Referring now to
Additionally, a bar code reader 60 may be provided that is capable of reading a bar code imprinted on a bar code label 70 affixed to the container. While the preferred embodiment is to use the RFID reader/interrogator 52, there are a lot of legacy containers that have a bar code label already attached. In addition, bar codes are at present still cheaper than RFID tags, and for this application, the minimum requirement is to simply have a unique ID number associated with the container 68 that may be read in some way by the system and the bar code accomplishes this task. Of course, to use a bar code label 70 in place of an RFID tag 72 places more constraints on the usage of the reader 60 because all containers must be completely accessible and within a foot or so of the reader 60. This is not true for an RFID reader 52 that may be located many feet from the container 68 and may see through other containers eliminating the requirement for container accessibility. Cost versus versatility becomes a tradeoff wherein an RFID tag costs a little more but offers the most capability, while a bar code reader is cheaper but puts constraints on the system.
In many cases there is a need to convert legacy containers that currently use bar codes with the newer RFID tags. In these cases it may be necessary to use a barcode reader 60 as part of the system with an RFID reader/interrogator. Specifically the system would first scan the bar code 70 using the bar code reader 60 to obtain the ID number stored on the bar code 70. To avoid the need for a complete change in the database management of the universe of containers, the system would probably write at least the ID number obtained from the bar code 70 into the RFID tag 72. This would require the RFID tag 72 to have write-able memory. If the RFID tag 72 does not have write-able memory then the barcode 70 ID would be stored into the database 58 along with the RFID tag 72 ID.
Additionally, there may be text associated with the bar code 70 affixed to the container 68 stored in a database that describes the contents of the container 68 (different from the database 58 shown in the system of
Turning once,again to
Also a microphone/audio digitizer 66 may be used to capture sound. As the container 68 is being packed, a person describes each item as it is placed in the container 68. For example if the container 68 was being packed with books, the person might say: “Book: Vector Analysis”. After a container 68 is packed, a digital voice recording that describes the entire contents of the container 68 exists that may now be linked to the RFID tag 72 affixed to the box. The recording is then stored in a database 58 linked to the ID number so that at a later time, the user can scan the RFID tag 72 on the container 68, obtain the ID number from the tag and then go to the database 58 to obtain the voice file that describes the contents of the container 68.
The microphone/audio digitizer 66 may also be used to feed the speech recognition to a text converter 64. The speech recognition to text converter 64 takes the spoken word describing the contents of the container 68 and converts it to text so that it may be stored as a text file in the database 58. This text file is then associated with the RFID tag 72 affixed to the container 68 and thus provides a text database describing the contents of the container 68. This database may then be searched at a future time to determine the contents of the container 68 or to determine if any of the containers contain the searched for item. It is possible to obtain text information from other sources such as a keypad and typing the information, but this is much simpler.
The database 58 stores all of the information recorded by the camera 62, the microphone audio digitizer 66, the speech recognition to text converter 64, and the ID number of the RFID tag 72 affixed to the container 68. The RFID tag ID 72 is used as the key field in the database and all of the other information is associated with this number. The physical medium for the database 58 may be almost anything from flash memory to a small hard drive. In the future, as RFID tags become more advanced, the information may be stored on the tag itself.
Additionally a keyboard 50 may be used to enter text information containing the contents of the container 68. This would be cheap but labor intensive. It may also be used to enter special information concerning the packing of the containers and/or of high interest to the user. For example, suppose a household moving company is using the system. It is very desirable to know the room that the contents for the container 68 came from. This information is so valuable that it is frequently written on the side of the container by hand. Another piece of information of great value is the name of the person who packed the container and a final piece of information would be a time and date stamp as to when the container was packed and closed. This final piece of information may be read automatically by using the system clock (not shown) in the system. The persons name would only have to be entered once, and the room he was working in would only have to be entered once given that most moving companies require the name of the room and the packer's initials be written on each container manually, it is likely that a considerable savings in time would result. There are other ways to enter this information automatically. For example, each packer could have his own RFID tag that identifies him. This may be read by the RFID reader/interrogator 52 during a special read cycle. A room may have a RFID tag associated with it that may also be read by the RFID reader/interrogator 52. To assist the packer and shipper, a GPS receiver 73 which is capable of receiving information from GPS satellites 77 by RF link 75 can automatically provide position of the location of the place being moved and this information added to database 58 and associated with container 68.
Referring once again to
A printer 54 may also be provided wherein after the container 68 is packed and the RFID tag ID 72 has been read and associated with the pictures/audio/text describing the contents of the container.68 some of the items might be printed out on a contact paper that may be easily affixed to the container 68 for easier verification at a later time. For example, one or more of the photos may be printed and if text information exists, that may also be printed. Another example is the moving company may use the keyboard 50 for printing the room in which the container was packed, and by whom and print the time and date stamp as well. The system would work using the following sequence. When the packer (not shown) sends to the system a signal that the container was packed and closed, the system would read the RFID tag ID 72 affixed to the container 68 (and/or the bar code 70 affixed to the container 68). It then links all of the data taken that describes the contents of the containers (and the special information that the user desires such as the room in which it was packed and the packers name along with a time stamp). The system then writes this to the database 58 and also begins to print the desired information on a label that the packer then affixes to the side of the container 68. This label is likely to be much more legible than the average packer's handwriting.
The system comprising the camera 62, database 58, control/user interface 56, RFID reader/interrogator 52, microphone/audio digitizer 66, speech recognition to text converter 64, bar code reader 60, GPS receiver 73, and any other component may all be combined into one package or be totally distributed. For example, the control/user interface 56 might be a notebook computer and the camera 62 may be a separate digital camera and so forth. By way of example the camera 62 may be a small box that straps to the wrist of the person loading the containers. If the link from the camera 62 to the rest of the system were wireless, then this would create the ultimate in convenience for the person doing the packing. When the person wanted to take a picture of the contents, he literally would have to do nothing more than point his wrist at the box and push a button. The picture would then go over a wireless link 74 to the main system where it would be appropriately cataloged and placed with the other pictures related to this container. Similarly a wireless microphone/audio/digitizer 66 may be placed on the person packing the container such that it automatically records his voice as he packs. When he is finished packing the container, he might push another button that causes the system to read the RFID tag 72 and store the all of the information into the database 58.
It should be noted that the system does not require picture information, audio information, and text information to be stored in the database 58 wherein only one of these pieces of information is required to identify the contents of the container 68. By way of example the system may use only a camera 62 and records only pictures to identify the contents of the container 68. Accordingly the data structure for the database 58 may be configured for the type of information stored. As an example, assume that a system contains only a camera 62 then the pictures to be stored in the database taken by the camera associated with the RFID tags 72 ID may be MPEG or JPEG or any other storage algorithm. Also, techniques for cataloging the information may vary. By way of example if the tag ID for this RFID tag 72 is 500 this allows for multiple pictures to be taken for each container. As each picture is taken, the picture number is concatenated with the tag ID (500) separated by some character (for example a period) and is used as the label for each picture. Therefore the first picture taken for this container 68 would be 500.1, the second picture would be 500.2, third would be 500.3 and so forth. Each picture is labeled accordingly and stored in the database 58. Later, when the user is trying to find out the contents of the container, all the system has to do is read the RFID tag 72 on the container 68 to obtain the tag ID. This ID is used to search the database using the numbers prior to the decimal point as the key. Then any set of pictures that match this number must be a picture of the contents of that container 68.
There are two distinctly different users for this system. There is the original packer of the containers who is not only responsible for packing the containers, but also must keep track of the contents of the container. This is the packing side of the container. The other user is the person who is confronted with a large number of closed containers and needs to be able to find a particular item contained in one of the containers; preferably without opening all of the containers. A slightly different need at this end is a need to just determine if an item is in one of the containers, or to take an inventory of all the containers to make sure nothing was lost from the time it was packed until the present time.
In use the camera 62 is strapped to the wrist of the packer for ease of use and a microphone audio digitizer 66 exists somewhere close enough to the packer that the packer's words may be heard and recorded. When the packer first arrives on the site he begins by entering his name and any other global information important to the particular task that needs to be recorded along with the specific information regarding the contents of the containers. He then acquires a container 68 making sure that it has an RFID tag 72 affixed and /or a bar code 70. He begins packing the container 68 with the desired contents. Once again by way of example if the contents are books he packs the books into the container while reading the title of each book aloud. The system simultaneously records this sound and converts it to a digital equivalent. It is unimportant exactly what digital code is used to represent the sound as long as it is consistent throughout the system. The system automatically does two things when it records this speech. 1) It stores the digital equivalent of the voice into the database 58 for later playback, and 2) it sends the voice into a speech recognition engine 64 that converts the speech to text that is also stored in the database 58.
As the packer fills a row of books where the addition of additional books would obscure the previous books packed, he takes a picture of the contents. He does this by simply pointing his arm that has the miniature digital camera 62 strapped to his wrist at the container and pushing a button to obtain the picture. He need do nothing more as the system now takes the picture and places it into the database 58. The packer continues to pack the container with items, speaking the name of each item as he goes, and occasionally stopping for a brief second to take a picture and does this until the container is filled. Once the container is full, the packer pushes another button that causes the system to associate all of the acquired pictures, audio files, and text files that describe the contents with the ID number that has been read from the RFID tag 72, or if the bar code reader 60 is used instead of the RFID reader/interrogator 52, the ID number stored on the bar code affixed to the container 70. Next, the system begins to print the label using the printer 54 that may be physically located on or next to the container 68. The information to be printed will vary from one use to another wherein the desired information to be printed might be programmed in at the beginning of the day, or it might be programmed in by the shipper at the request of the customer. The point is some people may want to print only pictures, others may want the ID number, who did the packing, and a time stamp. Still other users may want everything printed while others might not want any label at all. The flexibility exists to provide all of these things. While the printer is printing the external label, the packer is busy closing up the container. After he finishes closing the container, he removes the label from the printer, and affixes it to the container. After that, he moves on to the next container. In summary, the packer only needs to speak the name of the item he is packing as he packs the container, at critical times he aims his arm at the container and takes a picture, after the container is full, he pushes a button to let the system know it is full. He closes the container and then affixes the label printed by the system to the container. He wastes very little time in doing all of this but the result is a complete inventory stored as pictures, text and audio in the database that may be used to track the items very closely.
Another advantage of the system is if something gets damaged in route the moving company or customer may go back to the original database and look at the pictures to determine if the container had been properly packed or if the damage was due to something else. At the end of the packing, a complete inventory of every box will be contained in the database. The truck containing all the boxes may also be scanned using RFID tags (but no bar codes) and the contents of the truck compared against the database containing the complete inventory. In this manner, one could see if any containers had gone missing (or if any of the boxes had been opened and some of the contents had gone missing.) At the other end of the trip, the same scan could be done to prove that nothing was “lost” during the trip. This would provide great reassurance for the customer of the moving company to know that the items were under close control.
Another application is the case where a legacy system of containers already packed but identified with bar codes is being converted to RFID tags. The system performs this task by having the user first scan the bar code 70 on the container 68 with the bar code reader 60. Varying amounts of information about the contents of the containers might be available in various forms of storage (from paper to computer database). If the data is already in a computer database and is deemed reliable, it is probably sufficient to take this information directly from this database after the bar code has been read. If the amount of information is small, it could be written directly to the newly attached RFID tag 72. If it is larger, or if desired, it may also be written into the systems database 58. Under this circumstance, the container need never be opened. In many instances, the stored contents data will no longer meet the needs of the organization, or there may not be trust in the data and a desire exists to do a complete inventory where the containers are each opened and the contents examined. Under this circumstance, the system would operate much like before where a packer would examine each item, speak the name of the item into the microphone, take pictures as needed and otherwise do exactly the same as described above.
When the user is confronted with a very large number of closed containers and is attempting to find an item within one of those containers without opening any of the containers all he has to do is pick up the RFID reader/interrogator 84 (or a bar code scanner 86 if a bar code was used in place of the RFID tag), aim it at a container and push a button. The system will immediately read the ID stored in the RFID tag 90 affixed to the container in question 92. The system uses this information to go to the database 82 to obtain all of the information stored that is related to that particular container. If pictures were stored, the system would display them on a graphics display of the user interface 78 and may allow the user to automatically step through them in a slide show like fashion, or it could allow the user to push a button to advance to the next picture thus giving the user more time to study each picture. If text information is available, it could display this on the same monitor either as its own screen or beside each in a screen beside the picture. All the while these results are being displayed; the recorded audio that describes the content would be heard over the Audio Speaker 76.
Finally, the user might want to peruse the database on a computer prior to going on a search. If the item is found in the database and it is associated with an individual container, the user has a very good chance of finding the object. But if the user cannot find the item in the database, there is a good chance it isn't there at all. In any case, because the item is not in the database, the system won't help him as it relies on the database for information. If text information is stored in the database, the database is easily searched using standard computer search tools. If no text is stored, but voice is available, either the user listens to all of the speech stored in the system which would be tedious, or he may route the speech into his own speech to text recognition program and then use the output of this program to do the search for the actual item using standard text computer search tools. If pictures are stored in the database any number of photo display programs may be used to walk through all the pictures in the database. Once an item is found, then additional information like what room it was packed in, who packed it, what the ID number of the RFID tag is on the container holding the item becomes immediately available and useful for finding the object.
Turning now to
Referring once again to
Referring now to
The invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respect only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims, rather than by the foregoing description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.