User Identified to a Controller
First Claim
1. A method for configuring a computer program based on user, the method comprising:
- detecting by a controller an object carried by a user, the object including a parameter value that uniquely identifies the object from a plurality of objects;
transmitting the parameter value to a computing device executing the computer program;
determining if the computer program has user information associated with the parameter value; and
configuring the computer program utilizing the user information when the computer program has the user information for the parameter value.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer programs for configuring a computer program based on user are provided. One method includes an operation for detecting, by a controller, an object carried by a user, where the object includes a parameter value—e.g., a radio-frequency identification (RFID) tag—that uniquely identifies the object from a plurality of objects. The parameter value is transmitted to a computing device executing the computer program, and the computer program determines if the computer program has user information associated with the transmitted parameter value. The computer program is configured utilizing the user information, when the computer program has the user information for the parameter value.
60 Citations
22 Claims
-
1. A method for configuring a computer program based on user, the method comprising:
-
detecting by a controller an object carried by a user, the object including a parameter value that uniquely identifies the object from a plurality of objects; transmitting the parameter value to a computing device executing the computer program; determining if the computer program has user information associated with the parameter value; and configuring the computer program utilizing the user information when the computer program has the user information for the parameter value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for configuring a computer program based on user, the method comprising:
-
reading by a controller a fingerprint of a user; transmitting the fingerprint to a computing device executing the computer program; determining if the computer program has user information associated with the fingerprint; and configuring the computer program utilizing the user information when the computer program has the user information for the fingerprint. - View Dependent Claims (12, 13, 14)
-
-
15. A method for configuring a computer program based on user, the method comprising:
-
entering a signature detection mode by the computer program; detecting a signature entered by the user, the signature entered by moving a controller held by the user; exiting the signature detection mode; determining if the computer program has user information associated with the signature entered by the user; and setting a new calibration for the controller in the computer program based on the user information when the computer program has the user information for the signature entered by the user. - View Dependent Claims (16, 17, 18)
-
-
19. A controller for configuring a computer program based on user, the controller including:
-
a radio-frequency identification (RFID) reader operable to detect an RFID tag in an object carried by a user, the RFID tag uniquely identifying the object from a plurality of objects; a memory; and a processor operable to transmit the RFID tag to a computing device executing the computer program, wherein the computer program is operable to search for user information associated with the RFID tag, and wherein the computer program is configured utilizing the user information when the search obtains the user information associated with the RFID tag. - View Dependent Claims (20, 21, 22)
-
Specification