This document relates generally to Radio Frequency Identification (“RFID”) based systems. More particularly, this document relates to systems and methods for locating objects within a facility using RFID technology and alerting mechanisms.
RFID technology has conventionally been used in the identification and tracking of products, equipment, and other articles. For example, RFID systems are commonly used in Electronic Article Surveillance (“EAS”) and in logistical and inventory systems for monitoring goods and equipment and recording information on the target item. An RFID system typically includes an RFID reader and an RFID device such as a tag or label. The RFID reader may transmit a Radio-Frequency (“RF”) carrier signal to the RFID device. The RFID device may respond to the RF carrier signal (or interrogator signal) with a data response signal (or authentication reply signal) encoded with information stored on the RFID device. RFID devices may store information such as a unique identifier or an Electronic Product Code (“EPC”) associated with an article or item.
The RFID technology allows retailers to rapidly and/or continuously identify products, count products and track product locations. As such, the RFID technology offers significant benefits over a physical inventory counting process. By leveraging the RFID technology to increase inventory accuracy, retailers are better able to perform replenishment, service customer requests, manage product recalls or any other activities that rely on inventory data. With this level of inventory visibility, retailers must also take on the additional burden of being able to locate specific products easily and quickly so that they can service the above-listed use cases. Products on the market today to aid in determining a product's location are either too expensive or not accurate enough to serve this need.
The present disclosure concerns implementing systems and methods for locating an object within an area. The methods involve: receiving, by an RFID tag coupled to the object, an RF interrogator signal transmitted from an RFID reader; processing, by the RFID tag, the RF interrogator signal to determine if the RF interrogator signal applies thereto; and performing operations by the RFID tag to direct a person's attention directly to the object by activating at least one alerting mechanism electrically and mechanically coupled to the RFID tag when the RF interrogator signal is determined to apply to the RFID tag. The alerting mechanism can include, but is not limited to, an auditory, visual and/or tactile alerting device. A reply signal may be transmitted from the RFID tag which includes information specifying an alert state thereof.
In some scenarios, alerts are output from the alerting mechanism at a frequency which signifies the proximity of the RFID reader to the RFID tag. As such, this frequency may be selected based on received signal strength. The frequency may be adjusted when a distance between the RFID reader and the RFID tag changes. This distance change can be detected based on an increase or decrease of the received signal strength.
In those or other scenarios, at least two alerts of different types are output from the alerting mechanism so as to signify a proximity of the RFID reader to the RFID tag. The type of at least one alert output from the alerting mechanism may be changed when a distance between the RFID reader and the RFID tag changes. Additionally or alternatively, at least one additional alert is output from the alerting mechanism when the distance between the RFID reader and the RFID tag changes.
The present disclosure also concerns systems and methods for determining a general area in which an object is located using beacons. The methods involve: monitoring, by the beacon, communications between the RFID reader and a plurality of RFID tags; detecting, by the beacon, a particular combination of RF interrogator signals and reply signals communicated between an RFID reader and an RFID tag coupled to the object; and performing operations by the beacon to direct a person's attention to the area within which the object is disposed by activating at least one alerting mechanism of the beacon when the particular combination of RF interrogator signals and reply signals is detected thereby. The alerting mechanism includes, but is not limited to, an auditory, visual and/or tactile alerting device.
In some scenarios, alerts are output from the alerting mechanism at a frequency which signifies the proximity of the RFID reader to the beacon. As such, this frequency may be selected based on received signal strength. The frequency may be adjusted when a distance between the RFID reader and the beacon changes. This distance change can be detected based on an increase or decrease of the received signal strength.
In those or other scenarios, at least two alerts of different types are output from the alerting mechanism so as to signify a proximity of the RFID reader to the beacon. The type of at least one alert output from the alerting mechanism may be changed when a distance between the RFID reader and the beacon changes. Additionally or alternatively, at least one additional alert is output from the alerting mechanism when the distance between the RFID reader and the beacon changes.
Embodiments will be described with reference to the following drawing figures, in which like numerals represent like items throughout the figures, and in which:
It will be readily understood that the components of the embodiments as generally described herein and illustrated in the appended figures could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of various embodiments, as represented in the figures, is not intended to limit the scope of the present disclosure, but is merely representative of various embodiments. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by this detailed description. All changes which come within the meaning and range of equivalency of the claims are to be embraced within their scope.
Reference throughout this specification to features, advantages, or similar language does not imply that all of the features and advantages that may be realized with the present invention should be or are in any single embodiment of the invention. Rather, language referring to the features and advantages is understood to mean that a specific feature, advantage, or characteristic described in connection with an embodiment is included in at least one embodiment of the present invention. Thus, discussions of the features and advantages, and similar language, throughout the specification may, but do not necessarily, refer to the same embodiment.
Furthermore, the described features, advantages and characteristics of the invention may be combined in any suitable manner in one or more embodiments. One skilled in the relevant art will recognize, in light of the description herein, that the invention can be practiced without one or more of the specific features or advantages of a particular embodiment. In other instances, additional features and advantages may be recognized in certain embodiments that may not be present in all embodiments of the invention.
Reference throughout this specification to “one embodiment”, “an embodiment”, or similar language means that a particular feature, structure, or characteristic described in connection with the indicated embodiment is included in at least one embodiment of the present invention. Thus, the phrases “in one embodiment”, “in an embodiment”, and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
As used in this document, the singular form “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise. Unless defined otherwise, all technical and scientific terms used herein have the same meanings as commonly understood by one of ordinary skill in the art. As used in this document, the term “comprising” means “including, but not limited to”.
The present disclosure concerns systems and methods for locating objects within a facility using RFID technology and alerting mechanisms. The alerting mechanisms greatly aid in locating a particular object by drawing an end user's attention to a specific physical location within a facility. The alerting mechanisms can cover a broad spectrum of feedback to meet the needs of different end user capabilities. The alerting mechanisms can include, but are not limited to, audio output devices, visual output devices (e.g., lights), and/or tactile output devices (e.g., vibrators). The ability to create and activate the alerting mechanisms can be implemented in at least two different ways. For example, the alerting mechanisms can be implemented by a physical RFID tag and/or by an RFID-enabled beacon.
In the physical RFID tag scenarios, additional logic and feedback mechanism are provided with the RFID tag to make locating a particular object easier. Because an RFID reader can communicate with a specific RFID tag or a group of RFID tags, the RFID technology is leveraged to trigger alerting events on the RFID tag itself, making it relatively easy for the end user to locate the same.
In the RFID-enabled beacon scenarios, beacons are placed at strategic locations within the facility (e.g., on shelves or other display equipment). The beacons monitor communications between the RFID reader and the RFID tags. When a beacon detects a particular combination of requests/responses, the beacon activates its alerting mechanism. Because of a limited read-range of the beacon, the beacon can provide alerts to an area of the facility which is being monitored thereby.
By pairing the alerting mechanisms (in either form), an end user is directed to the exact location within a facility at which a given object current resides. Beacons provide a more general area to search for an object, thereby limiting the area of manual searches required to find the object. The RFID tags direct the end user directly to the object's location within a facility, thereby eliminating the need for any manual searches therefore. The alerting mechanisms provide new capabilities to existing RFID devices without significantly increasing the costs thereof and/or changing the deployment requirements thereof.
In addition to facilitating object locating, the alerting mechanisms can also be used for: visually displaying RFID equipment read ranges (e.g., RFID tags and beacons within a read range of a fixed or mobile RFID reader can illuminate to show the limits of the read range); training uses on the capabilities and limits of cycle counting and fixed reader ranges; tuning and testing RFID equipment during deployment exercises; and/or facilitating the identification of unauthorized RFID tag movement (e.g. RFID tags that leave a facility past an RFID read point without authorization can identify themselves following standard EAS alarms, making it easier for store personnel to identify the suspect item).
Referring now to
As shown in
RFID tags 1141-114N, 1181-118N are respectively coupled to the objects 1121-112N, 1161-116N. The RFID tags are described herein as comprising single-technology tags that are only RFID enabled. The present invention is not limited in this regard. The RFID tags can alternatively or additionally comprise dual-technology tags that have both EAS and RFID capabilities. In all scenarios, the RFID tags comprise alerting circuitry for assisting store personnel with locating objects within the RSF 102. The manner in which the RFID tags provide such assistance will become evident as the discussion progresses.
A detailed block diagram of RFID tag 1141 is provided in
The hardware architecture of
The RFID enabled device 200 comprises an antenna 202 for allowing data to be exchanged with the external device via RFID technology. The external device may comprise RFID reader 108 of
The RFID tag 1141 also comprises an alerting mechanism 220. The alerting mechanism 220 provides a means for assisting store personnel with locating the object 1121 (to which it is attached) within the RSF 102. In this regard, the alerting mechanism 220 includes a controller 214 and output devices 216 for outputting auditory, visual and/or tactile alerts. The output devices 216 can include, but are not limited to, speakers, Light Emitting Diodes (LEDs), and vibrators. At least one alert is output from output device(s) 216 when the RFID tag receives an RF request signal (or interrogator signal) from an RFID reader that is directed thereto or to a group of RFID tags to which it belongs. The alert directs the store personnel's attention directly to the object to which the RFID tag 1141 is attached. In effect, the store personnel does not need to manually access each RFID tag in the RSF for purposes of finding RFID tag 1141. As such, the amount of time necessary to find a particular object within the RSF is significantly reduced. Also, the store personnel's ability to find the particular object is much easier as compared to that when using conventional inventory tracking systems. Notably, the alert can be terminated under certain conditions. These conditions may either be configured within the device (e.g., time out configured) or occur when the RFID tag 1141 is no longer in the read field of the RFID reader. In some scenarios, the alert continues until expiration of a time period even when the RFID tag 1141 is no longer in the read field of the RFID reader. When the RFID tag 1141 is in the read field of the RFID reader, the alert may only be terminated in response to a termination command or signal.
The Air Interface Protocol (“AIP”) standard defines the method by which RFID readers communicate with compliant RFID tags. The controller 214 is operative to interface with existing RFID tag's electrical circuitry, as well as understand when the RFID tag is communicating with a requesting RFID reader. Based on whether or not the RFID tag 1141 is being requested by the RFID reader 108, the controller 214 may perform operations to cause the output devices 216 to be enabled or activated so as to draw the attention of store personnel thereto. Depending upon the various data points available to controller 214 (e.g., power level, signal strength and/or read frequency), the frequency at which alerts are outputs from the alerting mechanism 220 can be throttled up/down. Also, different combinations of alerts can be output from the alerting mechanism 220 so as to signify the store personnel's physical proximity to the RFID tag 1141. For example, if the RFID tag 1141 is near a far end of a read field, then the signal power of the RF request signal (or interrogator signal) received thereat is relatively low. In this case, the store employee is considered to be relatively far away from the RFID tag 1141. Consequently, an auditory alert and/or a visual alert is(are) selectively output by the alerting mechanism 220, but a tactile alert is not. As received power increases (signifying that the store personnel is approaching the RFID tag), the frequency at which the auditory alert and/or visual alert are output is increased. Also, additional alerts may be output from the alerting mechanism 220, such as a tactile alert.
Notably, memory 204 may be a volatile memory and/or a non-volatile memory. For example, the memory 204 can include, but is not limited to, a Random Access Memory (“RAM”), a Dynamic Random Access Memory (“DRAM”), a Static Random Access Memory (“SRAM”), a Read-Only Memory (“ROM”) and a flash memory. The memory 204 may also comprise unsecure memory and/or secure memory. The phrase “unsecure memory”, as used herein, refers to memory configured to store data in a plain text form. The phrase “secure memory”, as used herein, refers to memory configured to store data in an encrypted form and/or memory having or being disposed in a secure or tamper-proof enclosure.
Referring now to
Notably, the beacon 110 comprises RFID and alerting circuitry similar to the RFID tags 1141 described above. Accordingly, the beacon 110 provides a means to facilitate locating a general area of an RSF within which a particular object resides. The beacon 110 may also be used to decouple the alerting functionality from the RFID tags, so that RFID enabled swing tickets (or hang tags) can be used with a particular deployment (whereby the need to deploy RFID tags with alerting mechanisms on all objects within the RSF is eliminated).
In view of the forgoing, the hardware architecture of
The RFID enabled device 300 comprises an antenna 302 for allowing data to be exchanged with the external device via RFID technology. The antenna 302 is configured to receive RFID signals from the external device and/or transmit RFID signals generated by the RFID enabled device 300. The RFID enabled device 300 comprises an RFID transceiver 304. RFID transceivers are well known in the art, and therefore will not be described herein. However, it should be understood that the RFID transceiver 304 receives RFID carrier signals transmitted from RFID readers (e.g., RFID reader 108 of
Information associated with monitoring such communications can be stored in memory 304 of the RFID enabled device 300 and/or communicated to other external devices (e.g., server 120 and data store 122 of
The beacon 110 also comprises an alerting mechanism 320. The alerting mechanism 320 provides a means for assisting store personnel with locating a general area of a facility within which one or more objects is(are) disposed. In this regard, the alerting mechanism 320 includes a controller 314 and output devices 316 for outputting auditory, visual and/or tactile alerts. The output devices 316 can include, but are not limited to, speakers, LEDs, and vibrators. At least one alert is output from output device(s) 316 when certain criteria are met. The criteria can be provided by server 120 of
For example, let's assume that the beacon 110 detects a particular combination of requests/responses communicated between an RFID reader and at least one RFID tag. Upon such detection, the beacon 110 outputs at least one auditory, visual and/or tactile alert. The alert directs the store personnel's attention directly to the general area of the RSF in which at least one object is located. In effect, the amount of RFID tags which store personnel need to manually access for purposes of finding a particular object is significantly reduced (as compared to when the beacon alerting is not employed). As such, the amount of time necessary to find a particular object within the RSF is significantly reduced. Also, the store personnel's ability to find the particular object is much easier as compared to that when using conventional inventory tracking systems.
Using the AIP standard, the beacon 110 simply listens to RFID traffic that is detected by its antenna 302. Alert outputs are triggered when a series of events occur that indicate that the RFID tag(s) being searched for by store personnel via an RFID reader are nearby. This is typically a combination of read requests and responses to read requests. As with the RFID tags above, a combination and frequency of alerting can be varied based on various data points available to the beacon 110.
Referring now to
If the RF request signal (or interrogator signal) does not apply to the RFID tag or the group of RFID tags [408:NO], then step 410 is performed where method 400 ends or other processing is performed (e.g., return to step 404). In contrast, if the RF request signal (or interrogator signal) does apply to the RFID tag or the group of RFID tags [408:YES], then steps 412-424 are performed. These steps involve performing operations by the RFID tag to issue an auditory, visual and/or tactile alert. The alert can be a continuous alert (e.g., a continuous noise or emitted light) or a periodic alert occurring at regular or irregular intervals. In the periodic alert scenario, the frequency at which the alert is issued is selected based on a power level (or signal strength) of the received RF request signal (or interrogator signal) and/or other criteria. Also, two or more types of alerts may be concurrently or simultaneously issued. The particular combination of alerts is selected based on the received RF request signal (or interrogator signal) and/or other criteria. In this way, the alert frequency and/or types provide a means to signify a person's physical proximity to the RFID tag.
Steps 412-424 also involve: transmitting a data response signal (or authentication reply signal) from the RFID tag to the RFID reader which may specify its alert state; optionally receiving the data response signal (or authentication reply signal) by the RFID reader; optionally providing information specifying the RFID tag's alert state to the user thereof; performing activities by the user to find the RFID tag in response to the alert's issuance and/or the provision of the alert state information by the RFID reader; receiving by the RFID reader a user-software interaction for deactivating alert issuance after the RFID tag has been found; transmitting a deactivation signal from the RFID reader to the RFID tag for deactivating the alerting mechanism (e.g., alerting mechanism 220 of
Referring now to
If the RF request signal (or interrogator signal) does not apply to the RFID tag [508:NO], then step 510 is performed where the method 500 ends or other processing is performed (e.g., return to step 504). In contrast, if the RF request signal (or interrogator signal) does apply to the RFID tag [508:YES], then steps 512-514 are performed. These steps involve: generating by and transmitting from the RFID tag a data response signal (or authentication reply signal); and receiving the data response signal (or authentication reply signal) at the RFID reader and the beacon.
It should be emphasized here that the beacon received the RF request signal (or interrogator signal) in step 506 and the data response signal (or authentication reply signal) in step 506. In this way, the beacon monitors the communications between the RFID reader and the RFID tag. As a result of this monitoring, various operations are performed by the beacon to assist a person in locating the particular object. These operations are performed in steps 516-524. As shown by steps 516-518, the beacon: optionally communicates information associated with the RF request signals (or interrogator signal) and data response to an external device (e.g., server 120 of
If the criteria has not been met [520:NO], then step 522 is performed where method 500 ends or other processing is performed (e.g., return to step 504). In contrast, if the criteria is met [520:YES], then step 524 is performed where the beacon issues an auditory, visual and/or tactile alert. The alert can be a continuous alert (e.g., a continuous noise or emitted light) or a periodic alert occurring at regular or irregular intervals. In the periodic alert scenario, the frequency at which the alert is issued is selected based on a power level (or signal strength) of the received RF request signal (or interrogator signal) and/or other criteria. Also, two or more types of alerts may be concurrently or simultaneously issued. The particular combination of alerts is selected based on the received RF request signal (or interrogator signal) and/or other criteria. In this way, the alert frequency and/or types provide a means to signify a person's physical proximity to the RFID tag.
In response to the alert's issuance, the user performs activities in step 526 to find the RFID tag. After the RFID tag has been found, the user performs a user-software interaction with the RFID reader for deactivating alert issuance, as shown by step 528. In a next step 530, the RFID reader transmits a deactivation signal from the RFID reader to the RFID tag. Upon receipt of the deactivation signal, the RFID tag deactivates the alerting mechanism (e.g., alerting mechanism 320 of
Referring now to
If the RF request signal (or interrogator signal) does not apply to the RFID tag or a group of RFID tags to which the RFID tag belongs [610:NO], then step 612 is performed where method 600 ends or other processing is performed. In contrast, if the RF request signal (or interrogator signal) does apply to the RFID tag or a group of RFID tags to which the RFID tag belongs [610:YES], then steps 614-616 are performed by the RFID tag. These steps involve: performing operations by the RFID tag to issue an auditory, visual and/or tactile alert; and transmitting a data response signal (or authentication reply signal) from the RFID tag to the RFID reader which may specify its alert state. The data response signal (or authentication reply signal) is then received by the RFID reader in step 618. In response to the data response signal (or authentication reply signal), the RFID reader provides information specifying the RFID tag's alert state to the user thereof.
The user then performs activities in step 620 to find the RFID tag. After the RFID tag has been found, the user performs user-software interactions with the RFID reader for deactivating alert issuance, as shown by step 622. In turn, step 624 is performed where the RFID reader transmits a deactivation signal to the RFID tag for deactivating the alerting mechanism (e.g., alerting mechanism 220 of
Notably, in some scenarios, only one of the methods 400 and 500 is employed within an RSF. In other scenarios, both methods 400 and 500 are employed simultaneously or concurrently within an RSF. For example, let's assume a store employee is trying to find a particular object in the RSF. Accordingly, the store employee uses an RFID reader to communicate with the RFID tags in the RSF for purposes of issuing alarms indicting where in the RSF the object is located. When a beacon and/or an applicable RFID tag(s) receive(s) an RF request signal (or interrogator signal) from the RFID reader, it(they) issue(s) alarms. The alarm issued by the beacon directs the store employee to the display equipment in the general area where the object is located. The alarm issued by the RFID tag directs the store employee directly to the object when (s)he is in the general area within which the object resides.
All of the apparatus, methods, and algorithms disclosed and claimed herein can be made and executed without undue experimentation in light of the present disclosure. While the invention has been described in terms of preferred embodiments, it will be apparent to those having ordinary skill in the art that variations may be applied to the apparatus, methods and sequence of steps of the method without departing from the concept, spirit and scope of the invention. More specifically, it will be apparent that certain components may be added to, combined with, or substituted for the components described herein while the same or similar results would be achieved. All such similar substitutes and modifications apparent to those having ordinary skill in the art are deemed to be within the spirit, scope and concept of the invention as defined.
The features and functions disclosed above, as well as alternatives, may be combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations or improvements may be made by those skilled in the art, each of which is also intended to be encompassed by the disclosed embodiments.
Number | Name | Date | Kind |
---|---|---|---|
20020126010 | Trimble | Sep 2002 | A1 |
20050088302 | Pucci | Apr 2005 | A1 |
20070285229 | Batra | Dec 2007 | A1 |
20110080264 | Clare | Apr 2011 | A1 |
20110084840 | Mercier | Apr 2011 | A1 |