1. |
- Gidlund, Mikael, et al.
(författare)
-
Wireless communication method and system with collision avoidance protocol
- 2015
-
Patent (populärvet., debatt m.m.)abstract
- The invention concerns a method for providing wireless communication between a source node and a destination node in a wireless network wherein said wireless network uses a time division multiple access (TDMA) protocol. One or more dedicated TDMA transaction timeslots (60-71) are arranged in a superframe. The superframe comprises at least one dedicated transaction slot forming a hybrid protocol with two or more shared transaction slots 50 per superframe. The method is of particular advantage when practised with a WirelessHART protocol wireless sensor network and when used for monitoring and control equipment and processes in an industrial installation. A computer program, and a wireless node and a wireless network using the inventive method are also disclosed.
|
|
2. |
|
|
3. |
- Yen, Jonathan, et al.
(författare)
-
Authenticatable graphical bar codes
- 2000
-
Patent (populärvet., debatt m.m.)abstract
- Systems and methods for generating and decoding authenticatable graphical bar codes are described. In one aspect, a corroborative signed message is generated from information to be encoded, and a base image is modulated with a graphical encoding of the signed message to produce a marked image. In another aspect, a signed message is extracted from a marked image based upon a comparison of the marked image and a base image. The extracted signed message is decoded to produce a decoded message. Information encoded in the marked image is extracted from the decoded message and authenticated.
|
|
4. |
- Yen, Jonathan, et al.
(författare)
-
Method of encoding a handwritten signature
- 2000
-
Patent (populärvet., debatt m.m.)abstract
- Systems and methods for generating and decoding authenticatable graphical bar codes are described. In one aspect, a corroborative signed message is generated from information (12) to be encoded, and a base image (22) is modulated with a graphical encoding of the signed message to produce a marked image (14). In another aspect, a signed message is extracted from a marked image (14) and a base image (22). The extracted signed message is decoded to produce a decoded message. Information (12) encoded in the marked image (14) is extracted from the decoded message and authenticated.
|
|