The invention is generally related to encoded information reading (EIR) terminals and is specifically related to EIR terminals equipped with RFID reading devices.
Radio frequency identification (RFID) methods are widely used in a number of applications, including smart cards, item tracking in manufacturing and retail, etc. An RFID tag can be attached, e.g., to a retail item. An EIR terminal can be equipped with an RFID reader to read and/or modify the memory of an RFID tag attached to a retail item.
In one embodiment, there is provided an encoded information reading (EIR) terminal comprising a microprocessor, a memory communicatively coupled to the microprocessor, a communication interface, and an RFID reading device configured to output raw message data comprising an encoded message and/or output decoded message data corresponding to an encoded message. The EIR terminal can be configured, responsive to receiving one or more target item identifiers, to attempt to locate at least one RFID tag transmitting an encoded representation of a binary string, at least part of which is equal to at least part one of the specified one or more target item identifiers. The EIR terminal can be further configured, responsive to successfully locating at least one RFID tag, to notify the user via a visual message and/or an audible message.
For the purpose of illustrating the invention, the drawings show aspects of one or more embodiments of the invention. However, it should be understood that the present invention is not limited to the precise arrangements and instrumentalities shown in the drawings, wherein:
The drawings are not necessarily to scale, emphasis instead generally being placed upon illustrating the principles of the invention. In the drawings, like numerals are used to indicate like parts throughout the various views.
In one embodiment, there is provided an encoded information reading (EIR) terminal comprising a radio frequency identifier (RFID) reading device. The EIR terminal can be configured to read RFID tags containing decoded messages. In one embodiment, the RFID terminal can be configured to read an RFID tag containing an encoded message and output raw message data containing the encoded message. In another embodiment, the RFID terminal can be configured to read an RFID tag containing an encoded message and output decoded message data corresponding to the encoded message.
Various embodiments of EIR terminals can be used in a numerous applications, including but not limited to, authentication and access control systems (for example, using smart cards), item tracking in manufacturing and retail, etc. A smart card is an identification card (e.g., a credit card, a pass card) which does not need to be swiped or otherwise physically contacted by a card reader. This capability can be implemented by placing an RFID tag in the card. Item tracking can be implemented by placing an RFID tag on each individual item. Item tracking with RFID tags can be used in loss prevention systems by placing an RFID tag into merchandise items and placing sensors at exit points. If an exit sensor detects a tagged item with a tag, which was not deactivated at the checkout, an alarm can go off. In retail, item tracking with RFID tags can be used in conjunction with other technologies such as bar code scanning and payment terminals.
Of course, devices that read bar codes, read RFID, or read cards bearing encoded information may read more than one of these categories while remaining within the scope of this disclosure. For example, a device that reads bar codes may include a card reader, and/or RFID reader; a device that reads RFID may also be able to read bar codes and/or cards; and a device that reads cards may be able to also read bar codes and/or RFID. For further clarity, it is not necessary that a device's primary function involve any of these functions in order to be considered such a device; for example, a cellular telephone, smartphone, or PDA that is capable of reading bar codes is referred to as EIR terminal throughout this disclosure.
RFID technology can advantageously be used to locate a tagged item. In one example, illustrated in
In another example, a retail customer looking to find a particular product, can scan a bar code tag or read RFID tag 155 of any similarly looking product 157 using his or her mobile communication device 100 (e.g., a smartphone). Smartphone 100 can be programmed, responsive to scanning a product tag, to retrieve the product characteristics from an external database 151 that can be provided by the retailer, the product manufacturer, or by a third party. Smartphone 100 can further be programmed to display the retrieved product characteristics and to accept user's input editing the product characteristics. Smartphone 100 can further be programmed, responsive to accepting the user edited product characteristics, to retrieve the product identifier, optionally accompanied by the product availability and pricing, from external database 151. Smartphone 100 can further be programmed, responsive to retrieving the product identifier, to either locate the desired product 198 within the RFID communication range or display a failure message.
In another example, a retail store sales associate can use his or her portable data terminal to search for an item identifier in a store database, and then to locate the item on the sales floor or in a stockroom using the terminal's built-in RFID reader. In a yet another example, a warehouse worker can use his or her portable data terminal to receive an item identifier from a workflow process running on a local or remote server computer, and then to locate the item in the warehouse using the terminal's built-in RFID reader. In a yet another example, an airline passenger can receive an SMS or an MMS containing a tag identifier of an RFID tag attached to his or her luggage, and then to locate the luggage on or around a luggage distributing belt using the RFID reader built-in into his or her smartphone. In a yet another example, luggage tag identifiers can be provided to an airline passenger as part of an electronic boarding pass transferred to the passenger's mobile phone, e.g., via SMS or MMS.
Component-level diagram of one embodiment of EIR terminal 100 is now being described with references to
EIR terminal 100 can further comprise one or more EIR devices 330, including a bar code reading device, an RFID reading device, and a card reading device, also coupled to system bus 370. In one embodiment, an EIR reading device can be capable of outputting decoded message data corresponding to an encoded message. In another embodiment, the EIR reading device can output raw message data comprising an encoded message, e.g., raw image data or raw RFID data.
EIR terminal 100 can further comprise a keyboard interface 354 and a display adapter 355, both also coupled to system bus 370. EIR terminal 100 can further comprise a battery 356. In one embodiment, the EIR terminal 100 can further comprise an accelerometer 357. In one embodiment, the EIR terminal 100 can further comprise a GPS receiver 380. In one embodiment, the EIR terminal 100 can further comprise at least one connector 390 configured to receive a subscriber identity module (SIM) card.
As noted herein supra, in one embodiment, EIR terminal 100 can comprise an RFID reading device 333. In a further aspect, the RFID reading device can comprise an antenna 121. In one embodiment, antenna 121 can be provided by a single-cell or multiple-cell transmission line MTM antenna shown in
The components of EIR terminal 100 can be incorporated into a variety of different housings of various forms factors. As indicated by the embodiment of
In another aspect, EIR terminal 100 can be incorporated in a data collection system. The data collection system, schematically shown in
EIR terminal 100 can establish a communication session with external computer 171. In one embodiment, network frames can be exchanged by the EIR terminal 100 and external computer 171 via one or more routers, base stations, and other infrastructure elements. In another embodiment, external computer 171 can be reachable by the EIR terminal 100 via a local area network (LAN). In a yet another embodiment, external computer 171 can be reachable by EIR terminal 100 via a wide area network (WAN). A skilled artisan would appreciate the fact that other methods of providing interconnectivity between EIR terminal 100c and external computer 171 relying upon LANs, WANs, virtual private networks (VPNs), and/or other types of network are within the scope of this disclosure.
In one embodiment, communications between the EIR terminal 100 and external computer 171 can comprise a series of HTTP requests and responses transmitted over one or more TCP connections. In one embodiment, communications between EIR terminal 100c and external computer 171 can comprise VoIP traffic transmitted over one or more TCP and/or UDP ports. A skilled artisan would appreciate the fact that using other transport and application level protocols is within the scope of this disclosure.
In one aspect, at least one of the messages transmitted by the EIR terminal can include decoded message data corresponding to, e.g., a bar code label or an RFID label attached to an item or a product. For example, an EIR terminal can transmit a request to the host computer to retrieve product-related information corresponding to a product identifier encoded by a bar code label attached to the item, or to transmit an item tacking record for an item identified by a bar code label attached to the item.
In one embodiment, EIR terminal can be configured to interrogate RFID tags located within the RFID communications range. Referring again to
In another aspect, the information in RFID tag 199 can be programmed during the manufacturing process (factory programming, typically producing a read-only RFID tag) or after the manufacturing process has been completed (field programming). In a further aspect, the information in RFID tag 199 can be updated dynamically when the tag is in operation.
In another aspect, the distance at which an RFID tag can be read (the read range) can be affected by a number of factors, including the signal frequency, the antenna gain, antenna radiation pattern, the orientation and polarization of the RFID reading device antenna and the RFID tag antenna. In a further aspect, the signal strength of an RFID signal received by EIR terminal 100 from RFID tag 199, combined with some other settings and data, such as reader antenna orientation, reader antenna location, RSSI from other readers, etc., can be indicative of the distance range between EIR terminal 100 and RFID tag 199
In one embodiment, RFID tag 199 can be compliant with Generation 2 UHF Air Interface Protocol Standard commonly known as the “Gen 2” standard, which defines physical and logical requirements for a passive-backscatter, Interrogator-talks-first (ITF) RFID system operating in the 860 MHz-960 MHz frequency range.
In one embodiment, RFID tag 199 can be configured to store an Electronic Product Code (EPC) identifier and tag identifier (TID). In one embodiment, RFID tag 199 can implement a “kill” function that permanently disables the tag. In one embodiment, RFID tag 199 can be configured to support password-protected access control. In one embodiment, RFID tag 199 can comprise a memory, including read-only and programmable (user) memory. In one embodiment, RFID tag 199 can comprise a non-volatile memory which retains information without the need to electrically power the memory device.
In one embodiment, EIR terminal 100 can transmit information to a passive RFID tag 199 by modulating an RF signal in the 860-960 MHz frequency range. RFID 199 tag can receive both information and operating energy from the RF signal transmitted by EIR terminal 100. EIR terminal 100 can receive information from RFID 199 tag by transmitting a continuous-wave (CW) RF signal to the RFID tag 199. “Continuous wave” can refer to any waveform transmitted by an RFID reading device and suitable to power a passive RFID tag, e.g., a sinusoid at a given frequency. RFID tag 199 can respond by modulating the reflection coefficient of its antenna, thus backscattering an information signal to the EIR terminal 100. RFID tag 199 can modulate the reflection coefficient of its antenna only responsive to receiving an RFID signal from EIR terminal 100.
In a further aspect, EIR terminal 100 can be configured to send information to one or more RFID tags by modulating an RF carrier using double-sideband amplitude shift keying (DSB-ASK), single-sideband amplitude shift keying (DSB-ASK), or phase-reversal amplitude shift-keying (PR-ASK) using a pulse-interval encoding (PIE) format. RFID tag 199 can be configured to receive its operating energy from the same modulated RF carrier.
EIR terminal 100 can be configured to receive information from RFID tag 199 by transmitting an unmodulated RF carrier and listening for a backscatter reply. RFID tag 199 can be configured to transmit information by backscatter-modulating the amplitude and/or phase of the RFID carrier. RFID tag 199 can be configured to encode the backscattered data using, e.g., FMO baseband or Miller modulation of a subcarrier at the data rate. The encoding method to be employed by RFID tag 199 can be selected by EIR terminal 100.
In another aspect, the communication link between EIR terminal 100 and RFID tag 199 can be half-duplex, meaning that RFID tag 199 is not required to demodulate EIR terminal's commands while backscattering.
In another aspect, RFID tag 199 can have a memory comprising one or more memory banks Each of the memory banks can comprise zero or more memory words. In one embodiment, RFID tag 199 can comprise a reserved memory bank containing a kill password and an access password. In one embodiment, RFID tag 199 can comprise an EPC memory bank containing a code (e.g., an EPC code) identifying the object to which the RFID tag is or will be attached. In one embodiment, RFID tag 199 can comprise a TID memory bank containing a tag identifier, tag mode number, tag-specific data, and/or vendor specific data. In one embodiment, RFID tag 199 can comprise a user memory bank containing user-specific data.
In another aspect, the kill password can be provided by a 32-bit value stored in the reserved memory bank. EIR terminal 100 use the kill password once for a given RFID tag, to permanently disable the tag. RFID tag 199 should not execute the kill operation if its kill password has not been initialized. The access password can be provided by a 32-bit value stored in the reserved memory bank. RFID tag 199 having an initialized (non-zero) access password can require EIR terminal 100 to supply the access password before transitioning to a secured state.
In another aspect, EIR terminal can establish one or more sessions with one or more RFID tags. RFID tag 199 can support at least one session-dependent flag for every session. The session-dependent flag can have two states. RFID tag 199 can invert a session-dependent flag responsive to receiving a command from EIR terminal 100. Tag resources other than session-dependent flags can be shared among sessions. In another aspect, an RFID tag can support a selected status flag indicating that the tag was selected by EIR terminal 100.
Referring again to
The target item identifier can be in a form of a product code (e.g., an EPC code) or an RFID tag identifier. A skilled artisan would appreciate the fact that other methods of specifying the target item identifier are within the scope of this disclosure. The target item identifier can be inputted into EIR terminal 100 using numerous methods. In one embodiment, the target item identifier can be scanned using the terminal's bar code reading device. In another embodiment, the target item identifier can be keyed-in by a user using the terminal's keyboard or virtual keyboard. In a yet another embodiment, EIR terminal 100 can retrieve the target item identifier by querying external database 151 using search terms (e.g., item description) provided by the user. In one embodiment, the external database can return two or more item identifiers satisfying the specified search terms, and EIR terminal 100 can prompt the user to select one or more target item identifiers from the list of identifiers returned by database 151. In one embodiment, EIR terminal can prompt the user to specify additional search terms and, responsive to receiving the user input, query database 151 using the updated search terms.
In another embodiment, the target item identifier can be specified by a user employing EIR terminal 100 to scan a bar code or an RFID tag of a sample item having at least some similarity with the target item. EIR terminal 100 can be configured, responsive to scanning a bar code or reading an RFID tag, to retrieve corresponding sample item description from external database 151. The sample item description can comprise one or more sample item characteristics. EIR terminal 100 can be further configured to display at least part of the item description retrieved from database 151 and to accept user input editing the item description (e.g., by modifying one or more sample item characteristics). EIR terminal 100 can be further configured to retrieve the target item identifier satisfying the modified description from external database 151. In one embodiment, the target item identifier retrieved from external database 151 can be accompanied by auxiliary item information, such as item availability, location, pricing, etc.
In a further aspect, database 151 can reside on external server 153. In one embodiment, server 153 can be accessed by EIR terminal 100 using the terminal's wireless communication interface. In one embodiment, server 153 can be accessible via the Internet. In another embodiment, server 153 can be accessible via a local network (e.g., a retail store network). A skilled artisan would appreciate the fact that other methods of EIR terminal 100 accessing server 153 are within the scope of this description.
In another embodiment, EIR terminal can be configured to receive the target item identifier via a messaging service, e.g., SMS or MMS. In another embodiment, EIR terminal can be configured to receive the target item identifier via voice command module of the EIR terminal by converting a user voice command into an alphanumeric string containing the target item identifier. A skilled artisan would appreciate the fact that other methods of EIR terminal 100 receiving the target item identifier are within the scope of this disclosure.
As noted herein supra, responsive to receiving the target item identifier, EIR terminal 100 can be configured to interrogate RFID tags located within the RFID communications range in order to locate at least one RFID tag transmitting an encoded representation of a binary string, at least part of which is equal to at least part one of the specified one or more target item identifiers.
Responsive to receiving an interrogation signal transmitted by EIR terminal 100, RFID tag 199 can transmit a response signal back to EIR terminal 100. The response signal can contain useful data, e.g., an Electronic Product Code (EPC) identifier, or a tag identifier (TID). The response signal can include a representation of a binary string, at least part of which is equal to at least part one of the specified one or more target item identifiers.
In one embodiment, EIR terminal can be configured to listen to radio signals at one or more pre-defined frequencies before transmitting tag interrogation signals. In one embodiment, RFID tag 199 can constantly or periodically transmit a signal irrespectively of receiving a query signal from an EIR terminal.
In one embodiment, EIR terminal can implement EPC™ Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz by EPCglobal. EIR terminal 100 can interrogate RFID tags using the commands described herein infra.
Select command can be used by EIR terminal 100 to select a particular RFID tag population for the subsequent inventory round. Select command can be applied successively to select a particular tag population based on user-specified criteria. Select command can include the following parameters:
Inventory command set can be used by EIR terminal 100 to single out one or more individual tags from a group. A tag can maintain up to four simultaneous sessions and a binary Inventoried flag for each session. Inventory command set includes the following commands:
An RFID tag can implement a state machine. Once energized, a tag can change its current state to Ready. A selected tag can, responsive to receiving Query command, select a random integer from the range of [0; 2Q-1]. If the value of zero is selected, the tag can transition to Reply state, backscaterring a 16-bit random number. If a non-zero value is selected, the tag can load the selected random integer into its slot counter and change its state to Arbitrate.
Responsive to receiving the tag transmission, EIR terminal can acknowledge it with Ack command containing the same random number. Responsive to receiving Ack command, the tag can change its state to Acknowledged and backscatter its protocol control (PC) bits, EPC and cyclic redundancy check (CRC) value. Unacknowledged tag can select a new random integer from the range of [0; 2Q-1], load the value into its slot counter, and change its state to Arbitrate. Responsive to receiving QueryAdjust command, a tag in the Arbitrate state should decrement the value of its slot counter and backscatter its protocol control (PC) bits, EPC and CRC value if its slot counter is equal to zero.
Responsive to receiving the tag's transmission of its PC, EPC and 16-bit CRC value, EIR terminal can send a QueryAdjust command causing the tag to invert its Inventoried flag and to transition to Ready state.
Access command set can be used by EIR terminal 100 for communicating with (reading from and writing to) a tag. An individual tag must be uniquely identified prior to access. Access command set includes the following commands:
ReqRn command can be used by EIR terminal 100 to request a handle from a tag; the handle can be used in the subsequent Access command set commands. Responsive to receiving Req_RN commands, a tag returns a 16-bit random integer (handle) and transitions from Acknowledged to Open or Secured state.
Read command can be used by EIR terminal 100 to read tag's Reserved, EPC, TID and User memory;
Write command can be used by EIR terminal 100 to write to tag's Reserved, EPC, TID and User memory;
Kill command can be used by EIR terminal 100 to permanently disable a tag;
Lock command can be used by EIR terminal 100 to lock passwords preventing subsequent read or write operations; lock individual memory banks preventing subsequent write operations; permanently lock the lock status of passwords or memory banks;
Access command can be used by EIR terminal 100 to cause a tag having a non-zero access password to transition from Open to Secured state.
A skilled artisan would appreciate the fact that other methods of interrogating RFID tags by EIR terminal 100 are within the scope of this disclosure.
In a further aspect, EIR terminal 100 can be configured, responsive to successfully locating at least one RFID tag satisfying the search condition (i.e., a tag transmitting an encoded representation of a binary string, at least part of which is equal to at least part one of the specified one or more target item identifiers), to notify the user of EIR terminal 100 of a successful search via a visual message and/or an audible message. A visual Successful Search message can be displayed on display 504 of EIR terminal 100. An audible Successful Search message can be in a form of a generated voice message or a user-configurable sound.
In one embodiment, EIR terminal can be configured to sense its spatial movement using accelerometer 357. In one embodiment, EIR terminal 100 can be configured, responsive to sensing a spatial movement of said EIR terminal, to repeatedly attempt to locate at least one RFID tag satisfying the search condition.
In one embodiment, EIR terminal 100 can be configured, responsive to failing to locate within a pre-defined period of time at least one RFID tag satisfying the search condition, to notify the user of EIR terminal 100 of an unsuccessful search attempt via a visual message and/or an audible message. A visual Unsuccessful Search Attempt message can be displayed on display 504 of EIR terminal 100. In one embodiment, the visual message can indicate an approximate range within which the target item could not be located. An audible successful search message can be in a form of a generated voice message or a user-configurable sound.
In one embodiment, at least part of the above described item locate functionality can be implemented by one or more computer programs executed by microprocessor 310 of
While the present invention has been particularly shown and described with reference to certain exemplary embodiments, it will be understood by one skilled in the art that various changes in detail may be affected therein without departing from the spirit and scope of the invention as defined by claims that can be supported by the written description and drawings. Further, where exemplary embodiments are described with reference to a certain number of elements it will be understood that the exemplary embodiments can be practiced utilizing less than the certain number of elements.
A small sample of systems methods and apparatus that are described herein is as follows:
a microprocessor;
a memory communicatively coupled to said microprocessor;
a communication interface;
an RFID reading device configured to perform at least one of: outputting raw message data comprising an encoded message and outputting decoded message data corresponding to an encoded message;
wherein said EIR terminal is configured, responsive to receiving one or more target item identifiers, to attempt to locate at least one RFID tag transmitting an encoded representation of a binary string;
wherein at least part of said binary is equal to at least part of one of said one or more target item identifiers;
wherein said EIR terminal is further configured, responsive to successfully locating said at least one RFID tag, to notify a user of said EIR terminal via at least one of: a visual message and an audible message.
wherein said EIR terminal is further configured, responsive to receiving said one or more target item characteristics, to receive said target item identifier by querying an external database via said communication interface for at least one item identifier corresponding to an item conforming to said one or more target item characteristics.
wherein said EIR terminal is further configured to display via a GUI at least part of said description;
wherein said EIR terminal is further configured to receive a user input specifying one or more target item characteristics by modifying at least one of said one or more sample item characteristics; and
wherein said EIR terminal is further configured, responsive to receiving said user input, to receive said target item identifier by querying an external database via said communication interface for at least one item identifier corresponding to an item conforming to said target item characteristics.
wherein said EIR terminal is further configured to responsive to reading by said EIR device a decoded message comprising an item identifier, to query an external database via said communication interface for a description of an item identified by said item identifier, said description comprising one or more sample item characteristics;
wherein said EIR terminal is further configured to display via a GUI at least part of said description;
wherein said EIR terminal is further configured to receive a user input specifying one or more target item characteristics by modifying at least one of said one or more sample item characteristics; and
wherein said EIR terminal is further configured, responsive to receiving said user input, to receive said target item identifier by querying an external database via said communication interface for at least one item identifier corresponding to an item conforming to said target item characteristics.
While the present invention has been described with reference to a number of specific embodiments, it will be understood that the true spirit and scope of the invention should be determined only with respect to claims that can be supported by the present specification. Further, while in numerous cases herein wherein systems and apparatuses and methods are described as having a certain number of elements it will be understood that such systems, apparatuses and methods can be practiced with fewer than or greater than the mentioned certain number of elements. Also, while a number of particular embodiments have been described, it will be understood that features and aspects that have been described with reference to each particular embodiment can be used with each remaining particularly described embodiment.
Number | Name | Date | Kind |
---|---|---|---|
5231273 | Caswell et al. | Jul 1993 | A |
5589844 | Belcher et al. | Dec 1996 | A |
5786764 | Engellenner | Jul 1998 | A |
7190257 | Maltseff et al. | Mar 2007 | B2 |
7786844 | Ehrman et al. | Aug 2010 | B2 |
7812725 | Bolander et al. | Oct 2010 | B2 |
7839289 | Chung et al. | Nov 2010 | B2 |
7844505 | Arneson et al. | Nov 2010 | B1 |
7859411 | Chakraborty | Dec 2010 | B2 |
7868760 | Smith et al. | Jan 2011 | B2 |
7907053 | Wildman et al. | Mar 2011 | B2 |
7909248 | Goncalves | Mar 2011 | B1 |
7916023 | Rado | Mar 2011 | B2 |
7916025 | Locker et al. | Mar 2011 | B2 |
7916026 | Johnson et al. | Mar 2011 | B2 |
7932809 | Nair et al. | Apr 2011 | B2 |
7986227 | Yankelevitz et al. | Jul 2011 | B2 |
7986239 | Chang | Jul 2011 | B2 |
8258956 | Kuzma et al. | Sep 2012 | B1 |
8287327 | Ghaly | Oct 2012 | B1 |
20010000958 | Ulrich | May 2001 | A1 |
20050285742 | Charych et al. | Dec 2005 | A1 |
20060131377 | Zimmerman | Jun 2006 | A1 |
20070017983 | Frank et al. | Jan 2007 | A1 |
20070138260 | Keys | Jun 2007 | A1 |
20080001749 | Fein et al. | Jan 2008 | A1 |
20080102805 | Balia et al. | May 2008 | A1 |
20080278370 | Lachner et al. | Nov 2008 | A1 |
20090024550 | Wynn et al. | Jan 2009 | A1 |
20090224923 | Abraham et al. | Sep 2009 | A1 |
20100013603 | Chatani et al. | Jan 2010 | A1 |
20100019035 | Larson et al. | Jan 2010 | A1 |
20100060544 | Penev et al. | Mar 2010 | A1 |
20100194604 | Ehrman et al. | Aug 2010 | A1 |
20100201520 | Stern et al. | Aug 2010 | A1 |
20100207738 | Bloy | Aug 2010 | A1 |
20100214067 | Mo et al. | Aug 2010 | A1 |
20100231410 | Seisenberger et al. | Sep 2010 | A1 |
20100276498 | Rofougaran | Nov 2010 | A1 |
20100294840 | Barry | Nov 2010 | A1 |
20100295682 | August et al. | Nov 2010 | A1 |
20100295943 | Cha et al. | Nov 2010 | A1 |
20100328073 | Nikitin et al. | Dec 2010 | A1 |
20110012775 | Richards et al. | Jan 2011 | A1 |
20110032081 | Wild | Feb 2011 | A1 |
20110050397 | Cova | Mar 2011 | A1 |
20110050423 | Cova et al. | Mar 2011 | A1 |
20110068906 | Shafer et al. | Mar 2011 | A1 |
20110068921 | Shafer | Mar 2011 | A1 |
20110090057 | Kosecki et al. | Apr 2011 | A1 |
20110095885 | Nielsen et al. | Apr 2011 | A9 |
20110109434 | Hadsall, Sr. | May 2011 | A1 |
20110109442 | Pavlov et al. | May 2011 | A1 |
20110130085 | Bellows et al. | Jun 2011 | A1 |
20110148589 | Johnson et al. | Jun 2011 | A1 |
20110148591 | Reynolds et al. | Jun 2011 | A1 |
20110163857 | August et al. | Jul 2011 | A1 |
20110163882 | August et al. | Jul 2011 | A1 |
20110163916 | Bamidele | Jul 2011 | A1 |
20110169657 | August et al. | Jul 2011 | A1 |
20110183688 | Dietrich et al. | Jul 2011 | A1 |
20110309136 | Katsakhyan | Dec 2011 | A1 |
20120075076 | Wang | Mar 2012 | A1 |
20120092134 | Stern et al. | Apr 2012 | A1 |
20120193411 | Smith | Aug 2012 | A1 |
20120206238 | Lavedas | Aug 2012 | A1 |
20120313757 | Volpi et al. | Dec 2012 | A1 |
20130043309 | Qu | Feb 2013 | A1 |
20130043981 | Wang et al. | Feb 2013 | A1 |
20130054390 | Kerchner et al. | Feb 2013 | A1 |
Number | Date | Country |
---|---|---|
0152179 | Jul 2001 | WO |
2009064926 | May 2009 | WO |
Entry |
---|
EPCGLOBAL Inc., EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz, Version 1.0.9, Jan. 31, 2005, pp. 1-94. |
Jan. 23, 2013 European Search Report in European Application No. 12181099.8. |
Feb. 8, 2013 Communication pursuant to Article 94(3) EPC in European Application No. 12181099.8. |
Feb. 10, 2015 Search Report issued in European Application No. 14190366.6. |
Mar. 1, 2016 Office Action issued in European Patent Application No. 14 190 366.6. |
Number | Date | Country | |
---|---|---|---|
20130049962 A1 | Feb 2013 | US |