n/a
n/a
The present invention relates generally to inventory security, and more specifically to a method and system for programming a security system “hard” tag.
Radio frequency identification (“RFID”) systems are used in a wide variety of applications, and provide convenient mechanisms for the tracking, identification, and authentication of persons or objects. A RFID system typically includes one or more readers (also commonly referred to as interrogators) deployed at selected locations in an installation. Readers are typically deployed where it is desired to control or to receive information about objects or persons bearing or associated with RFID tags (also commonly referred to as markers or transponders). For example, readers may be deployed so as to cover entrances and exits, inventory control points, transaction terminals, and the like. Each reader is capable of receiving information from RFID tags with each tag typically being associated with an object or person. A tag may be affixed to or embedded in an object with which it is associated, or be part of a badge, card, or token given to a person. Signals conveyed between the tag and the reader, allow the reader to sense information on the tag. This information may include, for example, authentication or identification information, or may include instructions, such as a sequence of processes or operations to be conducted upon an object bearing the tag.
Each tag may include stored information that is communicated wirelessly to the reader. Tags typically carry information in onboard memory such as read only memory (“ROM”) or nonvolatile programmable memory such as electrically erasable programmable read only memory (“EEPROM”) and the amount of information may range from a single bit to kilobits or even more. Single bit tags typically serve as surveillance devices, such as theft prevention tags. Information amounting to a few bits or tens of bits may serve as an identifier, such as may be found in a badge or smart card, while information amounting to kilobits may comprise a portable data file that can be used for identification, communication, or control. The reader may, for example, extract information from a tag and use it for identification, or may store or convey the information to a responsible party. Alternatively, a data file may include a set of instructions that may initiate or control processes or actions without recourse to, or in coordination with, information stored elsewhere.
A tag typically includes a wireless communication device, for example a transmitter or transponder, which is capable of wirelessly communicating stored information to the reader. The tag may communicate the information independently or in response to a signal, such as an interrogation signal, received from the reader. Both active and passive tags are known in the art. An active tag has an onboard power source, while a passive tag may operate without an internal power source, deriving its operating power from a field generated by the reader. Passive tags are much lighter and less expensive than active tags and may offer a virtually unlimited operational lifetime. However, passive tags typically have shorter read ranges than active tags and require a higher powered reader. Passive tags are also constrained in their capacity to store data and their ability to perform well in electromagnetically noisy environments.
Some tags contain a combination of RFID and EAS technology and can support Electronic Product Code (“EPC”), a globally unique serial number that identifies an item in the supply chain. The EPC allows inquiries to be made about a single instance of an item, wherever it is within the supply chain. The EPC contains information about the manufacturer, the type of object and a specific serial for the object. The EPC can also be associated with dynamic data such as the origination point of an item or the date of its production.
Retail establishments typically use “hard tags” containing EAS elements or a combination of EAS and RFID elements. An advantage of these hard tags is that they can be reused and reprogrammed. In order to reuse these hard tags, they must be re-encoded with new EPC numbers when attached to a new product. This process may occur at a manufacturing site, distribution center, or at a retail store. However, unlike conventional RFID labels and hanging tags, these hard tags cannot be encoded in standard print/encode portable machines, like the ones found at department stores. Currently, the only way to reprogram the tag is to manually place the hard tag in front of a conventional reader/antenna to be reprogrammed, or using a mobile hand-held reader to encode. This is very time consuming and requires the target hard tag to be in isolation with no other tags nearby, given that there is a risk of unintentionally encoding other hard tags near the hard tag being encoded. The need to isolate the hard tag makes this method inconvenient and inefficient, as the user cannot just reprogram the hard tag by setting the encoder in front of a display rack containing products, including the product with the hard tag that needs to be reprogrammed. Instead, in order to reprogram the hard tag, the product with the hard tag must be set apart from all the other products which contain hard tags.
Therefore, what is needed is a system and method that automatically and efficiently reprograms a hard tag by isolating the tag so that the reprogramming does not interfere with other nearby tags.
In accordance with one aspect, the present invention provides a system for programming a hard tag in which the hard tag includes a programmable RFID element. The system has a platform defining at least one hard tag locating area. A feeder feeds the hard tag into one of the at least one hard tag locating areas. An antenna is positioned at a hard tag programming area. Each of the at least one hard tag locating areas are positionable within the hard tag programming area. A RFID processor causes the hard tag to be programmed by the antenna when the hard tag is positioned within the hard tag programming area.
In accordance with another aspect, the present invention provides a method for programming a hard tag in which the hard tag includes a programmable RFID element. The hard tag is received into at least one hard tag locating area. Each of the at least one hard tag locating areas is positioned within a hard tag programming area in which the hard tag programming area includes an antenna. The hard tag is programmed with a merchandise identifier when the hard tag is positioned within the hard tag programming area.
In accordance with still another aspect, the present invention provides a system for programming an RFID element in a security hard tag in which the hard tag includes an EAS element and the RFID element. A platform defines at least one hard tag locating area. A feeder feeds the hard tag into one of the at least one hard tag locating areas. An antenna is positioned at a hard tag programming area in which the antenna is arranged to transmit a programming signal substantially within the hard tag programming area. Each of the at least one hard tag locating areas is positionable within the hard tag programming area. A RFID processor causes the antenna to program the programmable RFID element of the hard tag with an electronic product code (“EPC”) when the hard tag is positioned within the hard tag programming area.
A more complete understanding of the present invention, and the attendant advantages and features thereof, will be more readily understood by reference to the following detailed description when considered in conjunction with the accompanying drawings wherein:
Before describing in detail exemplary embodiments that are in accordance with the present invention, it is noted that the embodiments reside primarily in combinations of apparatus components and processing steps related to implementing a system and method for programming an RFID element in an inventory security system hard tag. Accordingly, the system and method components have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
As used herein, relational terms, such as “first” and “second,” “top” and “bottom,” and the like, may be used solely to distinguish one entity or element from another entity or element without necessarily requiring or implying any physical or logical relationship or order between such entities or elements.
One embodiment of the present invention advantageously provides a system and method for programming a hard tag that includes a programmable RFID element. Programming a hard tag may be performed at any of several points, such as when stock is received, in inventory, before setting the merchandise on the shelves, etc., with minimal effort by using the hard tag programming system and method described below. The hard tag's EPC allows items to be tracked through the course of storage and when items are being moved to different stores or warehouses. The EPC may include several parts, such as a version number, a code identifying the manufacturer, the serial number of the product, etc. The programming system may program a complete new EPC or parts of an EPC.
Referring now to the drawing figures in which like reference designators refer to like elements, there is shown in
Programming system 10 includes near field programming (“NFP”) antenna 16 that can program text, and other data received from communication infrastructure 14 (or from a frame buffer not shown) into hard tag 40 using for example, EPC compliant communication. NFP antenna 16 programs hard tag 40 without programming any other nearby tags. Feeder 12 feeds hard tags 40 onto platform 18. The platform 18 can be a moving or a stationary platform that receives hard tag 40 to be programmed. Programming system 10 includes user interface 20 that forwards graphics, text, and other data from communication infrastructure 14 (or from a frame buffer not shown) for display on a display unit.
Interface 20 may also include a communications interface. Communications interface allows software and data to be transferred to external devices or to receive data from a user. Examples of communications interface may include a mouse, keyboard, a modem, a network interface (such as an Ethernet card), a communications port, a PCMCIA slot and card, wireless transceiver/antenna, etc. Software and data transferred via the communications interface/module are in the form of signals which may be, for example, electronic, electromagnetic, optical, or other signals capable of being received by the communications interface. These signals are provided to the communications interface via a communications link (i.e., channel), which carries signals and may be implemented using wire or cable, fiber optics, a phone line, a cellular phone link, an RF link, and/or other communications channels.
Programming system 10 includes RFID programming unit 22 that stores programming instructions and commands. RFID programming unit 22 can include a main memory, preferably random access memory (“RAM”), and may also include a secondary memory for such storage. The secondary memory may include, for example, a hard disk drive and/or a removable storage drive, representing a floppy disk drive, a magnetic tape drive, an optical disk drive, etc. The removable storage drive reads from and/or writes to a removable storage media in a manner well known to those having ordinary skill in the art. Removable storage media is read by and written to by removable storage drive. As will be appreciated, the removable storage media can include a computer usable storage medium having stored therein programming software and/or data. In one embodiment, the memory is a system wide memory shared by the elements of programming system 10, and it is not necessary to have the memory be included as part of RFID programming unit 22.
Executable computer programs (also called computer control logic) can be stored in the memory of RFID programming unit 22. Computer programs may also be received via communications infrastructure 14. Such computer programs, when executed, enable the system to perform the functions of the present invention as discussed herein. In alternative embodiments, the secondary memory may include other similar means for allowing computer programs or other instructions to be loaded into the computer system and for storing data. Such means may include, for example, a removable storage unit and an interface. Examples of such may include a program cartridge and cartridge interface (such as that found in video game devices), flash memory, a removable memory chip (such as an EPROM, EEPROM or PROM) and associated socket, and other removable storage units and interfaces which allow software and data to be transferred from the removable storage unit to other devices.
Programming system 10 also includes tester 24. Tester 24 allows programming system 10 to test whether hard tag 40 was programmed correctly. Tester 24 may use different methodologies to test whether the tag's programming was successful. In one embodiment, tester 24 rejects hard tag 40 that has been programmed incorrectly to prevent hard tag 40 from being attached to a product. As discussed below, tester 24 can include gating mechanism 34 that diverts rejected tags into reject bin 36.
Programming system 10 further includes processor 26.
Platform 18 includes a shielding system 32 to block RF energy, thereby preventing the NFP antenna 16 from inadvertently encoding adjacent tags. The shielding system 32 may use different methods to prevent the encoding of other tags, and as such, shielding system 32 may desensitize the areas outside the programming area or may create interference, thereby reducing the quality of wireless communications of the NFP antenna 16 with adjacent hard tags. Shielding system 32 may also separate the transmitted RF signals, or can provide a degree of isolation between hard tag programming area 46 and surrounding areas. Shielding system 32 provides isolation between the programmed hard tag 40 and adjacent tags by cancelling the whole or part of the RFID signal, by attenuating the signal, filtering the signal, reducing the amplitude of the signal, reducing the power of the signal, etc. Shielding system 32 may eliminate, cancel or minimize the RFID signal. Due to non-ideal circumstances, a portion of the transmit signal may leak or flow into the surrounding areas, but shielding system 32 ensures that the signal is not strong enough to reprogram adjacent hard tags.
NFP antenna 16 programs hard tag 40 with the desired EPC code or other standard RFID numbering scheme or identity. In another embodiment, separate NFP antennas 16 may be used in programming hard tags 40. Even when separate NFP antennas 16 are used to transmit RF signals, the RF signal broadcast via the NFP antenna 16 does not reprogram other adjacent hard tags. In one embodiment, programming system 28 has the ability to feed and encode a variety of hard tag shapes, designs and adapts to these designs automatically or by simple mechanical adjustments by the user.
Interface 20 can be a computer interface that receives commands, encoding information, serial numbers, etc. from a host system, a barcode scanning system or a user. Programming system 28 can receive both a single item number and a serial number range, giving programming system 28 the ability to encode a long series of identical items without intervention and without having to maintain a connection between, for example, computer interface 20 and an external host. In one embodiment, interface 20 emulates the interfaces of industry standard print/encode devices commonly used to program conventional RFID labels and tickets.
Interface 20 can allow programming system 28 to be updated, specifically, RFID reader/encoder programming unit 22 can be upgraded with new firmware to adapt to new RFID standards and improvements in technology. In one embodiment, interface 20 requires a password or a security look in order to prevent unauthorized encoding of hard tags 40. In one embodiment, interface 20 shows a visible signal, or an audible signal to provide feedback to the user as to the data being programmed, serial statistics on the number of hard tags encoded, the number of hard tags that failed to encode, serial numbers issues, etc.
Tester 24 checks that hard tag 40 is properly programmed and exposes hard tag 40 programming errors. Tester 24 performs quality assurance on hard tag 40, finding mistakes, bugs and other problems that could arise in the programming phase. Tester 24 can be a low power tester, and might activate different combinations of read and write routines on hard tag 40 and analyze the outcome. The reading routine can simulate a portable scanner reading hard tag 40, just like the portable scanners used in department stores. Tester 24 can also perform comprehensive protocol and parametric tests in accordance with preset standards. Tester 24 can allow multiple configuration possibilities to be tested using, for example, RF waves or fixed frequency pulses.
Hard tags 40 that are successfully programmed are dispensed to the user, ready for attachment to a product. Hard tags 40 that do not encode properly are rejected via a gating mechanism 34 and are diverted to reject bin 36. In one embodiment, tester 24 has the ability to mark rejected hard tags 40 with a visual mark to prevent future use. Optionally, hard tag 40 can be dispensed in such a way that hard tag 40 can be automatically attached to a product or garment by using a separate feed mechanism (not shown) which orients and provides attachment tacks, lanyards or clamps required to attach the hard tag to a product. In another embodiment, tester 24 verifies proper operation of the EAS element in hard tag 40 and rejects hard tag 40 if the EAS function is not operating properly.
Programming system 28 includes bar code label applicator (“BCA”) 38 that prints on the surface of hard tag 40 a visual indicator of the new code programmed in hard tag 40. BCA 38 may print the visual indicator of the new code in a label, and attach the printed label to hard tag 40, instead of printing the label on the hard tag. A visual indicator will give the user the ability to recognize which code has been used in programming hard tag 40.
In another embodiment, platform 18 is a stationary platform, and feeder 12, NFP antenna 16, BCA 38, and tester 24 are not stationary, but movable via a motor or motors, controlled, for example by processor 26, with respect to platform 18. NFP antenna 16 advances towards hard tag 40 to program hard tag 40 with a new EPC. After hard tag 40 is programmed, tester 24 proceeds towards hard tag 40 to perform testing on hard tag 40. If the testing is successful, BCA 38 advances towards hard tag 40 to mark hard tag 40 with a visual indicator of hard tag's 40 new code.
NFP antenna 16 is positionable within hard tag programming area 46 where RFID processor 26 causes hard tag 40 to be programmed. Near field programming antenna 16 can be configured to wirelessly program hard tag 40. Hard tags 40, which include an EAS element, are programmed with, for example, an EPC code, or a merchandise identifier comprising at least one of a manufacturer code, a product serial number, and a tracking number.
Circular platform 18 is coupled to a vibratory mechanism (not shown) to properly orient hard tags 40 into the at least one hard tag locating area 44. In another embodiment of a programming system constructed in accordance with the principles of the present invention, the NFP antenna 16 can be one of a stationary antenna or a movable antenna. RFID processor 26 causes the movable antenna to go to hard tag 40 for programming hard tag 40. Programming system 10 is coupled to tester 24 configured to determine whether hard tag 40 has been programmed correctly. An incorrectly programmed hard tag 40 is marked to prevent future use and it is rejected and diverted to reject bin 36. RFID processor 26 keeps track of a number of hard tags 40 programmed, a number of hard tags 40 programmed correctly, and a number of hard tags 40 programmed incorrectly.
Further, bar code label applicator 38 is configured to attach a bar code label to hard tags 40. Hard tags 40 are automatically attached to a product after being labeled and tested. Shielding system 32 divides the platform into hard tag locating areas 44. Shielding system 32 has a shielding property that prevents programming of other hard tags 40 adjacent to the hard tag being programmed. When tester 24 determines that hard tag 40 has been incorrectly programmed, hard tag 40 is marked to prevent future use and it is sent to reject bin 36. It should be noted that platform 18 illustrated in
Tester 24 evaluates hard tag 40 to determine whether tag 40 has been properly programmed (step S 106). Hard tag programming area 46 includes shielding system 32 that ensures programming system 10 programs only the target hard tag 40 and no any other adjacent tags. If hard tag 40 has not been properly programmed, hard tag 40 is rejected (step S108). A rejected tag is sent by gating mechanism 34 to reject bin 36, where it can be later recycled, thrown away, etc. Programming system 10 sounds an alarm to alert operators that hard tag 40 has been rejected. Otherwise, it is determined that hard tag 40 is properly programmed, and therefore hard tag 40 is ready to be attached to a product (step S 110). In one embodiment, BCA 38 labels hard tag 40 with a human readable indicator before hard tag 40 is attached to merchandise.
Various hard tag 40 programming embodiments are described in terms of this exemplary tag programming system 10. After reading this description, it will become apparent to a person of ordinary skill in the relevant art(s) how to implement the invention using other systems and methods. It is also understood that the capacities and quantities of the components of the system and method described may vary depending on the tag, the quantity of tags to be supported, as well as the intended interaction between programming components with the tag. For example, access to the programming system for configuration and management may be designed to occur remotely by web browser. In such case, the inclusion of a display interface may not be required.
The present invention can be realized in hardware, software, or a combination of hardware and software. Any kind of computing system, or other apparatus adapted for carrying out the methods described herein, is suited to perform the functions described herein.
A typical combination of hardware and software could be a specialized or general purpose computer system having one or more processing elements and a computer program stored on a storage medium that, when loaded and executed, controls the computer system such that it carries out the methods described herein. The present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods described herein, and which, when loaded in a computing system is able to carry out these methods. Storage medium refers to any volatile or non-volatile storage device.
Computer program or application in the present context means any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following a) conversion to another language, code or notation; b) reproduction in a different material form.
In addition, unless mention was made above to the contrary, it should be noted that all of the accompanying drawings are not to scale. Significantly, this invention can be embodied in other specific forms without departing from the spirit or essential attributes thereof, and accordingly, reference should be had to the following claims, rather than to the foregoing specification, as indicating the scope of the invention.