Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Turnout/crossover section for railway track

a technology of radio frequency identification and cross-over section, applied in the direction of railway tracks, ways, moving tracks, etc., can solve the problems of not appearing devices, inhibiting digital piracy or otherwise improving upon how digital media are used, and not providing a suitable additional incentive for customers to purchase additional rfid enabled objects, and not providing a suitable level of customer loyalty

Inactive Publication Date: 2009-04-02
SCOTT TRACK IP
View PDF6 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0088]The media player display interface 600 also includes data representing media player control graphics 606 for providing media player control to control play of the media content downloaded from the remote media source. For example, the media player control graphics 606 may be graphics buttons that are displayed representing fast forward, stop, play, volume control or any other suitable controls to control the digital audio and / or video media playing subsystem 22. In addition, if desired, the media player user interface presents data representing indicia from the RFID enabled article 608 which may be found for example in the embodiment where the article is a movie card. The data representing indicia from the RFID enabled article may be the content indicia 50 (which includes a representation thereof), or information that is related to it. Too, for example, the displayed data 608 indicates to the user that they have obtained the proper downloaded media content. As such, a visual indication allows the user to readily identify whether an error has occurred if the content of the downloaded media that is shown by for example the data 608 matches for example information or other visual indicia on the movie card. As such, the media player user interface includes data 608 that represents visual indicia located on the RFID tag that's on a portable media object.
[0101]As shown in FIG. 11, the RFID reader of the content media player 1104 reads both RFID enabled objects 1100 and 1102 and the content media player 1104 passes this information to the network element 1106. For example, if the combination of read content identifiers matches an expected combination of content identifiers (whether an expected spatial relationship among objects or an expected temporal relationship is detected), the network element authorizes access to content or media that are different from, or in addition to, media or content that would have been authorized if each of the RFID enabled objects were presented individually to the content player 1104. To help insure that combinations of objects are presented with a short period of time (as opposed to hours or days for example), as is also shown, timing logic 1108 may be introduced in the content media player 1104 as part of, for example, the RFID reader control, to determine whether the RFID reader read the tag information from the RFID tags on the different objects within an allowable period of time which may be any suitable predetermined period of time as desired.
[0115]The RFID enabled object 44, in this example, may be a Top 10 movie card with indicia thereon indicating that it is a Top 10 movie card or it may be a Top 10 song card or a Top 5 song card or any other suitable RFID media object. Similarly, the 3-D object 46 may be a Top 10 movie object, Top 10 song object, Top 10 album object or any other suitable RFID enabled object as desired. In this example an owner of the RFID enabled object purchases a subscription for the service. There may be for example, a one time fee that is paid to obtain the card where after the card may have a predetermined life span which may be monitored by the digital rights management service provider. Any other suitable subscription service and operation may also be employed. The controller (FIG. 12) is responsive to RFID tag based information, such as content identification information, obtained by the digital audio and / or video media playing device 16 and operates to facilitate access to immediate content associated with a periodically changing media content list. In this example, the controller is integrated as part of the digital rights management service provider 36, and provides media identification information such as URLs as described earlier so that the media playing device 16 can download the appropriate media from the media contents server 24. Alternatively, if the controller is located as part of the media contents server 24, the controller may facilitate access to media content by providing the media content directly for download. The digital audio and / or video media playing device 16 then plays the audio and / or video that has been retrieved based on the periodically changing media content list.
[0116]FIG. 16 illustrates a method for providing digital audio and / or video content that includes, as shown in block 1600, receiving RFID tag based information, such as content identification information, from an RFID enabled media object. As shown on block 1602, the method includes facilitating access to media content associated with a stored periodically changing media content list. The method may then end by waiting for another red RFD tag.
[0125]FIG. 18 depicts a game system in which placing a tagged RFID enabled figurine 1800 close to an RFID reader enabled game console 1802 triggers a game download and starts running the game. The figurine acts as the physical representation of the player in the video game. It is used in subsequent game sessions to log the user in and to store personal settings and high scores. Today, video games can be downloaded or come in a box with one or more CDs or DVDs and a user manual. A single object (e.g. figurine) materializing the game enhances the way players emotionally relate to the games they own. For example, the user buys a tagged warrior figurine in a video game shop. When he places the warrior close to his enhanced game console, the console reads the RFID tag and starts downloading the game software of an online multi-player heroic fantasy game from a content server based on media ID's from the DRM service provider 36. The game starts and the user plays a warrior character, as the figurine indicates. One month later, the user decides to go back to the shop to buy an axe for his figurine as he cannot manage to find one in the digital game world. His digital warrior gets an axe immediately in the video game after he physically places the RFID enabled axe in the figurine's hand, because the axe contains an RFID tag that links it to the digital game world. The figurine includes an add-on object sensor, such as an optical sensor, mechanical sensor or other suitable sensor to sense when the RFID enabled add-on object is in the figurine's hand.
[0127]FIG. 20 depicts a system in which software license keys could be physically materialized by decorative objects (e.g. tagged figurines) and sit next to RFID reader equipped computers. The installed software checks against the license key contained in the RFID tag 2000. Today's software complexity and unpredictable security flaws implies continuous software updates for licensees. Software licenses are mostly invisible to consumers (as they are digital or take the form of dongles plugged at the back of computers). The system increases user awareness of license key presence and limits illegal license copying and exchange. For example, a figurine watchdog sitting next to a workstation symbolizes the fact that the workstation is secure. Indeed, the figurine contains a tag which stores the license for a daily updated antivirus software. The method for secured access to software and dynamic updates is represented as follows:

Problems solved by technology

However, such systems and devices do not appear to, among other things, inhibit digital piracy or otherwise improve upon how digital media, such as audio and video are purchased or acquired.
However, known RFID tag based systems that employ some type of link to dynamic content, such as advertisements on web sites, does not appear to provide suitable additional incentive for customers to purchase additional RFID enabled objects nor provide a suitable level of customer loyalty that can translate into additional sales and product value.
However, this typically requires the user to enter long strings of characters in a keyboard or keypad.
However, to obtain downloadable content, these devices typically require a user to enter information through some type of user interface, such as a keyboard or touch screen to obtain remote digital media, such as digital audio and / or digital videos.
In addition, the size of digital media containers such as DVD cases and CD cases can take up valuable shelf space and their weight can result in associated shipping costs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Turnout/crossover section for railway track
  • Turnout/crossover section for railway track
  • Turnout/crossover section for railway track

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]Briefly, a system for selecting digital content from at least one content source employs a plurality of RFID enabled objects that are read by one or more RFID readers. The RFID enabled objects may be, for example, RFID enabled media objects or RFID enabled non-media objects, such as any suitable RFID enabled object. In this embodiment, specific combinations of RFID tags and RFID enabled objects, or RFID enabled media objects provide access to more (or different) digital content than the same tags provide alone. Accordingly, the combination of RFID tags may indicate to a network element (e.g., server or other element), such as a digital rights management service provider or other network element, that a different mix of media or content should be authorized for download by a content playing device, such as a media playing device or other suitable device. For example, two RFID enabled objects that are placed near the RFID reader (such as a media playing device or other device) a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for selecting digital content from at least one content source employs a plurality of RFID enabled objects that are read by one or more RFID readers. The RFID enabled objects may be, for example, RFID enabled media objects or RFID enabled non-media objects, such as any suitable RFID enabled object. Specific combinations of RFID tags and RFID enabled objects, or RFID enabled media objects provide access to more (or different) digital content than the same tags provide alone. A method includes contactlessly reading a plurality of RFID tags associated with a plurality of RFID enabled objects to obtain a plurality of RFID tag information and determining whether each of the read plurality of RFID tag information has been read within a suitable time period with respect to each other. If so, the method includes sending the read plurality of RFID tag information for receipt by a content delivery authorization unit to determine if downloadable content is available for download.

Description

FIELD OF THE INVENTION[0001]The invention relates generally to radio frequency identification (RFID) tag based systems and methods, and more particularly to RFID tag devices, systems and methods that allow downloading of media and content.BACKGROUND OF THE INVENTION[0002]Radio frequency identification tag (RFID) based technology is well known and is employed in systems such as those that track the location of inventory. RFID tags may be microchips, or other suitable structure and are typically capable of carrying information. For example, the identification tags or RFID tags can be an ultrasonic transmitter and the tag reader can be the ultrasonic transceiver. Upon placing the identification tag in the approximate area of the tag reader transceiver, the tag reader transceiver wirelessly reads the identification associated with the identification tag. Other RFID tag systems are also known that allow the RFID reader to induce energy onto the RFID tag which then powers the RFID tag whi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): E01B23/06E01B7/00
CPCE01B23/06E01B7/00
Inventor MCCALLUM, DONALD
Owner SCOTT TRACK IP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products