The present invention relates to walk-through gates and more particularly to the physical design of walk-through gates.
Walk-through gates are used for scanning objects passing through a defined space. Walk-through gates can be implemented as metal detectors for pedestrians or as checkout tunnels. Walk-through gates can be used for security control and to detect particular objects (for example, metal) carried into a restricted area.
According to an aspect of the present invention, a device is provided for implementing a walk-through gate. The device includes a walk-through gate structure having boundaries that have curved inner surfaces on each side of a cavity. The curved inner surfaces are partially covered by a reflective material. The devices include radio frequency (RF) signal transmitters and RF signal receivers. The devices also include apertures that provide access to the cavity of the walk-through gate structure.
According to another aspect of the present invention, a device is provided for implementing a walk-through gate. The device includes a walk-through gate structure having boundaries formed from arcs of a circle on each side of a cavity. The boundaries are covered by a reflective material. The device includes radio frequency (RF) signal transmitters positioned tangent to the boundaries and RF receivers positioned tangent to the boundaries. The devices include apertures that provide access to the cavity of the walk-through gate structure. The device also includes processing devices that perform signal space separation between a region inside of the walk-through gate structure and a region outside of the walk-through gate structure.
According to another aspect of the present invention, a system is provided for implementing a walk-through gate. The system includes a processor device operatively coupled to a memory device. The processor device receives a transmission at a receiver positioned in a walk-through gate structure having boundaries including curved inner surfaces on each side of a cavity. The curved inner surfaces are covered by a reflective material. The processor device performs signal space separation between a region inside of the walk-through gate structure and a region outside of the walk-through gate structure. The processor device determines whether the signal was transmitted from a radio frequency identifier (RFID) within the boundaries of the walk-through gate structure. The processor device processes a transaction based on the RFID in response to determining that the signal was transmitted from within the boundaries of the walk-through gate structure.
These and other features and advantages will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawings.
The disclosure will provide details in the following description of preferred embodiments with reference to the following figures wherein:
In accordance with embodiments of the present invention, systems and methods are provided to/for implementing a walk-through gate that includes an isolating chamber. Example embodiments of walk-through gates (WTGs) can be fabricated (or constructed) to include an open cavity comprised of boundaries that are in the form of arcs and given openings that can be interpreted as linear aperture.
In one embodiment, the isolating chamber can be implemented to have a strong differentiation property that separates the radio frequency (RF) signals inside the open cavity from the RF signals outside the cavity. Example embodiments can include quadrants having multiple reflection points, in which flipside and crosswise transmission are designed to allow signals to exit the cavity after a predetermined minimum attenuation.
Embodiments described herein may be entirely hardware, entirely software or including both hardware and software elements. In a preferred embodiment, the present invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
Embodiments may include a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. A computer-usable or computer readable medium may include any apparatus that stores, communicates, propagates, or transports the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be magnetic, optical, electronic, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. The medium may include a computer-readable storage medium such as a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk, etc.
Each computer program may be tangibly stored in a machine-readable storage media or device (e.g., program memory or magnetic disk) readable by a general or special purpose programmable computer, for configuring and controlling operation of a computer when the storage media or device is read by the computer to perform the procedures described herein. The inventive system may also be considered to be embodied in a computer-readable storage medium, configured with a computer program, where the storage medium so configured causes a computer to operate in a specific and predefined manner to perform the functions described herein.
A data processing system suitable for storing and/or executing program code may include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code to reduce the number of times code is retrieved from bulk storage during execution. Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) may be coupled to the system either directly or through intervening I/O controllers.
Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
Referring now in detail to the figures in which like numerals represent the same or similar elements and initially to
As shown in
The WTG 100 (which can also be referred to as a tunnel) is designed to provide (or amplify) signal space separation between two regions, namely the inside and outside of the WTG 100. The signal space separation can be implemented based on the shape of the WTG 100 and inside structure of the WTG 100. The surface of the structural curvature 105 can be covered by a reflective material (RF reflector) 132 and, in example embodiments, in part by an absorbing material (RF absorber) 134. The positioning of the reflective material 132 and the absorbing material 134 can be implemented in accordance with having a strong differentiation property that separates the radio frequency (RF) signals inside the open cavity from the RF signals outside the cavity. Example embodiments described herein provide an overview of the design and particular curvature formulations. The curvature 105 described herein are designed to contain as much as power of the transmitted signals 120 from the inside antennas 130 in the inside volume of the WTG 100 while keeping the power of outside antennas (not shown in
In example scenarios described herein, a partially closed space (or cavity, internal space, etc.) is generated (within the WTG 100) that can contain the RF signal 120 within itself. The RF signal 120 enters the cavity from an antenna 130 on the boundary (curvature walls 105) instead of entering such partially closed space or equivalently open cavity (for example, the space between the curvature walls 105) through an opening (or aperture) 140. An RF signal 120 may escape from the open cavity through its opening 140. Similarly, an RF signal 120 may enter the cavity and then reflect off of the internal walls or boundary (curvature walls 105) of the cavity or get absorbed by the internal walls or boundary 105 of the cavity.
The opening of the cavity is referred to as an aperture 140. The open cavity can have one or more aperture 140 (that can include the opening 110, through which RF signal 120 enters the cavity). The example embodiments enable a design in which an RF signal 120 that enters with a particular angle from a point on the aperture to get trapped inside the cavity. The RF signal 120 can be permanently entrapped through a combination of reflection and absorption.
In alternate example embodiments, the WTG 100 and corresponding cavity is designed to reflect the RF signals 120 that enter the cavity in particular directions off of its cavity (and out of the WTG 100).
In example embodiments, open cavities can be designed to differentiate between the internal space of the cavity (that is enclosed by the cavity boundary and its aperture) and the outside of the cavity (of the WTG 100). The differentiation can be implemented by designing the cavity to entrap the signals that are generated by an antenna that is on the cavity boundary and not directly transmitted out of an aperture 140. This means that as long as a source on the cavity boundary (for example, antenna 130) generates an RF signal 120 that is transmitted toward another point on the boundary the RF signal 120 may not escape the open cavity through its aperture (for example, not via opening 140) even after multiple reflections.
In further example embodiments, the design of the WTG 100 can be less constrained if the RF signals 120 are allowed to get out of cavity after a given attenuation.
For example, if the original RF signal 120 is 31 dBm, the WTG 100 can be designed to allow the signals to escape the aperture 140 if the RF signal 120 is less than 10 dBm (which means that the WTG 100 in this instance is designed for a minimum of 21 dB attenuation). The WTG 100 can be implemented with a designed curvature that includes reflective and absorption property that allows
Note that due to reciprocity, as the WTG 100 is designed for the RF signals 120 generated within the cavity to not be able to escape the cavity of the WTG 100, any signal that enters the cavity of the WTG 100 has to escape the cavity through a finite number of reflections inside the cavity and from the reflective part of the cavity or gets absorbed by the cavity, for example by hitting absorbers 134 (deployed, for example, on curvature walls 105). RF signal transmitter can generate a signal that is transmitted toward another point on the curved inner surfaces that can escape the cavity after a minimum number of reflections inside the cavity. Therefore, the example cavities (of the WTG 100) are implemented (for example, manufactured, assembled, fabricated, etc.) with a strong differentiation property that separate the RF signals 120 inside the open cavity from the RF signal (not shown) outside. Hence, the WTG 100 that includes this differentiation property for an open cavity is referred to herein as including an isolating chamber.
The example embodiments described herein provide a particular design of an isolating chamber. The designs described herein provide guidelines that can be used in different setting and using different geometrical shapes that include curved inner surfaces. Specifically, the example embodiments include boundaries 105 that are comprised of multiple arcs of a circle in a two-dimensional cross section. Other example embodiments can include partial ellipses, etc. A point on the boundary 105 may be a reflector 132 (for example, a metal sheet, etc.) or a RF absorber 134.
The curved inner surfaces can include a convex surface comprised of RF reflective material. In example embodiments, at least part of the outer portions (for example, the premier) of the convex surface comprised of RF reflective material can be lined with RF absorbing material. In example embodiments, a mid-section of the curved inner surfaces can include RF reflective material and a remaining section of the curved inner surfaces include RF absorbing material.
When a beam (for example, RF signal 120 or another beam that enters the cavity from outside of the WTG 100) is transmitted from an antenna (for example, antenna 130 or an antenna outside of the WTG 100), the beam may bounce back from a reflecting object. The reflected beam in turn can be reflected from another object, and so on. The reflection order of the transmitted wave before bouncing back from any reflector is zero.
The number of reflections is a property of the wave that can be used to deduce the possible average length that the wave has travelled from the source, or to estimate the average signal strength of the wave since after each reflection, part of the wave energy is absorbed by the reflecting object (for example reflector 132). This is applicable both to the signals that are generated inside the cavity or those that come inside the cavity through an aperture and then are reflected back (for example, out of the cavity) by hitting a reflective part of the curvature.
In some other example scenarios, where the wave is reflected from the boundaries of a closed or partially closed space, such as an open cavity (as described herein above), the WTG control module 136 can use the number of reflections to deduce the wave coverage within the cavity (for example, during a manufacturing phase).
For example, the WTG 100 can be designed as an isolating chamber for a wave that is transmitted by an antenna 130 on the interior boundary of the chamber to either have no wave with reflection order greater than zero inside or have (for example, all) partial waves (for example, with any reflection order) inside the cavity. This means that any wave that is generated inside the cavity will remain inside the cavity or absorbed by the cavity. RFID tags 150 that transmit within the WTG 100 can thereby be separated from transmissions that occur outside the WTG 100 (for example, from other RFID tags 150).
As employed herein, the term “hardware processor subsystem” or “hardware processor” can refer to a processor, memory, software or combinations thereof that cooperate to perform one or more specific tasks. In useful embodiments, the hardware processor subsystem can include one or more data processing elements (e.g., logic circuits, processing circuits, instruction execution devices, etc.). The one or more data processing elements can be included in a central processing unit, a graphics processing unit, and/or a separate processor- or computing element-based controller (e.g., logic gates, etc.). The hardware processor subsystem can include one or more on-board memories (e.g., caches, dedicated memory arrays, read only memory, etc.). In some embodiments, the hardware processor subsystem can include one or more memories that can be on or off board or that can be dedicated for use by the hardware processor subsystem (e.g., ROM, RAM, basic input/output system (BIOS), etc.).
In some embodiments, the hardware processor subsystem can include and execute one or more software elements. The one or more software elements can include an operating system and/or one or more applications and/or specific code to achieve a specified result.
In other embodiments, the hardware processor subsystem can include dedicated, specialized circuitry that performs one or more electronic processing functions to achieve a specified result. Such circuitry can include one or more application-specific integrated circuits (ASICs), field-programmable gate arrays (FPGAs), and/or programmable logic arrays (PLAs).
These and other variations of a hardware processor subsystem are also contemplated in accordance with embodiments of the present invention.
As shown in
In example embodiments, isolating chamber 200 includes two arcs 205 (shown as 205-1 (with left and right halves 205-1-A and 205-1-B, as further described herein below) and 205-2 (with left and right halves 205-2-A and 205-2-B)) of a circle (or circles) with radius R that are placed in a mirror image symmetrical to a divider line as in
Consider a point of transmission B (220) (for example, from an RF antenna 130, not shown in
Consider each arc 205 to be divided into left and right arc based on the center point 210, i.e., either A or B. For example, arc 205-1 has left and right halves 205-1-A and 205-1-B. Therefore, isolation chamber 200 has arcs 205 in four quadrants, left-top arc 205-1-A, left-down arc 205-2-A, right down arc 205-2-B, and right-top arc 205-1-B. For clarity of discussion, the left-top arc 205-1-A and right-down arc 205-2-B are defined as crosswise of each other while the pair of left-top arc 205-1-A and left-down arc 205-2-A are defined as flipside of each other. Similarly, the pair of right-down arc 205-2-B and right-up arc 205-1-B to be flipside of each other. The two arcs in the top (205-1-A and 205-1-B) or in the down arc (205-2-A and 205-2-B) are defined as adjacent.
In example embodiments, beams transmitted from an origin point in one arc (205) into the crosswise quadrant will reflect back from the corresponding arc in that crosswise quadrant if the incident wave hits the arc 205 where it is covered with reflecting material (for example, a reflector 132). The reflected wave is then transmitted in the direction of its flipside quadrant which reflects when hitting the reflector 132 part of the arc 205 in that quadrant. This is illustrated in
Due to reciprocity, the beam that originates on the boundary in one quadrant and emitted toward the flipside quadrant will be reflected off of the reflecting part of the arc 205 in this flip-side quadrant and the reflected beam 120 heads toward its crosswise quadrant which means that the beam 120 after the first reflection will be received at the adjacent quadrant to the original quadrant. This is illustrated in
In the example embodiments described in the following, the WTG control module 136 finds the point and angle of the incident wave after the first reflections by treating two cases mentioned above (Case I and Case II). WTG control module 136 may find the corresponding incident points and angle of incident after any number of reflections because a beam alternatively hits the crosswise quadrant and flip-side quadrant, which will be treated in Case I and Case II, respectively.
Regarding Case I, the transmission scenario can be defined based on the parameters (ϕ, α) where α is the angle of the arc AE 255 which uniquely defines the point E 230 in one quadrant with respect to the middle point. The transmission angle is denoted by α which is measured with respect to the radius CE 235 and the transmission angle is defined as always one side of the line CE 235 that results in a ray or beam toward the crosswise quadrant which means there is no ambiguity in the definition of the transmission beam EB (along BE 225) in Case I.
The transmitted signal from E 230 is received at point B 220 with an incident angle η with respect to the normal line at that point that is the radius AB 260. Note that the normal line (or orthogonal line) is the line that is perpendicular to the tangent line to the boundary 205 at that point (point B 220). In the following, the system identifies the pair (θ,η) that uniquely determines the incident location and angle, where θ is the angle between AB 260 and AC 265 which corresponds to the angle of the arc CB 270 (from point C 210 to point B 220).
consider the line EA 255 and denote the angle BEA between BE 225 and EA 255 by β. β is determined as follows.
β=π/2−α−ϕ/2 Eqn. (1).
since CA (265)=CE (235) and hence 2α+2β+ϕ=π.
On the other hand, the length of EA (255), denoted by a is determined by:
a=2R sin (ϕ/2) Eqn. (2).
where R is the radius that is equal to the length of AB (260), AC (265), AD (275), and CE (235).
Hence, the length of the altitude AG 280 in triangle AEB, denoted by b, is given by:
b=a sinβ. Eqn. (3).
The incident angle η is then given by
η=arc sin (b/R) Eqn. (4).
since in the triangle AGB we have sin η=b/R. Using the series of equations above, and replacing the values, WTG control module 136 determines:
η=arc sin (2 sin (ϕ/2) cos (α+ϕ2)) Eqn. (5).
To find the angle θ, note that the angle EAC is equal to the angle AEC because the triangle ECA is isosceles with EC=AC. Hence, the angle EAC is equal to α+β. In triangle AEB, β+(β+α+θ)+η=π, and WTG control module 136 determines:
θ=π−η−α−2β=ϕ+α−η. Eqn. (6).
The above derivation for Case I indicates that if a transmission happens from an angular location ϕ with the departure angle α with respect to the normal line at the transmission point toward the crosswise quadrant, the transmission will be received at angular location θ=ϕ+α−η where arc sin (2 sin (ϕ/2) cos (α+ϕ/2)) is the angle of the incident wave with respect to the normal line at the received point. Hence, WTG control module 136 determines:
where the notation x at the top of the arrow means transmission toward the crosswise quadrant.
Regarding Case II, similar to Case I, the transmission scenario is defined based on the parameters (ϕ,α) where α is the angle of the arc AE 285 which uniquely defines the point E 230 in one quadrant with respect to the middle point. The transmission angle is denoted by α which is measured with respect to the radius CE (235) and it always has to be in one side of the line CE (235) that results in a ray or beam toward the flipside quadrant which means there is no ambiguity in the definition of the transmission beam EB (225) in Case II. Note that the wave departing the transmission point E (230) for example with departure angle α in one side of the normal line EC (235) will head toward the crosswise quadrant, for example, as indicated by line EB (225), while the transmission from the same angle in the other side of the normal line EC (235) is directed toward the flipside quadrant, e.g., as indicated by ED (245).
The transmitted signal from E (230) is received at point D (240) with an incident angle μ with respect to the normal line at that point that is the radius AD (275). In the following example embodiments, WTG control module 136 can find the pair (γ,μ) that uniquely determines the incident location and angle, where γ is the angle between AD (line 275) and AC (line 265) which corresponds to the angle of the arc CD (290).
From derivation for Case I, WTG control module 136 determines:
β=π/2−α−ϕ/2 Eqn. (8).
and
a=2R sin (ϕ/2) Eqn. (9).
The length of the altitude AH (295) in triangle AEH, denoted by c, is given by
c=a sin (π−β−2α) Eqn. (10).
The incident angle μ is then given by
μ=arc sin (c/R) Eqn. (11).
since in the triangle AHD, sin μ=c/R. Using the series of equations above, and replacing the values, WTG control module 136 determines:
μ=arc sin (2 sin (ϕ/2) cos (α−ϕ/2)) Eqn. (12).
The cross section of the line AD 275 and EC 235 can be defined as point F. Comparing the sum of the angles in two triangle AFC and EFD, WTG control module 136 determines α+μ=γ+ϕ. Therefore, the angle γ is found as
γ=α−ϕ+μ Eqn. (13).
The above derivation for case II indicates that if a transmission happens from an angular location ϕ with the departure angle α with respect to the normal line at the transmission point toward the flip-side quadrant, it will be received at angular location γ=α−ϕ+μ, where μ=arc sin (2 sin (ϕ/2) cos (α−ϕ/2)) is the angle of the incident wave with respect to the normal line at the received point. Hence, WTG control module 136 determines:
where the letter F at the top of the arrow means transmission toward the flipside quadrant.
Multiple reflection points can be derived as follows. Note that the crosswise transmission will be always followed by the flipside transmission and vice versa. Hence, by using alternative combination of the equations (7) and (14), WTG control module 136 determines the angular location and the angle of incident wave after an arbitrary reflection if the lower and upper arcs are of the angular length 2π/3.
However, for shorter arc length, WTG control module 136 can determine how many reflections after which the wave may escape the cavity from its opening. In the following, properties of the reflection when the transmission is toward the crosswise or flip-side quadrant are described. These properties can then be used in the design of an isolating chamber 200.
Consider the point E 230 that is located at angular location ϕ with respect to center of the arc on the top (205-1) that is denoted by C 210. For any departure angle α and an angular location ϕ (alternatively denoted as φ at point C 210, as shown in
For any incident angle α and a given angular location ϕ for the originating transmission point, the angular location of the second reflection point is (for example, absolutely) less than the angular location of the originating point if the first transmission is toward a crosswise quadrant.
For incident angle α bounded as 0≤α≤αB and a given angular location ϕ for the originating transmission point, the angular location of the second reflection point is bounded by some value ϕC, where π/3≥ϕC≥ϕB. This proposition can be proved because the angular location of the second reflection point is either monotone increasing or monotone decreasing function of the incident angle. Although this function (the angular location of the second reflection point based on the incident angle α and an originating angular location ϕ) depends on the value of the originating angular location, WTG control module 136 can take the supremum of all possible angles over the set of originating angular locations to find the value of ϕC. Please note that the subscripts B and C in, for example, ϕC, denote that ϕB or ϕC are two values related to some angular positions that the subscripts are not related to points B and C in the
Referring now to
Exemplary computer system (e.g., a server or a network device) for implementing a walk-through gate with signal separation is shown in accordance with an embodiment of the present invention. The computer system 300 includes at least one processing device (CPU) 305 operatively coupled to other components via a system bus 302. A cache 306, a Read Only Memory (ROM) 308, a Random-Access Memory (RAM) 210, an input/output (I/O) adapter 320, a network adapter 390, a user interface adapter 350, a signal separation device 370, and a display adapter 360, can be operatively coupled to the system bus 302.
A first storage device 322 and a second storage device 329 can be operatively coupled to system bus 302 by the I/O adapter 320. The storage devices 322 and 329 can be any of a disk storage device (e.g., a magnetic or optical disk storage device), a solid-state magnetic device, and so forth. The storage devices 322 and 329 can be the same type of storage device or different types of storage devices. Either or both of the storage devices 322 and 329 can be configured to operate as a data store or database to store various logs of RF signal data 372 (e.g., initial signal strength and signal measurements from various portions of the WTG). The signal separation device 370 can include software and/or hardware as described herein below.
A transceiver 395 can be operatively coupled to system bus 302 by network adapter 390. A display device 362 is operatively coupled to system bus 302 by display adapter 360. Radio frequency identifier (RFID) (reader) data 372 can be operatively coupled to system bus 302 directly or indirectly, for example via signal separation device 370. The signal separation device 370 can be configured to receive RF signal data 372.
A first user input device 352 and a second user input device 359 can be operatively coupled to system bus 302 by user interface adapter 350. The user input devices 352 and 359 can be any of a sensor, a keyboard, a mouse, a keypad, a joystick, an image capture device, a motion sensing device, a power measurement device, a microphone, a device incorporating the functionality of at least two of the preceding devices, and so forth. Of course, other types of input devices can also be used in accordance with the present invention. The user input devices 352 and 359 can be the same type of user input device or different types of user input devices. The user input devices 352 and 359 can be used to input and output information to and from system 300.
Other embodiments of the present invention can optionally include further processing units including a graphics processing unit (“GPU”), a mother board, or alternatively/additionally another storage medium, an operating system, one or more application software, as well as including one or more communication interfaces (e.g., RS232, Ethernet, Wi-Fi, Bluetooth, USB). Useful examples of computing devices optionally included in or integrable with embodiments of the present invention include, but are not limited to, personal computers, smart phones, laptops, mobile computing devices, tablet PCs, and servers. In accordance with embodiments of the present invention, an event record log source can be a computer storage medium.
Of course, the computer system 300 can also include other elements (not shown), as readily contemplated by one of skill in the art, as well as omit certain elements. For example, various other input devices and/or output devices can be included in computer system 300, depending upon the particular implementation of the same, as readily understood by one of ordinary skill in the art. For example, various types of wireless and/or wired input and/or output devices can be used. Moreover, additional processors, controllers, memories, and so forth, in various configurations can also be utilized as readily appreciated by one of ordinary skill in the art. These and other variations of the computer system 300 are readily contemplated by one of ordinary skill in the art given the teachings of the present invention provided herein.
It should be understood that multiple computing devices can be operably linked to form a computer network in a manner as to distribute and share one or more resources, such as clustered computing devices and server banks/farms. In embodiments of the present invention each of the aforementioned elements (e.g., device, medium, source, or module) can be directly or indirectly communicably connected (e.g., via a wireless a wired electronic connection) to at least one other element of the system. As described in more detail below, some embodiments of the present invention can be wholly contained within a single computing device. Other embodiments, however, can encompass a plurality of interconnected or networked devices and resources.
As shown in
RF signal data module 372 receives RF signal data, for example, from WTGs 100 and/or alternatively from stored training data sets. The RF signal data can include signals transmitted from RFID tags 150 located within the WTG 100 and signals transmitted from outside of the WTG 100.
According to example embodiments, the WTG system can include (i) a physical structure that includes the curvature designed in described herein as the WTG walls or inside the WTG wall, (ii) a reader module including a set of antennas that are located inside WTG as well as outside WTG, and (iii) (in some implementations) a signaling module including lamps, digital screens, microphones, cameras, and loudspeakers to perform human interactions.
When single or multiple RFID tags 150 go through the WTG 100, the reader interrogates the RFID tags 150 and reply signals (RFID reader data 372) from the RFID tags 150 will be received by the antennas. The designed curvature as described herein facilitates receipt of the reply from the RFID tags 150 that are physically located inside WTG primarily by inside antennas and not by outside antennas. Similarly, the reply from RFID tags 150 that are located outside WTG 100 will be received by the antennas that are outside WTG 100.
Signal space separation module 410 can implement signal space separation between a region inside of the walk-through gate structure and a region outside of the walk-through gate structure. According to an example embodiment, based on the readings of an RFID tag 150 within a given time window (called a session), signal space separation module 410 can decide if the RFID tag 150 is inside or outside the WTG 100. To make such decisions, signal space separation module 410 can consider all the readings including the number of readings, the received antenna port number, as well as the signal strength.
Signal differentiation module 420 determines whether the signal was transmitted from a radio frequency identifier (RFID) within the boundaries of the walk-through gate structure.
Transaction module 430 processes transactions based on RFID tags 150 in response to determining that signals from the RFID tags 150 were transmitted from within the boundaries of the walk-through gate structure.
At block 510, signal separation device 370 receives a transmission at a receiver positioned in a walk-through gate structure having boundaries with curved inner surfaces on each side of a cavity. The cavity includes a walk-through area through which RFID tags can be carried. The curved inner surfaces are covered by a reflective material.
At block 520, signal separation device 370 performs signal space separation between a region inside of the walk-through gate structure and a region outside of the walk-through gate structure.
At block 530, signal separation device 370 determines whether the signal was transmitted from a radio frequency identifier (RFID) within the boundaries of the walk-through gate structure.
At block 540, signal separation device 370 processes a transaction based on the RFID in response to determining that the signal was transmitted from within the boundaries of the walk-through gate structure.
The foregoing is to be understood as being in every respect illustrative and exemplary, but not restrictive, and the scope of the invention disclosed herein is not to be determined from the Detailed Description, but rather from the claims as interpreted according to the full breadth permitted by the patent laws. It is to be understood that the embodiments shown and described herein are only illustrative of the present invention and that those skilled in the art may implement various modifications without departing from the scope and spirit of the invention. Those skilled in the art could implement various other feature combinations without departing from the scope and spirit of the invention. Having thus described aspects of the invention, with the details and particularity required by the patent laws, what is claimed and desired protected by Letters Patent is set forth in the appended claims.
This application claims priority to U.S. Provisional Patent Application No. 62/791,143, filed on Jan. 11, 2019, incorporated herein by reference herein its entirety.
Number | Date | Country | |
---|---|---|---|
62791143 | Jan 2019 | US |