Systems and methods for establishing communication between an identification tag reader and a computing device
First Claim
Patent Images
1. In an identification tag reader, a method comprising:
- reading a first identification tag that comprises an instruction to form a logical connection with a computing device;
using address information associated with the computing device to form the logical connection with the computing device in accordance with the instruction;
obtaining data;
transmitting the data to the computing device via the logical connection; and
on subsequent power up, attempting to form a new logical connection with a same computing device to which the identification tag reader was most recently connected.
1 Assignment
0 Petitions
Accused Products
Abstract
An exemplary method involves reading a first identification tag. The first identification tag includes an instruction to form a logical connection with a computing device. Address information associated with the computing device is used to form the logical connection with the computing device in accordance with the instruction. Data is obtained. The data is transmitted to the computing device via the logical connection.
-
Citations
44 Claims
-
1. In an identification tag reader, a method comprising:
-
reading a first identification tag that comprises an instruction to form a logical connection with a computing device; using address information associated with the computing device to form the logical connection with the computing device in accordance with the instruction; obtaining data; transmitting the data to the computing device via the logical connection; and on subsequent power up, attempting to form a new logical connection with a same computing device to which the identification tag reader was most recently connected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. An identification tag reader, comprising:
-
a processor; memory in electronic communication with the processor; instructions stored in the memory, the instructions being executable by the processor to implement a method comprising; reading a first identification tag that comprises an instruction to form a logical connection with a computing device; using address information associated with the computing device to form the logical connection with the computing device in accordance with the instruction; obtaining data; transmitting the data to the computing device via the logical connection; and on subsequent power up, attempting to form a new logical connection with a same computing device to which the identification tag reader was most recently connected. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. An identification tag reader, comprising:
-
a processor; memory in electronic communication with the processor; and instructions stored in the memory, the instructions being executable by the processor to implement a method comprising; reading an identification tag that comprises an instruction to form a logical connection with a computing device; determining whether a link key database includes a link key associated with the computing device; if the link key database includes the link key, establishing a logical connection with the computing device using address information associated with the computing device and the link key; if the link key database does not include the link key; establishing a logical connection with the computing device using address information associated with the computing device, wherein the computing device enters a PIN for authentication, and wherein the link key is generated; and storing the link key in the link key database; obtaining data; and transmitting the data to the computing device via the logical connection. - View Dependent Claims (34, 35, 36, 37, 38)
-
-
39. In an identification tag reader, a method comprising:
-
reading an identification tag that comprises an instruction to form a logical connection with a computing device; determining whether a link key database includes a link key associated with the computing device; if the link key database includes the link key, establishing a logical connection with the computing device using address information associated with the computing device and the link key; if the link key database does not include the link key; establishing a logical connection with the computing device using address information associated with the computing device, wherein the computing device enters a PIN for authentication, and wherein the link key is generated; and storing the link key in the link key database; obtaining data; and transmitting the data to the computing device via the logical connection. - View Dependent Claims (40, 41, 42, 43, 44)
-
Specification