Abstract: A portable RFID detector that can be configured to scan an object and determine whether an RFID chip is included within or on the object is provided. Thee portable RFID detector can be utilized as a personal device allowing an individual to scan any number of objects for RFID chips. An indication of the presence or absence of an RFID chip can be presented to the user in any combination or sub-combination of a visual signal, an audible signal, vibratory signal, or other signal perceivable by a user. The portable RFID detector can be selectively activated and/or deactivated depending on the device configuration. The portable RFID detector can have a small footprint allowing the detector to be easily carried, such as in a pocket, on a key chain, or through various other means.
Abstract: An access port has an RF tag associated therewith (e.g., physically incorporated into the access port), wherein the RF tag includes configuration information. A mobile unit having an RF tag reader associated therewith sends a probe request and reads the configuration information from the RF tag. The RF tag may include, for example, information traditionally incorporated into an IEEE 802.11 probe response or beacon. The tag may include, for example, non-real-time configuration information, such as capabilities of the access port, data rates, and the like.
Abstract: Apparatus, systems, and methods for enabling a radio frequency identification (RFID) passive tag to be visible as an RFID active tag over an extended period of time are disclosed. An RFID reader transmits a substantially continuous radio frequency (RF) charging signal. In response to receiving the RF charging signal, one or more RFID passive tags each transmit a substantially continuous identifier signal. The RFID reader is configured to receive the identifier signal(s) and to determine a location and/or asset associated with each RFID passive tag.
Abstract: An RFID-based reminder system as described herein leverages RFID technology to manage deadline-driven items of correspondence such as bills, event invitations, meeting notices, voting ballots, jury duty notices, and the like. RFID tags are affixed to (or embedded into) items of correspondence, and the tags are programmed with relevant data such as a response deadline, the action to be taken, and the name of the originating company or entity. Upon receipt, the recipient can interrogate the correspondence using an RFID reader, and the received RFID tag data is processed by one or more software applications running on a computing device of the recipient. The computing device can then automatically generate event reminders that notify the user of approaching response deadlines for the items of correspondence.
Abstract: A system for communicating data through a network is disclosed. The system includes at least one access point and at least one mobile unit. The access point includes an access point processor, a wireless transceiver and an RFID transceiver. The wireless transceiver is coupled to the access point processor and the wireless transceiver is configured to receive and transmit data to a wireless device in the wireless local area network. The RFID transceiver is coupled to the access point processor and the RFID transceiver is configured to receive data from at least one mobile unit in the wireless local area network when the wireless transceiver is unavailable. The mobile unit includes a mobile unit processor, a mobile unit wireless transceiver and a mobile unit RFID transceiver. The mobile unit wireless transceiver is coupled to the mobile unit processor and the mobile unit wireless transceiver is configured to receive and transmit data to the access point.
Abstract: The present invention provides a method for interfacing a mobile device with a system including a plurality of RF ports and a cell controller adapted to communicate a data signal with the mobile unit through the RF ports. The method includes associating the mobile device with a first RF port using at least one security parameter for communicating the data signal, receiving a request message from the mobile device to roam from the first RF port to a second RF port, and associating the mobile device with the second RF port without changing the at least one security parameter.
Abstract: A method of obtaining a package is described. A user is electronically notified that a package has arrived at a predetermined location. The user then prints a paper receipt including a two-dimensional bar code encoding the user's previously provided biometric information. At the predetermined location, the user scans the two-dimensional bar code, which is decoded to obtain the previously provided biometric information. The user also conveys current biometric information. If the user's current biometric information is equivalent to the user's current biometric information, a retrieval devices provides the package to the user.
Abstract: Methods, systems, and apparatuses for an entity in a full duplex radio frequency (RF) communication system are presented. In an aspect, the communication entity includes an antenna assembly and a radio frequency identification (RFID) tag. The antenna assembly includes at least an antenna and an encapsulating body which encapsulates the antenna. The RFID tag is associated with the antenna assembly.
Abstract: The present invention relates generally to an adapter unit for a personal digital assistant. More specifically, this invention relates to an adapter unit that provides additional functionality, and improved ergonomics and increased ruggedness to the personal digital assistant. The additional functionality includes the ability to automatically change the function of one or more of the application buttons on the personal digital assistant upon the attachment of the adapter unit.
Type:
Application
Filed:
January 18, 2008
Publication date:
June 5, 2008
Applicant:
SYMBOL TECHNOLOGIES, INC.
Inventors:
David D. Landron, Robert Sandler, Mark E. Sidor, Dominick H. Salvato, Michael J. Sasloff
Abstract: Methods and systems are provided for improved protection of radio frequency identification tag memory by using two or more “brownout-safe” pointer registers (instead of a single pointer register) that are logically concatenated to form a complete address for the boundary between a locked portion and an unlocked portion of the tag memory. A first pointer is a coarse pointer identifying a block of memory containing the boundary. A second pointer is a fine pointer identifying a specific location within the identified coarse block of memory. The coarse pointer may be a gray-coded or linear pointer. Similarly, the fine pointer may be a gray-coded or linear pointer.
Abstract: A method, system, and apparatus for reading RFID tags in a stack of objects is described. For example, a pallet may hold a stack of objects, with one or more of the objects coupled to a RFID tag. A RFID reader may be used to read the tags in the stack. However, tagged objects in the middle of the stack may be difficult to read due to the RF signal loss passing through objects inside the stack. A waveguide may be used to guide radio waves to locations inside the pallet stack. For example, the waveguide can replace a slipsheet that is conventionally placed between horizontal layers of cases in the pallet stack.
Abstract: A system and method for interfacing a data acquisition device to a host device via a plurality of interfaces are provided. The present invention is enabled by a multi-interface controller which enables the data acquisition device to interface to a plurality of host devices having different interfaces e.g., RS232, USB, keyboard wedge, IBM4683, wand emulation, synapse, undecoded, etc. The interface controller includes a microcomputer for translating received data from the data acquisition device and outputting a host device type signal; and a switching circuit for electrically coupling the microcomputer to the at least one host device based on the host device type signal and transmitting the received data to the host device.
Type:
Grant
Filed:
August 28, 2003
Date of Patent:
June 3, 2008
Assignee:
Symbol Technologies, Inc.
Inventors:
Jeffrey J. Terlizzi, Rizwan Ahmad Alladin, Tong-Hsiao Chang, John Joseph Fioriglio, Peter Musteric, Robert W. DiGiovanna
Abstract: A system and method for encoding scanner signal strength and timing information provided, possibly on multiple signal lines, from a digitizer circuit into a signal that can be transmitted on a single line to a modified decoder. A multiplexing device multiplexes the multiple signals, which can be multi-bit or dual-DBP signals, into a single signal.
Type:
Application
Filed:
November 20, 2007
Publication date:
May 29, 2008
Applicant:
Symbol Technologies, Inc.
Inventors:
Costanzo di Fazio, James R. Giebel, Gary Schneider, Frederick Schuessler
Abstract: A system for scanning a target is provided. A light source directs a beam of light toward piezoelectric material having an arcuate reflective surface. The reflective surface directs at least a portion of the beam of light to a beam expander, which in turn directs light onto the target. A power source provides movement in the piezoelectric material to scan at least a portion of the beam of light across at least a portion of the target. The at least a portion of the beam of light is reflected onto a photosensor to provide an electrical signal representing the reflected light. A mirror is further provided between the reflector and the target to allow scanning of a target at an angle to the system components.
Abstract: A wireless local area network for data communications between a computer and mobile units is provided with at least two cell controllers connected to the computer and one or more rf ports each connected to a primary interface of one cell controller and to a backup interface of another cell controller. A control program in the cell controller monitors data communications between the other cell controller and the rf port by a backup interface. The program is arranged to cause the second cell controller to assume primary communications functions for the rf port in the event primary communications functions between a first cell controller and the rf port are inoperative.
Abstract: Methods, systems, and apparatuses for reading tags of tag populations are described. Rather than interrogating a tag population in a single query round, interrogations of tag populations are performed using reduced transmit power levels over multiple query rounds, each query round reading a portion of the tag population. In this manner, an overall power amount expended to transmit interrogations signals is reduced, while maintaining a substantially similar read rate as in single query round interrogations.
Type:
Application
Filed:
November 15, 2006
Publication date:
May 15, 2008
Applicant:
Symbol Technologies, Inc.
Inventors:
Lang Lin, Seok Ho Kim, Jens Arnold, Mohammad Soleimani, Victor Hugo Molina
Abstract: Systems and methods for reducing interference by warbling a reader transmitted signal are described. To reduce interference in a densely packed multiple reader environment, a reader modulates or warbles the frequency or phase of the transmitted signal during a reception portion of a symbol exchange period. The transmitted signal is modulated within the bandwidth of an operating channel. The bandwidth of the operating channel is much narrower than the system bandwidth. In frequency warbling, the carrier frequency is shifted one or more times during the reception portion of the symbol exchange period. If phase warbling, the transmitted signal is spread within bandwidth of the operating channel during the reception portion of the symbol exchange period.
Abstract: A computing arrangement for determining a location of a wireless communications device includes a memory arrangement, a communication arrangement and a processor. The memory arrangement stores a location of each of at least three access points. The communication arrangement receives first data which includes at least one of first signal strength data and second signal strength data. The first signal strength data is indicative of a strength of a first signal transmitted by the device and received by the at least three access points. The second signal strength data is indicative of a strength of a second signal transmitted by the at least three access points and received by the device. The processor determines a location area of the device as a function of the first data and the location of each of the at least three access points, the location area being within a predetermined reception range of the at least three access points.