includes (a) positioning two real time location tracking active RFID readers in two respective locations; (b) positioning a first calibrating RFID tag at a fixed and known position; (c) moving a second calibrating RFID tag along a pre-determined path; (d) obtaining the first RFID reader's readings of location-related information of the RFID tags at a point in time; (e) obtaining the second RFID reader's readings of location-related information of the RFID tags at that point in time; and (f) comparing the readings with the known positions of the first and second calibrating tags. | 09-17-2009 |
20090322536 | INTEGRATED SWITCH SYSTEMS AND METHODS FOR LOCATING IDENTIFICATION TAGS - Integrated switch systems and methods for locating ID tags are disclosed. One system includes an application, a plurality of different tag readers in communication with the ID tags, and an integrated switch configured to enable the application to receive tag information from the different tag readers. An integrated switch includes multiple reader adapters, an application adapter, and a virtualization core. The virtualization core is configured to provide a common interface between each tag reader and the application. One method includes receiving a first signal from a first tag reader and receiving a second signal from a second tag reader, the first and second signals having information related to first and second ID tags, respectively. The method also includes normalizing the first and second signals such that the signals are compatible with the application and transmitting an ID tag report based on the normalized first and/or second signal to the application. | 12-31-2009 |
20090322537 | RFID-BASED ASSET SECURITY AND TRACKING SYSTEM, APPARATUS AND METHOD - Systems and methods are disclosed for tracking an item using a RFID surveillance system. In some embodiments, a security controller is connected to a point of sale system with at least one RFID tag reader. In these embodiments, the RFID tag reader is associated with an area that is observable through a video camera. If the tag reader does not recognize information obtained from a RFID tag, the tag reader may activate the video camera. When the video camera is activated, the video camera may capture images and send them to a recording device. | 12-31-2009 |
20100007500 | DETECTOR SYSTEM FOR DETECTING CARGO ITEMS FALLING DURING TRANSPORT AND METHOD FOR RETRIEVAL THEREOF - A detector arrangement including an antenna for detecting an object or objects equipped with RFID tags and which has or have fallen from a transport arrangement during conveyance thereon from a first location to a second location. Also provided is a method of detecting and retrieving an object or objects that has or have fallen from a transport arrangement while in transit from a first location towards a second location. A Global Positioning System (GPS) may be provided to assist in retrieving the lost object or objects. | 01-14-2010 |
20100039266 | Transceiver device for cell phones for tracking of objects - A system for tracking objects includes a radio frequency (RF) transceiver device integrated in a wireless handheld personal electronic device (e.g., cell phone, BLACKBERRY, iPHONE) having a visual display, a battery power source and a selection of distinct audible ringtones. The transceiver device communicates via RF signals with transponders installed within or attached to personal objects such as, but not limited to: keys; wallets; laptops; handbags; handheld electronic devices; cameras; video cameras; MP3 players; sunglasses and pens. The tracked objects are programmed into the wireless handheld electronic device and are viewable on the display, identifying the object by name, transponder number and identifying ringtone. The transceiver device is pre-programmed to trigger alarm functions (e.g., distinct ringtone, vibration and/or visual indicator) of the wireless handheld device upon any one or more of the tracked objects becoming separated from the transceiver device beyond a predetermined distance. | 02-18-2010 |
20100052910 | CONTROL UNIT FOR AN EAS SYSTEM - A control unit for an EAS system is described, the unit comprising a controller area network (CAN) communication device operatively coupled with a remote communications link. A master control (MC) module interfaces the CAN device and the remote communications link. Machine readable executable instructions reside on a digital signal processor (DSP). The unit further includes at least one system module having a targeted feature within the EAS system. | 03-04-2010 |
20100060455 | IDENTIFICATION AND SURVEILLANCE DEVICE, SYSTEM AND METHOD FOR INDIVIDUAL ITEM LEVEL TRACKING - There are provided an identification and surveillance device, a system and a method using active RFID technology to accurately and automatically track inventory at the item-level across the supply chain in real-time and at a distance. The device is provided with an attaching device for attaching to the item and a radio-frequency device securely mounted with the attaching device. The radio-frequency device comprises storing means for storing data therein, the data comprising individual tag-related information, a transmitter, an antenna and a power source for powering the device. The radio-frequency device, with the help of the transmitter, is able to communicate with a corresponding radio-frequency receiver for tracking the item. | 03-11-2010 |
20100079288 | RFID Tag Device with Temperature Sensitive Antenna - An apparatus system, and techniques for detecting temperature change are disclosed. The system includes a temperature sensitive antenna that can be included in an RFID tag device. The antenna is associated with a temperature sensitive material that, upon being exposed to a particular temperature level over a time interval, causes at least one of a change in the resonance frequency of the antenna and change in antenna signal strength (e.g., antenna gain). An RFID reader is also provided that sends commands to the tag device and determines the existence of a temperature change based on a comparison of signal strengths received on different frequencies from the antenna. | 04-01-2010 |
20100109870 | MULTIFUNCTION PORTABLE ELECTRONIC DEVICE AND ANTI-THEFT METHOD THEREOF - A portable electronic device includes a transmitting unit and a receiving unit separate from the transmitting unit. The receiving unit can communicate with the transmitting unit within a predetermined work distance, and generate an alarming signal when the transmitting unit is outside of the predetermined work distance. | 05-06-2010 |
20100127874 | INFORMATION LOCATOR - A system and method for interrogating a plurality of different environments to locate an object within the environments includes a plurality of transceivers. A control unit is also provided to selectively operate each transceiver while it is positioned in a respective environment. For operation of the system, an identification tag is affixed to the object, and transmission of an interrogation signal from a selected transceiver is accomplished at an inaudible high frequency. The tag is then responsive to the interrogation signal to send a return signal back to the control unit via the transceiver. A follow-up search of the environment can be made with a hand-held mobile locator that electronically interacts with the tag to provide for a more precise location of the object in the environment. | 05-27-2010 |
20100225484 | OBJECT LOCALIZATION METHOD, SYSTEM, TAG, AND USER INTERFACE DEVICE - Proposed is an object localization method, system and user interface device for locating a (misplaced) object ( | 09-09-2010 |
20100253522 | SYSTEM AS WELL AS METHOD FOR PROTECTING AN ITEM TO BE SECURED - In order to further develop a system ( | 10-07-2010 |
20100265070 | APPARATUS AND METHOD THAT PREVENT COLLISION OF TAGS IN RFID SYSTEM - Disclosed is an apparatus and method for preventing a collision in an RFID system, the method including: transmitting a Query to at least one tag, verifying whether an adjustment of a slot counter is required based on a response received from the tag, adjusting the slot counter when the verifying verifies that the adjustment of the slot counter is required, and transmitting the adjusted slot counter to the tag using a QueryAdjust regardless of whether a current frame is completed. | 10-21-2010 |
20100271210 | TAG COMMUNICATION DEVICE, TAG COMMUNICATION SYSTEM, AND TAG COMMUNICATION METHOD - It is possible to provide a tag communication device, a tag communication system, and a tag communication method which can secure an optimal communication region even when an antenna installation environment or a peripheral environment changes. A tag A is arranged in a preset communication region while a tag B is arranged outside the communication region. A reader/writer ( | 10-28-2010 |
20100283614 | RADIO FREQUENCY IDENTIFICATION DEVICES AND READER SYSTEMS - An RFID device such as an RFID tag ( | 11-11-2010 |
20110018714 | RFID READER AND METHOD FOR IDENTIFYING RFID TAG THEREOF AND APPARATUS FOR ANALYZING RECEPTION POWER PATTERN - A radio frequency identification (RFID) reader may extract a reception power from a tag signal transmitted from an RFID tag, generate a power pattern from the extracted reception power, and analyze the power pattern. Next, the RFID reader may determine whether the RFID tag is identified based on an analysis result of the power pattern. | 01-27-2011 |
20110084841 | METHOD AND APPARATUS FOR DETERMINING RANGE INFORMATION OF A NODE IN A WIRELESS SYSTEM - A method and apparatus for determining a range within a wireless communication system is provided herein. The range information can then be used to locate a node (e.g., an asset tag). During operation, the minimum transmission power of a source transceiver (e.g., an RFID reader) that enables a tag to be detected will be used to indicate distance. Changes in transmit power will be used to indicate relative changes in distance to a particular node. The reader will be configured to always operate at a transmission power that will result in a certain percentage (e.g., 50%) detection rate for a target transceiver (e.g., an RFID asset tag). As the reader moves closer to the tag, the minimum detection power will decrease; as it moves farther from the tag, the minimum detection power will increase. This information is displayed to give a general change in range information between the RFID reader and the asset tag (e.g., increasing range or decreasing range). An individual will be able to easily locate the asset tag by using the displayed information. | 04-14-2011 |
20110102180 | APPARATUS AND METHOD FOR ESTIMATING TAG LOCATION - A first tag that is located in a communication coverage area among a plurality of tags is selected as a base tag in order to estimate tag location in an apparatus for estimating tag location that communicates with a plurality of tags. A second tag whose location is estimated among the plurality of tags is searched. First distance information of the second tag is estimated by performing a ranging procedure of the second tag. The second distance information estimated between the first tag and the second tag is received from the first tag, and the location information of the second tag is estimated by using the first distance information and the second distance information. | 05-05-2011 |
20130038452 | METHOD AND APPARATUS FOR TRACKING OBJECTS AND PEOPLE - An object locating, identifying, tracking, and surveillance system, denoted the Assets Locating, Tracking, and Surveillance System (ALTSS), is provided for managing physical objects and evidence in environments such as police departments, law offices, and the Courts. ALTSS employs radio frequency identification (RFID) technology, computer programming and database applications, networking technologies, and hardware elements. ALTSS may locate and track physical evidence, merchandise, information carriers like files, folders or individual pieces of paper, and people, under certain conditions, in near-real time. It may be configured as part of a local area network, a wide area network, or the Internet. ALTSS may employ exemplary components such as RFID transponders, scanners, strategically located antennas and computers to facilitate tracking of objects and people as needed. Any number of users having access privileges and connected to the network may access ALTSS directly or remotely via the Internet to locate and track evidence or objects. | 02-14-2013 |
20140167965 | METHOD AND APPARATUS FOR TRACKING OBJECTS AND PEOPLE - An object locating, identifying, tracking, and surveillance system, denoted the Assets Locating, Tracking, and Surveillance System (ALTSS), is provided for managing physical objects and evidence in environments such as police departments, law offices, and the Courts. ALTSS employs radio frequency identification (RFID) technology, computer programming and database applications, networking technologies, and hardware elements. ALTSS may locate and track physical evidence, merchandise, information carriers like files, folders or individual pieces of paper, and people, under certain conditions, in near-real time. It may be configured as part of a local area network, a wide area network, or the Internet. ALTSS may employ exemplary components such as RFID transponders, scanners, strategically located antennas and computers to facilitate tracking of objects and people as needed. Any number of users having access privileges and connected to the network may access ALTSS directly or remotely via the Internet to locate and track evidence or objects. | 06-19-2014 |
20140167966 | METHOD AND APPARATUS FOR TRACKING OBJECTS AND PEOPLE - An object locating, identifying, tracking, and surveillance system, denoted the Assets Locating, Tracking, and Surveillance System (ALTSS), is provided for managing physical objects and evidence in environments such as police departments, law offices, and the Courts. ALTSS employs radio frequency identification (RFID) technology, computer programming and database applications, networking technologies, and hardware elements. ALTSS may locate and track physical evidence, merchandise, information carriers like files, folders or individual pieces of paper, and people, under certain conditions, in near-real time. It may be configured as part of a local area network, a wide area network, or the Internet. ALTSS may employ exemplary components such as RFID transponders, scanners, strategically located antennas and computers to facilitate tracking of objects and people as needed. Any number of users having access privileges and connected to the network may access ALTSS directly or remotely via the Internet to locate and track evidence or objects. | 06-19-2014 |
20140253333 | SYSTEMS AND METHODS FOR VERIFICATION OF SECURITY TAG DETACHMENT | 09-11-2014 |
20140354432 | SYSTEM AND METHOD FOR VERIFYING PATIENT COMPLIANCE - A system for verifying compliance, comprises an input device including a radio-frequency identification (RFID) reader module, wherein the RFID reader module is capable of determining that an RFID tag corresponding to a medication dose in a product packaging is not detectable, and recording a time of the determination that the RFID tag is not detectable, a network, and a data management service module which is capable of receiving from the input device via the network information corresponding to the RFID tag and the time when the RFID tag was determined not detectable. | 12-04-2014 |
20140354433 | SYSTEM AND METHOD FOR VERIFYING PATIENT COMPLIANCE - A system for verifying compliance, comprises an input device including a radio-frequency identification (RFID) reader module, wherein the RFID reader module is capable of determining that an RFID tag corresponding to a medication dose in a product packaging is not detectable, and recording a time of the determination that the RFID tag is not detectable, a network, and a data management service module which is capable of receiving from the input device via the network information corresponding to the RFID tag and the time when the RFID tag was determined not detectable. | 12-04-2014 |
20160049058 | ELECTRONIC ARTICLE SURVEILLANCE SYSTEMS IMPLEMENTING METHODS FOR DETERMINING SECURITY TAG LOCATIONS | 02-18-2016 |
20160180675 | Method And System For State-Based Power Management Of Asset Tracking Systems For Non-Statutory Assets | 06-23-2016 |