Entries |
Document | Title | Date |
20080197969 | METHODS AND SYSTEMS FOR AUTHENTICATING CONTENTS OF A BOTTLE - A system for authenticating contents of a bottle containing an alcoholic beverage includes a neck seal, a first reader, a second reader, and a server. The neck seal is attached to the bottle and includes a neck seal identification number and an invisible security taggant. The first reader scans the neck seal, detects the presence of the security taggant, and authenticates the neck seal. The second reader retrieves a bottle tag number from a radio-frequency identification tag. The server authenticates the contents of the bottle responsive to identifying an association between the neck seal identification number and the bottle tag number. | 08-21-2008 |
20080218308 | Identification Document with a Contactless Rfid Chip - To provide an identification document, particularly a passport, in which at least one contactless RFID chip ( | 09-11-2008 |
20080218309 | METHOD AND TECHNOLOGY FOR REMOTE ADMINISTRATION OF WIRELESS DEVICES - A remote administrator to allow a caregiver to configure a user's wireless device includes a master software client in the remote administrator and a controllable software client in the wireless device. Commands transmitted to the wireless device from the remote administrator allow the caregiver to configure the user's wireless device based on user initiated configuration requested. | 09-11-2008 |
20080218310 | SMART GARMENT - A sensor authenticated to a garment transfers information, either wirelessly or wired, to an external data processing device. Such information includes location information, physiometric data of the individual wearing the garment, garment performance and wear data (when the garment is an athletic shoe, for example). The external data processing device can be portable digital media players that are, in turn, in wireless communication with a server computer or other wireless devices. | 09-11-2008 |
20080224823 | Identification Systems - An identification system where providing' identification data sets that contain different types of information accessible by different parties, removes the need for all potential readers of the object to be able to access all information, and to contact a third party during the verification process is disclosed. The identification data sets are encrypted and printed in a portable physical form as an identity object. Graphical symbols, such as a data matrix, or RFID tags or secure chips may be used to store encrypted data. These may be incorporated into a passport or other identification document. Additional identity objects may be printed for use in identifying objects connected with a user or source that contain a subset of the information in the original data matrix. | 09-18-2008 |
20080238611 | Authentication of source, plus, for goods and services system, method, and components - A unique identifier is created for each article (clothing, accessories, jewels, fragrances, manufactures, etc.) for which the provider of the article desires to authenticate its Brand source to the party acquiring the article to substantiate to that acquiring party that they are receiving a genuine article. The unique identifier is so provided from a secure third party that also stores the unique identifier, possibly with other historical information, in a secure data base accessable only by authorized parties. The unique identifier may be provided on tags to be carried by the respective article or it may be applied directly to the article as by direct part marking from the material of the article and when so provided it includes a brand source identifier of the party providing the unique identifier as an additional protective measure. The unique identifier furthermore may be provided as an encoded, imageable symbology such as a “Data Matrix”. | 10-02-2008 |
20080258864 | Communication Apparatus and Communication Method - A communication apparatus for mutual communication, when acting as an authenticator communication apparatus performing authentication, includes a transmitting section that transmits to an authenticatee communication apparatus subject to authentication challenge data to authenticate the authenticatee communication apparatus in a time slot, which is a segmented period of time in which the communication apparatus to communicate with a specific communication apparatus; and a receiving section that receives from the authenticatee communication apparatus first response data for responding to the challenge data in the same time slot as the one in which the transmitting section transmits the challenge data. An objective is to carry out authentication of a tag by a Reader/Writer (R/W) and authentication of the R/W by the tag at the same time as an anti-collision process, and to further achieve confidentiality of unique ID information that is transmitted. | 10-23-2008 |
20080272882 | Verifying the ownership of an owner's authority in terms of product and service - The present invention provides an apparatus for verifying the authority of an owner, in terms of an identifier of a product, the first verification information for verifying the authority held at a terminal for an owner with the authority involving the product, and the second verification information for verifying the authority concerning the identifier of the product stored in a product database. The apparatus comprises means for receiving the identifier and the first verification information, means for acquiring the second verification information from the product DB, and means for determining whether or not there is the authority from the first verification information and the second verification information. A hash value acquired from a one-way hash function is employed as a verification key of the verification information. | 11-06-2008 |
20080272883 | Display and labeled article - A higher forgery prevention effect is realized. A display includes a first interface section provided with a relief-type diffraction grating constituted by a plurality of grooves, and a second interface section provided with a plurality of recesses or projections arranged two-dimensionally at a center-to-center distance smaller than the minimum center-to-center distance of the plural grooves, and each having a forward tapered shape. | 11-06-2008 |
20080278282 | Motor Vehicle Control Device Data Transfer System And Process - The present invention relates to a motor vehicle control device data transfer system and process. In particular, it relates to such a system and process for the transfer of data, subject to the risk of tampering, from a central data-processing device ( | 11-13-2008 |
20080284562 | Computer based guest monitoring and identification system and method - A guest monitoring and identification system is shown. The system comprises an RFID carried by a guest and includes therein programmed predetermined data identifying a guest. An activating transmitter transmits a monitoring signal over a designated area to be traversed by a guest having the RFID. A receiver receives from the RFID a transmitted data signal containing the programmed predetermined data identifying the guest. A guest identification and service information processor receives the transmitted data signal. The processor interprets the programmed predetermined data identifying a guest and generates data/information signals providing the name and service profile for an identified guest. A communication device communicates to service staff the name and service profile for an identified guest. | 11-20-2008 |
20080309456 | Kiosk device - An kiosk device, which includes a receiver, a memory unit, a central processor, a decoder and a player, wherein the receiver receives signals transmitted from GPS (Global Positioning System) transmitters, or RFID (wireless radio frequency identification) transmitters which activate the central processor that controls the decoder to decode digital data stored in the memory unit and produce information guide data that can be automatically played back by the player. Accordingly, the present invention provides considerable ease of operation and convenience. | 12-18-2008 |
20090045909 | Water Friend or Foe System for Global Vessel Identification and Tracking - A Water Friend or Foe System (WFSS) includes a Subscriber Identity Module (SIM) card in a SIM reader on a marine vessel. A transmitter, which is coupled to the SIM reader, transmits information from the SIM card, as well as positioning information, to a WFFS tracking station. | 02-19-2009 |
20090045910 | Platform for Standardizing Vehicle Communications With Third-Party Applications - A business-to-vehicle platform functions as an information technology (IT) integration platform to support secure communication between a vehicle's onboard IT system and any offboard third-party IT system. In one embodiment, the a vehicle's communication hub is decoupled from all voice and data traffic to/from third-party service providers, such that the vehicles will “look and feel” like standard business IT devices to the third-party service providers. In certain embodiments, this decoupling enables the use of standardized business IT services in vehicles, rather than the traditional approach of requiring vehicle-specific embedded services. | 02-19-2009 |
20090045911 | USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H | 02-19-2009 |
20090051485 | Methods and Apparatus for Product Authentication - A method for product authentication, comprising applying to the genuine products code on a label, the code being generated by an algorithm, which code is unique to a small sub-set of articles, preferably for a single such article, so that it can be assumed that any product on the market which either does not have a label or has a wrong label, or for which the label is otherwise accounted for, is counterfeit, the label being machine readable, such as a writeable RFID tag characterised in that the label comprises a machine-readable microcircuit to which a code can be written, and from which the written code can be read remotely. | 02-26-2009 |
20090072946 | COLLABORATIVE PRODUCT AUTHENTICATION - An identification of an RFID tag is received from a mobile device. A product associated with the identification is identified, and a keeper associated with the product is identified. The keeper is provided to the mobile device, and a selection of the keeper is received from the mobile device. Authentication information associated with the product and the keeper is identified, and the authentication information is provided to the mobile device. | 03-19-2009 |
20090091422 | DEVICE IDENTIFICATION VIA SERIAL COMMUNICATION LINK - Systems and methods are provided that enable identification of an accessory device or other peripheral device via a serial communication link. An electronic device (e.g., a media player or portable media device) may identify an accessory device using a serial communication link when the accessory device is attached or coupled to the electronic device. Based on serial communications, for example, the electronic device may discover and identify an accessory device to determine whether one or more preferences or functionalities should be set or enabled. The electronic device may also discover whether an accessory device or its manufacturer, distributor, or retailer is authorized or licensed to enable certain functionalities or set certain preferences when connect to the electronic device. Therefore, aspects of a serial communication link that may already exist in many electronic devices for data communication usage may be repurposed to provide identification or authorization of accessories or other peripheral devices. | 04-09-2009 |
20090096573 | Activation of Cryptographically Paired Device - An event is detected at a first device. Responsive to the detection, at least some functionality of the first device is deactivated. The presence of a second device, cryptographically paired with the first device, is detected by the first device. Responsive to the detection, at least some functionality of the first device is activated or reactivated. | 04-16-2009 |
20090096574 | RFID TAG USING ENCRYPTED PASSWORD PROTECTION - A permanent ID can be read off of an RFID chip of an RFID tag. The permanent ID can be combined with a seed value to form a combined value. The combined value can be encrypted to form an encrypted value. This encrypted value can be stored on the RFID chip. Later, the RFID tag can be validated using the encryption value. | 04-16-2009 |
20090128286 | System for controlling the use of electronic devices within an automobile - A system for controlling the use of electronic devices within an automobile includes a control module integrated into the operation of the automobile, wherein the control module is linked to the electrical system of the automobile and is controlled, monitored and updated via a graphical user interface of the automobiles. The control module includes a mechanism for identifying use of electronic devices within the automobile, determining whether the usage is permitted and preventing usage of the electronic device if it is determined the usage is not permitted. | 05-21-2009 |
20090146778 | SYSTEM COMPRISING AN OBJECT AND A SENSING UNIT FOR IDENTIFYING THE OBJECT - The invention relates to a system (Sy) which comprises an object ( | 06-11-2009 |
20090160605 | Interrogation System Employing Prior Knowledge About an Object to Discern an Identity Thereof - An interrogation system employable with an object having a radio frequency identification (RFID) tag and method of operating the same. In one embodiment, the interrogation system includes a database having prior knowledge about the object, and an interrogator that scans the RFID tag and discerns additional information therefrom about the object. The interrogator still further includes a control system that identifies the object based on the prior knowledge and the additional information. | 06-25-2009 |
20090167489 | ANTI-FORGERY METHOD AND APPARATUS BASED ON CPK ELECTRONIC TAG - An anti-forgery method and apparatus based on combined public key (CPK) electronic tag is provided. The CPK electronic tag is implemented by CPK crypto scheme and RFID, to perform self-signing on predefined ID, and to ensure uniqueness and authenticity of the item by binding the item and the tag, to prevent duplicating and counterfeiting. | 07-02-2009 |
20090167490 | COMMUNICATION SYSTEM, SETTLEMENT MANAGEMENT APPARATUS AND METHOD, PORTABLE INFORMATION TERMINAL AND INFORMATION PROCESSING METHOD, AND PROGRAM - The present invention provides a communication system that enables safe and easy addition of a function for use of credit card settlement services to a portable information terminal. In this system, if a user brings his credit card close to the portable information terminal, the portable information terminal reads a card ID stored in a contactless IC card provided in the credit card. Then, the card ID is transmitted to a card management system which checks whether or not the card ID is valid. If confirming that the card ID is valid, the card management system instructs the portable information terminal to write the card ID thereto. If the user places an order of a merchandise, the card ID written to the portable information terminal is provided therefrom to use credit card settlement services. | 07-02-2009 |
20090174525 | Communication system and communication method - An object of the invention is to provide a communication system for inputting authentication information to a communication machine without providing an external machine access interface for inputting authentication information. | 07-09-2009 |
20090184799 | INFORMATION STORAGE MEDIUM AND INFORMATION STORAGE MEDIUM PROCESSING APPARATUS - An information storage medium according to this embodiment includes a first communication unit configured to communicate with an information storage medium processing apparatus in a contact state, a second communication unit configured to communicate with the information storage medium processing apparatus in a non-contact state, a storage unit configured to store information, and an execution unit configured to execute predetermined processing based on the information stored in the storage unit using information processing results of both the first communication unit and the second communication unit. The execution unit executes the predetermined processing under a condition that both the first communication unit and the second communication unit have succeeded in authentication processing for the predetermined processing. | 07-23-2009 |
20090195354 | Authenticating a signal based on an unknown component thereof - Authentication of a signal, signal | 08-06-2009 |
20090195355 | METHODS AND APPARATUS FOR PLACE SHIFTING CONTENT TO A VEHICLE ENTERTAINMENT SYSTEM - Apparatus, systems and methods are provided for transferring content from a home entertainment system to a vehicle entertainment system through a wireless connection. A user requests to experience content, through a vehicle entertainment system that is stored or otherwise made available through a content source that is located remotely with respect to the vehicle entertainment system. The vehicle entertainment system transmits a request to a base station communicatively coupled to the content source and the base station responsively retrieves the content from the content source and transmits the content over a wireless connection to the vehicle entertainment system. | 08-06-2009 |
20090206986 | METHOD OF PRESENTING IMS PUBLIC USER IDENTIFY TO RFID APPLICATIONS - An IMS node communicating with a user node and an information node is provided. The information node is adapted to conduct access control based on IMS Public User Identity. The IMS node comprises: request mediation means for mediating an access request from the user node to the information node by converting a first protocol conforming to IMS into a second protocol interpretable to the information node; and response mediation means for mediating an access response from the information node to the user node by converting the second protocol into the first protocol. The access request includes the IMS Public User Identity and information identity specifying information which the information node is requested to retrieve. | 08-20-2009 |
20090206987 | METHODS AND SYSTEMS FOR OBJECT IDENTIFICATION AND FOR AUTHENTICATION - Methods and systems for object identification and/or authentication. | 08-20-2009 |
20090219132 | SYSTEM FOR PRODUCT AUTHENTICATION AND TRACKING - An authentication system enabling a customer to verify the authenticity of a product in a foolproof, secure and simple manner. plurality of secret sets of numbers ( | 09-03-2009 |
20090261944 | CONTENT DISTRIBUTION SYSTEM, SERVER COMPUTER AND RECORDING MEDIUM - A server computer includes a receiving part for receiving a content and apparatus identification information of an apparatus that existed in a vicinity when the content was generated; an extracting part for extracting identification information corresponding to the apparatus identification information received by the receiving part by referring to a database in which the identification information is stored in association with the apparatus identification information; a storing part for storing the content and apparatus identification information received by the receiving part and the identification information extracted by the extracting part in an associated manner in the storage unit; and a first sending part for sending the content stored in the storage unit to another information processor corresponding to identification information received from outside when the identification information received from the outside matches the identification information stored in the storage unit. | 10-22-2009 |
20090267729 | Anti-counterfeiting system - A method and apparatus for verifying the authenticity of, and detecting tampering with, an item is disclosed. An RFID transponder comprises an antenna resonant circuit which is coupled to an associated integrated circuit when the integrated circuit is positioned proximately to the antenna resonant circuit, thereby enabling the integrated circuit to receive and respond to a radiofrequency query signal. The antenna resonant circuit can be integrated with a capsule or other form of removable packaging, such that it is destroyed upon removal of, or tampering with, the packaging. | 10-29-2009 |
20090267730 | Robust Authentication and Key Agreement Protocol for Net-Generation Wireless networks - Embodiments of the invention may be used to provide an authentication and key agreement protocol that is more robust against base station, replay and other attacks compared to previously known systems. The nonce-based authentication and key agreement protocol provides security against such attacks while avoiding the problems that arise in systems that use sequence number counters on the home environment and mobile station-sides. In an embodiment, a nonce that is transmitted from the user to the home environment through the serving network, as well as subsequent values for the nonce that are derived from the initial nonce, are used as indices for authentication vectors. | 10-29-2009 |
20090289758 | Wireless Device, Wireless Control System and Wireless Control Method - According to one embodiment, a wireless control system having an electronic device with a wireless communication function and a remote control module for remotely operating the electronic device, wherein the remote control module includes a control module. A control module configured to transmit a authentication information to a other device via a proximity communication module and receive remote control command information for remotely operating the other device from the other device via the proximity communication module so as to store it in a storage module in order to allow the other device to start a process for establishing wireless connection with the electronic device based on the authentication information. | 11-26-2009 |
20090309695 | COMPUTING SYSTEM AND COMPUTER-IMPLEMENTED METHOD FOR A MULTI-CARD SYSTEM - A computer-implemented method for a multi-card system is provided. An inserted card detects the operational status of cards of the same type. The inserted card will be in standby status when inserted card finds an active card of the same type. If the inserted card does not find any active card of the same type, the inserted card will send a query to a control card requesting the operational status of the cards of the same type. If the control card accepts the query, the control card will send a signal to the inserted card. The inserted card determines its operational status based on the signal. If the inserted card does not receive the signal in a predetermined amount of time, it will be activated. | 12-17-2009 |
20090315670 | RFID ENABLED MEDIA SYSTEM AND METHOD - A digital media playing system includes, in one embodiment, a digital video and/or audio media object, such as a portable digital media container adapted to hold one or more digital storage mediums, that includes a radio frequency identification tag containing RFID tag information. The digital media playing system also includes a trusted media content playing device that has a radio frequency identification tag reader operatively coupled therewith, to read the RFID tag information from the RFID tag that is located on the portable media container and that securely downloads remotely stored audio and/or video media based on the RFID tag information. The RFID tag information that is in the RFID tag includes, in one embodiment, encrypted tag identification information and unencrypted remote content identification information as well as, if desired, portable digital media container authentication data (e.g. player ID). Other RFID enabled digital video and/or audio media objects include movie tickets, concert tickets, 3-D objects, clothing and other forms. | 12-24-2009 |
20090315671 | IMAGE ACQUISITION SYSTEM AND METHOD OF AUTHENTICATING IMAGE ACQUISITION DEVICE IN THE IMAGE ACQUISITION SYSTEM - An image acquisition system includes an image acquisition device and a commanding device configured as a member separate from the image acquisition device to transmit a command to the image acquisition device for controlling the image acquisition device in such a manner as to permit the image acquisition device to operate in response to the command. The image acquisition device transmits to the commanding device identification information permitting the image acquisition device to identify the commanding device. The commanding device receives the transmitted identification information and transmits a command with authentication information contains authentication information permitting the image acquisition device to authenticate the commanding device, the authentication information containing one of the received identification information and information derived from the identification information. | 12-24-2009 |
20100013593 | Biometric authentication and verification - Biometric authentication and verification are described. A method in biometric identification includes establishing a foundational biometric measurement based on a first user input. The method also includes providing a second user input at a biometric terminal, the second user input used by the biometric terminal to determine whether to acknowledge a verifying biometric measurement, in response to receipt of the established foundational biometric measurement and the second user input. The method may also include establishing the foundational biometric measurement, by the user, utilizing biometric equipment. Alternatively, the establishing of the foundational biometric measurement based on first user input is performed by providing the first user input to a biometric kiosk, the biometric kiosk using the first user input to establish the foundational biometric measurement. Advantages of the present invention include the ability to perform more secure biometric transactions. | 01-21-2010 |
20100013594 | System for monitoring component of operating machine - A working machine is provided with a plurality of exchangeable components, and each component is provided with a wireless tag. A component ID is stored in advance in the wireless tag. When, on the side of the working machine, a component exchange timing or an engine starting timing is detected, the component ID stored in the wireless tag is acquired, and is transmitted to a working machine management device. The working machine management device checks the component ID which has been received from the working machine and a component ID which is stored in a component ID storage means against one another. And, if these two component IDs do not match one another, an abnormal state detection means outputs a warning signal. | 01-21-2010 |
20100013595 | Method for controlling the re-use of prefilled reagent dispensers and other consumables - This disclosure provides methods and systems by which a device could detect if it has been loaded with a consumable that was not authorized by the manufacturer of the device even if the gray market could exactly remanufacture or duplicate the consumable. The methods and systems utilize an asymmetric key pair. | 01-21-2010 |
20100026450 | IDENTIFICATION MEDIUM, IDENTIFICATION METHOD, AND IDENTIFICATION APPARATUS - An identification medium is to be observed via a linearly polarizing filter and includes a first liquid crystal layer that changes the wavelength of light according to the rotational angle of the linearly polarizing filter, a cholesteric liquid crystal layer, and a light absorbing layer that is provided below the cholesteric liquid crystal layer. | 02-04-2010 |
20100033300 | Apparatus, systems and methods for authentication of objects having multiple components - Apparatus, systems and methods for authenticating objects, comprising receiving an encrypted object identifier associated with an unknown object having multiple components, decrypting the encrypted object identifier using a first public key of a first public/private key pair to obtain unknown object information including unknown identification data for the multiple components, inspecting the unknown object to obtain actual object information including actual identification data for the multiple components, and comparing the unknown identification data with the actual identification data to determine whether the unknown object is an authentic object, wherein an authentic object has an object identifier generated using a first private key of the first public/private key pair to encrypt the actual object information. | 02-11-2010 |
20100039218 | System and method for transmitting illusory and non-illusory identification characteristics - Methods and systems for transmitting illusory identification characteristics are provided. | 02-18-2010 |
20100045425 | DATA TRANSMISSION OF SENSORS - A method for data transmission between a sensor module for measuring and storing data and a mobile device wherein the sensor module and the mobile device have identified each other and, wherein the sensor module comprises a first secure element capable of storing a first security key and the mobile device comprises a second secure element capable of storing a second security key characterized in that the method comprises the steps of an authentication step for carrying out a security process between the sensor module and the mobile device in order to authenticate the sensor module with the mobile device by means of comparing first and second security keys; a pairing step for establishing a communication between the sensor module and the mobile device in order to enable communication therebetween; a transmission step for establishing a secure transmission of data from the sensor module to the mobile device when comparison of the first and second security keys has resulted in authentication. | 02-25-2010 |
20100052845 | Antitheft System For Vehicle - In a keyless entry system, a CPU in an ECU and a CPU in a remote control key change a function formula specified by primary function formula data stored in a memory and a function formula specified by primary function formula data stored in a memory to respective new function formulas. With this structure, function formulas used in the remote control key and the ECU can be changed to respective new function formulas. This makes it possible to enhance the safety of the keyless entry system because it is difficult to predict the function formulas used in the remote control key and the ECU. | 03-04-2010 |
20100066488 | SYSTEM AND METHOD FOR VALIDATED GUEST REVIEWS - The present invention relates to a validation system and method which enables a guest review website to prevent people from posting reviews of hotels without having an invitation with a unique identifier generated by an independent service provider. | 03-18-2010 |
20100066489 | SECURITY-ENABLED DIGITAL MEDIA AND AUTHENTICATION METHODS THEREOF - Embodiments of methods, devices and/or systems for security-enabled digital media and authentication methods thereof are described. | 03-18-2010 |
20100073128 | APPARATUS AND METHOD FOR SECURE DETECTION OF AN ITEM AND A METHOD OF SECURING ACCESS TO INFORMATION ASSOCIATED WITH THE ITEM - Privacy of information is protected by a method of securing access to information associated with a value item, the method involving comparing a security signature and a stored profile, and permitting access to the information associated with the value item if the security signature matches the stored profile. | 03-25-2010 |
20100073129 | ELECTROMECHANICAL LOCK - The invention relates to an electromechanical lock comprising: an electronic circuitry ( | 03-25-2010 |
20100073130 | KEY HOLDING DEVICE FOR IN-VEHICLE AUXILIARY KEY - A key holding device includes a key cylinder capable of retaining an auxiliary key which is a vehicle key that is not a master key. A rotor is rotatably arranged in the key cylinder. The auxiliary key is insertable into the rotor. A tumbler is rotatable with the rotor in the key cylinder. The tumbler holds the auxiliary key in a manner irremovable from the key cylinder in accordance with the rotational position of the rotor. A key lock mechanism is capable of locking the rotor in a state in which the tumbler holds the auxiliary key in a manner irremovable from the key cylinder. A control unit selectively switches the rotor between a locked state and an unlocked state by controlling the key lock mechanism so as to permit removal of the auxiliary key when the rotor is in the unlocked state. | 03-25-2010 |
20100079237 | DEVICE AND METHOD FOR PROVIDING RFID IDENTIFICATION DATA FOR AN AUTHENTICATION SERVER - In a system ( | 04-01-2010 |
20100079238 | RFID TAG WITH PIEZOELECTRIC SENSOR FOR POWER AND INPUT DATA - An RFID tag having a non-volatile memory and a piezoelectric sensor. The piezoelectric sensor produces an electrical charge that momentarily supplies electrical power to the RFID tag when subjected to a mechanical force and the electrical power is sufficient to record data in the non-volatile memory. The piezoelectric sensor is affixed to an article such that an attempt to tamper with the article produces sufficient mechanical force on the piezoelectric sensor to record data evidencing the tampering in the non-volatile memory. | 04-01-2010 |
20100097175 | VEHICLE AUTHENTICATION DEVICE - A vehicle authentication device has an in-vehicle device mounted on a vehicle, an authentication unit disposed in the in-vehicle device, for matching an ID returned from a portable device in response to a request from the in-vehicle device and performing an authentication of the vehicle, and an operation switch for instructing a power supply transition of the vehicle. The in-vehicle device has a measurement unit for measuring a duration of an active state of the operation switch, a determination unit for determining whether the duration exceeds a predetermined time, and a control unit for executing a power supply transition control of the vehicle based on the determination that the duration time of the active state of the operation switch exceeds the predetermined time made by the determination unit and an authentication result of the authentication unit. | 04-22-2010 |
20100097176 | INPUT DEVICE AND USER AUTHENTICATION METHOD - An input device having a given input screen includes a first unit that generates data indicating any one of a touch position, a touch area, and a touching time, the touch position being a position touched by an object, the touch area being an area touched by the object, and the touching time being a period touched by the object, a second unit that generates password codes based on any one of the touch position, the touch area, and the touching time, and a third unit that judges whether a user is an authorized user based on the password code. It is possible to generate password codes including data of any one of the touch position, the touch area, and the touching time. Accordingly, the password cannot be stolen by others, and the input device with which impersonation or spoofing is difficult and the password need not be input. | 04-22-2010 |
20100123545 | PROJECTION SYSTEM, SCREEN, AND PROJECTOR - A projection system includes: a screen having screen specific authentication information; and a projector having a function of acquiring the screen specific authentication information and, based on the acquired authentication information, carrying out an authentication process for setting the projector to a usable condition. | 05-20-2010 |
20100127822 | NON-NETWORKED RFID-PUF AUTHENTICATION - An integrated circuit includes a sequence generator configured to generate a series of challenges; a hidden output generator configured to generate a series of hidden outputs, each hidden output a function of a corresponding challenge in the series of challenges; and bit reduction circuitry configured to generate a response sequence including a plurality of response parts, each response part a function of a corresponding plurality of hidden outputs. | 05-27-2010 |
20100127823 | Radio Frequency Certificates of Authenticity and Related Scanners - Radio frequency certificates of authenticity (RFCOAs) and associated scanners and methods are presented. In one implementation, an array of miniaturized antenna elements in an RFCOA scanner occupies an area smaller than a credit card yet obtains a unique electromagnetic fingerprint from an RFCOA associated with an item, such as the credit card. The antenna elements are miniaturized by a combination of both folding and meandering the antenna patch components. The electromagnetic fingerprint of an exemplary RFCOA embeddable in a credit card or other item is computationally infeasible to fake, and the RFCOA cannot be physically copied or counterfeited based only on possession of the electromagnetic fingerprint. | 05-27-2010 |
20100156593 | Radiation image capturing system - The power consumption of a battery for supplying electric power to a cassette having a radiation detector for detecting radiation image information is greatly reduced. When a cassette transceiver of the cassette starts transmitting the radiation image information to a console transceiver of a console, the cassette transceiver changes the gain of a variable-gain amplifier to change a transmission radio-wave intensity, and transmits a test signal at the changed transmission radio-wave intensity. When the console transceiver receives the test signal, the console transceiver transmits a reception acknowledgement signal generated by a reception acknowledgement signal generator. In response to the reception acknowledgement signal, the cassette transceiver sets its own transmission radio-wave intensity to a value at the time the cassette transceiver received the reception acknowledgement signal, and transmits the radiation image information at the set transmission radio-wave intensity. | 06-24-2010 |
20100182122 | RFID Tag and Operating Method Thereof - A radio frequency identification (RFID) tag and a method for operating the RFID tag are provided. The method includes steps of receiving a read command, generating a mode parameter, selecting a simulation situation from a situation group according to the mode parameter, and selectively generating a response signal according to the simulation situation. The situation group includes a first situation and a second situation. The response signal includes virtual identification (ID) information or virtual content information stored in the RFID tag. | 07-22-2010 |
20100188191 | SYSTEM AND METHOD FOR PROVIDING SECURE IDENTIFICATION SOLUTIONS - The present invention provides a method and system for verifying and tracking identification information. In an embodiment of the invention, a system for delivering security solutions is provided that includes at least one of the following: a radio frequency (RF) identification device, an identification mechanism (e.g., a card, sticker), and an RF reader. | 07-29-2010 |
20100194528 | CONTROL DEVICE, CONTROL SYSTEM, CONTROL METHOD AND STORAGE MEDIUM - To provide a control system capable of avoiding communication with an unintended external device when a number of external devices exist outside the device. A control system includes a control device | 08-05-2010 |
20100201480 | METHOD FOR THE ACCESS CONTROL TO AN AUTOMATION UNIT - In a method for the access control to an automation unit ( | 08-12-2010 |
20100231352 | ACCESSORY IDENTIFICATION FOR MOBILE COMPUTING DEVICES - Embodiments disclosed herein provide for identification processes and/or procedures for accessories coupled with a mobile computing device. During identification an accessory can communicate lingo information that includes only those lingoes the accessory can use while coupled with the mobile computing device. The accessory can also communicate accessory protocol information to the mobile computing device during identification. The accessory can be limited to using only those lingoes and/or those protocols identified during identification. Various other accessory information, capabilities, preferences, etc. can also be communicated to the mobile computing device during identification. | 09-16-2010 |
20100231353 | SYSTEM AND PORTABLE DEVICE FOR TRANSMITTING IDENTIFICATION SIGNALS - A system is provided with a portable device for the transmission of a signal to a second device, wherein the portable device is wearable on the body of a user. The portable device includes at least two electrodes and transmitter electronics for the generation of an electrical signal between the electrodes, such that the signal is able to be coupled by the electrodes into the body of the user and detected by at least one electrode of the second device. A portable device is distinguished in that between the electrodes are arranged component parts of the transmitter electronics and/or of an application distinct from the transmitter electronics, and/or an air gap is present. | 09-16-2010 |
20100231354 | CONTROL SYSTEM AND METHOD, AND COMMUNICATION DEVICE AND METHOD - A control system has a control device for performing a control of a predetermined process, and a communication device for communicating with the control device. The control device has a first transmission unit for transmitting a request signal requesting for transmission of a response signal to the communication device, a first reception unit for receiving the response signal transmitted through a predetermined procedure from the communication device in response to the request signal transmitted by the first transmission unit, an authentication unit for performing authentication of the communication device using identification information of the communication device contained in the response signal received by the first reception unit and identification information of the communication device registered in advance, and a process executing unit for executing the predetermined process when the authentication of the communication device by the authentication unit is successful. The communication device has a first storage unit for storing transmission scheduled time information indicating a time scheduled to transmit the response signal assigned to the communication device, a second reception unit for receiving the request signal transmitted from the first transmission unit, and a second transmission unit for transmitting the response signal corresponding to the request signal received by the second reception unit to the control device at a time different from times assigned to other communication devices based on the transmission scheduled time information stored in the first storage unit. | 09-16-2010 |
20100231355 | INFORMATION PROCESSING APPARATUS - An information processing apparatus includes: an authenticating unit configured to perform, when an input from an operator not having operation authority is received on a restricted input button that can be operated only by an operator having the operation authority, authentication by the operator having the operation authority; and a restriction releasing unit configured to temporarily release the operation restriction for the restricted input button when the authentication by the operator having the operation authority is successful. | 09-16-2010 |
20100237985 | METHOD, SYSTEM, AND APPARATUS FOR DISTRIBUTING ELECTRICITY TO ELECTRIC VEHICLES, MONITORING THE DISTRIBUTION THEREOF, AND/OR CONTROLLING THE DISTRIBUTION THEREOF - A method, system, and apparatus for distributing electricity to electric vehicles, monitoring the distribution thereof, and/or controlling the distribution thereof, provides various components to vehicle operators and station owners to track and control energy usage. Plug outlet devices are associated with a station. A coordinator element is configured to receive vehicle information and information about the station from one or more electric vehicles. The information is verified, stored, and/or aggregated for later display. In addition, the information can be used to determine whether or not to deny electrical charging service to a vehicle using a switch component. | 09-23-2010 |
20100245035 | ELECTRONIC TAG BROADCASTING SYSTEM AND BROADCASTING METHOD USING ELECTRONIC TAG - An electronic tag broadcasting system and a broadcasting method using an electronic tag are provided. The electronic tag broadcasting system makes it possible to include information on photographed objects in a broadcasting signal, greatly change the combination of information by means of conventional manual operations, increase benefits of bi-directional broadcasting and the combination of broadcasting/communication by using recognition information included in broadcasting contents, and create a lot of new products and a large market. Popularity of broadcasting increases usage of electronic tags and their related application, thereby providing various service convergence that combines RFID, USN, communication, broadcasting, etc. and leading to a convenient ubiquitous society. | 09-30-2010 |
20100245036 | BEVERAGE CONTAINER AUTHENTICITY AND PROVENANCE DEVICES AND METHODS - An RFID label comprising an RFID circuit and an RFID antenna, and optional secondary security label ensures the authenticity of a beverage contained in a beverage container. The RFID label cannot be removed without destroying the RFID label or rendering it inoperable. A secondary security label may be placed over the closure of the beverage container to provide a secondary measure against tampering as well as a visual indicator of authenticity. It is placed on a portion of the bottle, a portion of the beverage container's closure, and the RFID label. An attempt to remove the secondary security label will also render the RFID label unusable. | 09-30-2010 |
20100271172 | CAR-CHARGING SYSTEM - The car-charging system can charge only an authenticated car both in a public parking area and at home. The car-charging system is capable of charging a charge-accumulating device in the car to be charged through a power-supplying line from a power source outside the car, and is arranged to authenticate the car by means of communication between an authentication-managing device in a power-supplying device outside the car and a DSRC onboard device in the car. The authentication-managing device and DSRC onboard device each have a DSRC basic application software program implemented thereon. | 10-28-2010 |
20100277275 | METHOD AND SYSTEM FOR A RECOGNITION SYSTEM HAVING A VERIFICATION RECOGNITION SYSTEM - A method and system for performing computer implemented recognition is disclosed. In one method embodiment, the present invention first accesses user input stored in a memory of a mobile device. On the mobile device, the present invention performs a coarse recognition process on the user input to generate a coarse result. The coarse process may operate in real-time. The embodiment then displays a portion of the coarse result on a display screen of the mobile device. The embodiment further performs a detailed recognition process on the user input to generate a detailed result. The detailed process has more recognition patterns and computing resources available to it. The present embodiment performs a comparison of the detailed result and the coarse result. The present embodiment displays a portion of the comparison on the display screen. | 11-04-2010 |
20100328026 | AUTHENTICATION OF AN ELECTROMAGNETIC TERMINAL-TRANSPONDER COUPLE BY THE TRANSPONDER - A method of authentication of a terminal generating a magnetic field, by a transponder including an oscillating circuit from which a D.C. voltage is generated, wherein the transponder: receives first data relative to the current in an oscillating circuit of the terminal, measured by the terminal for a first value of the resistive load of the transponder; and exploits these first data and second data relative to the level of said D.C. voltage, respectively measured for the first resistive load value and for a second resistive load value. | 12-30-2010 |
20100328027 | AUTHENTICATION OF AN ELECTROMAGNETIC TERMINAL-TRANSPONDER COUPLE BY THE TERMINAL - A method of authentication, by a terminal generating a magnetic field, of a transponder located in this field, wherein: first data, relative to the current in an oscillating circuit of the terminal, measured by the terminal for a first value of the resistive load of the transponder, are transmitted to the transponder; second corresponding data are evaluated by the transponder for a second value of the resistive load and are transmitted to the terminal; and said second data are compared with third corresponding data, measured by the terminal for the second value of the resistive load. | 12-30-2010 |
20100328028 | FLEXIBLE SEMICONDUCTOR DEVICE AND IDENTIFICATION LABEL - Provided is a flexible device ( | 12-30-2010 |
20110006878 | GAMMA STERILIZABLE RFID SYSTEM THAT PREVENTS UNAUTHORIZED OPERATION OF ASSOCIATED DISPOSABLE BIOPROCESS COMPONENTS - This invention provides a system and apparatus that is able to authenticate and prevent illegal manufacturing and unauthorized operation of disposable bioprocess components. This invention utilizes a ferro-electric random access memory (FRAM) chip to store error-correctable information on a RFID tag attached to the disposable bioprocess components, where the error-correctable information is written into the memory chip, so that the information can remain in the chip when the RFID tag and disposable bioprocess component is gamma-sterilized. Also, this invention includes a method for authenticating the disposable bioprocess component that reduces liability in that a counterfeit poor quality disposable component is not used on the hardware so the user will not file an unjustified complaint. | 01-13-2011 |
20110025458 | METHOD AND APPARATUS FOR AUTHENTICATING RFID TAGS - In an RFID system, a method and apparatus for linking an RFID tag to an associated object. The system includes a relatively simple tag, a reader, a linker, and a store. The reader interrogates the tag for an ID and selectively provides the ID to the linker. The linker, in turn, uses the ID to provide back to the reader an associated Uniform Resource Identifier (“URI”). The reader then forwards the URI to the store. In response, the store returns to the reader the object associated with the ID via the URI. The disclosed method and apparatus provide more efficient and secure tag authentication. | 02-03-2011 |
20110043326 | Broadcast receiver, mobile device, service providing method, and broadcast receiver controlling method - A broadcast receiver includes a mode determination unit to determine a current operation mode among a plurality of operation modes, a communication interface to transmit the determined current operation mode to a mobile device through interactive communication, and to receive a control command from the mobile device, and a controller to provide a service of the determined current operation mode according to the control command received from the mobile device. Accordingly, a user controls the broadcast receiver through the mobile device according to the operation mode so that user's convenience is improved. | 02-24-2011 |
20110043327 | PHYSICAL AND VIRTUAL IDENTIFICATION IN A WIRELESS POWER NETWORK - A wireless charging system is disclosed. The wireless charging system includes a detector configured to identify device information related to a device to be powered at a location, a location processor coupled with the detector and configured to deliver location-specific information related to the location to the device to be powered based on the detected device information, a power supply in communication with the location processor configured to wirelessly provide power to the device based on the detected device information, such that the location processor is configured to deliver the location specific information to the device via a first channel, and wherein the power supply is configured to wirelessly provide power to the device via a second channel. | 02-24-2011 |
20110050388 | Gesture Based Electronic Latch for Laptop Computers - A portable information handling system includes a top cover, a base, and an electronic latch. The top cover is connected to the base. The top cover has a gesture sensitive surface configured to receive a trace. The electronic latch is in communication with the gesture sensitive surface, and is configured to latch the top cover and the base together. The electronic latch is further configured to unlatch the top cover from the base in response to receiving a signal representing that the trace received on the gesture sensitive surface is proper. | 03-03-2011 |
20110050389 | LOW POWER WIRELESS CONTROLLER SYSTEMS AND METHODS - A wireless control device is described that single chip passive wireless control integrated circuit device. The device is coupled to an antenna configured to receive a radio signal and comprises a radio frequency transceiver circuit fabricated on a semiconductor substrate of an integrated circuit device and configured to extract information from the radio signal and a processor fabricated on the semiconductor substrate and configured to receive the information extracted from the radio signal and to respond to a command encoded in the information. A FET fabricated on the substrate operates as a switch and has a gate controlled by the processor. The FET can be configured to transmit an activation current provided to the integrated circuit device to an output of the integrated circuit device. The output may drive an actuator. | 03-03-2011 |
20110068893 | RFID FINGERPRINT CREATION AND UTILIZATION - Embodiments of the present invention provide a method, system and computer program product for creating and managing radio frequency identification (RFID) fingerprints to ensure item authenticity. In an embodiment of the invention, an object fingerprint creation method can be provided. The method can include receiving a sensed signal from at least one RFID reader resulting from at least one RFID tag affixed to a target object. The method further can include extracting a voltage produced by the RFID tag from the sensed signal. Finally, the method can include storing the voltage as a fingerprint for the target object for later comparison with another fingerprint for an authenticating object to determine whether or not the authenticating object is the target object. | 03-24-2011 |
20110068894 | METHOD FOR AUTHENTICATING AN RFID TAG - To ensure data protection in an authentication method for use in an RFID system in accordance with the challenge-response protocol, the data communication between RFID reader and RFID tag is usually encrypted in addition. Such an authentication can be designed to an arbitrary degree of complexity and therefore inevitably requires a high level of investment in hardware and software resources. An RFID tag has a display, wherein the response is displayed on the display of the RFID tag and is read in by the RFID reader by an optical scanner. The response of the RFID tag can therefore be read out only when there is direct visual contact. | 03-24-2011 |
20110074540 | CONTROL SYSTEM AND METHOD FOR INTERFACE OF ELECTRONIC DEVICE - A control system for controlling interfaces of an electronic device. The electronic device includes a display device. The control system includes a storage module stores a plurality of human face images and desktop media files. A detecting module detects whether a face of a user is within a determined range and accordingly outputs a detection signal in response to the face being within the determined range. An image capture module captures a face image of the user according to the detection signal and outputs the face image. An identify module receives the face image and compares the face image with the plurality of stored human face images in the storage module, for identifying the age of the user, and output an identification result. A control module reads a corresponding desktop media file from the storage module according to the identification result and displays the media file on the display device. | 03-31-2011 |
20110080257 | CONFIGURABLE DISPLAY FOR SIGNAL ACTIVATED DEVICE - A system for providing a configurable display for a signal activated device may include a receiver, a memory, a processor, and a display. The receiver may be operative to receive a radio frequency signal. The memory may be coupled with the receiver, and may be operative to store an item. The processor may be coupled with the memory and may be operative to retrieve the item stored in the memory, in response to the activation signal received by the receiver. The processor may use a current induced in the receiver by the radio frequency signal to retrieve the item. The display may be coupled with the processor and may be operative to display the item retrieved from memory using the current induced in the receiver. | 04-07-2011 |
20110084796 | METHOD AND SYSTEM FOR SECURE RFID COMMUNICATION BETWEEN A NOISY READER AND A COMMUNICATING OBJECT - A method for communication between a RFID noisy reader ( | 04-14-2011 |
20110090044 | Information processing apparatus, communication apparatus, and program - An information processing apparatus includes: a storage block configured to store a first region as part of a layer structure; an execution block which, in response to a designation command transmitted by a communication apparatus to designate the creation of a second region as a lower layer of the first region, performs a region creation process for creating the second region as the lower layer of the first region; and a transmission block which, if the region creation process is stopped, then transmits first information indicating whether or not the second region is already created to the communication apparatus, in response to a request from the communication apparatus. | 04-21-2011 |
20110102135 | GEOGRAPHIC BASED REMOTE CONTROL - An intermediary between a remote control device and a remotely controllable device implements identification and/or authentication. The intermediary is, e.g., a node or set of nodes within a head end of a cable network service provider. A remote control device at a customer premise sends a command intended to control a remotely controllably device which is also located at the same customer premise. The customer premise includes a network interface, e.g., a cable modem, which has associated identification information. The command and the associated network interface identification information are communicated to the intermediary, e.g., via a cable modem. The intermediary accesses a subscriber record corresponding to the location based on the network interface identification information. The intermediary identifies the device to be controlled, e.g., a particular set top box and/or authenticates the remote control device. A command is sent via the network to the device to be controlled. | 05-05-2011 |
20110102136 | INFORMATION PROCESSING APPARATUS, POWER-SUPPLY CONTROL METHOD, PROGRAM, AND POWER-SUPPLY CONTROL SYSTEM - An information processing apparatus includes: a first connection section to which a first power-supply device is connected; a second connection section to which a second power-supply device is connected; a setting determiner that determines whether or not identification information is to be set for each power-supply device on the basis of connection states and setting control information; an authenticator that selectively obtains, when the setting determiner determines that identification information is not to be set, identification information from the power-supply devices connected to each connection section and that authenticates the obtained identification information; an identification-information setter that causes, when the setting determiner determines that identification information is to be set, unique identification information to be set for each power-supply device; and a processor that selectively performs executable power-supply-related processing on the basis of a result of the authentication or the identification-information setting and of processing control information. | 05-05-2011 |
20110109427 | IMAGE PROCESSING APPARATUS AND METHOD OF CONTROLLING THE IMAGE PROCESSINGAPPARATUS - A process to generate a request for a copy process occurs at the side of a Web server before the copying is actually started since a user has selected the copy function of an MFP. If the user instructs logout from the MFP during the process, it is determined that the user has no right because the authentication context of the user is deleted from the MFP. Accordingly, it is not possible for the user to perform the copying. | 05-12-2011 |
20110109428 | System and Method for Article Authentication Using Signatures - A method and apparatus for determining a digital signature from an article. A coherent light source directs a beam to illuminate the article and a detector arrangement collects data points from light scattered from many different parts of the article to collect a large number of independent data points, typically 500 or more. By collecting a large number of independent signal contributions specific to many different parts of the article, a digital signature can be computed that is unique to the area of the article that has been scanned. This measurement can be repeated whenever required to test authenticity of the article. Using this method, it has been discovered that it is essentially pointless to go to the effort and expense of making specially prepared tokens, since unique characteristics are measurable a in a straightforward manner from a wide variety of every day articles. | 05-12-2011 |
20110109429 | System and Method for Article Authentication Using Thumbnail Signatures - A method and apparatus for determining a digital signature from an article. A coherent light source directs a beam to illuminate the article and a detector arrangement collects data points from light scattered from many different parts of the article to collect a large number of independent data points, typically 500 or more. By collecting a large number of independent signal contributions specific to many different parts of the article, a digital signature can be computed that is unique to the area of the article that has been scanned. This measurement can be repeated whenever required to test authenticity of the article. Using this method, it has been discovered that it is essentially pointless to go to the effort and expense of making specially prepared tokens, since unique characteristics are measurable a in a straightforward manner from a wide variety of every day articles. | 05-12-2011 |
20110109430 | System And Method For Article Authentication Using Blanket Illumination - A method and apparatus for determining a digital signature from an article. A coherent light source directs a beam to illuminate the article and a detector arrangement collects data points from light scattered from many different parts of the article to collect a large number of independent data points, typically 500 or more. By collecting a large number of independent signal contributions specific to many different parts of the article, a digital signature can be computed that is unique to the area of the article that has been scanned. This measurement can be repeated whenever required to test authenticity of the article. Using this method, it has been discovered that it is essentially pointless to go to the effort and expense of making specially prepared tokens, since unique characteristics are measurable a in a straightforward manner from a wide variety of every day articles. | 05-12-2011 |
20110128120 | SYSTEMS AND METHODS FOR DETERMINING AUTHENTICITY OF SUBSTANCES - One embodiment of the present invention includes a system for determining authenticity of substances. The system comprises a plurality of RF sensors distributed in a predefined location pattern relative to a location for placing a substance under analysis. Each of the RF sensors is configured to transmit a response to an interrogation signal with a unique identifier. The system also comprises an RF transmitter that transmits sequences of interrogation signals over different frequency bands at one or more power levels and an RF receiver that receives responses to the sequences of interrogation signals transmitted from the RF sensors. The system further comprises a response pattern analyzer that determines response patterns for the RF sensors to the interrogation sequences and transmits a difference indicator if at least one of the determined response patterns varies from a predetermined signature of an authentic substance. | 06-02-2011 |
20110133883 | ANONYMOUS AUTHENTICATION METHOD BASED ON PRE-SHARED CIPHER KEY, READER-WRITER, ELECTRONIC TAG AND SYSTEM THEREOF - An anonymous authentication method based on a pre-shared key, a reader-writer, an electronic tag and an anonymous bidirectional authentication system are disclosed. The method comprises the following steps: 1) a reader-writer sends an accessing authentication requirement group to the electronic tag; 2) after the electronic tag receives the accessing authentication requirement group, an accessing authentication response group is constructed and sent to the reader-writer; 3) after the reader-writer receives the accessing authentication response group, an accessing authentication confirmation group is constructed and sent to the electronic tag; 4) the electronic tag carries out confirmation according to the accessing authentication confirmation group. | 06-09-2011 |
20110140836 | COMMUNICATION PAD FOR A COMMUNICATION TERMINAL - A communication pad for communication with a communication terminal is provided, wherein the communication pad comprises a processing unit and a non-volatile memory having a crypto key and/or a unique identification code stored thereon, wherein the processing unit is adapted to process the crypto key together with authentication challenge data to generate an authentication response, and wherein the communication pad is adapted to be identified to the communication terminal by sending the authentication response and/or a unique identification code to the communication terminal. In particular, the communication pad may be a user proprietary game pad, adapted to communicate with an open domain stand-alone or network-based game terminal. | 06-16-2011 |
20110148570 | Configuration RFID Circuit - A radio-frequency identification (RFID) reader circuit includes a transceiver configured to communicate with a plurality of different types of RFID transponders using radio frequency signals. The RFID reader circuit includes a processor circuit that is configured to detect and communicate with the plurality of different types of RFID transponders via the transceiver, respectively using a command set for the type of RFID transponder that the processor circuit is communicating with. The processor circuit is further configured to, in response to detecting an RFID transponder having configuration data for a new command set, access and use the configuration data for the new command set to update a configuration of the RFID reader circuit to enable communication with a new type of RFID transponder. | 06-23-2011 |
20110163844 | IDENTIFICATION ELEMENT HAVING AN OPTICAL TRANSPONDER - An identification element has a transponder with a data-emitting transmission unit and with a data-receiving reception unit in order to communicate with a device for registering and/or controlling access authorization to spaces or objects. In addition, a control circuit is provided for the transmission unit and reception unit. The transponder is an optical transponder ( | 07-07-2011 |
20110169602 | SYSTEM AND METHOD FOR MONITORING PRODUCTS IN A DISTRIBUTION CHAIN - In a product distribution system, a product with a product identification code (e.g., a serial number) is shipped between the different entities of a chain with a security label having a security label code. At each entity, the product can be authenticated by sending a query with the security label to the product source. At the product source, the received label code is compared to a label code stored in a database. Preferably the label codes are indexed with the product identification and if they match, a verification of authenticity is sent to the entity. In addition, if the entity desires to relabel the product before sending it on the chain, the source generates a new label code, stores the new label code so that it can be authenticated in the future and sends information to the entity for generating the new label with the new label code. The entity cannot generate or print a new label without receiving the label code from the source. | 07-14-2011 |
20110187494 | METHOD AND APPARATUS TO VALIDATE A SUBSCRIBER LINE - A method is described of providing validation data associated with a subscriber line of a telecommunication network using a validation system. The method includes obtaining line data of the subscriber line wherein the line data is suitable for interrogating a line identification database (LIDB). The method interrogates the LIDB with the line data to obtain reference subscriber data associated with the line data, and processes the reference subscriber data to obtain validation data associated with the subscriber line. The method includes identifying a local exchange carrier (LEC) associated with the subscriber line to determine if a billing arrangement exists between the validation system and the LEC. The invention extends to a subscriber line validation system to validate a subscriber line of a communication network. | 08-04-2011 |
20110205015 | METHOD FOR CHALLENGE RESPONSE AUTHENTICATION BETWEEN A READING DEVICE AND A TRANSPONDER USING CONTACTLESS DATA TRANSMISSION - A method for challenge-response authentication between a reading device and a transponder based on a contactless data transmission, according to which challenge data (CH) are transferred within an anti-collision loop from the reading device to the transponder by means of one or several commands (AC) of an anti-collision method, with the command or commands (AC) serving to determine transponder identification data. In the command or commands (AC) respective challenge data (CH) are contained in a data field (D | 08-25-2011 |
20110210820 | MULTIPLE NEAR FIELD COMMUNICATION TAGS IN A PAIRING DOMAIN - A system and method for simply and securely pairing multiple Bluetooth or other wireless electronic devices in a network. Multiple Near Field Communication (NFC) read-only tags are places in a vehicle or other defined space, such that users of NFC-enabled electronic devices can pass their device near one of the NFC tags, which then transfers encryption key data to the user's device, allowing that device to be automatically joined to a small, secure wireless network. Various embodiments are disclosed for establishing and controlling the network, and applications are suggested for using the ad-hoc network—such as for the control of a vehicle's entertainment system. | 09-01-2011 |
20110241823 | TAG-BASED PERSONALIZATION - Embodiments of methods and apparatus for tag-based personalization of kiosk computing devices are disclosed. In embodiments, an authentication server/system may receive, from a mobile device, a plurality data packets having data associated with a display tag of a kiosk computing device. The authentication system/server may, in response, instruct the kiosk to activate an account-specific mode based on an account associated with the mobile device. Other embodiments may be described and/or claimed. | 10-06-2011 |
20110241824 | IN-VEHICLE MOUNT TYPE BATTERY CHARGING SYSTEM, MANAGING SERVER, MANAGING SERVER CONTROL METHOD AND COMPUTER-READABLE MEDIUM STORING PROGRAM FOR MANAGING SERVER - An in-vehicle mount type battery charging system including a charging station having a charger for charging an in-vehicle mount battery of an electric vehicle, and a managing server connected to the charger. The managing server receives registration for enabling use of the charger from a user, authenticates the user when the user uses the charger and allows the user to use the charger when the user is authenticated as a registered member. Furthermore, the managing server receives temporary registration for temporarily enabling use of the charger from a user as a nonmember, authenticates the user when the user uses the charger and temporarily allows the user to use the charger when the user is authenticated as a registered temporary member. | 10-06-2011 |
20110241825 | IDENTIFICATION INFORMATION MANAGEMENT SYSTEM, METHOD OF GENERATING AND MANAGING IDENTIFICATION INFORMATION, TERMINAL, AND GENERATION AND MANAGEMENT PROGRAMS - An identification information management system according to the present invention comprises a plurality of terminals communicable with servers and a site management apparatus which manages site containing the terminals. The terminal has an identification information processing unit which assuming that a one-way hash function is f(x) and a terminal-unique ID is a, generates values x satisfying a conditional equation f(x)=a as identification information. | 10-06-2011 |
20110279226 | CHARGING SYSTEM AND CHARGING METHOD THEREOF - A charging system and the charging method are provided. The charging system comprises a charging unit and a rechargeable unit. The rechargeable unit includes a first wireless communication apparatus and a first wireless charging module. The charging unit includes a second wireless communication apparatus, a second wireless charging module and a processing module. The charging method comprises the steps of: transmitting an authentication code and a charging signal to the second wireless communication apparatus by the first wireless communication apparatus; verifying the authentication code by the processing module after receiving the authentication code and the charging signal from the second wireless communication apparatus; charging the first wireless charging module via wireless charging by the second wireless charging module controlled by the processing module when the authentication code is verified. | 11-17-2011 |
20110298582 | Visibility Radio Cap and Network - A pedigree tag for tracking and validating authenticity of contents in a container includes: a radio frequency modem operable at a low radio frequency, not exceeding one megahertz, and including a full duplex transmitter and receiver; an antenna operatively coupled with the radio frequency modem; a programmable microprocessor operatively coupled with the radio frequency modem; a memory operatively coupled with the programmable microprocessor; a clock; and a connector for connecting a power source for providing power to the microprocessor; wherein the pedigree tag is in a form factor conformable to the container to which it is affixed. | 12-08-2011 |
20110304425 | Systems and Methods for Efficient Authentication - A communication system is configured to operate in an ad hoc wireless network. The communication system includes a transmission device configured to send and receive a message, a signing module configured to generate a hierarchical signature using the message, and a verifying module configured to hierarchically verify a predetermined portion of a hierarchically signed message. | 12-15-2011 |
20120062360 | SYSTEM AND METHOD FOR CONTROLLING THE ACCESS TO A NETWORKED CONTROL SYSTEM - The invention relates to controlling the access to a networked control system such as a lighting control system or a home control system. According to an embodiment of the invention, a system for controlling the access to a networked control system ( | 03-15-2012 |
20120119875 | METHOD, PORTABLE DATA CARRIER, AND SYSTEM FOR ENABLING A TRANSACTION - A method, portable data carrier ( | 05-17-2012 |
20120139697 | IDENTIFYING AND GENERATING BIOMETRIC COHORTS BASED ON BIOMETRIC SENSOR INPUT - Biometric data, which identifies a set of biometric patterns, is received from a set of biometric sensors. The biometric data is processed to form digital biometric data that identifies attributes of the biometric data. Thereafter, a biometric cohort is generated using the digital biometric data. Each member of the set of biometric cohorts shares at least one biometric attribute in common. | 06-07-2012 |
20120154111 | METHOD FOR INSPECTING A PRODUCT AS AN ORIGINAL PRODUCT OF A PRODUCT PRODUCER - Against the background of continually growing problems of product piracy, in particular due to the further expansion and liberalization of international trade, there is great demand for automated and reliable inspection of the authenticity of products. The present disclosure relates to methods and systems for inspecting a product as an original product of a product producer by authenticating at least one RFID (Radio Frequency Identification) tag allocated to the product using an asymmetrical challenge response protocol. | 06-21-2012 |
20120161924 | Automatic Authentication of Electronic Devices - An electronic device with an embedded wireless tag may be authenticated by a linking partner, which may be another electronic device or a data network, before network connection can be established. In some embodiments, the electronic device includes an embedded wireless communicator for communicating with the wireless tag through a wireless link to retrieve identification data for authentication. In other embodiments, the electronic device cooperates with an external wireless communicator to retrieve stored identification data from the embedded wireless tag. In alternate embodiments, an electronic device may authenticate a peripheral device with an embedded wireless tag before connection can be established with the peripheral device. The electronic device may further erase the data stored on the peripheral device when authentication fails. | 06-28-2012 |
20120169459 | SYSTEM AND METHOD FOR PASSIVELY ACQUIRING EXISTING CUSTOMERS' MOBILE PHONE NUMBERS FROM CUSTOMER SERVICE LOGS - An entity passively acquires an existing customer's mobile phone number and links the customer's mobile phone number to the customer's account without requesting the customer to actively provide customer identifying information. This is accomplished by capturing the customer's mobile phone number when the customer uses a mobile phone to contact the entity and checking whether the captured mobile phone number is in a customer database. If the captured mobile phone number is not in the customer database, the customer using the mobile phone number may be validated by determining that the customer corresponds to a particular customer account and associating the captured mobile phone number with the particular customer account. For example, the validation of the customer may include analyzing entries in the service log to identify phone numbers, determining whether the identified phone numbers are mobile numbers or landline numbers, determining who the identified phone numbers belong to, and determining whether the identified person corresponds to an account in the customer database. If the captured mobile phone number is in the customer database, the customer using the mobile phone number may be validated against the corresponding customer account record to establish a confidence score. | 07-05-2012 |
20120188053 | System and method for monitoring patients that perform a medical self-check - A system for monitoring patients that perform a medical self-check includes a piece of equipment having a data entry unit, through which a user can enter one or more data; a user identification unit having a mother board configured to request a univocal identification datum and verify the identification entered by the user after the request; a clinical data acquisition unit configured to acquire one or more clinical data of the user after a positive user identification; a mobile telephony system; and at least one, preferably a plurality of diagnostic centers located in different parts and placed in communication with the piece of equipment through the mobile telephony system such that, in use, the piece of equipment transmits the data acquired through the mobile telephony system to a diagnostic center, so that the center can monitor and file such data. | 07-26-2012 |
20120200386 | METHOD OF MUTUALLY AUTHENTICATING A READER AND A RADIO TAG - A method and apparatus are provided for mutually authenticating a reader and a radio tag. The method includes: a step of the tag sending data to the reader, the data enabling an index to be determined for identifying an authentication coupon of the reader, the index being selected by the tag; a step of the reader obtaining the coupon from the determined index and of the reader sending the coupon to the tag; a step of the tag obtaining an authentication value from the selected index and of the tag verifying that the coupon received from the reader corresponds to the authentication value that is obtained, if the verification is positive, then a step of finalizing the authentication of the tag by the reader; and if the verification is negative, interrupting the mutual authentication method. | 08-09-2012 |
20120206234 | Systems for Activating and/or Authenticating Electronic Devices for Operation with Athletic Equipment - Articles of clothing or pieces of athletic equipment include modules, e.g., for sensing physical and/or physiological characteristics associated with use of the clothing or athletic equipment or for performing other functions. Such systems and methods may use physical or other interaction(s) between the module and the article of clothing or piece of athletic equipment for activating and/or deactivating the module and/or sensing devices included with the module, for confirming whether the module and clothing or piece of athletic equipment are authorized for use with one another, and/or for automatic data algorithm selection methods. Additionally, such systems and methods also may use the activation and/or authentication systems for data input to the module. Some examples of such systems and methods may utilize magnets and magnetic sensing systems and/or light (or other radiation) sources and sensing systems for activation, authentication, data input, and/or algorithm selection. | 08-16-2012 |
20120212321 | SYSTEM AND METHOD FOR MANAGING ACCESS TO AND TRACKING A PLURALITY OF CARTS - A system and method for managing access to a plurality of carts. A plurality of users may be created in a database, each user having unique identifying information. Users may be grouped into user groups when having similar attributes. Each cart may have an entry in the database with associated attributes. Carts may be grouped into cart groups for carts having similar attributes. Users may be given access to cart either individually, through a user group that has access to the cart, by given access to an entire group of carts, or through a user group that has access to an entire group of carts. The various associations can be interwoven to provide groups and sub-groups for managing applications where multiple users must interact with multiple carts. The carts can store access logs which may be communicated in real time to a computing device or may be stored locally at the cart for later access by an administrator. | 08-23-2012 |
20120218073 | Accessible Region of a Device - A device to detect a portable device associated with a user accessing an accessible region of the device with a sensor, identify the portable device and log the user into the device with a profile of the user if the accessible region is accessed by the portable device, and generate a session on the device based on the profile of the user. | 08-30-2012 |
20120229250 | HOST APPARATUS, ACCESSORY APPARATUS, AND AUTHENTICATING AND CONTROLLING METHOD THEREOF - A method for authenticating an accessory apparatus by a host apparatus is provided. The method includes receiving authentication information from the accessory apparatus, comparing the received authentication information and pre-stored authentication information and performing authentication with respect to the accessory apparatus based on a result of the comparing, and, if the authentication is normally performed, performing a function corresponding to the accessory apparatus, and, if the authentication is not normally performed, transmitting corresponding information to an external server. | 09-13-2012 |
20120235785 | WIRELESS COMMUNICATION DEVICE AND METHOD WITH INTELLIGENT AUTHENTICATION - A wireless communication device ( | 09-20-2012 |
20120242452 | USE OF RADIO FREQUENCY IDENTIFIER (RFID) TAGS FOR IDENTIFICATION OF AN AUTHENTICATION STATUS OF AN ITEM - A method and system for identifying an authentication status of a first item. An RFID reader transmits zero and a random number to a first RFID tag associated with the first item. The first RFID tag uses a hashing function to compute a hash (H | 09-27-2012 |
20120256723 | RANDOM LOCATION AUTHENTICATION - An authentication string, such as a password, consists of characters. Each of the characters in the authentication string is randomly associated with a defined location on a device. For example, an area on a touch screen can be associated with a character in the authentication string. When a user selects a location associated with the character, feedback is provided that identifies the character. When the user selects a location that is not associated with the character, feedback is provided that does not identify the character. | 10-11-2012 |
20120268238 | APPARATUS AND SYSTEM FOR PROVIDING WIRELESS CHARGING SERVICE - A wireless charging apparatus and system according to an embodiment of the present invention provides a wireless charging service through authentication so as to efficiently control charging rights with respect to a plurality of electronic devices, which desire to receive the wireless charging service using a shared wireless charging apparatus, resulting in allowing a user to get a stable wireless charging service and proposing a new benefit creation model. The wireless charging apparatus according to an embodiment of the present invention includes a wireless communication unit configured to receive authentication result information relating to a target electronic device from a server, and a wireless charging unit configured to wirelessly transmit power to the target electronic device if the authentication result information indicates a successful authentication, wherein the wireless communication unit transmits the authentication result information to the target electronic device if the authentication result information indicates an unsuccessful authentication. | 10-25-2012 |
20120268239 | METHODS, SYSTEMS AND COMPUTER PROGRAM PRODUCTS FOR REGISTRATION OF AND ANONYMOUS COMMUNICATIONS RELATED TO TAGGED OBJECTS - Systems and methods of registration of an anonymous tag having an owner with a location service include authenticating a tag sensor associated with the owner of the tag with the location service. The tag is placed within a defined transmission distance of the tag from the tag sensor associated with the owner. The tag is activated while it is within the defined distance from the tag sensor to initiate transmission of the self identification. The transmitted self identification is received at the tag sensor to detect the tag. It is determined that the detected tag is not yet registered with the location service and an identification of the tag and the owner is transmitted to the location service from the tag sensor to register the tag as belonging to the owner at the location service to limit registration of the tag at the location service. | 10-25-2012 |
20120274442 | METHOD AND SYSTEM FOR MEASURING THE MOBILITY OF AN ANIMAL - A method and system to measure and record the mobility score of quadrupeds is disclosed. The method and system determines when an animal is walking and measures dynamic parameters to assess gait and derive a mobility score. | 11-01-2012 |
20120313747 | METHOD FOR AUTHENTICATING SECURITY MARKERS - A method for authenticating security markers includes preparing a security marker with at least two or more optically active compounds; applying the security marker to an article to be authenticated; illuminating the security marker with radiation; detecting the optical response of the security marker; and wherein the two or more optically active compounds have a complementary response to different wavelengths of the illuminating radiation. | 12-13-2012 |
20120313748 | AUTHENTICATION OF A SECURITY MARKER - A method for authenticating security markers includes illuminating the security marker with a laser, detecting an optical response from the security marker, changing a temperature of the laser to vary the wavelength of radiation produced by the laser; detecting changes in the optical response from the security marker as the wavelength of the radiation changes, comparing the optical response profile from the security marker as it varies with changes in wavelength to a reference profile; and authenticating the security marker if the optical response profile matches the reference profile. | 12-13-2012 |
20120313749 | AUTHENTICATION OF A SECURITY MARKER - An apparatus for authenticating security markers includes a laser or LED for illuminating the security marker; a detector for detecting an optical response from the security marker; an element for changing a temperature of the laser or LED to vary the wavelength of radiation produced by the LED; a detector for detecting changes in the optical response from the security marker as the wavelength of the radiation changes; a microprocessor for comparing the optical response profile from the security marker as it varies with changes in wavelength to a reference profile; and authenticating the security marker if the optical response profile matches the reference profile. | 12-13-2012 |
20120319815 | AUTHENTICATION SYSTEMS AND METHODS - A system includes a machine-readable storage medium, a processor in communication with the machine-readable storage medium, communication circuitry in communication with the processor; and a plurality of sensors in communication with the processor. Each of the plurality of sensors is configured to generate an electrical signal in response to receiving wave energy. The processor is configured to control data acquisition for authenticating an object using at least a subset of the plurality of sensors, calculate an authentication value based on signals received from the subset of the plurality of sensors, and cause the communication circuitry to transmit an authentication request including the authentication value to an authentication entity. | 12-20-2012 |
20120319816 | PATIENT MONITOR CAPABLE OF MONITORING THE QUALITY OF ATTACHED PROBES AND ACCESSORIES - A system and method to help maintain quality control and reduce cannibalization of accessories and attached probes in a highly sensitive patient monitor, such as a pulse oximetry system. One or more attached components may have information elements designed to designate what quality control mechanisms a patient monitor should look to find on that or another component or designate other components with which the one component may properly work. In a further embodiment, such information elements may also include data indicating the appropriate life of the component. | 12-20-2012 |
20120326838 | METHOD OF TRANSFERRING ENERGY BETWEEN A FIRST UNIT AND A SECOND UNIT - A method for transferring energy between first and second units with first and second meters and subscriptions to first and second backend platforms, as well as a first unit for supporting such energy transfer, where the backend platforms execute an authentication procedure and a switch is unbarred by the first control box upon successful execution of the authentication procedure. A second control box sends an amount of the transferred energy measured by the second meter to the first control box energy consumption to data is sent to the backend platforms, and a consumption clearing procedure is executed between the first and the second units at the backend platforms by means of the received energy consumption data. | 12-27-2012 |
20130002398 | Apparatus, System, and Method for Providing Attribute Identity Control Associated with a Processor - Described herein are an apparatus, system, and method for attribute identity control in a processor. The apparatus comprises a logic unit including a radio-frequency identification (RFID) tag comprising a non-volatile memory; and a processor operable to access the non-volatile memory, wherein the non-volatile memory for storing an attribute identity associated with a group of processors, the attribute identity being different from an identity of the processor. | 01-03-2013 |
20130015948 | CARD DEVICEAANM AKITA; KojiAACI KanagawaAACO JPAAGP AKITA; Koji Kanagawa JPAANM HORIKAWA; SeiichiroAACI KanagawaAACO JPAAGP HORIKAWA; Seiichiro Kanagawa JPAANM KASAMI; HideoAACI KanagawaAACO JPAAGP KASAMI; Hideo Kanagawa JP - According to one embodiment, a card device includes an authentication unit, a wireless communication unit, and a control unit. The authentication unit performs an authentication process with an external device via wired communication. The wireless communication unit performs wireless communication with the external device. The control unit controls the wireless communication unit to reduce radio waves radiated from the wireless communication unit when the control unit detects that the authentication process is being performed. | 01-17-2013 |
20130038424 | ATTENUATION LEVEL BASED ASSOCIATION IN COMMUNICATION NETWORKS - An electric vehicle can be configured to execute an association procedure with one or more charging stations in a charging facility to securely connect to and receive electric power from one of the charging stations. The electric vehicle can broadcast one or more service matching messages to the charging stations and, in response, can receive attenuation information from one or more of the charging stations. The electric vehicle can analyze the attenuation information received from the charging stations to identify with which charging station the electric vehicle should associate (e.g., to determine which charging station should provide electric power to the electric vehicle). The electric vehicle can then associate with (and receive electric power from) the identified charging station. | 02-14-2013 |
20130063244 | SYSTEM AND METHOD FOR CONTROLLING VEHICLE IGNITION - The system for controlling vehicle ignition provides three separate levels of access to prevent unauthorized users from actuating ignition of a vehicle. The system includes a radio frequency identification tag having permanent computer readable memory and volatile computer readable memory associated therewith. The radio frequency identification tag is preferably embedded within a vehicle key. A predetermined permanently assigned authentication code is stored in the permanent computer readable memory and a variable time stamp is stored in the volatile computer readable memory. The permanently assigned authentication code and the variable time stamp are transmitted upon activation of the radio frequency identification tag. Vehicle ignition occurs only upon the mechanical operation of the key in a conventional ignition switch and matching of both the permanently assigned authentication code and the variable time stamp with codes and stamps stored in vehicle memory. The time stamp represents time and date of prior ignition actuation. | 03-14-2013 |
20130135080 | TAG FORGERY PROTECTION - A method for determining the authenticity of an article including a microchip package, wherein the microchip package includes a sensing element. The method includes receiving a value of a measurable quantity. The value of the measurable quantity is measured using the sensing element. The value of the measurable quantity is indicative of an environment. Reference information indicative of the environment I received. The received value of a measurable quantity and the reference information are used to determine the authenticity of the article comprising the microchip package. A computer program product including a non-transitory computer readable medium and computer program code which when executed by a data processor is for executing the method. An apparatus for determining the authenticity of an article including a microchip package including a sensing element. | 05-30-2013 |
20130135081 | Systems And Methods For Authenticating Objects Using IR - Systems and methods authenticate an object using IR. IR is projected at a first wavelength onto the object and a first image of the object is captured during the projection of the IR. The object is authenticated by processing the first image to detect IR fluorescence from an IR fluorescing material incorporated into the object in response to the projected IR, where presence of the IR fluorescence within the first image indicates authentication of the object. | 05-30-2013 |
20130169409 | ANTI-COUNTERFEITING ARTICLE AND METHOD THEREOF - An anti-counterfeiting article includes a first part, a second part, a first radio frequency identification (RFID) tag, and a second RFID tag. The second part of the article is detachably attached to the first part. The first RFID tag is attached to the first part, and the second RFID tag is attached to the second part. The first RFID tag pre-stores a first identification code, the second RFID pre-stores a second identification code, the first identification code is identical with or is related to the second identification code in a some way or according to a predetermined criteria for confirming the status of the article as a certified product. | 07-04-2013 |
20130176104 | Semiconductor-Based Device Authentication - Various embodiments of devices and associated methods are described herein for authenticating electrical devices. In one aspect, an electrical device is provided comprising an interface configured to receive and transmit signals; a power line coupled to the interface and configured to provide a power signal thereto; and an authentication circuit coupled to the interface and the power line. The authentication circuit is configured to disable the power signal on the power line for a specified time period in response to an authentication request signal received at the interface and to provide an authentication response signal on the power line to represent the disabling of the power signal. | 07-11-2013 |
20130187752 | Coded Doorbell Chime - A coded doorbell chime and a system therefore that is useful for effectively screening visitors at an entrance into the structure by providing one or more different doorbell sounds for different visitors or categories of visitors, such as family, friends and the like. The coded doorbell chime comprises a doorbell activating device, having a housing, a doorbell switch and a keypad associated therewith, and a sound producing mechanism, having a housing, sound generator and a speaker associated therewith, operatively connected to the doorbell activating device. Selected visitors enter a code to produce a first sound identifying them as a person the occupant of the structure knows. Other visitors use the doorbell switch to produce a second sound that identifies them as a person the occupant does not know. Preferably, the doorbell switch is on the outer surface of a moveable cover that hides the keypad when the cover is closed. | 07-25-2013 |
20130194065 | Communication Method in a Home-Automation Installation - The communication method applies to a home-automation installation comprising at least one sending element, a self-powered receiving element and an element for substituting for the receiving element. The method is such that, when the receiving element is in a sleep mode, the substitution element receives and records information sent by the sending element for the attention of the receiving element and such that, when the receiving element is no longer in sleep mode, the substitution element sends the information for the attention of the receiving element. | 08-01-2013 |
20130222109 | System-Level Chip Identify Verification (Locking) Method with Authentication Chip - A system for authenticating electronic devices, particularly chips or integrated circuits is described. This allows authenticating that the devices are authorized by the original manufacturer for operation in critical applications. | 08-29-2013 |
20130257587 | AUTHENTICATION OF A TERMINAL BY AN ELECTROMAGNETIC TRANSPONDER - A method of authentication of a terminal generating a magnetic field by a transponder including an oscillating circuit from which a D.C. voltage is generated, wherein at least one quantity depending on the coupling between the transponder and the terminal is compared with at least one reference value. | 10-03-2013 |
20130265134 | RFID TAGS AND PROCESSES FOR PRODUCING RFID TAGS - A Radio Frequency Identification (RFID) tag. The RFID tag comprises a flexible substrate and an integrated circuit embedded within the flexible substrate. The top surface of the integrated circuit is coplanar with the flexible substrate. At least one conductive element is formed on the flexible substrate. The conductive element is electrically connected to the integrated circuit. The conductive element serves as an antenna for the RFID tag. | 10-10-2013 |
20130278378 | SECURE EPASS BOOKLET BASED ON DOUBLE CHIP TECHNOLOGY - A tamper-evident credential has a radio frequency identification (RFID) package with a first antenna and a subordinate antenna, RFID package defining a first part of the credential. The credential also has a subordinate RFID package defining a second part of the credential. The subordinate RFID package selectively coupled to said subordinate antenna so that an interrogation signal applied to said first antenna package is transmitted to the subordinate RFID package across said subordinate antenna. | 10-24-2013 |
20130307667 | AUTHENTICATION SYSTEM OF PORTABLE ELECTRONIC DEVICE AND PORTABLE ELECTRONIC DEVICE USING THE SAME - An authentication system of a portable electronic device is disclosed. The authentication system of a portable electronic device includes a first identity recognition module, a second identity recognition module, an application module, an authentication module and a near field communication (NFC) module. The application module enables the first identity recognition module or the second identity recognition module according to a setting. The authentication module is electrically connected to the first identity recognition module and the second identity recognition module. The authentication module authenticates the first identity recognition module or the second identity recognition module which is enabled. The NFC module is electrically connected to the first identity recognition module and the second identity recognition module. The NFC module executes a corresponding function according to the first identity recognition module or the second identity recognition module which is enabled and authenticated. | 11-21-2013 |
20130314206 | VERIFYING IDENTIFICATION OF SEQUENTIALLY SUPPLIED FLUIDS - A method of verifying the identification of fluids to be supplied successively through a fluid-supply hose that selectively connects to successive movable, RFID-tagged fluid containers includes providing an RFID reading unit including an antenna. A sequence of reference container identification codes is received. A container-present indication indicating one of the containers is positioned so that its RFID tag is in the antenna range is received. In response, the RFID tag of that container is read using the RFID reading unit to determine an identification code of the container. A controller automatically verifies the determined container identification code against the first reference identification code in the sequence using a controller. The starting through verifying steps are repeated, using successive values from the sequence in the verifying step, until all values in the sequence have been verified against container identification codes read using the RFID reading unit. | 11-28-2013 |
20130314207 | DRIVER'S LECENSE DETECTOR - A license detector system enables a person such as a police officer to monitor vehicles on the road to ensure drivers have valid licenses. Within each valid license is an RFID tag which contains specific information and each RFID tag is able to send that information to a detector when requested. To use the system, the police officer aims the detector at a vehicle, initiates the signal to be received by the RFID tag within the license and waits to receive a signal back from the RFID tag. If a signal is received, then a valid license has been detected within the vehicle. However, if no signal or an invalid signal is received by the detector, then no one, specifically the driver of the car, has a valid license. Upon discovering such information, the police officer should be justified in stopping the vehicle and taking the necessary police action. | 11-28-2013 |
20130342311 | PRODUCTION METHOD, RFID TRANSPONDER, AUTHENTICATION METHOD, READER DEVICE AND COMPUTER PROGRAM PRODUCT - The exemplary embodiments of the invention realize an efficient prevention of massive infiltration of cloned RFID transponders into existing and new RFID systems. Furthermore, reader devices used for authentication of RFID transponders do not need to be on-line and do not need to be equipped with a Security Authentication Module (SAM). This simplifies authentication procedures and reduces costs. According to an exemplary embodiment of the invention a transponder-specific originality signature is stored by a transponder manufacturer on the transponder. The transponder-specific originality signature may, for example, be stored in the non-volatile memory (EEPROM) of the transponder during the fabrication of the transponder. This transponder-specific originality signature can be checked at any time in a convenient way, which provides an indication of originality of said transponder. | 12-26-2013 |
20140009259 | SEA-BASED SECURITY ARCH FOR IDENTIFYING SHIPPING CONTRABAND - The invention discloses devices and methods for analyzing inbound and outbound ships for illegal or dangerous cargo or persons. An arch is generally placed several kilometers from shore, the arch including a plurality of distinct analytical and diagnostic equipment. A ship passing through the arch is analyzed by photographic, thermal and other means for presence of explosives, nuclear, chemical, or biological agents, terrorists, contraband, illegal passengers and/or other potential threats. Results from scanning are sent to appropriate security officials as are data of ships that attempt to circumvent the security arch. | 01-09-2014 |
20140009260 | System and Method for Querying Vehicle Status at a Checkpoint using Identity Information - A system and method for querying vehicle status at a checkpoint using identity information is disclosed herein. In one embodiment, a method of querying vehicle status can comprise storing identity information in a data store, receiving from a checkpoint computer data from a visitor, querying the profiles using the data to locate the first profile, querying a motor vehicle database using the vehicle information, obtaining a vehicle status from the motor vehicle database, and sending the vehicle status to the chekpoint computer. First profile can be one of a plurality of profiles in the data store. Further, the data used for querying the profiles can comprise at least a portion of the identity information. | 01-09-2014 |
20140055233 | SYSTEM AND METHOD FOR FACILITATING COMPATIBILITY BETWEEN MULTIPLE IMAGE DETECTORS AND IMAGING DEVICE - A system for facilitating compatibility between multiple image detectors and a medical imaging device is disclosed. The system comprises a memory for storing a detector identifier comprising a hardware ID associated with an image detector and firmware ID associated with a software application in the medical imaging device. The firmware ID comprises a plurality of strings. A processor receives a firmware identifier from the image detector and establishes a compatibility of the image detector with the medical imaging device based on the firmware identifier and the detector identifier. | 02-27-2014 |
20140062652 | ITEM AUTHENTICATION - Mechanisms for validating the authenticity of an item. A reader device records authentication data that is obscured in a label. The authentication data is provided to a remote authentication server via a network. The reader device receives, from the remote authentication server, an authentication response based on the authentication data. Based at least in part on the authentication response, the reader device displays an indication that identifies whether the item is authentic. | 03-06-2014 |
20140077928 | System, Method and Computer Program Product for Detecting Tampering in a Product - A system for detecting tampering in a product having a tamper-detector seal, including a secure element configured to store a digital signature and a data associated with the digital signature, transmit the digital signature and the data associated with the digital signature in response to a request, detect tampering of the tamper-detector seal, and modify the data associated with the digital signature if tampering is detected. The system further includes a seal validation device configured to receive a public key associated with the product, request the digital signature and the data associated with the digital signature from the secure element, and validate the digital signature utilizing the data associated with the digital signature and the public key associated with the product. | 03-20-2014 |
20140091902 | SYSTEM FOR VERIFYING A COMMUNICATION DEVICE AND A SECURITY COMMUNICATION DEVICE - A system for verifying a communication device, the system comprising at least a one communication device comprising a transmitter for performing communication, and a storage for holding first information, the first information comprising ID information of the communication device, at least a one security communication device comprising a transmitter for performing communication, and a storage for holding second information, the second information comprising ID information of the security communication device, a verification element, and a communication element for receiving the ID information from one or more of the communication devices and one or more of the security communication devices, transmitting the received ID information to the verification element, wherein the verification element is adapted to verify each of the one or more communication devices only if the received ID information of the pertaining communication device can be verified and the received ID information of at least one of the one or more security communication devices can be verified. | 04-03-2014 |
20140111305 | VERIFYING SYSTEM AND A METHOD THEREOF - This invention discloses a verifying system and method thereof. The verifying system comprises a plurality of objects to be verified and a verifying end. Each of the objects to be verified respectively comprises an identifying code. The verifying end has a database, and the database stores a plurality records of information of the objects respectively corresponding to each of the indentifying codes. When a user utilizes an electronic device to read one of the indentifying codes for making the electronic device connect to the verifying end, the verifying end compares the identifying code with the plurality records of information of the objects to generate an information of verification results which is then transmitted back to the electronic device. Herewith the effect of the present invention being verifying authenticity of the object by the indentifying code is achieved. | 04-24-2014 |
20140118106 | SYSTEMS AND METHODS FOR IDENTIFYING PROCESS MOLDED PARTS - A system and method are provided for reading and identifying molded products based on detecting intentionally introduced defects in the molded products that were included to identify and authenticate the molded products, or to confirm compatibility of the molded products in devices in which the molded products are installed for use. Process conditions in the fabrication or formation of melt processed parts are modified to deliberately introduce surface, detectable defects into the melt processed parts. A Quality Review (QR) code that specifies a compilation of at least some of the actual defects that are present in the molded part is provided, potentially encrypted, for comparison purposes. | 05-01-2014 |
20140132390 | INTELLIGENT LIGHTING NETWORK FOR GENERATING LIGHT AVATARS - Disclosed is an intelligent lighting network for facilitating operation of a lighting system including at least one controllable light source and configured to generate light representing light avatars uniquely associated one or more users of a plurality of users. The light avatar is a light pattern suitable to represent the user and/or convey information about the user to other users. | 05-15-2014 |
20140159860 | Gas Activated Changes to Light Absorption and Emission Characteristics for Security Articles - Disclosed are security articles and methods and systems for authenticating security articles using a plurality of stimuli. According to one embodiment, an illustrative security feature includes an encoded feature wherein differential activation of phosphorescent or fluorescent materials creates a machine readable code through the simultaneous presence of a source of electromagnetic radiation and a specific gas environment. A detector detects a differential spectral emission across the security feature that results from the change in gas environment. The spectral emission may be compared to an expected emissive signature to determine authenticity of the security article. | 06-12-2014 |
20140266581 | MODULAR SMART LABEL DATA TRANSMISSION SYSTEMS FOR APPLIED END-USER OPTIMIZATION - Disruption tolerant transmission of supply chain and end user data allows for both advanced safety assurances and enhanced personalized utility of medical devices in or near the clinical environment. The embodiment of this invention encompasses the application of disruption tolerant transmission smart labels to microneedle patches and other modular medical devices bearing obvious and or nonobvious patentable features. | 09-18-2014 |
20140292477 | SYSTEM AND METHOD FOR IDENTIFICATION AND AUTHENTICATION OF PRECIOUS METALS AND SMALL JEWELRY ITEMS USING RADIO FREQUENCY IDENTIFICATION ("RFID") TECHNOLOGY - A system and method is provided for the identification and authentication of precious metals and small jewelry. The system can include an embedded RFID tag, RFID tag reader and reader based unit (wired or wireless), and a basic tag information system for tag capture, look-up and display. The RFID tag can be embedded in absorbing dielectric medium inside epoxy in a tiny cavity placed in the metal or jewelry. A thin layer of epoxy placed over the tag can ensure that the tag will not be damaged from rubbing against skin, abrasion or chemicals while still allowing the desired electromagnetic properties (antenna and the circuitry performance). The RFID tag information can be transferred to a computer through the reader, and can be matched with preprogrammed information in a database. | 10-02-2014 |
20140306797 | FILTER ASSEMBLIES - A fume extraction apparatus ( | 10-16-2014 |
20140340192 | VEHICLE IDENTIFICATION SYSTEM AND METHOD - Exemplary systems and methods are directed to establishing a signature for a device emitting electromagnetic radiation (EMR). The system includes a radio frequency (RF) receiver, a signal processor, and a signature generator. The RF receiver samples detected EMR, generate pulses having characteristics that are a function of the EMR, and select generated pulses in a spectral band having energy above a predetermined threshold. The signal processor establishes a set of correlated pulses, computes a vector space associated with the set of correlated pulses, and compares each pulse in the set of correlated pulses to a basis of the vector space for establishing a device signature, and associates pulses having a threshold percentage of energy within the basis in a database with a device identifier. | 11-20-2014 |
20140368311 | Proper Installation Determination Based on RFID - A radio frequency identification (RFID) transceiver may be associated with an identification proximity to identify an RFID tag associated with a component. A control may determine proper inflation of component based on the RFID tag being identified. | 12-18-2014 |
20140368312 | Authentication method between a reader and a radio tag - A method for authenticating a reader to a radio tag includes the following steps, which are implemented by the tag: receiving a piece of information ciphered by a reversible operation, which is parameterized by an authentication coupon for the reader, and a data item allowing determination of an index for identifying the authentication coupon of the reader; calculating a current authentication coupon for the reader as a function of the index; deciphering the received piece of information ciphered by the reversible operation, which is parameterized by the calculated current authentication coupon; and checking the deciphered piece of information that is intended to verify that the calculated current coupon corresponds to the authentication coupon used by the reader in order to parameterize the reversible operation. | 12-18-2014 |
20140375419 | METHOD AND APPARATUS FOR DETECTING ACCESSORIES IN ELECTRONIC DEVICES - A method and an apparatus for detecting an accessory in an electronic device. A connection of accessory with an interface unit is detected. An analog signal in a predetermined frequency is generated. The generated analog signal is applied to an identification terminal of the interface unit. The applied analog signal is converted to a digital signal and the type of the accessory is identified based on the converted digital signal. | 12-25-2014 |
20150022314 | METHOD FOR AUTHENTICATING AN RFID TAG - A method for authenticating an RFID tag with the aid of an RFID reader via a radio interface, wherein a user-specific key is stored in the RFID reader and a tag-specific identifier and a password generated from the identifier and the key in accordance with a known derivative function are stored in the RFID tag, comprising the following steps performed in the RFID reader: receiving via the radio interface the identifier of an RFID tag to be authenticated, generating the correct password from the received identifier and the stored key according to the known derivative function, and generating at least one incorrect password differing from the correct password, sending a series of at least two passwords, at least one being correct and at least one being incorrect, via the radio interface to the RFID tag, and authenticating the RFID tag if no confirmation response is received to any incorrect password. | 01-22-2015 |
20150070131 | METHOD AND APPARATUS FOR DETECTING BOARDING OF A MEANS OF TRANSPORT - An approach is provided for detecting when a user has boarded a means of transport. The sensor platform may determine sensor information associated with at least one device, wherein the sensor information is collected from one or more sensors that do not include one or more satellite-based location sensors. Then, the sensor platform may process and/or facilitate a processing of the sensor information to determine at least one entry or at least one exit of the at least one device with respect to at least one structure, at least one supporting structure associated with the at least one structure, or a combination thereof associated with one or more transport means. | 03-12-2015 |
20150289944 | DEVICES, SYSTEMS AND METHODS FOR AUTHENTICATED INTRAVASCULAR DEVICE USE AND REUSE - Devices, systems, and methods for reconditioning an intravascular device for reuse are provided. The method includes reading first security data from a memory of the intravascular device; determining if the intravascular device is authentic; generating second security data, when the intravascular device is authentic; and writing the second security data to the memory of the intravascular device. Devices, systems, and methods for authenticating an intravascular device for use are also provided. The method includes bringing an intravascular device into communication with a computing device, the intravascular device including a memory; determining if first security data is authentic; determining, when the first security data is authentic, if the intravascular device has been reconditioned; determining, when the intravascular device has been reconditioned, if the second security data is authentic base; and permitting, when second security data is authentic, use of the intravascular device in the clinical procedure. | 10-15-2015 |
20150317501 | SYSTEMS AND METHODS FOR USE IN AUTHENTICATING AN OBJECT - A system for use in authenticating an object is provided. The system includes a radio-frequency identification tag coupled to the object and an interrogation system. The interrogation system includes a backscatter x-ray source configured to discharge backscatter x-ray beams towards the object. The backscatter x-ray source is calibrated such that the backscatter x-ray beams cause the radio-frequency identification tag to emit a signal. The system also includes a radio-frequency detector configured to receive the signal from the radio-frequency identification tag and a computing device in communication with the radio-frequency detector. The computing device is configured to obtain first identifying information of the object from the signal and authenticate the object from the first identifying information. | 11-05-2015 |
20160042207 | SYSTEMS AND METHODS FOR END-TO-END SECURE LINK BETWEEN A NEAR-FIELD COMMUNICATION (NFC) CHIP AND SERVER - Systems and method of the present solution are directed to authenticating and updating a near-field-communication (NFC) chip over a network. According to one aspect, a method of authenticating and updating a NFC chip over a network includes identifying, by a device, a NFC chip of the device. The NFC chip is configured with an identification code established by a NFC server to uniquely identify the NFC chip. The method includes sending, by the device, a signal that includes the identification code over a network to the NFC server. The method further includes establishing a secure communication link over the network between the NFC server and the device responsive to authenticating the NFC chip by the NFC server via the identification code. The method also includes receiving, by the device via the secure communication link, data from the NFC server to store to the NFC chip and storing, by the device, the data to the NFC chip. | 02-11-2016 |
20160070936 | ELECTRONIC APPARATUS - An electronic apparatus includes an authentication unit that executes an authentication process for authenticating a battery connected to the electronic apparatus, a holding unit that holds a value representing a result of the authentication process, wherein the value held by the holding unit is deleted in a case where the battery is removed from the electronic apparatus, or in a case where a voltage of the battery is equal to or less than a predetermined value, and a control unit that performs control to determine whether to cause the authentication unit to execute the authentication process according to the value held by the holding unit. | 03-10-2016 |
20160086004 | AUTHENTICATION SYSTEMS AND METHODS - A system includes a machine-readable storage medium, a processor in communication with the machine-readable storage medium, communication circuitry in communication with the processor; and a plurality of sensors in communication with the processor. Each of the plurality of sensors is configured to generate an electrical signal in response to receiving wave energy. The processor is configured to control data acquisition for authenticating an object using at least a subset of the plurality of sensors, calculate an authentication value based on signals received from the subset of the plurality of sensors, and cause the communication circuitry to transmit an authentication request including the authentication value to an authentication entity. | 03-24-2016 |