This disclosure relates generally to scanning devices, and, more particularly, to scanning devices and methods to constrain radio frequency identification (RFID) signals within a physical location.
Scanning devices are electronic devices used to read or scan information from barcodes, RFID tags, near field communication (NFC) tags, etc. associated with packages or other items. For example, such scanning devices may be used in retail, warehouse, factory, or other environments by employees, contractors, personnel or other such users to obtain information from retail packages or other items, and may be used in applications ranging from retail sales, inventory management, shipping and tracking, and for a variety of other applications. For example, product information can be obtained from RFID tags and used to charge a customer for products associated with the tags based on the product information. Some scanning devices may incorporate multiple, different scanning technologies and related hardware to perform different functions. For example, a scanning device may contain both an imaging barcode reader for scanning barcodes, an RFID radio for reading RFID tags, and an NFC sensor for reading NFC tags.
A problem may arise, however, because an RFID reader may pick up stray RFID tags causing false positive reads, which causes unwanted data to be read. This is especially problematic in retail environments where customers or other individuals may move through high traffic areas, such as point-of-sale (POS) lanes, where scanning devices are located, causing the scanning devices to activate, and, therefore read or scan at times that are unintended.
Accordingly, there is a need for solutions that solve issues regarding scanning devices that incorporate RFID readers and related hardware, for example, via scanning devices, and related methods, for constraining RFID signals within a physical location.
The accompanying figures, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed invention, and explain various principles and advantages of those embodiments
Connecting lines or connectors shown in the various figures presented are intended to represent example functional relationships and/or physical or logical couplings between the various elements. In general, the same reference numbers will be used throughout the drawing(s) and accompanying written description to refer to the same or like parts.
Elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, components may been represented where appropriate by conventional symbols in the drawings, and may show only those specific details that are pertinent to understanding the embodiments of the invention so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein. Further, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of embodiments of the invention.
In various embodiments of the present disclosure, a scanning device, and related methods, are described for activating and deactivating an identification tag reader (e.g., an RFID reader) based on the location of use of the scanning device. An example scanning device includes a housing, an identification tag reader in the housing, the identification tag reader having an active mode in which the identification tag reader is configured to identify tags within a detection region about the housing and determine identification data for the identified tags, and the identification tag reader having an inactive mode in which the identification tag reader is prevented from detecting tags within the detection region, and a detector in the housing configured to detect a presence of a control item in an environment, the identification tag reader in the active mode when the control item is detected in the environment, and the identification tag reader in the inactive mode if the presence of the control item is not been detected.
Benefits may be realized by configuring an identification tag reader into an active mode only when the identification tag reader is at a designated, pre-determined, intended use location, in a designated intended use mount, etc. For example, the intended use location, mount, etc. can be selected so that only identification tags in a pre-determined detection region (e.g., a store checkout lane) can be read. When the identification tag reader is away from the pre-determined detection region (e.g., not at the intended use location, mount, etc.) and, thus, could read unintended tags (e.g., tags associated with a different checkout lane), the identification tag reader is configured to the inactive mode.
For example, a component in the scanning device interacts with another component at the intended use location, mount, etc. so as to configure the identification tag reader in the active mode when the scanning device is at the intended use location, mount, etc. and to configure the identification tag reader in the inactive mode when the scanning device is not at the intended use location, mount, etc. In some examples, the component in the scanning device is a Hall sensor and the component at the intended use location is a magnet. When the magnet is sensed by the Hall sensor, the identification tag reader is configured in the active mode. Otherwise, when the scanning device is not at the intended use location so the magnet is not sensed, the identification tag reader is configured in the inactive mode.
In some examples, the component in the scanning device is a mechanical switch and the component at the intended use location is a switch activator. When the switch activator closes the mechanical switch, the identification tag reader is configured in the active mode. Otherwise, when the scanning device is not at the intended use location so the mechanical switch is not closed by the switch activator, the identification tag reader is configured in the inactive mode.
In some examples, the component in the scanning device is a pressure switch and the component at the intended use location is a pressure activator. When the pressure activator is sensed by the pressure switch, the identification tag reader is configured in the active mode. Otherwise, when the scanning device is not at the intended use location so the pressure activator is not sensed by the pressure switch, the identification tag reader is configured in the inactive mode.
In some examples, the component in the scanning device is a light sensor and the component at the intended use location is a light source. When the light sensor senses light emitted by the light source, the identification tag reader is configured in the active mode. Otherwise, when the scanning device is not at the intended use location, the light is not detected and the identification tag reader is configured in the inactive mode.
In some examples, the component in the scanning device includes a light source and a light detector, and the component at the intended use location is an opaque member. When the light emitted by the light source is blocked from the light detector by the opaque member, the identification tag reader is configured in the active mode. Otherwise, when the scanning device is not at the intended use location so the light source is not blocked, the identification tag reader is configured in the inactive mode.
In some examples, the component in the scanning device is a color sensor and the component at the intended use location is a colored item having a predetermined color. When the predetermined color of the colored item is detected by the color sensor, the identification tag reader is configured in the active mode. Otherwise, when the scanning device is not at the intended use location so the colored item is not detected, the identification tag reader is configured in the inactive mode.
In some examples, the component in the scanning device is an NFC detector and the component at the intended use location is an NFC tag. When the NFC tag is sensed by the NFC detector, the identification tag reader is configured in the active mode. Otherwise, when the scanning device is not at the intended use location so the NFC tag is not sensed, the identification tag reader is configured in the inactive mode.
In some examples, a barcode reader system includes the scanning device and an imager configured to read barcodes.
In some examples, the intended use location is a mount for the scanning device. In some examples, the intended use location is a designated intended use location on a surface on which to set the scanning device.
An example method to constrain RFID signals within a physical intended use location includes detecting whether a scanning device having a housing and an identification tag reader disposed in the housing is located at a defined intended use location, when the scanning device is at the defined intended use location, configuring the identification tag reader in an active mode in which the identification tag reader is configured to identify tags within a detection region about the housing, and, when the scanning device is not at the defined intended use location, configuring the identification tag reader in an inactive mode in which the identification tag reader is prevented from identifying tags.
The method may further include obtaining product information associated with the tags and charging a customer for products associated with the tags based on the product information. In some examples, a mount for the scanning device defines the intended use location.
An example barcode reader to constrain RFID signals to a physical intended use location includes a housing, the barcode reader in the housing comprising an imager configured to read a barcode, and an identification tag reader in the housing having a transmit mode in which the identification tag reader is to search for and identify tags within a detection region about the housing, determine identification data for the identified tags, and transmit the determined identification data to a receiver, and a sniffing mode in which the identification tag reader is to search for an identity tag containing authenticating identification data, the identification tag reader prevented from transmitting to a receiver when in the sniffing mode, the identification tag reader configured to enter the transmit mode, from the sniffing mode, when the identification tag reader identifies the identity tag containing the authenticating identification data.
An example system to constrain RFID signals to a physical intended use location includes a barcode reader having a housing, an imager in the housing configured to read a barcode, an identification tag reader in the housing having an active mode in which the identification tag reader is to identify tags within a detection region about the housing and determine identification data for the identified tags, and the identification tag reader having an inactive mode in which the identification tag reader is prevented from detecting identity tags within the detection region, and a detector configured to detect for the presence of a control item in an environment and to enable the active mode when the control item is detected in the environment, wherein the identification tag reader is configured to be in the inactive mode if the control item presence has not been detected, and an external mount having a receiver end for engaging the housing, the receiver end configured to allow relative movement of the housing from a release position to an engaged position where the barcode reader is maintained in a fixed position, the external mount positioning the control item such that the control item is detectable by the detector when the housing is in the engaged position and not detectable by the detector when the housing is in the release position.
An example RFID module to constrain RFID signals to a physical intended use location includes an RFID tag reader configured to scan for RFID tags within a detection region, a transmitter configured to transmit, to a receiver, identification data received from RFID tags in the detection region detected by the RFID tag reader, a detector configured to detect for the presence of a control item in an environment, and a controller configured to, in response to the detector detecting the presence of the control item, switch the RFID module from an inactive mode wherein the RFID module is prevented from transmitting to the receiver to an active mode wherein the RFID module is to identify RFID tags within the detection region, determine identification data for the identified RFID tags, and transmit the identification data to the receiver.
Reference will now be made in detail to non-limiting examples, some of which are illustrated in the accompanying drawings.
The scanning device 102 includes an identification tag reader, such as an ultra-high frequency (UHF) RFID reader 202 (see
When the scanning device 102 is positioned at an example intended use location 112 where the RFID reader 202 is intended to be used to read RFID tags, the RFID reader 202 emits (e.g., transmits, radiates, etc.) RFID signals having a desired radiation field pattern (e.g., according to a circle 114) into the lane 110. Accordingly, the RFID reader 202 can read RFID tags 106 present in the lane 110 that are within the emitted radiation pattern (e.g., within the circle 114). The RFID reader 202 has a limited transmit strength and, thus, when positioned at the location 112, the RFID signal transmitted by the RFID reader 202 will not extend into other POS stations (e.g., a POS station 116). Accordingly, the RFID reader 202 will not mistakenly read RFID tags present in a lane 118 of the POS station 116. That is, the RFID signals are constrained to within a desired region (e.g., an area, a detection region 120, etc.) about the location 112 that does not include the POS 116.
When the scanning device 102 is instead positioned at a different unintended use location (e.g., an unintended use location 122 or an unintended use location 124) where the RFID reader 202 is not intended to be used, the RFID reader 202 can unintentionally transmit RFID signals in a radiation field pattern (represented by a respective circle 126 or circle 128) into the lane 118 of the POS 116. That is, the RFID signals 126, 128 are no longer constrained to within a region that does not include the POS 116. Accordingly, when the RFID reader 202 is at either of the unintended use locations 122, 124, their respective RFID signals 126, 128 extend into the POS station 116 and, thus, the RFID reader 202 can mistakenly read identification tags (e.g., an RFID tag 130) present in the lane 118. Furthermore, in the illustrated example, the RFID signals 126, 128 do not extend into the lane 110 of the POS station 104 and, thus, the RFID reader 202 is unable to detect items 108 that are intended to be purchased in the lane 110.
To prevent the RFID reader 202 from reading RFID tags 106 at unintended use locations (e.g., the locations 122, 124), the example scanning device 102 includes an example detector 206 and an example controller 208 (see
In some example control configurations, to constrain RFID signals within a physical location, an intended use location is an example surface 210 (see
In some example control configurations, to constrain RFID signals within a physical location, an example intended use location is an example mount 302 (see
The scanning device 300 of
In some examples, the detector 206 includes a Hall sensor, and the control item 132 includes a magnet. When the Hall sensor detects the magnet, the controller 208 places the RFID reader 202 in the active mode.
In some examples, the detector 206 includes a mechanical switch, and the control item 132 includes a switch activator that changes the state of the mechanical switch. For example, when the switch activator closes the mechanical switch, the controller 28 places the RFID reader 202 in the active mode.
In some examples, the detector 206 includes a pressure switch, and the control item 132 includes a pressure inducer. When the pressure inducer closes the pressure switch, the controller 208 places the RFID reader 202 in the active mode.
In some examples, the detector 206 includes a light sensor, and the control item 132 includes a light source. When the light sensor detects an interruption of light emitted by the light source, the controller 208 places the RFID reader 202 in the inactive mode.
In some examples, the detector 206 includes a light source and a light sensor, and the control item 132 includes an opaque member. When the light sensor does not sense the light emitted by the light source due to the opaque member, the controller 208 places the RFID reader 202 in the active mode.
In some examples, the detector 206 includes a color sensor, and the control item 132 includes a colored member having a predetermined color. When the color sensor detects the predetermined color of the colored member, the controller 208 places the RFID reader 202 in the active mode.
In some examples, the detector 206 includes an NFC sensor or the RFID reader 202, and the control item 132 includes a special identification NFC or RFID tag. When the NFC sensor or RFID reader 202 detects the special identification NFC or RFID tag, the controller 208 places the RFID reader 202 in the active mode. When the NFC sensor or RFID reader 202 does not detect the special identification NFC or RFID tag, the controller 208 places the RFID reader 202 in the inactive mode. In some examples, the NFC sensor or RFID reader 202 is placed in a sniffing mode for the special identification NFC or RFID tag rather than being placed in the inactive mode. The controller 208 may set operating parameters for the active mode based on control data read from the special identification NFC or RFID tag.
In some examples, the detector 206 includes a light source in the base 214 of the housing 216, and the base 214 includes a stopper positioned to block the light source when the scanning device 102 is mounted to the base 214. When the detector 206 detects the light source is blocked, the controller 208 places the RFID reader 202 in the active mode.
An example barcode reader system includes the scanning device 102, an optical imaging assembly 218, and a scanning window 220 (see
The scanning device 102 may further include a trigger 224. In some embodiments, the trigger 224 activates each of the optical imaging assembly 218 and the RFID reader 202 together for a scanning session. In other embodiments, the trigger 224 may be configured to activate, at least initially, one of the optical imaging assembly 218 or the RFID reader 202 where, for example, a top portion of the trigger 224 activates the optical imaging assembly 218 and a bottom portion of the trigger 224 activates the RFID reader 202, or vice versa. It is to be understood however, that activation of the optical imaging assembly 218 and/or the RFID reader 202 need not occur solely through the trigger 224, and that the scanning device 102 may also operate in a hands-free mode where activation of the optical imaging assembly 218 and/or the RFID reader 202 may occur upon the detection of products in the vicinity, field of view, effective reading range, etc. of scanning device 102.
In some examples, the controller 208 is implemented in a POS terminal to which the scanning device 200 is coupled. Example controllers 208 include a programmable processor, a programmable controller, a graphics processing unit (GPU), a digital signal processor (DSP), etc. Alternatively, an application specific integrated circuit (ASIC), a programmable logic device (PLD), a field programmable gate array (FPGA), a field programmable logic device (FPLD), a logic circuit, etc.) may be structured or configured to implement the controller 208.
The scanning device 200 includes memory 226 to store software, and machine- or computer-readable instructions, which may be executed by the controller 208. Example memories 226 include any number or type(s) of non-transitory computer- or machine-readable storage medium or disk, such as a hard disk drive (HDD), an optical storage drive, a solid-state storage device, a solid-state drive (SSD), a read-only memory (ROM), a random-access memory (RAM), a compact disc (CD), a compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a Blu-ray disk, a cache, a flash memory, or any other storage device or storage disk in which information may be stored for any duration (e.g., permanently, for an extended time period, for a brief instance, for temporarily buffering, for caching of the information, etc.).
As used herein, the term non-transitory computer-readable medium is expressly defined to include any type of computer-readable storage device and/or storage disk and to exclude propagating signals and to exclude transmission media. As used herein, the term non-transitory machine-readable medium is expressly defined to include any type of machine-readable storage device and/or storage disk and to exclude propagating signals and to exclude transmission media.
The scanning device 200 includes an input/output (I/O) circuit 228 to couple the controller 208 to, among possibly other elements, the RFID reader 202, the detector 206, another component of a POS station (e.g., a terminal), etc.
While an example scanning device 200 is shown in
A flowchart 400 representative of example processes, methods, software, firmware, and computer- or machine-readable instructions for implementing the controller 208 of
When a special RFID or NFC tag is used as the control element 132, the controller 208 places RFID reader 202 or NFC sensor in a sniffing mode for the special NFC or RFID tag rather than being placed in the inactive mode.
In the foregoing specification, specific embodiments have been described. However, one of ordinary skill in the art appreciates that various modifications and changes can be made in view of aspects of this disclosure without departing from the scope of the invention as set forth in the claims below. Accordingly, the specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications made in view of aspects of this disclosure are intended to be included within the scope of present teachings.
The benefits, advantages, solutions to problems, and any element(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential features or elements of any or all the claims.
Moreover in this document, relational terms such as first and second, top and bottom, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising,” “has,” “having,” “includes,” “including,” “contains,” “containing,” or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises, has, includes, contains a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element proceeded by “comprises . . . a,” “has . . . a,” “includes . . . a,” “contains . . . a” does not, without more constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises, has, includes, contains the element. The terms “a” and “an” are defined as one or more unless explicitly stated otherwise herein. The term “coupled” as used herein is defined as connected, although not necessarily directly and not necessarily mechanically. A device or structure that is “configured” in a certain way is configured in at least that way, but may also be configured in ways that are not listed.
Further, unless expressly stated to the contrary, “or” refers to an inclusive or and not to an exclusive or. For example, A, B or C refers to any combination or subset of A, B, C such as (1) A alone, (2) B alone, (3) C alone, (4) A with B, (5) A with C, (6) B with C, and (7) A with B and with C. As used herein, the phrase “at least one of A or B” is intended to refer to implementations including any of (1) at least one A, (2) at least one B, and (3) at least one A and at least one B. Similarly, the phrase “at least one of A and B” is intended to refer to implementations including any of (1) at least one A, (2) at least one B, and (3) at least one A and at least one B. The term “and/or” when used, for example, in a form such as A, B, and/or C refers to any combination or subset of A, B, C such as (1) A alone, (2) B alone, (3) C alone, (4) A with B, (5) A with C, (6) B with C, and (7) A with B and with C.
As used herein, the expressions “in communication,” “coupled” and “connected,” including variations thereof, encompasses direct communication and/or indirect communication through one or more intermediary components, and does not require direct physical (e.g., wired) communication and/or constant communication, but rather additionally includes selective communication at periodic intervals, scheduled intervals, aperiodic intervals, and/or one-time events.
The Abstract of the Disclosure is provided to allow the reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in various embodiments for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim and/or combinations thereof standing on its own as a separately claimed subject matter.
This patent covers all methods, apparatus and articles of manufacture fairly falling within the scope of the claims of this patent.