Exemplary embodiments of the present invention relate generally to RFID scanning systems, devices and methods, and more specifically those used for managing and securing critical inventories, such as medication kits, narcotics, and other prescription drugs.
RFID (radio-frequency identification) technology has seen adoption for many uses, such as advertising, transportation, shipping and general inventory management, for instance. Tagging and tracking items with RFID technology in inventory stock is generally done to decrease latency in the reporting of inventory information and to increase the accuracy in the information being reported. In many use cases, the application of RFID technology to inventory management procedures can produce significant gains in a business's efficiency and speed of operations, and further permits the use of electronic tracking and large-scale inventory information analysis often used for further improvements systemically.
RFID technology in general, however, has some disadvantages that can be magnified in certain potential use cases. In some industries, coping with these types of issues has led to a slower rate of deployment of the technology in general. For example, in the medical industry, accuracy of the objects being inventoried (typically medication) is critical.
The medical professionals using the inventoried medication need to consistently have particular medications available to them. Known RFID inventory technology is insufficient, however, due to problem with the labor-intensive creation of such RFID devices, inability to provide bulk scanning, and the actual or potential inaccurate RFID readings due to electromagnetic interference and leakage which can cause inaccuracies in the gathered data.
There is, therefore, an unmet need in the prior art for a highly accurate bulk scanning RFID inventory device that is relatively easy and cost efficient to manufacture. There is also an unmet need for a scanning RFID inventory device that is secure. Pain killers and other medications are commonly subject to theft. Furthermore, there are many settings outside of the traditional hospital or medical office that store medications or supplies. For example, fire stations often store pain killers and/or sedatives for use in their ambulances. There is an increasing amount of theft of pain killers and other medications from fire stations and other facilities. It is, therefore, desirable to have a secure scanning device that limits access to authorized users. It is also desirable to have a scanning device that is compact and can be utilized in a variety of environments without the need for a pharmacy computer or computer station nearby. It is also desirable to have a scanning system that can communicate basic information in a simple way that can be understood by both medical and non-medical personnel.
Exemplary embodiments of the present disclosure pertain to an RFID box that is comprised of a conductive metallic material so as to insulate it from electromagnetic interference. The RFID box comprises a hinged door that is biased open but held shut by latches. Preferably, the door is hinged at the top of the RFID box. The RFID box may comprise an RFID antenna and a RFID antenna/reader, both of which are configured to read RFID tags placed within the RFID box. A pass-through device is preferably located on the rear wall of the RFID box which provides a channel for the passage of a communications wire and power supply.
The box may be formed by one C-shaped enclosure and a pair of open top box shaped side panels such that the enclosure and the side panels form a lip around the front aperture of the RFID box. The hinged door may be hung from the top of the enclosure such that it covers said front aperture when placed in the closed position. A gasket may run the perimeter of the lip to prevent electromagnetic leakage.
The RFID box may be in communication with a remote server and electronic device. The RFID box may transmit baseline data regarding the inventory placed within the RFID box and current content data regarding the inventory current located in the RFID box to the remote server. The remote server may compare the data and send a summary of the comparison to the electronic device.
In an alternative embodiment, the RFID box may comprise a housing surrounding an interior cavity, where the housing has a front side with an aperture for receiving one or more items into said interior cavity. The housing may have a door adapted to move between an open position (allowing access to the interior cavity) and a close position where such access is prohibited. The RFID box may have an antenna and an antenna/reader for communicating with and receiving information from one or more RFID tags located within the interior cavity. The RFID box may have a local processor that is within the housing. The processor may communicate with the antenna and antenna/reader to direct scanning of the items in the interior cavity and obtain RFID information that comprises, among other things, unique identifiers of each of the items. The processor may compare the results of a scan against baseline information previously received to determine if any items are missing and/or expired. The processor may also control access to the box by locking the box until and unless an authorized user, as identified by an RFID bracelet, badge, card, or other item, is recognized by an RFID reader located on the device. The processor may achieve this by being in electronic communication with an access control or audit system comprising one or more lock mechanisms, authentication mechanisms, access control units, and associated communicative coupling means. Magnetic and/or mechanical latches and locks may be used to keep the door securely shut when an authorized user is not accessing the box. The processor may further store access information in local memory and communicate such information to a remote server in order to create an audit trail of users that have obtained access to the interior cavity. Information regarding items scanned and the audit trail may be transmitted to a web portal or to electronic devices. In various embodiments the RFID box may have a variety of shapes and sizes as desired. In some embodiments the RFID box may be sized to receive a single tray of items, such as a crash cart tray, while in other embodiments the RFID box may be sized and shaped to receive multiple trays at the same time. The RFID box may have brackets, tabs, or other features that allow it to be secured to a wall for easy access. The box may also have a light that can visually communicate information to users including, for example, whether an item is missing, an item is expired, or whether an unauthorized user has accessed the device.
In an alternative embodiment, the RFID box may comprise a housing with dual doors that limit access to an interior cavity. The outer door may be connected to the front side of the housing via a hinge mechanism that allows it to move between and open position and a closed position. An inner door may be located behind the outer door in a recess in the front side of the housing. The inner door may also be connected to the housing via a hinge mechanism that allows it to move between an open position and a closed position. The inner door may be prevented from being opened until the outer door is opened. Both doors may have lips on them or other features to aid in manually opening and closing the doors, and both doors may be spring biased in an open position. Both doors may have electromechanical locking mechanisms that keep the doors securely closed by latches that inserts into apertures in the housing when the doors are closed. While opening of the doors may be achieved electronically when authorized permission is granted by an internal processor in communication with an access reader unit, the locking mechanisms may include mechanical override locks that allow the doors to be unlocked and locked in the event that the RFID box has no power. The internal processor may instruct an internal antenna in communication with an internal RFID reader to scan the contents of the interior cavity to read RFID tags when one or both of the doors are closed. In order for the RFID box to allow access when in receipt of electrical power, the access reader unit will read a first RFID card associated with an authorized user to open the outer door, and then read a second RFID card presented by a second authorized user in order to open the outer door. This dual authorization process may achieve desired security concerns for storing and accessing narcotics and other sensitive items.
This alternative embodiment may also comprise a drop box mechanism located on the top side of the RFID box, the drop box mechanism may allow items to be deposited into the interior cavity even when the inner door is closed, as long as the outer door has been opened. The drop box mechanism includes a mechanical internal locking feature comprising a spring pin, a lever and a slot on the drawer that secures the drawer in a closed position when the outer door is in a closed position. The drawer may also comprise an electrically actuated lock in addition to, or in lieu of, the mechanical internal locking feature.
The double door RFID box may be in electronic communication with a remote server associated with a database. The remote server may grant or deny requests for authorization, maintain audit records related to past access to the RFID box and which items were removed or added in connection with authorized users, may maintain an overall inventory of items stored in the RFID box and push alerts and notifications to users regarding access, attempts to access, and inventory. RFID information relayed to the remote server from the RFID box supports the tracking of items, access requests, and authorizations. The remote server may also support an online portal that users can access on a variety of devices in order to update permissions, search for particular items (such as those that may be subject to a recall or are expired), manage expiration date information, and perform other maintenance on the system. The remote server may communicate with and serve multiple RFID devices, with the ability to monitor overall inventory and track the movement of items from one RFID device to another.
The RFID tags may comprise a thin tail section for attachment to the objects to be inventoried and a pair of tabs separated from one another by a perforation. The tabs may include an RFID antenna and indication markers such as serial number, bar codes, and QR codes. Furthermore, the tabs may be configured to be folded against one another such that they create a flag. Alternatively, the second tab, which has the RFID antenna, may be torn from the first tab and adhered directly to the object to be inventoried.
An object of the present invention is to provide an RFID bulk scanning device that can be manufactured with relatively minimal labor effort and cost.
It is a further object of this invention to provide an RFID bulk scanning device that can scan objects to be inventoried located therein with a high degree of accuracy.
It is a further object of this invention to provide an RFID bulk scanning device that prevents electromagnetic leakage and interference.
It is a further object of this invention to provide an RFID bulk scanning system that can compare the current contents of the RFID bulk scanning device with a baseline data to determine, among other things, whether an item is missing or expired.
It is a further object of this invention to provide an RFID tag that can work efficiently with said RFID bulk scanning device and system.
It is a further object of this invention to provide an RFID scanning device that is compact and has wide utility.
It is a further object of this invention to provide RFID scanning devices of the type generally described herein, being adapted for the purposes set forth herein, and overcoming disadvantages found in the prior art. These and other advantages are provided by the invention described and shown in more detail below.
Novel features and advantages of the present invention, in addition to those mentioned above, will become apparent to those skilled in the art from a reading of the following detailed description in conjunction with the accompanying drawings wherein identical reference characters refer to identical parts and in which:
The enclosure 110 may be C-shaped such that it forms the top, rear, and bottom surfaces of the housing and surrounds an interior cavity 113 that is accessible through the door 114. The enclosure 110 may additionally include a lip that extends vertically from the top and the bottom surfaces such that it forms a portion of the front surface of the housing and partially defines an aperture in the front surface of the housing. The pair of side panels 112 may be configured to fit within the enclosure 110 on either side thereof such that the side panels 112 forms the side surfaces of the RFID box 100. In exemplary embodiments of the present invention, the side panels 112 may be open top box shaped such that they likewise create a lip that protrudes inwardly from the left and right side panels such that it forms a portion of the front surface of the housing and partially defines an aperture in the front surface of the housing.
One or more hinges 118 may connect the door 114 to the housing such that the RFID box 100 is completely enclosed. In exemplary embodiments of the present invention, a pair of hinges 118 are located on the lip formed along the upper edge of the enclosure 110 and connect the door 114 to the enclosure 110. This may reduce sagging of the door 114 otherwise resulting from placing the hinges on the side of the RFID box 100. Sagging of the door 114 may create gaps in the RFID box 100 housing and result in electromagnetic leakage.
In exemplary embodiments of the present invention, the hinges 118 are continuous tension hinges that are configured to bias the door 114 in the opened position, preferably at a 170° angle from the front surface of the RFID box 100. The door 114 may be sized and located to cover the front of the RFID box 100 and be substantially flush with the side and bottom edges thereof, thereby preferably overlapping with at least a portion of the lip created by the enclosure 110 and the side panels 112. In exemplary embodiments of the present invention, the door 114 may comprise one or more tabs 116 that protrude beyond the side panels 112 to facilitate a user manipulating the door 114 between a closed position and an opened position. In other exemplary embodiments of the present invention, the door 114 may comprise pull handles, knobs, or other devices for opening and closing the door 114.
As best shown in
A gasket 132 may be located along the perimeter of the front surface of the housing for the RFID box 100. In exemplary embodiments, the gasket 132 may extend along the lip created by the enclosure 110 and the side panels 112. The gasket may be comprised of a conductive material and may be a foam, tape, pad, or the like. An RFID antenna 124 may be located along the bottom surface of the RFID box 100. The RFID antenna 124 may be configured to communicate with a series of RFID tags 300 (as shown in
As best illustrated in
In exemplary embodiments of the present invention, the pass through device 126 may be configured to cover the aperture in the RFID box 100 where the wire 130 passes outside of the RFID box 100. The pass-through device 126 may comprise an enclosure defining a channel which extends along the rear wall of the RFID box 100 for the wire 130 to pass through. The pass through device 126 may be fastened, welded, or otherwise adhered to the inside rear wall of the RFID box 100. Preferably, conductive tape is used along the seams between the pass through device 126 and the RFID box 100 to minimize electromagnetic leakage. The pass through device 126 may comprise a coupler 134 (as best illustrated in
One or more mechanical stops 119 may be located along the rear wall of the RFID box 100, though such is not required. The mechanical stops 119 may be configured to prevent the inventory basket 238 or other container from contacting the pass through device 126 and/or the rear wall of the RFID box. In other exemplary embodiments of the present invention, the pass through device 126 may act as a mechanical stop 119.
The components of the RFID box 100, including, but not limited to, the enclosure 110, the side panels 112, and the pass-through device 126 may be fastened, welded, adhered, or otherwise secured in their respective locations preferably by conductive materials. Conductive tape or other conductive material may be additionally placed along the seams of the components of the RFID box 100 so as to minimize RFID leakage. These components may be comprised of a metallic, conductive material such as, but not limited to, aluminum. Specifically, they may be comprised of ⅛″ thick aluminum, though any thickness is contemplated. The use of a conductive material may serve to substantially electromagnetically “seal” the RFID box 100, thus minimizing RFID leakage, which thereby ensures accuracy in RFID readings by ensuring that the RFID antenna 124 and RFID antenna/reader 128 only detect RFID signals being emitted from within the RFID box 100.
The baseline box content data may be transmitted to and stored on the server 140. At a later time, the contents of the RFID box 100 may be scanned and the data recorded, this data is hereinafter referred to as the current box content data. The current box content data may then be transmitted to the server 140 for storage and processing. The server 140 may compare the current box content data with the baseline box content data and produce summary of the comparison, hereinafter referred to as the comparison data. The comparison data may then be transmitted to the electronic device 150 for display.
In exemplary embodiments of the present invention, as illustrated in
The first tab 304 and the second tab 306 may each comprise an identification number 312 and/or a code 314 such as, but not limited to, a bar code, QR code, or the like. The second tab 306 may further comprise an RFID antenna 310 configured to communicate with the RFID antennas 124 and the RFID antenna/reader 128.
In an exemplary embodiment, each tab 306, 304 has a length of approximately 1.189 inches and a height of 0.6 inches. The tail has a height of 0.188 inches. The RFID tag 300 has an overall length of 4.75 inches, prior to any folding. The RFID tag has a thickness of 0.005 inches. In other embodiments, the dimensions of the RFID tag may vary as desired. Any size, shape, or design of the RFID tag 300 is contemplated.
A further exemplary embodiment of the invention that includes access control and auditing features is depicted in connection with
In some embodiments, the distribution boxes may be networked with an inventory system such as shown in connection with
An exemplary embodiment of the distribution box 400 is shown with Faraday cage construction shielding methods similar to those described in connection with the RFID box 100. An enclosure 410 may be C-shaped such that it forms the top 402, rear 404, and bottom 406 surfaces of the housing. The enclosure 410 may additionally include lips 408 and 409 that extend vertically from the top 402 and the bottom 406 surfaces such that it forms a portion of the front surface of the housing and partially defines an aperture 411 in the front surface of the housing. In some embodiments, it may be convenient to mount the invented distribution box 400 on a vertical surface, such as the wall of a hospital operating room or patient room, such that mounting brackets 413 are provided for securing said box 400 to said vertical surface. A pair of side panels 412 may be configured to fit within the enclosure 410 on either side thereof such that the side panels 412 forms the side surfaces of the distribution box 400. In exemplary embodiments of the present invention, the side panels 412 may be open top box shaped such that they likewise create a lip that protrudes inwardly from the left and right side panels such that it forms a portion of the front surface of the housing and partially defines an aperture 411 in the front surface of the housing.
One or more hinge mechanisms 418 may connect the door 414 to the housing such that the distribution box 400 is completely enclosed. In an exemplary embodiment of the present invention, one or more hinges 418 are located on the lip formed along the upper edge of the enclosure 410 and connect the door 414 to the enclosure 410. This may reduce sagging of the door 414 otherwise resulting from placing the hinges on the side of the distribution box 400. Sagging of the door 414 may create gaps in the distribution box 400 housing and result in electromagnetic leakage, which is undesirable in applications in which the inventory items in a kit are being logged.
In exemplary embodiments of the present invention, the hinges 418 are continuous tension hinges that are configured to bias the door 414 in the opened position, preferably at a 170° angle from the front surface of the distribution box 400. The door 414 may be sized and located to cover the front of the distribution box 400 and be substantially flush with the side and bottom edges thereof, thereby preferably overlapping with at least a portion of the front face of the box 400 created by the lips of the enclosure 410 and the side panels 412. In exemplary embodiments of the present invention, the door 414 may comprise one or more tabs 416 that protrude beyond the side panels 412 to facilitate a user manipulating the door 414 between a closed position and an opened position. In other exemplary embodiments of the present invention, the door 414 may comprise pull handles, knobs, or other devices for opening and closing the door 414.
As best shown in
A gasket 432 may be located along the perimeter of the front surface of the housing for the distribution box 400. In exemplary embodiments, the gasket 432 may extend along the lip created by the enclosure 410 and the side panels 412. The gasket 432 may be comprised of a conductive material and may be a foam, tape, pad, or the like. The door 416 may further be provided with additional insulation or electromagnetic shielding material, as at 417. Similarly, an interior enclosure 419 with an open face may be affixed within the enclosure 410 and generally within the box 400, wherein the open face 421 is aligned with the aperture 411. The interior enclosure 419, which surrounds the interior cavity 415, may be used to provide additional electromagnetic insulative capacity to the box 400, and provide a smooth working surface for inventory storage.
A control system 450 is also provided in the exemplary embodiment shown in connection with
Depending upon the deployment environment, the authentication means 454 may be provided in a manner conducive and complementary to existing authentication means already in use at a location. For example, a lock access point may be provided which includes an RFID antenna located at a surface of the distribution box 400. The RFID antenna may be configured to communicate with a series of RFID tags 300 (as shown in
An electronic lock mechanism 452 is provided to couple to the door latch 420 to prevent unauthorized access to the contents of the distribution box 400. This lock receives actuation signals from the access control unit 456 via conductive wires 458, which in turn receives and processes inputs from the lock access mechanism 454. In some embodiments, RFID-enabled cards, badges, wrist bands, or bracelets 460 are provided to users, such as hospital staff, and the access control unit 456 is programmed to open the lock mechanism 452 upon a successful scan of a predetermined ID range received at the lock access device 454. In other embodiments, the distribution box 400 may be networked with the RFID inventory box system (see, e.g.,
Importantly, the invented distribution box 400 and access control system 450 may be configured to log access to the distribution box 400, either locally in a memory unit of the access control unit 456 or remotely (e.g., 150 in
In some embodiments, the lock access mechanism 454 may be configured with other alternative types of access readers, as is desired in a particular application. For example, the lock access mechanism could be provided as an RFID antenna, a biometric reader, a proximity induction-based card reader, a mag-stripe reader, a keypad, or a combination thereof.
In some cases, the distribution box 400 may further include an internal RFID antenna as part of the access control unit 456 for tracking and logging inventory items present both before and after an access event. While the box 400 may be configured with a targeted RF leak at the location of the lock access mechanism 454, exemplary embodiments may include two antennas (internal and external) shielded from one another to track box access and inventory levels. Network access, power source or both for the access control unit 456 may be achieved, for example, via an Ethernet pass-through 462 in the housing 410. Those skilled in the art will appreciate that, while an exemplary configuration of the lock 452 and latch 420 mechanism, lock access reader mechanism 454, access control unit 456 and pass-through 462 is shown in connection with
The components of the distribution box 400, including but not limited to the enclosure 410 and the side panels 412, may be fastened, welded, adhered, or otherwise secured in their respective locations preferably by conductive materials. Conductive tape or other conductive material may be additionally placed along the seams of the components of the RFID box 400 so as to minimize RFID leakage. These components may be comprised of a metallic, conductive material such as, but not limited to, aluminum. Specifically, they may be comprised of ⅛″ thick aluminum, though any thickness is contemplated. The use of a conductive material may serve to substantially electromagnetically “seal” the distribution box 400 thus minimizing RFID leakage, which thereby ensures accuracy in RFID readings by ensuring that an RFID antenna and RFID antenna/reader only detect RFID signals being emitted from within the RFID box 400 for accuracy and efficacy in inventory tracking procedures.
A second exemplary embodiment of a distribution box 500 and its components are shown in connection with
In certain embodiments, the processing unit 570 allows for local processing of authorization requests and comparison of baseline information against inventory scans. While changes in user roles and changes to baseline information may be effected through a web portal, the box 500 can perform many operations locally, allowing it to maintain operability even when network/internet connection is unavailable.
Another embodiment of a distribution box 600 having different shape and size is shown in connection with
As shown in
The box 600 may have a status light 617 located on the housing. The status light 617 may display one or more colors that communicate information to a user. In an exemplary embodiment, the light can turn green, orange and red. When a scan reveals that all items are present, and all items are unexpired, the light 617 may be green. A user can take one look at the box and upon seeing the green light know that there is no need to replace any expired items, and that all items are present. The light 617 turns orange when one or more items are expired, providing a visual notification to the user that restocking is necessary. When the scan indicates that according to baseline box content data an item is missing, the box may turn red, again providing a visual notification to the user that restocking is necessary and possibly a review of the audit records is necessary as well to see what user removed the item. Of course, in different embodiments, the light may be configured in different ways. The light may be an LED light in electronic communication with the motherboard 580. The box 600 may be powered by PoE (power over ethernet) or other means. An ethernet port may be located on its back side or other surface. In some embodiments, the box may include a battery to allow it to remain operable when the power goes out or during transport.
This embodiment may have a mechanical lock in addition to the lock operated by the lock access mechanism. The mechanical lock may be completely separate to and provide a secondary level of security to the lock access mechanism. This may allow for increased security. The mechanical lock may also be configured to override the lock access mechanism in times when the power is out or in other emergency situations.
Different embodiments may also have a display screen integrated into the box itself to provide written notifications to users. For example, the screen may display the name of a pharmaceutical item that has expired along with its expiration date. In some embodiments, the screen may display the name of the last user that has accessed the box. The screen may be sized such that it can only provide a few words to a user or it may be larger and even have touch-screen capabilities to allow users to configure settings, enter queries, or otherwise obtain information about contents and access history.
It will be appreciated by one of ordinary skill in the art that a box shaped like the embodiment in
Located on the front side 712 of the housing 710 is an outer door 726 which may be attached to the housing 710 by a hinge mechanisms 728. In the exemplary embodiment of
While in
In this exemplary embodiment both the outer door 726 and inner door 730 are associated with electromechanical lock access mechanisms 732, 734 to allow for access into the RFID box. Each of the lock access mechanisms 732, 734 are electrically actuated, but also contain manual override locks 733, 735 that can bypass the electric actuation. The manual override locks 733, 735 can be accessed from the front face of the outer and inner doors 726, 730. The manual override locks 733, 735 may be keyed differently such that two different keys are needed to open both the outer and inner doors. Manual access may be necessary in the event of an electrical outage or the box 700 otherwise loses access to a power supply. Each lock access mechanism 732, 734 comprises a latch 738, 740 on the back side of its respective door that insertably engages with an aperture located in the housing 710 when in the “locked” orientation (apertures not shown). The apertures may be located within the recess 731 on the front side 712 of the housing.
The RFID box 700 includes an internal processing unit for controlling operations of the box 700, including access to the inner cavity. Referring to
The access reader unit 737 is the source of authentication for the electronic actuation of the lock access mechanisms 732, 734. In some embodiments, the access reader unit 737 may be a proximity card reader. The PCB is also in electronic communication with an RFID antenna 743 located in the housing 710 of the box 700. As illustrated in
As with other embodiments disclosed herein, one or more wires (not shown) may be used to facilitate communication between the various components of the box 700 and the internal processing unit, as well as supply power. The box 710 may be mains-powered and may be powered by PoE or other means. Referring to
One or ordinary skill in the art will recognize that any location, variation, or combination of RFID antenna and RFID readers is contemplated, including versions described in other embodiments herein. Additionally, although a single antenna may be used to scan the entire volume of the inner cavity 724, in other embodiments multiple antennas, readers, or antenna/readers may be used to read RFID tags located in the box 700.
Referring to
As illustrated in
In its extended position, the pin 754 makes contact with a lever 756 connected to said housing 710 and forces the lever 756 to engage with a slot 758 located on the drawer 746. The lever 756 is spring loaded and biased into a position that is disengaged from the slot 758. When the pin 754 is extended, the engagement of the lever 756 into the slot 758 prevents the drawer 746 from being opened from the top side of the box 700. When the outer door 726 opens, the pin 754 springs from the extended position back to its initial position. Returned to its initial position the pin 754 is no longer in contact with the lever 756, and the lever 756 springs into a disengaged position in which it is no longer engaged with the slot 758 on the drawer 746. Accordingly, the drop box 744 can be opened by a user, who can then drop items into the inner cavity 724 using the drawer 746.
In other embodiments, an electrical locking mechanism may secure the drawer 746 in a closed position by being insertably received into the surrounding housing 710 when in a locked state. In such an embodiment the locking mechanism may be in electronic communication with the PCB, which controls the locking and unlocking of the drawer 746.
The drop box mechanism 744 may be useful in scenarios where there is far more concern about the removal of items from the box 700 than the addition of items to the box 700. Also, the drop box 744 allows for more flexibility in dropping in items as there is not the same need for authorized users as there is to access the inner cavity 724. That is, in an exemplary embodiment there only needs to be authorization for the opening of the outer door 726. In an exemplary scenario, a drug kit could be returned to the box 700 at the end of a shift or work day without requiring an authorized supervisor to open the inner door 730.
Although the exemplary embodiment of
The RFID box includes means for visually indicating alerts to a user. A tri-colored LED (light emitting diode) 750 may be located the front side of the housing. In the exemplary embodiment of
The double door RFID box 700 may be used to control access to narcotics or other controlled substances or expensive drugs that require security. The housing 710 and doors 726, 730 may be made of durable steel construction, and two different authorized users may need to be recognized by the system before both doors can be opened and the interior cavity 724 accessed. Authorized users may be recognized by pre-approved RFID IDs associated with RFID cards, RFID bracelets, or other RFID items that may be carried by a user. The need for two authorized users in order to access the inner cavity 724 of the box (each being authorized to open a single door) may satisfy security requirements in a hospital, medical facility, emergency medical service facility, fire station, or other facility that follows high-security protocols for securing and accessing narcotics or other drugs.
Operations of the box 700 are performed by software located on the internal processing unit 736, including the PCB, as well as software located on a remote server accessible over a network. In an exemplary embodiment, configuration of access levels, permissions, notifications, box content/inventory tracking, audit recording, and RFID maintenance levels may be performed by the remote server. In some embodiments the remote server may be a cloud based data storage and processing server. In other embodiments the remote server may simply be located on a local network within the same facility or campus. In other embodiments the internal processing unit may instead perform some or all of these functions, allowing the box 700 greater autonomy to perform various tasks even when not connected to a wireless network In an embodiment where the internal processing server performs all functions, including maintaining its own database, there may be no need for a remote server.
In an exemplary embodiment where a remote server is used, the remote server is associated with a database that stores the baseline box content data and updates it with the current box content data after each scan. Content data is provided by scans of RFID tags within the internal cavity, although the system may also allow manual entry of content data as well when necessary.
The remote server also stores information regarding authorized users, authorization levels, and the audit records for each box. Although a certain user, associated with a specific RFID card, may have authorization to open the outer door, they may not be authorized to open the inner door. In some embodiments there may be no authorization levels, just a requirement that two separate authorized users, as identified by their RFID cards, open each of the doors.
A user on a remote device can change authorization levels and perform RFID maintenance using an online portal supported by the remote server. A remote user device could be a personal computer, a cell phone, or any other electronic device able to access the online portal. The remote server can also push alerts and notifications to user devices when certain activities occur. For example, if the box is accessed by an authorized user, a supervisor may receive a text message letting them know who has accessed the contents of the box, what time the box was accessed, and what items, if any, were taken from the box. A user could receive a text message or email at the end of each day letting them know the current contents of the box, and whether any items are expired or under recall. One of ordinary skill in the art will appreciate that many types of alerts and notifications may be communicated to users in a variety of ways including email, text message, fax, or even automated voicemail. Furthermore, a user may check on the status of a particular box at any time by accessing an online portal using a variety of devices. Again, the operations described herein, and more, may be performed by the internal processing unit in an exemplary embodiment that does not require a remote server.
In an exemplary scenario, the RFID box 700 is stocked with one or more items and both the outer door 726 and inner door 730 are locked. The drop box mechanism 744 is shut and locked. A first RFID card associated with a first authorized user account is placed in close enough proximity to the access reader unit 737 that it is detected. The access reader unit 737 communicates with the PCB in the internal processing unit, which communicates the RFID information with the remote server over a wireless network. The remote server compares the RFID information presented by the internal processing unit with RFID information stored in a database. If authorization is confirmed, the internal processing unit directs the lock access mechanism 732 on the outer door 726 to unlock, allowing the outer door 726 to be opened by a user. In some embodiments the hinge mechanisms 728 on the outer and inner doors 726, 730 may include biased springs that cause the door to swing open once unlocked. The internal processing unit also directs the locking mechanism for the drop box 744 to unlock so that a user can open the drawer 746 via the finger slot 748 and drop in any items as desired.
In order to open the inner door 730, a second RFID card associated with a second authorized account is placed in close enough proximity to the access reader unit 737 that it is detected. The access reader unit 737 again communicates with the PCB in the internal processing unit, which directs the request to the remote server. If authorization is granted, the PCB directs the lock access mechanism 734 on the inner door 730 to unlock, allowing the inner door 730 to be opened by a user or swing open. A user may then access the contents of the inner cavity 724.
An audit trail of which user accounts were read by the access reader unit 737 is stored by the remote server. Records stored by the remote server may include which users requested access to the box, what time access was sought, and whether such access was granted or denied. In a system where there are two or more boxes, the audit trail will also include information identifying which specific box was accessed. The remote server may push notifications and/or alerts out to users to notify them of who has requested access to the box and/or received authorization. The remote server may also transmit such information to a remote portal to be accessed by users on a variety of electronic devices.
When both doors are shut, the latches re-engage with the respective apertures in the housing. In other embodiments, the doors may not automatically lock once fully shut, and may require the use of an authorized RFID card to relock.
Once both doors are shut, the internal processing unit may initiate a scan of the inner cavity 724 to detect RFID tags. The results of the scan are transmitted from the computer to the remote server containing a database of information related to previously-scanned items. The remote server compares the scan results to the last scan to determine if any items are missing and if any new items are present. Any expired or recalled items may also be identified. Notifications regarding missing items, new items, or users may be communicated from the remote server. Items determined to be missing may be noted on the audit trail. For example, the audit trail may identify that at 12:43 pm on a particular day, user A was granted access through the inner door and removed two unit doses of Hydrocodone tablets from box A. The audit trail may also identify that user B was granted access to the outer door at 12:00 pm on that same day. The audit trail could also show that user C sought access through the inner door at 12:30 pm on the same day and was denied. The audit trail could further show that at 12:50 on that day, user D sought access through the inner door, which was granted, and left two unit doses of Fentanyl in the inner cavity.
It will be appreciated by one of ordinary skill in the art that various forms of software and hardware could be used. In exemplary embodiments where there is no remote server, the internal processing unit stores all information, including information pertaining to authorized users, audit records, inventory, content. The internal processing unit is able to push notifications and alerts to users, and can support a web portal. Variations including those systems described in other embodiments herein may be used as desired without departing from the inventive concept.
In an exemplary embodiment, the drop box may include a micro switch that can signal to the internal computer that an item has been deposited into the inner cavity through the drop box and an inventory scan needs to be performed in order to update content data. In such an embodiment, the box will be able to send alerts and notifications regarding items that have been dropped into the drop box, and will not wait for updates when the outer door is closed.
In an exemplary embodiment, the box may initiate notifications if the doors have been opened for a certain amount of time, in order to increase security. This may be achieved through the use of micro switches located on each of the doors. This may also be achieved through the internal processing unit tracking the locking and unlocking of both doors.
In an exemplary embodiment, there may not be double doors, but instead a single door for accessing the internal cavity. Authorization requirements would vary accordingly, as only one authorized user would be needed to open this embodiment of the box. However, in this embodiment the box may still have a drop box mechanism and any of the other features described herein for the double door RFID box. A single door box may be beneficial to support delivery confirmation in a hospital or other large facility setting where drugs that are not narcotics or otherwise subject to the highest standards of security are moved around the facility on a daily basis. A single door box may be used as a receptacle to hold such drugs temporarily, yet still serve the function of tracking the location of the drug, who dropped it off, at what time it was dropped off, and similar information regarding when it is removed.
Two or more RFID box devices according to the exemplary embodiments described herein may be used together in the same system to track the location of items and user access/authorization. A multi-device system may be used in a hospital or large clinical setting where drugs are routinely moved from one location to another depending upon specific needs. For example, a hospital with a pharmacy unit that sends drugs to various hospital floors throughout the day for eventual use. In an exemplary embodiment of a multi-device system, the system may not only detect the removal of items from one RFID box, but identify when those same items are deposited in a second RFID box at a later time. The system may also track, record, and report the time interval between the removal of an item from one device and the deposit of the same item in another device. A common remote server in communication with each RFID box may provide authorizations, track overall and individual inventories, and monitor the operations of each box and send notifications and alerts. Each device may have a unique identifier with the remote server that is associated with information regarding the specific location of each device and any other features particular to each device. Accordingly, if a user receives a notification that a certain item has been taken from a particular device, they will know where in the facility that device is, and accordingly the last physical location of the item.
Although one or more double door RFID boxes may be part of a multi-device system, in various embodiments different combinations of RIFD boxes according to other embodiments of RFID boxes identified herein may be used.
One of ordinary skill in the art will recognize that any embodiment of the present invention may include any of the optional or preferred features of the other embodiments of the present invention. The exemplary embodiments herein disclosed are not intended to be exhaustive or to unnecessarily limit the scope of the invention. The exemplary embodiments were chosen and described in order to explain the principles of the present invention so that others skilled in the art may practice the invention. Having shown and described exemplary embodiments of the present invention, those skilled in the art will realize that many variations and modifications may be made to the described invention. Many of those variations and modifications will provide the same result and fall within the spirit of the claimed invention. It is the intention, therefore, to limit the invention only as indicated by the scope of the claims.
This non-provisional application is a continuation-in-part of, and claims the benefit of priority to, U.S. Non-provisional application Ser. No. 15/724,218, filed on Oct. 3, 2017, which in turn claims the benefit of priority to U.S. Provisional Application No. 62/403,319 filed Oct. 3, 2016; and U.S. Provisional Application No. 62/465,329, filed Mar. 1, 2017. The contents of these non-provisional and provisional applications are hereby incorporated by references as if fully recited herein.
Number | Name | Date | Kind |
---|---|---|---|
4884827 | Kelley | Dec 1989 | A |
4961533 | Teller et al. | Oct 1990 | A |
5713485 | Liff et al. | Feb 1998 | A |
5930145 | Yuyama et al. | Jul 1999 | A |
5963134 | Bowers et al. | Oct 1999 | A |
5986662 | Argiro et al. | Nov 1999 | A |
6112502 | Frederick et al. | Sep 2000 | A |
6189727 | Shoenfeld | Feb 2001 | B1 |
6249299 | Tainer | Jun 2001 | B1 |
6275157 | Mays et al. | Aug 2001 | B1 |
6294999 | Yarin et al. | Sep 2001 | B1 |
6330351 | Yasunaga | Dec 2001 | B1 |
6574166 | Niemiec | Jun 2003 | B2 |
6632619 | Harrison et al. | Oct 2003 | B1 |
6771369 | Rzasa et al. | Aug 2004 | B2 |
6825864 | Botten et al. | Nov 2004 | B2 |
6847861 | Lunak et al. | Jan 2005 | B2 |
6851615 | Jones | Feb 2005 | B2 |
6861954 | Levin | Mar 2005 | B2 |
6877658 | Raistrick et al. | Apr 2005 | B2 |
6879876 | O'Dougherty et al. | Apr 2005 | B2 |
6899626 | Luciano et al. | May 2005 | B1 |
6900021 | Harrison et al. | May 2005 | B1 |
6933849 | Sawyer | Aug 2005 | B2 |
6935560 | Andreasson et al. | Aug 2005 | B2 |
6952681 | McQuade et al. | Oct 2005 | B2 |
6985870 | Martucci et al. | Jan 2006 | B2 |
6992574 | Aupperle et al. | Jan 2006 | B2 |
6994249 | Peterka et al. | Feb 2006 | B2 |
7028182 | Killcommons | Apr 2006 | B1 |
7036729 | Chung | May 2006 | B2 |
7061831 | De La Huerga | Jun 2006 | B2 |
7111780 | Broussard et al. | Sep 2006 | B2 |
7116343 | Botten et al. | Oct 2006 | B2 |
7118029 | Nycz et al. | Oct 2006 | B2 |
7140542 | Andreasson et al. | Nov 2006 | B2 |
7146247 | Kirsch et al. | Dec 2006 | B2 |
7151456 | Godfrey | Dec 2006 | B2 |
7158030 | Chung | Jan 2007 | B2 |
7165077 | Kalies | Jan 2007 | B2 |
7175081 | Andreasson et al. | Feb 2007 | B2 |
7177721 | Kirsch et al. | Feb 2007 | B2 |
7178729 | Shaffer et al. | Feb 2007 | B2 |
7182256 | Andreasson et al. | Feb 2007 | B2 |
7212100 | Terenna | May 2007 | B2 |
7212127 | Jacober et al. | May 2007 | B2 |
7227469 | Varner et al. | Jun 2007 | B2 |
7232066 | Andreasson et al. | Jun 2007 | B2 |
7253736 | Tethrake et al. | Aug 2007 | B2 |
7256699 | Tethrake et al. | Aug 2007 | B2 |
7263501 | Tirinato et al. | Aug 2007 | B2 |
7264323 | Tainer et al. | Sep 2007 | B2 |
7268684 | Tethrake et al. | Sep 2007 | B2 |
7275645 | Mallett et al. | Oct 2007 | B2 |
7299981 | Hickle et al. | Nov 2007 | B2 |
7316231 | Hickle | Jan 2008 | B2 |
7317393 | Maloney | Jan 2008 | B2 |
7318529 | Mallett et al. | Jan 2008 | B2 |
7339550 | Hayama et al. | Mar 2008 | B2 |
7341147 | Mallett et al. | Mar 2008 | B2 |
7348884 | Higham | Mar 2008 | B2 |
7354884 | Hada et al. | Apr 2008 | B2 |
7362228 | Nycz et al. | Apr 2008 | B2 |
7375737 | Botten et al. | May 2008 | B2 |
7394383 | Hager et al. | Jul 2008 | B2 |
7428980 | Irwin | Sep 2008 | B2 |
7440818 | Handfield et al. | Oct 2008 | B2 |
7446747 | Youngblood et al. | Nov 2008 | B2 |
7454880 | Austin et al. | Nov 2008 | B1 |
7486188 | Van Alstyne | Feb 2009 | B2 |
7492257 | Tethrake et al. | Feb 2009 | B2 |
7492261 | Cambre et al. | Feb 2009 | B2 |
7504954 | Spaeder | Mar 2009 | B2 |
7518502 | Austin et al. | Apr 2009 | B2 |
7518516 | Azevedo et al. | Apr 2009 | B2 |
7551089 | Sawyer | Jun 2009 | B2 |
7559483 | Hickle et al. | Jul 2009 | B2 |
7564364 | Zweig | Jul 2009 | B2 |
7596427 | Frederick et al. | Sep 2009 | B1 |
7630791 | Nguyen et al. | Dec 2009 | B2 |
7639136 | Wass et al. | Dec 2009 | B1 |
7644016 | Nycz et al. | Jan 2010 | B2 |
7672872 | Shanton | Mar 2010 | B2 |
7706915 | Mohapatra et al. | Apr 2010 | B2 |
7706916 | Hilton | Apr 2010 | B2 |
7712670 | Sauerwein, Jr. et al. | May 2010 | B2 |
7715277 | De La Huerga | May 2010 | B2 |
7724918 | Balakrishnan et al. | May 2010 | B2 |
7729597 | Wright et al. | Jun 2010 | B2 |
7734157 | Wright et al. | Jun 2010 | B2 |
7735732 | Linton et al. | Jun 2010 | B2 |
7747477 | Louie et al. | Jun 2010 | B1 |
7752085 | Monroe | Jul 2010 | B2 |
7772964 | Tethrake et al. | Aug 2010 | B2 |
7775056 | Lowenstein | Aug 2010 | B2 |
7783163 | Wright et al. | Aug 2010 | B2 |
7783174 | Wright et al. | Aug 2010 | B2 |
7801422 | Wright et al. | Sep 2010 | B2 |
7815117 | Tuschel et al. | Oct 2010 | B2 |
7834765 | Sawyer | Nov 2010 | B2 |
7834766 | Sawyer | Nov 2010 | B2 |
7837093 | Leu et al. | Nov 2010 | B1 |
7837107 | Leu et al. | Nov 2010 | B1 |
7858841 | Krautkramer et al. | Dec 2010 | B2 |
7860730 | Goodall et al. | Dec 2010 | B1 |
7868754 | Salvat, Jr. | Jan 2011 | B2 |
7893876 | Brown et al. | Feb 2011 | B2 |
7908030 | Handfield et al. | Mar 2011 | B2 |
7918830 | Langan et al. | Apr 2011 | B2 |
7933033 | Ohishi et al. | Apr 2011 | B2 |
7976508 | Hoag | Jul 2011 | B2 |
7985711 | Tohmatsu et al. | Jul 2011 | B2 |
7990272 | Wass et al. | Aug 2011 | B2 |
7996286 | Kreiner et al. | Aug 2011 | B2 |
8002174 | Coyne, III et al. | Aug 2011 | B2 |
8006903 | Braun et al. | Aug 2011 | B2 |
8009913 | Greyshock | Aug 2011 | B2 |
8031347 | Edwards et al. | Oct 2011 | B2 |
8042738 | Cloix | Oct 2011 | B2 |
8049627 | Addante | Nov 2011 | B1 |
8063925 | Tainer et al. | Nov 2011 | B2 |
8065858 | Leu et al. | Nov 2011 | B2 |
8072635 | Roberts et al. | Dec 2011 | B2 |
8077041 | Stern et al. | Dec 2011 | B2 |
8082192 | Nycz et al. | Dec 2011 | B2 |
8099339 | Pinsonneault et al. | Jan 2012 | B1 |
8108068 | Boucher et al. | Jan 2012 | B1 |
8111159 | Andreasson et al. | Feb 2012 | B2 |
8112175 | Handfield et al. | Feb 2012 | B2 |
8131397 | Vahlberg et al. | Mar 2012 | B2 |
8154390 | Heath et al. | Apr 2012 | B2 |
8160741 | Shoenfeld | Apr 2012 | B1 |
8174392 | Sagbhini et al. | May 2012 | B1 |
8186587 | Zmood et al. | May 2012 | B2 |
8212677 | Ferguson | Jul 2012 | B2 |
8219413 | Martinez et al. | Jul 2012 | B2 |
8224483 | Ansari et al. | Jul 2012 | B1 |
8231749 | Dent et al. | Jul 2012 | B2 |
8258961 | Phillips et al. | Sep 2012 | B2 |
8261939 | Knoth | Sep 2012 | B2 |
8271128 | Schultz | Sep 2012 | B1 |
8272492 | Chang | Sep 2012 | B1 |
8279069 | Sawyer | Oct 2012 | B2 |
8283287 | Aihara et al. | Oct 2012 | B2 |
8284059 | Ross | Oct 2012 | B2 |
8285083 | Canessa et al. | Oct 2012 | B2 |
8285607 | Danilewitz | Oct 2012 | B2 |
8286222 | Silverbrook et al. | Oct 2012 | B2 |
8292173 | Yturralde et al. | Oct 2012 | B2 |
8292186 | Deloche et al. | Oct 2012 | B2 |
8296950 | Colbrunn et al. | Oct 2012 | B2 |
8313024 | Marino | Nov 2012 | B2 |
8319607 | Grimlund et al. | Nov 2012 | B2 |
8328082 | Bochenko et al. | Dec 2012 | B1 |
8339649 | Ohishi et al. | Dec 2012 | B2 |
8341041 | Hull | Dec 2012 | B2 |
8346632 | Saghbini | Jan 2013 | B2 |
8355753 | Bochenko et al. | Jan 2013 | B2 |
8355962 | Delaney et al. | Jan 2013 | B2 |
8359338 | Butterfield et al. | Jan 2013 | B2 |
8371448 | Reaux | Feb 2013 | B1 |
8376228 | DeVet et al. | Feb 2013 | B2 |
8384545 | Hussain et al. | Feb 2013 | B2 |
8385972 | Bochenko et al. | Feb 2013 | B2 |
8386070 | Eliuk et al. | Feb 2013 | B2 |
8394053 | Bochenko et al. | Mar 2013 | B2 |
8403212 | van Esch | Mar 2013 | B2 |
8403224 | Fedorko et al. | Mar 2013 | B2 |
8405508 | Burke | Mar 2013 | B2 |
8438067 | Omura et al. | May 2013 | B2 |
8461076 | Okada et al. | Jun 2013 | B2 |
8483550 | Wright et al. | Jul 2013 | B2 |
8509604 | Wright et al. | Aug 2013 | B2 |
8515251 | Wright et al. | Aug 2013 | B2 |
8519849 | Ross-Messemer | Aug 2013 | B2 |
8530379 | Shimizu et al. | Sep 2013 | B2 |
8564416 | Steven et al. | Oct 2013 | B2 |
8565552 | Sommer et al. | Oct 2013 | B2 |
8582171 | Srnka et al. | Nov 2013 | B2 |
8589271 | Evans | Nov 2013 | B2 |
8593278 | Churbock et al. | Nov 2013 | B2 |
8593678 | Ohishi et al. | Nov 2013 | B2 |
D694817 | Adam et al. | Dec 2013 | S |
8606596 | Bochenko et al. | Dec 2013 | B1 |
8636202 | Keefe et al. | Jan 2014 | B2 |
8639525 | Levine et al. | Jan 2014 | B2 |
8686859 | Hussain et al. | Apr 2014 | B2 |
8699054 | Edwards et al. | Apr 2014 | B2 |
8702674 | Bochenko | Apr 2014 | B2 |
8723674 | Conley et al. | May 2014 | B2 |
8749356 | Hussain et al. | Jun 2014 | B2 |
8755056 | Edwards et al. | Jun 2014 | B2 |
8825680 | Burke et al. | Sep 2014 | B2 |
8893970 | Keefe et al. | Nov 2014 | B2 |
8922435 | Fontecchio et al. | Dec 2014 | B2 |
8935280 | Bauman et al. | Jan 2015 | B2 |
8945066 | Bochenko et al. | Feb 2015 | B2 |
8948478 | Keefe et al. | Feb 2015 | B2 |
8985388 | Ratnaker | Mar 2015 | B2 |
8990099 | MacDonald et al. | Mar 2015 | B2 |
9004346 | Farentinos | Apr 2015 | B2 |
9037479 | MacDonald et al. | May 2015 | B1 |
9058412 | MacDonald et al. | Jun 2015 | B2 |
9058413 | MacDonald et al. | Jun 2015 | B2 |
9058435 | Keefe et al. | Jun 2015 | B2 |
9171280 | Gitchell et al. | Oct 2015 | B2 |
9367665 | MacDonald et al. | Jun 2016 | B2 |
9378484 | Russell et al. | Jun 2016 | B1 |
9449296 | MacDonald et al. | Sep 2016 | B2 |
9539374 | Halpern | Jan 2017 | B2 |
9582644 | Gitchell et al. | Feb 2017 | B2 |
9734294 | MacDonald et al. | Aug 2017 | B2 |
9805169 | MacDonald et al. | Oct 2017 | B2 |
10083766 | Gitchell et al. | Sep 2018 | B2 |
10210954 | Caputo et al. | Feb 2019 | B2 |
20010053986 | Dick | Dec 2001 | A1 |
20020026330 | Klein | Feb 2002 | A1 |
20020049650 | Reff | Apr 2002 | A1 |
20020087360 | Pettit | Jul 2002 | A1 |
20020087362 | Cobb et al. | Jul 2002 | A1 |
20020087554 | Seelinger | Jul 2002 | A1 |
20030055685 | Cobb et al. | Mar 2003 | A1 |
20030074223 | Hickle et al. | Apr 2003 | A1 |
20030102970 | Creel et al. | Jun 2003 | A1 |
20030160698 | Andreasson et al. | Aug 2003 | A1 |
20030216974 | Browne | Nov 2003 | A1 |
20040008123 | Carrender et al. | Jan 2004 | A1 |
20040032330 | Hoffman | Feb 2004 | A1 |
20040051368 | Caputo et al. | Mar 2004 | A1 |
20040055221 | Hoffman | Mar 2004 | A1 |
20040057609 | Weinberg | Mar 2004 | A1 |
20040081669 | Greeven et al. | Apr 2004 | A1 |
20040158507 | Meek, Jr. et al. | Aug 2004 | A1 |
20040178071 | Harrison et al. | Sep 2004 | A1 |
20040215486 | Braverman | Oct 2004 | A1 |
20040225528 | Brock | Nov 2004 | A1 |
20050014849 | Pettit et al. | Jan 2005 | A1 |
20050014948 | Galbo et al. | Jan 2005 | A1 |
20050060171 | Molnar | Mar 2005 | A1 |
20050062603 | Fuerst et al. | Mar 2005 | A1 |
20050087544 | Skavnak | Apr 2005 | A1 |
20050108044 | Koster | May 2005 | A1 |
20050125097 | Chudy et al. | Jun 2005 | A1 |
20050127176 | Dickinson et al. | Jun 2005 | A1 |
20050149378 | Cyr et al. | Jul 2005 | A1 |
20050149414 | Schrodt et al. | Jul 2005 | A1 |
20050184151 | DiMaggio et al. | Aug 2005 | A1 |
20050283259 | Wolpow | Dec 2005 | A1 |
20050285732 | Sengupta et al. | Dec 2005 | A1 |
20050285746 | Sengupta et al. | Dec 2005 | A1 |
20060006999 | Walczyk et al. | Jan 2006 | A1 |
20060043177 | Nycz et al. | Mar 2006 | A1 |
20060043179 | Nycz et al. | Mar 2006 | A1 |
20060065726 | Andreasson et al. | Mar 2006 | A1 |
20060109105 | Varner et al. | May 2006 | A1 |
20060132311 | Kruest et al. | Jun 2006 | A1 |
20060145871 | Donati et al. | Jul 2006 | A1 |
20060152338 | Hsu | Jul 2006 | A1 |
20060152364 | Walton | Jul 2006 | A1 |
20060152367 | Narayanaswamy | Jul 2006 | A1 |
20060208886 | Beamer | Sep 2006 | A1 |
20060230072 | Partovi et al. | Oct 2006 | A1 |
20060242159 | Bishop et al. | Oct 2006 | A1 |
20060267731 | Chen | Nov 2006 | A1 |
20070001809 | Kodukula et al. | Jan 2007 | A1 |
20070008399 | Botten et al. | Jan 2007 | A1 |
20070023512 | Miller et al. | Feb 2007 | A1 |
20070023513 | Andreasson et al. | Feb 2007 | A1 |
20070074722 | Giroux et al. | Apr 2007 | A1 |
20070114279 | Lessing et al. | May 2007 | A1 |
20070150382 | Danilewitz | Jun 2007 | A1 |
20070168228 | Lawless | Jul 2007 | A1 |
20070187475 | MacLeod | Aug 2007 | A1 |
20070188306 | Tethrake et al. | Aug 2007 | A1 |
20070200702 | Chung | Aug 2007 | A1 |
20070213659 | Trovato et al. | Sep 2007 | A1 |
20070213684 | Hickle et al. | Sep 2007 | A1 |
20070229268 | Swan et al. | Oct 2007 | A1 |
20070272746 | Ortiz et al. | Nov 2007 | A1 |
20080004908 | Oh et al. | Jan 2008 | A1 |
20080012687 | Rubinstein | Jan 2008 | A1 |
20080045930 | Makin et al. | Feb 2008 | A1 |
20080046295 | Albrecht | Feb 2008 | A1 |
20080094214 | Azevedo et al. | Apr 2008 | A1 |
20080122878 | Keefe et al. | May 2008 | A1 |
20080128482 | Chen et al. | Jun 2008 | A1 |
20080129496 | Koblasz | Jun 2008 | A1 |
20080150722 | Jackson | Jun 2008 | A1 |
20080157967 | Jones et al. | Jul 2008 | A1 |
20080172253 | Chung et al. | Jul 2008 | A1 |
20080184719 | Lowenstein | Aug 2008 | A1 |
20080191013 | Liberatore | Aug 2008 | A1 |
20080218307 | Schoettle | Sep 2008 | A1 |
20080228160 | Harrison | Sep 2008 | A1 |
20080243088 | Evans | Oct 2008 | A1 |
20080270178 | McRae et al. | Oct 2008 | A1 |
20080296373 | Zmood et al. | Dec 2008 | A1 |
20080297356 | Oberle | Dec 2008 | A1 |
20080306772 | Shahrokh | Dec 2008 | A1 |
20080316045 | Sriharto et al. | Dec 2008 | A1 |
20090002173 | Bergsten et al. | Jan 2009 | A1 |
20090020442 | Dietrich et al. | Jan 2009 | A1 |
20090058653 | Geissler et al. | Mar 2009 | A1 |
20090144087 | Kelsch et al. | Jun 2009 | A1 |
20090153290 | Bierach | Jun 2009 | A1 |
20090164042 | Handfield et al. | Jun 2009 | A1 |
20090194987 | Christie et al. | Aug 2009 | A1 |
20090224891 | Vishik et al. | Sep 2009 | A1 |
20090231138 | Lai et al. | Sep 2009 | A1 |
20090267740 | Pizzuto | Oct 2009 | A1 |
20090267772 | Dehnadi | Oct 2009 | A1 |
20090277815 | Kohl | Nov 2009 | A1 |
20090294521 | De La Huerga | Dec 2009 | A1 |
20090307755 | Dvorak et al. | Dec 2009 | A1 |
20100022953 | Bochenko et al. | Jan 2010 | A1 |
20100022987 | Bochenko et al. | Jan 2010 | A1 |
20100036310 | Hillman | Feb 2010 | A1 |
20100036678 | Bray | Feb 2010 | A1 |
20100036755 | Saghbini | Feb 2010 | A1 |
20100042439 | Martinez et al. | Feb 2010 | A1 |
20100079337 | Shiau et al. | Apr 2010 | A1 |
20100098425 | Kewitsch | Apr 2010 | A1 |
20100108761 | Nycz et al. | May 2010 | A1 |
20100114951 | Bauman et al. | May 2010 | A1 |
20100176917 | Bacarella | Jul 2010 | A1 |
20100185458 | Newcomb et al. | Jul 2010 | A1 |
20100204659 | Bochenko et al. | Aug 2010 | A1 |
20100217621 | Schoenberg et al. | Aug 2010 | A1 |
20100219097 | Ramasubramanian et al. | Sep 2010 | A1 |
20100238039 | Tethrake et al. | Sep 2010 | A1 |
20100268548 | Louie et al. | Oct 2010 | A1 |
20100275625 | Lowenstein | Nov 2010 | A1 |
20100299158 | Siegel | Nov 2010 | A1 |
20100328474 | Hsieh | Dec 2010 | A1 |
20100332246 | Fedorko et al. | Dec 2010 | A1 |
20110006879 | Lambrou et al. | Jan 2011 | A1 |
20110063091 | Kang | Mar 2011 | A1 |
20110068922 | Ross | Mar 2011 | A1 |
20110093279 | Levine et al. | Apr 2011 | A1 |
20110110568 | Vesper et al. | May 2011 | A1 |
20110112682 | Matsukawa et al. | May 2011 | A1 |
20110115612 | Kulinets et al. | May 2011 | A1 |
20110125315 | Handfield et al. | May 2011 | A1 |
20110131056 | Chudy et al. | Jun 2011 | A1 |
20110139871 | Yturralde et al. | Jun 2011 | A1 |
20110161112 | Keefe et al. | Jun 2011 | A1 |
20110163871 | Einav et al. | Jul 2011 | A1 |
20110166878 | Louie et al. | Jul 2011 | A1 |
20110184751 | Holmes | Jul 2011 | A1 |
20110187549 | Balasing | Aug 2011 | A1 |
20110225100 | Sangal et al. | Sep 2011 | A1 |
20110227722 | Salvat, Jr. | Sep 2011 | A1 |
20110240729 | Schuck | Oct 2011 | A1 |
20110257991 | Shukla | Oct 2011 | A1 |
20110270441 | Handfield et al. | Nov 2011 | A1 |
20110291809 | Niemiec et al. | Dec 2011 | A1 |
20110301446 | Kaman | Dec 2011 | A1 |
20110313395 | Krulevitch et al. | Dec 2011 | A1 |
20120037266 | Bochenko | Feb 2012 | A1 |
20120041778 | Kraft | Feb 2012 | A1 |
20120044054 | Hussain et al. | Feb 2012 | A1 |
20120061463 | Burke | Mar 2012 | A1 |
20120089411 | Srnka et al. | Apr 2012 | A1 |
20120089418 | Kamath et al. | Apr 2012 | A1 |
20120116798 | Heath et al. | May 2012 | A1 |
20120125994 | Heath et al. | May 2012 | A1 |
20120130534 | Wurm | May 2012 | A1 |
20120173440 | Dehlinger et al. | Jul 2012 | A1 |
20120177256 | Keefe et al. | Jul 2012 | A1 |
20120179132 | Valk et al. | Jul 2012 | A1 |
20120185951 | Bauman et al. | Jul 2012 | A1 |
20120209619 | Knotts et al. | Aug 2012 | A1 |
20120240067 | Bauman et al. | Sep 2012 | A1 |
20120273087 | Stavsky et al. | Nov 2012 | A1 |
20120278096 | Holness | Nov 2012 | A1 |
20120278228 | Rubinstein | Nov 2012 | A1 |
20120323208 | Bochenko et al. | Dec 2012 | A1 |
20120325330 | Prince et al. | Dec 2012 | A1 |
20130018356 | Prince et al. | Jan 2013 | A1 |
20130038452 | Sawyer | Feb 2013 | A1 |
20130041784 | Danilewitz | Feb 2013 | A1 |
20130092727 | Edwards et al. | Apr 2013 | A1 |
20130105568 | Jablonski et al. | May 2013 | A1 |
20130151005 | Gerold et al. | Jun 2013 | A1 |
20130191149 | Kolberg et al. | Jul 2013 | A1 |
20130221082 | Botten | Aug 2013 | A1 |
20130221087 | Keefe et al. | Aug 2013 | A1 |
20130225945 | Prince et al. | Aug 2013 | A1 |
20130282438 | Hunter et al. | Oct 2013 | A1 |
20130327822 | Keefe et al. | Dec 2013 | A1 |
20140060729 | Srnka et al. | Mar 2014 | A1 |
20140066880 | Prince et al. | Mar 2014 | A1 |
20140117081 | Jablonski et al. | May 2014 | A1 |
20140136229 | Levine et al. | May 2014 | A1 |
20140138440 | D'Ambrosio | May 2014 | A1 |
20140142975 | Keefe et al. | May 2014 | A1 |
20140184390 | Elizondo, II | Jul 2014 | A1 |
20140184391 | Elizondo, II | Jul 2014 | A1 |
20140197954 | Caputo et al. | Jul 2014 | A1 |
20140210596 | Hussain et al. | Jul 2014 | A1 |
20140262919 | Hussain et al. | Sep 2014 | A1 |
20140263614 | Keefe et al. | Sep 2014 | A1 |
20140276213 | Bochenko | Sep 2014 | A1 |
20140279548 | Wang et al. | Sep 2014 | A1 |
20140282197 | Keefe et al. | Sep 2014 | A1 |
20140291397 | Caputo et al. | Oct 2014 | A1 |
20140316561 | Tkachenko et al. | Oct 2014 | A1 |
20140367080 | Hussain et al. | Dec 2014 | A1 |
20140372145 | MacDonald et al. | Dec 2014 | A1 |
20150058182 | Kress-Spatz et al. | Feb 2015 | A1 |
20150115029 | Rahim | Apr 2015 | A1 |
20150235005 | MacDonald et al. | Aug 2015 | A1 |
20150339622 | MacDonald et al. | Nov 2015 | A1 |
20160019367 | Olson | Jan 2016 | A1 |
20160132649 | Gitchell et al. | May 2016 | A1 |
20170061095 | Waskins et al. | Mar 2017 | A1 |
20170132734 | MacDonald et al. | May 2017 | A1 |
20170212993 | Gitchell et al. | Jul 2017 | A1 |
20180039758 | MacDonald et al. | Feb 2018 | A1 |
20180279781 | Jeffries | Oct 2018 | A1 |
20190088354 | Yanowitz et al. | Mar 2019 | A1 |
20190115098 | Gitchell et al. | Apr 2019 | A1 |
Number | Date | Country |
---|---|---|
2722328 | Oct 2009 | CA |
2722328 | Oct 2009 | CA |
2790220 | Jun 2013 | CA |
102791310 | Dec 2014 | CN |
201204914 | Oct 2013 | IN |
02095675 | Nov 2002 | WO |
2006135830 | Feb 2006 | WO |
2006026246 | Mar 2006 | WO |
2010074781 | Jul 2010 | WO |
2011115676 | Sep 2011 | WO |
2011150013 | Dec 2011 | WO |
2013082423 | Jun 2013 | WO |
2013116873 | Aug 2013 | WO |
2013134256 | Sep 2013 | WO |
2014092754 | Jun 2014 | WO |
2014159928 | Oct 2014 | WO |
2014189834 | Nov 2014 | WO |
Entry |
---|
Barlas, Stephen, “Pharmacy Product Tracing Likely to Go National—Costs to Pharmacies Worrisome”, Pharmacy & Therapeutics, Jan. 2009, vol. 34 No. 1, p. 14. |
Belson, D., “Storage, Distribution, and Dispensing of Medical Supplies”, CREATE Interim Report Under FEMA Grant EMW-2004-GR-0112, Apr. 21, 2005, pp. 1-36. |
Cakici et al., “Using RFID for the management of pharmaceutical inventory-system optimization and shrinkage control”, Decision Support Systems, 2011, pp. 842-852. |
CPG Sec. 400.210, Radiofrequency Identification Feasibility Studies and Pilot Programs for Drugs, Nov. 2004, Compliance Policy Guide, available at: http://www.fda.gov/ICECI/ComplianceManuals/CompliancePolicyGuidanceManual/ucm074357.htm. |
Crash Cart Inventory Checklist, Outpatient Surgery Magazine, Oct. 2004, “Outpatient Surgery”, available at: http://www.outpatientsurgery.net/resources/forms/2004/pdf/OutpatientSurgeryMagazine 0410 crashCart.pdf, in 1 page. |
Curtin et al., “Making the ‘MOST’ out of RFID: a research agenda for the study of the adoption, usage and impact of RFID”, Information Technology Management, Apr. 2007, pp. 87-110. |
Gonzalez, Stephanie, “Health Maintenance System (HMS) Hardware Research, Design, and Collaboration”, NASA USRP—Internship Final Report, 2010, pp. 1-20. |
Harrop et al., “RFID for Healthcare and Pharmaceuticals, 2008-2018”, Securing Pharma, May 2008, pp. 1-12. |
Houliston, Bryan, “Integrating RFID Technology into a Drug Administration System”, Bulletin of Applied Computing and Information Technology, vol. 3, No. 1, May 2005, pp. 8. Retrieved Sep. 26, 2013 from http://citrenz.ac.nz/bacit/0301/2005Houliston RFID.htm. |
Jorgensen et al., “Executable Use Cases: Requirements for a Pervasive Health Care System”, IEEE Software, Mar./Apr. 2004, pp. 34-41. |
Lai et al., “Enhancing Medication Safety and Reduce Adverse Drug Events on Inpatient Medication Administration using RFID”, WSEAS Transactions on Communications, Oct. 2008, vol. 7, No. 10, pp. 1045-1054. |
Lampe et al., “The Smart Box Application Model”, Advances in Pervasive Computing, 2004, pp. 1-6. |
“McKesson's Announces New Touch-Screen Driven Medication Dispensing Solution”, Business Wire, Jun. 15, 2009, pp. 2, Available at: http://www.businesswire.com/news/home/20090615005349/en/McKesson-Announces-Touch-Screen-Driven-Medication-Dispensing-Solution#.NR7quPnF 10. |
“Medical Packaging Inc. Announces Clear Stem Flag Label System for Ampoules, Vials, and Syringes”, Feb. 1, 2006 available at: http://www.medpak.com/v1/news/20060201 CSFLAG.pdf, in 1 page. |
O'Driscoll et al., “RFID: An Ideal Technology for Ubiquitous Computing?” Dublin Institute of Technology School of Electronics and Communications Conference Papers, Jan. 1, 2008, pp. 1-17. |
Pappu, Ph.D. et al., “RFID in Hospitals: Issues and Solutions” Consortium for the Accelerated Deployment of RFID in Distribution, Sep. 2004, pp. 1-12. |
Tzeng et al., “Evaluating the Business Value of RFID: Evidence from Five Case Studies”, International Journal of Production Economics, 2008, vol. 112, pp. 601-613. |
Wang et al., “Applying RFID Technology to Develop a Distant Medical Care Service Platform”, International Journal of Electronic Business Management, 2010, vol. 8, No. 2, pp. 161-170. |
O'Connor, “Johnson & Johnson Finds Value in Multiple RFID Apps” (Apr. 23, 2008), retrieved Aug. 21, 2017, 2 pages, available at http://www.rfidjounal.com/articles/pdf?4046. |
Collins, “RFID Cabinet Manages Medicine” (Aug. 12, 2004), retrieved Aug. 21, 2017, 1 page, available at http://www.rfidjournal.com/articles/pdf?1081. |
O'Connor, Mary Catherine, “To Keep Drugs from Expiring, Hospital Tests Intelliguard System”, RFID Journal, Jan. 12, 2011, pp. 3. http://www.rfidjournal.com/articles/view?8123. |
Liu et al, “Point-of-Care Support for Error Free Medication Process” (Jun. 25, 2007), retrieved Aug. 21, 2017, 12 pages, available at: http://ieeexplore.ieee.org/document/4438162/. |
McCall et al., “RMAIS: RFID-based Medication Adherence Intelligence System” (Aug. 31, 2010), retrieved Aug. 21, 2017, 4 pages, available at http://ieeexplore.ieee.org/document/5627529/. |
Tsai et al., “iMAT: Intelligent Medication Administration Tools” (Jul. 1, 2010), retrieved Aug. 21, 2017, 8 pages, available at http://ieeexplore.ieee.org/document/5556551/. |
Tsai et al., “Smart Medication Dispenser: Design, Architecture, and Implementation” (Sep. 27, 2010), retrieved Aug. 21, 2017, 12 pages, available at http://ieeexplore.ieee.org/document/5585838/. |
Becker et al. SmartDrawer: RFID-Based Smart Medicine Drawer for Assistive Environments,pp. 1-8, PETRA '09, Jun. 9-13, 2009, Corfu, Greece. |
Mike Mowry, A Survey of RFID in the Medical Industry With Emphasis on Applications to Surgery and Surgical Devices, MAE188 Introduction to RFID Dr. Rajit Gadh UCLA, Jun. 9, 2008, pp. 1-22, USA. |
JD Howard, Implementation of RFID in the Pharmaceutical Industry, Advisor: Dr. Jay Singh, Feb. 2009, pp. 1-11, San Luis Obispo, CA, USA. |
Yahia Zare Mehrjerfi, RFID-enabled healthcare systems: risk-benefit analysis, Department of Industrial Engineering, Yazd University, vol. 4 No. 3, 2010, pp. 282-300, Yazd, Iran. |
Cakici et al, Using RFID for the management of pharmaceutical inventory—system optimization and shrinkage control, www.elsevier.com, Feb. 5, 2011, pp. 1-11, Rochester, NY, USA. |
John Edwards, RFID Smart Shelves and Cabinets, www.rfidjournal.com, Aug. 24, 2009, pp. 1-4, USA. |
Bendavid et al., Using RFID to Improve Hospital Supply Chain Management for High Value and Consignment Items, ScieneDirect, Procedia Computer Science 5 (2011) 849-856, Canada. |
Wickipedia, Faraday cage, http://wikipedi.org/w/index.php?title=Faraday, Apr. 23, 2018, pp. 1-3. |
Floerkemeier et al., The Smart Box Concept for Ubiquitous Computing Environments, Institute for Pervasive Computing Department of Computer Science, pp. 1-4, ETH Zurich, Switzerland. |
School of Electrical and Electronic Engineering, Dublin Institute of Technology, RFID: an Ideal Technology for Ubiquitous Computing?, http://arrow.dit.ie/engschcecon, Jan. 1, 2008, pp. 1-17. |
Loc Ho et al. A Prototype on RFID and Sensor Networks for Elder Healthcare: Progress Report, Loc Ho, et al., SIGCOMM '05 Workshops, pp. 70-75, Aug. 22-26, 2005, Philadelphia, PA, USA. |
C. Saygin, Adaptive Inventory Management Using RFID Data, C. Saygin, Adv Manuf Technol (2007) 32: 1045-1051. |
Yannick Meiller et al. Adaptive Knowledge-Based System for Health Care Applications with RFID-Generated information, Elsevier, Decision Support Systems. |
AmerisourceBergen Specialty Group Reconfigures Cubixx Medical Cabinet, Pharmaceutical Commerce, Jan. 9, 2011, Posted in Supply Chain/Logistics, Tagged Nov./Dec. 2010. |
Malabika Parida et al., Application of RFID Technology for In-House Drug Management System, IEEE, 2012 15th International Conference on Network-Based Information Systems. |
Beth Bacheldor, Healthcare Deploys RFID Refrigerated Drug Cabinets, Sep. 24, 2007, RFID Journal. |
Beth Bacheldor, Cardinal Health Readies Item-Level Pilot, May 31, 2006, RFID Journal. |
Crash Cart Inventory Checklist (Sample), Courtesy of Progressive Surgical Solutions, LLC, Outpatient Surgery Magazine, Oct. 2004. |
Data Gathering Developments, Manufacturing Chemist, p. 24, Feb. 2005. |
Chia-Chen Chao et al., Determining Technology Trends and Forecasts of RFID by a Historical Review and Bibliometric Analysis from 1991 to 2005, et al., Elsevier, ScienceDirect, 2006. |
Doing the Wave: Inventory Management with RFID, Kathryn Green, Sr. Director Radiology Services and Cardiovascular Diagnostic & Interventional Services, UMass Memorial Medical Center, Worchester, Massachusetts, vol. 15—Issue 9—Sep. 2007. |
Mary Cahtherine O'Connor, Drug Distributor Uses RFID to Vend Meds, May 23, 2006, RFID Journal. |
Chun-Liang Lai et al.m Enhancing Medication Safety and Reduce Adverse Drug Events on Inpatient Medication Administration Using RFID, WSEAS. |
Chih-Peng Lin et al., Fair Sharing Using Real-time Polling Service to Adaptive VBR Stream Transmission in a 802.16 Wireless Networks, Transactions on Communications, ISSN: 1109-2742, Issue 10, vol. 7, Oct. 2008. |
Mary Catherine O'Connor, GlaxoSmithKline Tests RFID on HIV Drug, Mar. 24, 2006, RFID Journal. |
Carol Humble, RN, How RFID Freed Nurses from the Pain of Inventory Duties, Memorial Health Care System, Chattanooga, TN, vol. 17—Issue 12—Dec. 2009. |
Intel & Siemens Launch RFID Blood Bank in Malaysia, Aug. 16, 2007, RFID Journal. |
Mary Catherine O'Connor, Interrogators Start to Evolve, Jun. 1, 2006, RFID Journal. |
Ergin Erdem et al., Investigation of RFID Tag Readability for Pharmaceutical Products at Item Level, Drug Development and Industrial Pharmacy, 2009; 35(11): 1312-1324. |
Andrea Cangialosi et al., Leveraging RFID in Hospitals: Patient Life Cycle and Mobility Perspectives, IEEE Applications & Practice, Sep. 2007. |
Jones et al., Marketing Intelligence & Planning: The benefits, challenges and impacts of radio frequency identification technology (RFID) for retailers in the UK., Marketing Intelligence & Planning, vol. 23 Issue: 4, pp. 395-402, Mar. 2005. |
Mary Catherine O'Connor, McKesson Starts RFID Pilot for Viagra, Feb. 17, 2005, RFID Journal. |
Jerry Fahrni, More RFID Refrigerator Stuff—Cubixx and myCubixx, Sep. 3, 2012. |
New RFID Medical Cabinets Deployed at 50 Hospitals, Sep. 17, 2007, RFID Journal. |
Mary Catherine O'Connor, Pfizer Using RFID to Fight Fake Viagra, Jan. 6, 2006, RFID Journal. |
Elizabeth Wasserman, Purdue Pharma to Run Pedigree Pilot, May 31, 2005, RFID Journal. |
Ygal Bendavid et al., Redesigning the Replenishment Process of Medical Supplies in Hospitals with RFID, Business Process Management Journal, (2010), vol. 16, Issue: 6, pp. 991-1013. |
Shang-Wei Wang et al., RFID Applications in Hospitals: a Case Study on a Demonstration RFID Project in a Taiwan Hospital, Proceedings of the 39th Hawaii International Conference on System Sciences, 2006. |
Mark Roberti, RFID Basics for Health Care: Understanding the Fundamental Concepts That Affect RFID Deployments, RFID Journal presentation, Sep. 17, 2009, The Westin Waltham-Boston, Waltham, MA. |
Mark O. Lewis et al., RFID—Enabled Capabilities and Their Impact on Healthcare Process Performance, Jan. 1, 2010, Association for Information Systems AIS Electronic Library (AISeL), ICIS 2010 Proceedings, International Conference in Information Systems. |
RFID Medical Cabinets Evaluated in New Benchmark, Sep. 12, 2007, RFID Journal. |
Antti Lahtela et al., RFID and NFC in Healthcare: Safety of Hospitals Medication Care, University of Kuopio, Kuopio, Finland, 2008 Second International Conference on Pervasive Computing Technologies for Healthcare, 241-244, IEEE. |
RFID and NFC in Healthcare Information Page. |
Amitava Dutta et al., RFID and Operations Management: Technology, Value, and Incentives, Production and Operations Management, vol. 16, No. 5, Sep.-Oct. 2007, pp. 646-655. |
Ari Juels, RFID Security and Privacy: A Research Survey, IEEE Journal on Selected Areas in Communications, vol. 24, No. 2, pp. 381-394, Feb. 2006. |
Christian Floerkemeier et al., The Smart Box Concept for Ubiquitous Computing Environments, Institute for Pervasive Computing, Department of Computer Science, ETH Zurich, Switzerland, Jan. 2004. |
Clair Swedberg, Tennessee Hospital Tracks High-Value Items, Aug. 5, 2009, RFID Journal. |
Mary Catherine O'Connor, To Keep Drugs from Expiring, Hospital Tests Intelliguard System, Jan. 12, 2011, RFID Journal. |
Beth Bacheldor, UCSD Medical Center Expands Its RFID Deployment, Oct. 29, 2008, RFID Journal. |
Beth Bacheldor, UMass Med Center Finds Big Savings Through Tagging, Nov. 21, 2007, RFID Journal. |
Kinsella, B., Kit Check Announces New RFID Scanning Station, Little Blue Box is Smaller, Lighter, Provided Free for Users, Jun. 2, 2014, 2 pages, Kit Check, webpage includes video link at https://kitcheck.com/2014/06/new-kit-check-smaller-rfid-scanning-station-little-blue-box/. |
Inderbir Singh et al., Versatility of Radio Frequency Identification (RFID) Tags in the Pharmaceutical Industry, Instrumentation Science and Technology, 36: 656-663, 2008. |
The Orange Book, Approved Drug Products with Therapeutic Equivalence Evaluations, 2018. |
Kit Check, Kit Check Installs in One Hour, video link at https://kitcheck.com/leam-more/video/kit-check-installs-in-me-hour/, publication date unknown, accessed Jul. 8, 2019. |
Kit Check, Overview, video link at https://www.youtube.com/watch?v=UvNnoZYgGW4, published Oct. 13, 2013. |
Kit Check, Wick Video, video link at https://www.youtube.com/watch?v=tDpVoM4iMbl, published Oct. 14, 2013. |
Brown, Dennis E., RFID Implementation, McGraw-Hill Communications, 2007, 34 pages (excerpts), The McGraw-Hill Companies. |
Glover, Bill et al., RFID Essentials, First Edition, Jan. 2006, 37 pages (excerpts), O'Reilly Media, Inc., Sebastopol, CA. |
Bacheldor, Beth, Children's Hospital Boston Joins Others Using RFID to Track Implantables, RFID Journal, Mar. 5, 2008, 3 pages. |
U.S. Department of Health and Human Services, Food and Drug Administration, Approved Drug Products with Therapeutic Equivalence Evaluations (“The Orange Book”), 28th edition, 2008, first published in 1980, 1103 pages. |
Reexamination Control No. 90014344, Request for Ex Parte Reexamination of U.S. Pat. No. 8,990,099 B2 with Appendices A-D, filed with the USPTO on Jul. 25, 2019, 1387 pages. |
Reexamination Control No. 90014345, Request for Ex Parte Reexamination of U.S. Pat. No. 9,058,412 B2 with Appendices A-D, filed with the USPTO on Jul. 26, 2019, 1429 pages. |
Reexamination Control No. 90014343, Request for Ex Parte Reexamination of U.S. Pat. No. 9,058,413 B2 with Appendices A-D, filed with the USPTO on Jul. 25, 2019, 1463 pages. |
Reexamination Control No. 90014346, Request for Ex Parte Reexamination of U.S. Pat. No. 9,367,665 B2 with Appendices A-D, filed with the USPTO on Jul. 26, 2019, 1477 pages. |
Reexamination Control No. 90014347, Request for Ex Parte Reexamination of U.S. Pat. No. 9,805,169 B2 with Appendices A-D, filed with the USPTO on Jul. 29, 2019, 1535 pages. |
Case IPR2019-00376, Petition for Inter Partes Review of U.S. Pat. No. 8,990,099 with Exhibits 1001-1011 filed with the USPTO Patent Trial and Appeal Board on Nov. 30, 2018 by Health Care Logistics, Inc., Patent Owner's Preliminary Response filed with the USPTO Patent Trial and Appeal Board on Mar. 8, 2019 by Kit Check, Inc., and Decision Denying Institution of Inter Partes Review entered by the USPTO Patent Trial and Appeal Board on Jun. 4, 2019, 863 pages. |
Case IPR2019-00385, Petition for Inter Partes Review of U.S. Pat. No. 9,058,412 with Exhibits 1001-1014 filed with the USPTO Patent Trial and Appeal Board on Nov. 30, 2018 by Health Care Logistics, Inc., Patent Owner's Preliminary Response filed with the USPTO Patent Trial and Appeal Board on Mar. 8, 2019 by Kit Check, Inc., and Decision Denying Institution of Inter Partes Review entered by the USPTO Patent Trial and Appeal Board on Jun. 3, 2019, 2013 pages. |
Case IPR2019-00387, Petition for Inter Partes Review of U.S. Pat. No. 9,058,413 with Exhibits 1001-1014 filed with the USPTO Patent Trial and Appeal Board on Dec. 1, 2018 by Health Care Logistics, Inc., Patent Owner's Preliminary Response filed with the USPTO Patent Trial and Appeal Board on Mar. 13, 2019 by Kit Check, Inc., and Decision Denying Institution of Inter Partes Review entered by the USPTO Patent Trial and Appeal Board on Jun. 7, 2019, 2014 pages. |
Case IPR2019-00394, Petition for Inter Partes Review of U.S. Pat. No. 9,367,665 with Exhibits 1001-1014 filed with the USPTO Patent Trial and Appeal Board on Dec. 3, 2018 by Health Care Logistics, Inc., Patent Owner's Preliminary Response filed with the USPTO Patent Trial and Appeal Board on Mar. 13, 2019 by Kit Check, Inc., and Decision Denying Institution of Inter Partes Review entered by the USPTO Patent Trial and Appeal Board on Jun. 11, 2019, 638 pages. |
Case IPR2019-00388, Petition for Inter Partes Review of U.S. Pat. No. 9,805,169 with Exhibits 1001-1010 filed with the USPTO Patent Trial and Appeal Board on Dec. 1, 2018 by Health Care Logistics, Inc., Patent Owner's Preliminary Response filed with the USPTO Patent Trial and Appeal Board on Mar. 13, 2019 by Kit Check, Inc., and Decision Denying Institution of Inter Partes Review entered by the USPTO Patent Trial and Appeal Board on Jun. 3, 2019, 625 pages. |
Complaint, Kit Check, Inc., Plaintiff, v. Health Care Logistics, Inc., Defendant, Case No. 2:17-cv-1041, United States District Court for the Southern District of Ohio Eastern Division, Dec. 1, 2017, 45 pages. |
Defendant's First Amended Answer, Affirmative Defenses, and Counterclaims to Plaintiff's Complaint, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041-ALM-CMV, United States District Court for the Southern District of Ohio Eastern Division, Feb. 9, 2018, 117 pages. |
Defendant Health Care Logistics, Inc.'s Motion for Judgment on the Pleadings Pursuant to FED. R. CIV. P. 12(C), Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041-ALM-CMV, United States District Court for the Southern District of Ohio Eastern Division, May 25, 2018, 43 pages. |
Plaintiff Kit Check, Inc.'s Memorandum in Opposition to Defendant Health Care Logistics, Inc.'s Motion for Judgment on the Pleadings, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Jun. 29, 2018, 91 pages. |
Defendant Health Care Logistics, Inc.'s Reply in Support of Motion for Judgment on the Pleadings Pursuant to FED. R. CIV. P. 12(C), Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041-ALM-CMV, United States District Court for the Southern District of Ohio Eastern Division, Jul. 20, 2018, 76 pages. |
Joint Claim Construction and Prehearing Statement, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Sep. 20, 2018, 21 pages. |
Plaintiff Kit Check, Inc.'s Opening Claim Construction Brief, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Nov. 16, 2018, 93 pages. |
Defendant Health Care Logistics, Inc.'s Opening Claim Construction Brief, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Nov. 16, 2018, 307 pages. |
Deposition of Jeffrey Fischer, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Dec. 19, 2018, 86 pages. |
Plaintiff Kit Check, Inc.'s Responsive Claim Construction Brief, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Jan. 3, 2019, 88 pages. |
Defendant Health Care Logistics, Inc.'s Response to Plaintiff Kit Check, Inc.'s Opening Claim Construction Brief, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041-ALM-CMV, United States District Court for the Southern District of Ohio Eastern Division, Jan. 3, 2019, 32 pages. |
Defendant Health Care Logistics, Inc.'s Motion for Stay, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041-ALM-CMV, United States District Court for the Southern District of Ohio Eastern Division, Jan. 21, 2019, 12 pages. |
Opinion & Order, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Mar. 14, 2019, 17 pages. |
Joint Stipulation of Partial Dismissal Without Prejudice, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Apr. 16, 2019, 2 pages. |
Joint Notice Regarding Claim Terms Which No Longer Need to be Construed at Markman, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Apr. 16, 2019, 2 pages. |
Opinion & Order, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Apr. 29, 2019, 4 pages. |
Notice to the Court Regarding PTAB's Decision to Deny Institution on All of Defendant's IPR Petitions, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Jun. 12, 2019, 120 pages. |
Notice of Status of Defendant Health Care Logistics Inc.'s Requests for Inter Partes Review, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041-ALM-CMV, United States District Court for the Southern District of Ohio Eastern Division, Jun. 20, 2019, 3 pages. |
Roberti, Mark, RFID Basics for Health Care, Understanding the fundamental concepts that affect RFID deployments, RFID Journal presentation, Sep. 17, 2009, 33 pages, The Westin Waltham-Boston, Waltham, MA. |
KitCheck, Bluesight for Controlled Substances Overview, as retrieved Aug. 30, 2018 from https://web.archive.org/web/20180830001131/https://kitcheck.com/learn-more/video/bluesight-for-controlled-substances-overview/, 1 page. |
KitCheck, Diversion Events, as retrieved Aug. 30, 2018 from https://web.archive.org/web/20180830001851/https://kitcheck.com/solutions/controlled-substances/diversion-events/, 1 page. |
Kitcheck, Security, as retrieved Aug. 30, 2018 from https://web.archive.org/web/20180830000040/https://kitcheck.com/security/, 1 page. |
New, et al., “Utilize ADC Transaction Data to Detect Diversion”, Oct. 2017, vol. 14, No. 10, pp. 10 as retrieved from https://www.pppmag.com/article/2119, 1 page. |
Swedberg, Claire, “Zimmer Ohio in Use RFID to Manage Orthopedic Products”, RFID Journal, May 12, 2010, https://www.rfidjournal.com/articles/pdf?7588, 3 pages. |
Opinion & Order, it Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Aug. 30, 2019, 26 pages. |
Notice of Granting of Three of HCL's Requests for Ex Parte Reexamination with Exhibits A-C, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Ohio Eastern Division, Sep. 9, 2019, 61 pages. |
Notice of Granting of HCL's Two Remaining Requests for Ex Parte Reexamination with Exhibits A and B, Kit Check, Inc. v. Health Care Logistics, Inc., Case No. 2:17-cv-01041, United States District Court for the Southern District of Dhio Eastern Division, Sep. 10, 2019, 48 pages. |
Reexamination Control No. 90014346, Office Action dated Dec. 19, 2019 for U.S. Pat. No. 9,367,665, 50 pages. |
Reexamination Control No. 90014347, Office Action dated Dec. 19, 2019 for U.S. Pat. No. 9,805,169, 52 pages. |
Number | Date | Country | |
---|---|---|---|
20190340855 A1 | Nov 2019 | US |
Number | Date | Country | |
---|---|---|---|
62403319 | Oct 2016 | US | |
62465329 | Mar 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15724218 | Oct 2017 | US |
Child | 15828508 | US |