A more complete understanding of the present invention, and the attendant advantages and features thereof, will be more readily understood by reference to the following detailed description when considered in conjunction with the accompanying drawings, wherein like designations refer to like elements, and wherein:
In accordance with one aspect, system 10 utilizes an RFID multiplexer in a manner that allows it to be used in conjunction with EAS or other security alarm system devices that provide data input, e.g., door sensors, PIR sensors, intrusion alarms, access control, etc. during a “sensor event”. The multiplexer monitors data inputs from these EAS and alarm system data generating devices, i.e., the sensors, alarms, etc., and stores their activity (state changes, alarms, etc) until an RFID reader accesses the multiplexer during a normal RFID inventory process (such as shelf reading or portal monitoring). At this time, these sensor events will be encoded as RFID IDs and or RFID IDs and data (such as EPC Gen2) and returned to the RFID reader as normal RFID “singulations”. The term “singulation” refers to the identification by an RFID reader of a tag with a specific serial number from a number of tags in its interrogation field. The reader can then pass the sensor event data on to the enterprise system monitoring the facility.
It is contemplated that the multiplexer can be equipped with logic rules and outputs to trigger other devices in when certain alarms occur. For example, this output could be used to trigger the RFID reader to perform an inventory at the location of the alarm event.
Referring now to the drawing figures in which like reference designators refer to like elements, there is shown in
In addition to or instead of host computer 14, reader 12 can interface with and exchange data with enterprise system 16. This interface provides communication via a hard wired or wireless communication networked or direct connection. Enterprise system 16 can be a single computing device such as host computer 14, or can include multiple networked computing devices, display, input devices, etc. as may be used in conjunction with an EAS or security alarm monitoring system.
System 10 includes traditional RFID tags 18a-c (referred to collectively herein as “tags 18”) and MUXes 20a-c (referred to collectively herein as “MUXes 20”). Of note, although enterprise system 16 is shown in
System 10 also includes devices found in EAS and alarm systems, including but not limited to EAS systems 22a and 22b (referred to collectively herein as “EAS systems 22”), door sensor 24, access control system 26, intrusion alarm 28 and photo-infrared (“PIR”) sensor 30. Of note, devices 22-30 are merely exemplary and it is presumed that one of ordinary skill would understand that there are many other types of EAS and alarm system elements that can be supported by the present invention. Also, the quantities of tags 18, MUXes 20 and devices 22-30 shown in
The reader 12, MUXes 20, tags 18 and EAS/alarm system devices 22-30 communicate wirelessly using backscatter with one another using antennas 32. Of note, although some elements, such as tags 18, show antenna 32 within the device, this arrangement is merely exemplary. It is contemplated that an antenna 32 can be incorporated within, or externally coupled to the reader 12, MUXes 20, tags 18 and EAS/alarm system devices 22-30.
Of note, although
This present invention advantageously allows the transmission of typical tag data and a variety of EAS and alarm system data to share the same RFID transmission network and be sent wirelessly by extending an existing RFID air interface protocol such as the Electronic Product Code (“EPC”) Radio Frequency Identity Protocols. The method and system of the present invention use the radio frequency spectrum and protocol transmitted to/from RFID interrogator 12 (note that the terms “reader” and “interrogator” are used interchangeably herein) as the medium for network communication. The communicating devices use the standard protocols to transmit, receive and decode the RFID packets, but the data within the packets need not simply be data and commands related to tag identification and control. Put another way, MUXes 20 and EAS/alarm system devices 22-30 appear to the RFID readers, transmitters and receivers as tags 18, even though the data and/or commands relating to the MUXes 20 and non-tag devices 20 is not tag-related data. This extends traditional tag identifying/writing/reading to allow more robust communications with RFID multiplexers 16 and EAS/alarm system devices 22-30. This arrangement also advantageously eliminates or reduces cabling, networking and installation costs normally required for the interconnection of EAS/alarm system devices 22-30.
In accordance with another aspect, a MUX 20 used to inventory tags 18 within its interrogation zone may need to store and forward that inventory information back to host 14 via reader 12. In such a case, MUX 20 includes elements needed to act as a readpoint (it is noted that other non-tag devices 22-30 can also include reader elements to act as RFID read points) to store and forward tag or EAS system/alarm device information.
For example, MUX 20a can be used to detect and read alarm event data from EAS system 22b. Data corresponding to the alarm event is read from EAS system 22b via the RFID air interface protocol and is stored in MUX 20a. In other words, EAS system 22b appears as a tag to MUX 20a. In turn, when main reader 12 interrogates devices in its interrogation zone, MUX 20a appears as a tag. When interrogated further, main reader 12 learns not only of MUX 20a, but also of any tags, RFID enabled EAS/alarm system devices and other MUXes 20 in its interrogation zone, it also receives the alarm event data initially acquired by EAS system 22b. In this manner, reader 12 can supply enterprise system 16 with the alarm event data that can be further processed. For example, enterprise system 16 might directly or indirectly instruct reader 12 to initiate an inventory of all RFID tags in the area supported by EAS system 22b in order to determine which item triggered the EAS system alarm.
In addition, although not shown, it is also contemplated that MUX 20 can include one or more other types of interfaces to directly communicate with EAS and alarm system devices. For example, some devices 22-30 might be close enough to a MUX 20 to warrant a direct wired connection via an Ethernet or serial interface. As such, it is contemplated that MUX 20 can include other types of communication interfaces to control and exchange data with EAS and alarm system devices.
Referring again to
Referring now to
An advantage of the present invention is that, although certain aspects of implementing the present invention may require software customization, existing RFID reader hardware can generally be used in conjunction with the present invention. Once the EAS or alarm system data has been stripped from the RFID singulation, the data can be passed to enterprise system 16 for further processing/action.
In addition, data relating to inventory items can now be associated (in time, location, etc.) with events such as EAS alarms, door openings, movement of people, video triggered alarms, etc. As such, a single enterprise system 16 could easily associate the movement and location of inventory items with alarm events within the same database structure, using RFID readers as a single source of data about the enterprise.
As noted above, a normal inventory process could alter its behavior when an alarm “item” is detected at a node of a MUX 20. For example, when an EAS alarm is detected, a more focused inventory could be executed at the location of the EAS system to detect the items passing thru the EAS system. In other words, the present invention allows inventory data and event data to be captured and analyzed together to enhance loss preventions schemes.
The present invention can be realized in hardware, software, or a combination of hardware and software. An implementation of the method and system of the present invention can be realized in a centralized fashion in one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system, or other apparatus adapted for carrying out the methods described herein, is suited to perform the functions described herein.
A typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein. The present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which, when loaded in a computer system is able to carry out these methods.
Computer program or application in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or notation; b) reproduction in a different material form. Significantly, this invention can be embodied in other specific forms without departing from the spirit or essential attributes thereof, and accordingly, reference should be had to the following claims, rather than to the foregoing specification, as indicating the scope of the invention.
It will be appreciated by persons skilled in the art that the present invention is not limited to what has been particularly shown and described herein above. In addition, unless mention was made above to the contrary, it should be noted that all of the accompanying drawings are not to scale. A variety of modifications and variations are possible in light of the above teachings without departing from the scope and spirit of the invention, which is limited only by the following claims.
This application is related to and claims priority to U.S. Provisional Patent Application Ser. No. 60/848,215, filed Sep. 28, 2006, entitled US Provisional Patent for ELECTRONIC ARTICLE SURVEILLANCE ENABLED RADIO FREQUENCY IDENTIFICATION MULTIPLEXER AND METHOD, the entirety of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60848215 | Sep 2006 | US |