摘要:
A semantic access control system includes a computer system having an associated memory, the memory storing a semantic network model comprising a plurality of endpoints and oriented links between the endpoints and a semantic attribute. The computer system is configured to receive a primary signal having identification data associated with a user and to process an access attempt by the user to a secured endpoint by identifying the user based on the primary signal, sending an authorization message comprising a secondary access code, receiving a secondary signal containing the secondary access code as part of an email or cell phone transmission, allowing a computer-controlled access to the secured endpoint, and inferring the semantic attribute to the user when the computer-controlled access to the secured endpoint is allowed.
摘要:
A payment processor system includes a point-of-sale device having at least one first sensor, a processor, a memory storing a plurality of users and a plurality of virtual payment accounts, wherein the processor is configured to apply semantic drift to select a virtual payment account in rapport with an item semantic identity in a payment transaction initiated at the point of sale.
摘要:
A display control system includes a sensor and a wireless transceiver, with a display controller and memory storing a plurality of endpoints. The memory further stores a plurality of semantic identities and is configured for communication with a mobile device. The display controller receives from the mobile device a semantic profile, and infers a first person semantic gesture and a second person semantic gesture. The display control system controls access to a user interface by determining that the semantic gestures are applicable to the semantic identity based on a semantic drift, and either allows or disallows access to manipulation of the user interface.
摘要:
A robotic door lock includes a lockable spinner having a spinner shell coupled to a bolt rail and an axial profile coupled to a door handle or knob. A processor selectively engages the spinner shell with the axial profile via an actuator to enable the manipulation of the bolt. The robotic lock has a wireless module, an actuator, and a processor in communication with the actuator and a wireless module. The wireless module uses a wireless energy harvester configured to receive energy from a user device or a post infrastructure to power the processor, the actuator and the memory. The wireless energy harvester may be connected to an internal energy storage.
摘要:
A monitoring system includes a first sensor and a second sensor, at least one of which is a camera. A computer system coupled to the first and second sensors includes a memory and stored object types and associations between objects of the object types. The computer system is configured to infer a first association between a first and second object by retrieving an input from at least one of the sensors, determining the object types of the first and second objects and inferring a specific interaction at a monitored location based on the sensor inputs.
摘要:
A robotic post includes a processor and a memory. The robotic post may include a manipulation arm and a swiveling or otherwise movable trunk or base. One or more sensors provided on the robotic post enable the robotic post to determine the position and location of a piece of luggage. The processor, based on the sensor input, causes the robotic post to rotate, tilt or move toward the luggage to orient and secure a hook or gripper onto the handle of the luggage. The post may move, under control of the processor, to another location. When presented with authorization by a user, the luggage is released at the second location.
摘要:
A networked radio frequency identification system includes a plurality of radio frequency identification (RFID) tag readers, a computer in signal communication with the RFID tag readers over a network, and a software module for storage on and operable by the computer that localizes RFID tags based on information received from the RFID tag readers using a network model having endpoints and oriented links. In an additional example, at least one of the RFID tag readers includes an adjustable configuration setting selected from RF signal strength, antenna gain, antenna polarization, and antenna orientation. In a further aspect, the system localizes RFID tags based on hierarchical threshold limit calculations. In an additional aspect, the system controls a locking device associated with an access point based on localization of an authorized RFID tag at the access point and reception of additional authorizing information from an input device.
摘要:
A networked radio frequency identification system includes a plurality of radio frequency identification (RFID) tag readers, a computer in signal communication with the RFID tag readers over a network, and a software module for storage on and operable by the computer that localizes RFID tags based on information received from the RFID tag readers using a network model having endpoints and oriented links. In an additional example, at least one of the RFID tag readers includes an adjustable configuration setting selected from RF signal strength, antenna gain, antenna polarization, and antenna orientation. In a further aspect, the system localizes RFID tags based on hierarchical threshold limit calculations. In an additional aspect, the system controls a locking device associated with an access point based on localization of an authorized RFID tag at the access point and reception of additional authorizing information from an input device.
摘要:
A networked radio frequency identification system includes a plurality of radio frequency identification (RFID) tag readers, a computer in signal communication with the RFID tag readers over a network, and a software module for storage on and operable by the computer that localizes RFID tags based on information received from the RFID tag readers using a network model having endpoints and oriented links. In an additional example, at least one of the RFID tag readers includes an adjustable configuration setting selected from RF signal strength, antenna gain, antenna polarization, and antenna orientation. In a further aspect, the system localizes RFID tags based on hierarchical threshold limit calculations. In an additional aspect, the system controls a locking device associated with an access point based on localization of an authorized RFID tag at the access point and reception of additional authorizing information from an input device.
摘要:
A semantic robotic system includes a memory and a processor in communication with the memory, the memory storing a semantic indicative of a capability, and further storing a semantic indicative of a first interest at a first endpoint. The processor is configured to publish, on a first semantic flux, the first semantic in association with the second semantic at a first time, and to unpublish the first semantic or the second semantic at a second time, after a determination that the first interest has been satisfied based on semantic matching.