US20080094177A1 - Visible Assets Dot-Tag Visibility Network Architecture - Google Patents

Visible Assets Dot-Tag Visibility Network Architecture Download PDF

Info

Publication number
US20080094177A1
US20080094177A1 US11/764,360 US76436007A US2008094177A1 US 20080094177 A1 US20080094177 A1 US 20080094177A1 US 76436007 A US76436007 A US 76436007A US 2008094177 A1 US2008094177 A1 US 2008094177A1
Authority
US
United States
Prior art keywords
tag
router
address
tags
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/764,360
Inventor
John Stevens
Dived Cramer
Tom Packert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Visible Assets Inc
Original Assignee
Visible Assets Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visible Assets Inc filed Critical Visible Assets Inc
Priority to PCT/IB2007/052331 priority Critical patent/WO2007144859A2/en
Priority to US11/764,360 priority patent/US20080094177A1/en
Assigned to VISIBLE ASSETS, INC reassignment VISIBLE ASSETS, INC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PACKERT, TOM, STEVENS, JOHN K., CRAMER, DAVID
Publication of US20080094177A1 publication Critical patent/US20080094177A1/en
Priority to US12/705,115 priority patent/US8115628B2/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders

Definitions

  • Prior-art systems always had bandwidth as an issue. Prior-art systems also had high cost, low client count, short battery life and can only function in mild environment (away from steel and water). Many cost-sensitive, power “limited” applications exist (e.g., most industrial visibility networks) that may not require bandwidth, yet do require real-time, peer-to-peer networking with extended battery life.
  • the Visibility Network is designed to provide real-time web enabled asset visibility.
  • the RuBee IV protocol was designed to work reliably in a local visibility network and provide real-time visibility for assets, people, and livestock, pedigree and provide chain of possession events.
  • RuBee works over a controlled-range, wide area (1′ ⁇ 1′ to 100′ ⁇ 100′) in harsh environments (that is, near metals, liquids and through earth), with an extended battery life (10-15 years), and a high safety standard.
  • the network's design goal was to create a low cost two-way radio tag that is safe for use in hospital patient-based settings, hospital operating rooms, airports and other public facilities.
  • RuBee could not accept any Electromagnetic Interference (EMI) risk to hearing aid wearers, pacemaker, or IDC patients and has no known or Electromagnetic Compatibility (EMC) issues worldwide.
  • EMI Electromagnetic Interference
  • EMC Electromagnetic Compatibility
  • RuBee provides range and the reliability needed to produce a real-time visibility network. Every radio tag attached to an asset appears to be a mini-web asset server within the Visibility Network.
  • the Long Wavelength ID (LWID) tag has an antenna operable at a low radio frequency not exceeding 1 megahertz
  • the tag also has a radiating transceiver operatively connected to said antenna, the transceiver operates to transmit and receive data at low radio frequency.
  • the tag also has a programmed data processor to process data received from the transceiver.
  • the data processor usually is a low cost 4-bit processor capable of encrypting and decrypting and complex functions associated with managing IP addresses.
  • the tag associated with a first IP address.
  • the tag has a volatile memory that stores said IP address.
  • the transceiver emits an identification signal based upon said IP address stored in the volatile memory.
  • the tag also has an energy source used for activating the transceiver and the data processor. Any RuBee IV tag if enabled properly may be searched and discovered on Google or the VAI “Dot-Tag” network.
  • the local network of tags talks to a RuBee Router (Sidewinder).
  • the Sidewinder manages the local tag net in real time in much the same way any WiFi router manages a TCP/IP network.
  • the Sidewinder communicates by a VPN to a data server which manages a PostgresSQL database of virtual tags (the Dot-Tag Visibility Data Server).
  • the RuBee radio tags are inductive tags and typically need a minimum signal of 0.1 milligauss to a maximum of about 300 milligauss for reliable communication.
  • the strongest field near or on top of a base station antenna can be about 1200 milligauss, however most standard antennas are in the 100-300 milligauss range. To help provide some context for these values, the earth's magnetic field is 300-600 milligauss.
  • the systems are installed in several major retailers as in-store inventory visible systems, in hospitals to provide medical device visibility, other healthcare applications providing real time inventory visibility on high valued products throughout distribution, in agricultural applications providing visibility and age verification for cattle, and in other industries providing identity systems and visibility systems for patients, physicians, policemen, firemen, correctional officers and corporate employees.
  • FIG. 1 shows a block diagram of a Visibility Network.
  • FIG. 2 shows a block diagram of a Dot-Tag Visibility Network and a User Application Visibility Network.
  • FIG. 3 shows a block diagram for the Dot-Tag Visibility Network.
  • FIG. 4 shows a block diagram of a Long Wavelength Tag.
  • FIG. 5 shows a block diagram of a diagnostic tools used in the Dot-Tag Visibility Network.
  • FIG. 6 shows a block diagram of a Part11 Data Flow.
  • FIG. 7 shows another block diagram of the Part11 Data Flow.
  • FIG. 8 shows a block diagram of a Visibility Data Flow.
  • FIG. 9 shows another block diagram of the Visibility Data Flow.
  • FIGS. 10-13 show example of a real life application of the Visibility Network.
  • FIG. 1 shows one exemplary Visibility Network 100 in accordance with one embodiment.
  • the Visibility Network 100 includes six layers.
  • the first layer 101 is a RuBee IV Network Layer.
  • the second layer 102 is a RuBee wireless network connection.
  • the third layer 103 is an embedded VPN connection between the second layer 104 and a forth layer 104 .
  • the forth layer 104 is a data plus control that creates and preserves a data in a virtual tag data base.
  • the fifth layer 105 is a visibility ERP and the sixth layer 106 is a Visibility Export layer.
  • FIG. 2 shows a block diagram 200 of the Visibility Network 100 that includes a Dot-Tag Visibility Network 201 and a User Visibility Network 202 .
  • FIG. 3 is a block diagram 300 that shows The Dot-Tag Visibility Network 201 .
  • the Dot-tag Visibility Network 201 starts with many local RuBee Networks' 301 .
  • each sidewinder 302 communicates to the RuBee Tags 301 a through 301 n contained within its local net regularly. This time set by the user (each 10 minutes typical).
  • the sidewinder 302 keeps a table of IP addresses and subnet addresses of all active and legible tags plus all tag data within its RuBee network. 301 . If a tag 301 a has problems or is missing or has a bad CRC check it gets flagged in a trouble table. If any new tag appears within a Network it is placed in the new tag table.
  • Each sidewinder 302 is connected to a Visibility Data Server 304 by a VPN link 303 and preserves a Virtual Tag Database (VTDB) 305 .
  • VTDB Virtual Tag Database
  • the VTDB 305 is shared by many Sidewinders 302 within a Visibility Network 100 but effectively produces a PostgresSQL database that represents the tag, its data and reads over last human legible, comma separated, date time-stamped record of every tag transaction. It provides a total RuBee network history of critical evens including signal, errors, rereads, CRC checks and can be used for audits or for network statistics. Sidewinders 302 spool approximately 24 hours of tag data in a local database, providing protection and backup if any Network outages occur over the VPN 303 .
  • FIG. 4 illustrates a block diagram 400 of the RuBee tag 301 a .
  • the RuBee tag 301 a includes a transceiver 406 .
  • New long-wavelength (LW under 450 Khz) power efficient designs have made it possible to create active transceivers with IP addresses and peer-to-peer, on-demand, communications, with an acceptable range to work as a local network.
  • the RuBee tag 301 a also includes a power unit 408 .
  • the power unit 408 could be a quarter-sized CR2525 Li battery with a 10-year or longer battery life. The communication is taken place through an antenna 408 .
  • RuBee IV Current RuBee Networks 301 use a protocol known as RuBee IV, and consume only a few microamps in standby and less than 1 milliamp in active mode.
  • RuBee tag 301 a may be fully programmable using low cost 4-bit processors 403 capable of encryption and decryption and complex functions associated with managing IP addresses (DCHP, ARP).
  • RuBee tag 301 a is remotely driven form the standby mode to active mode the sidewinder 302 .
  • RuBee Networks 301 offer the advantage of low cost tags and low cost base stations ( ⁇ $100). Moreover, because RuBee tag 301 a have the power source 408 , they may optionally be equipped with sensors 401 , sRAM 404 , displays 409 , LEDs 402 and may also be low in cost ( ⁇ $2 per tag). Some Rubee protocol designs also eliminate the battery and cost about 15 cents with a reduced range. Networks of thousands of peer-to-peer RuBee tags work reliably as a visibility network. RuBee tags are not affected by liquids, can be used underwater or as an implantable device, and are minimally affected by steel.
  • the base station apparatus employed may be that disclosed in U.S. application Ser. No. 11/462,981 filed Aug. 7, 2006, incorporated herein by reference.
  • the tags employed can be those described in US 2007/0115132, published May 24, 2007, incorporated herein by reference for all purposes.
  • the RF technology can be that described in US 2007/0063895, published Mar. 22, 2007, incorporated herein by reference for all purposes.
  • the tag technology can be that described in U.S. Pat. No. 7,049,963, issued May 23, 2006, incorporated herein by reference for all purposes.
  • the transceiver communicating with the tags can be that described in US 2007/0120649, published May 31, 2007, incorporated herein by reference for all purposes.
  • RuBee industrial visibility networks may be used to provide visibility on or near steel shelves and in harsh environments such as operating theaters (rooms), oil and chemical plants, warehouses and retail stores. Long wavelength, low bandwidth visibility systems and sensor networks are currently in use at industrial installations.
  • FIG. 5 shows a block diagram 500 of a diagnostic tools used in the Dot-Tag Visibility Network 201 .
  • the Dot-Tag Visibility Network 201 includes a suite of diagnostic tools 501 that run on a laptop.
  • the diagnostic tools talk direct to the Sidewinder 302 and bypass the Linux kernel.
  • the tools 501 drive the RuBee base station direct and make it possible to read and program an individual tag through the RuBee network 301 .
  • These tools 501 will work from anywhere in the world providing you have the correct IP address, passwords and VPN authority. They can collect tag statistics, read memory, change addresses, or almost any other maintenance diagnostic function as shown in Tables 502 and 503 .
  • the tools 501 produce a data log consistent with Part11 logs and represent the supreme check on network and tag integrity.
  • FIG. 6 shows a block diagram 600 of a Part11 Data Flow.
  • the Sidewinder 302 communicates by a VPN 303 to a data server 304 which manages a PostgresSQL database of virtual tags 305 . These data links all Linux-Linux and use standard SQL protocols.
  • the Visibility Data Server 304 creates and preserves off-site physical backups, as well as Part11 human legible records (Archive) 602 of every tag transaction.
  • the Part11 records (Archive) 602 include tag signal strength, tag field boundaries, CRC confidence checks, statistics on each tag read, failed reads, packet relays, noise levels, and tag data.
  • Part11 data 602 may be encrypted using Tools Data Desk 601 and emailed to a subscriber every hour day or week, and will identify and diagnose tag, antenna or network problems before they happen. Statistics of reads and read errors for individual tags or millions of tags may be routinely viewed in a few seconds shown in Tables 604 , 605 and 606 . This data is written with an independently verified date time stamp to a WORM optical disk drive 603 to create an audit trail that meets 21CFRPart11 for all tag transactions. The Part11 audit trails also meet SEC Rule 17a-4, HIPAA, Sarbanes-Oxleyn (SOX), and DoD 5015.2 standards.
  • FIG. 7 shows another block diagram 700 of the Part11 Data Flow.
  • the Sidewinder 302 communicates by a VPN 303 to a data server 304 which manages a PostgresSQL database of virtual tags 305 . These data links all Linux-Linux and use standard SQL protocols.
  • the Visibility Data Server 304 creates and preserves the SOX Archive 701 .
  • the SOX Archive 701 is a human readable comma separated, date time stamped certified record of every box or item transaction. It provides a human legible total product network history of critical events including time on shelf, when removed, physical inventory, date sold, reorder points, and billing information.
  • SOX data 701 may be encrypted using Tools Data Desk 601 and emailed to a subscriber day, week, or month and will identify and diagnose product inventory delivery problems before they happen. Statistics of product movement for individual items or millions of items may be routinely viewed in a few seconds. This data is written with an independently verified date time stamp to a WORM optical disk drive 603 to create an audit trail that meets SEC rules for all product transactions.
  • FIG. 8 and FIG. 9 shows a block diagram 800 and 900 of a Visibility Data Flow.
  • User Web enabled Visibility Systems/reports and ERP's 806 are created by simple plugs to the Visibility Data server 304 .
  • the Vis-Data Server 304 contains the full Virtual Tag Database 305 updated by all Sidewinders 302 .
  • the Tag Database 304 is actively maintained but the sidewinders 302 .
  • Standard interfaces are available for PostgresSQL to JAVA, Ruby on Rails, Pentahoe and many other enterprise driven ERP systems 806 . It is possible to create sophisticated and interactive systems, real-time visibility reports and systems using the Vis-Data Server and plug in in a matter of days.
  • the Air Traffic Control (ATC) ATC plug 805 is used to control functions within a RuBee network 301 . For example to turn on a LED 402 on a tag the tag is accessed using a simple instruction with flash time etc through the ATC plug 805 . The read times for tags, router start stop times, and antenna tune checks etc. are all controlled through the ATC plug 805 .
  • the SQL plug 804 is used to support a data requests. Real-time visibility reports are shown in Table 808 .
  • the user ERP's 806 are also responsible for exports to a customer system 809 .
  • a customer system 809 For example business rules linked to a billing event and all information tied to that are exported in Layer 6.
  • the layer 6 includes a User Event Export Tools 807 that covert a real-time visibility reports into report that fits a specific event like billing. Examples of User Event Export Tools 807 are Excel, CSV, HL7 and XML-RDF.
  • FIGS. 10-13 show example of a real life application of the Visibility Network 100 .
  • FIG. 10 is a Smart Shelf RuBee Local Net 1000 . Typical smart shelf application for medical devices. The devices are steel and are packaged in conductive Aluminum as shown in Pictures 1001 - 1003 . Box's are stacked 6-8 high and two to three rows deep.
  • FIG. 11 is an example 1100 how the Dot-Tag Network 201 works in real life.
  • the graph 1100 shows signal strength vs time for 24 hours. A full inventory is carried out each ten minutes for 203 Box's on the shelf. That means each box is checked about 130 times each day. The green dots represent reads, the red represent no-reads on an attempt. Important to not no miss-reads occur at a high signal. This usually means small burst of noise or that box has been removed.
  • RuBee Network 301 activated smart shelves 1001 has been placed as a network in Hospitals. Orthopedic implants have tags placed on outside of box. Note these devices are steel and are packaged with heavy aluminum sealed packages and stacked on steel shelves.
  • the Part11 data 602 and tools shows 24 hours of reads (26,391 per day) and shows that 99.765% or 26,329 reads are 100% on first attempt. 0.129 were successful on second attempt and so on for 100% reads up to five attempts. Local noise, and individual moving or searching for a box etc. May lead to re-reads as shown in the Table 1102 .
  • FIG. 12 and FIG. 13 how the Dot-Tag Network 201 works when an Orthopedic implants are removed from the smart shelves 1001 and placed in the cart that has two levels.
  • Level one 1201 is the inventory pending and level two 1202 inventory used.
  • the Part11 Log 602 provides an archive for all tag and network based transactions.
  • the Sox Log 701 provides an archive for all product based transactions.
  • Tables 1301 and 1302 are examples of a real time access to the inventory of the shelf 1001 . It also provided point of use data, usage statistics, and needs predictions.
  • the server can be a user web-based ERP, the server providing real-time visibility reports.
  • the user web-based ERP may be selected from the set consisting of Eclipse, Pentaho, Ruby on Rails, Google tools, Java, .Net and Weblogic.
  • At least one of the long-wavelength tags can include a sensor or a Light Emitting Diode (LED).
  • LED Light Emitting Diode
  • the server can create and preserve a Part11 human-legible record of tag transactions.
  • the Part11 human legible records can include tag signal strength, tag field boundaries, CRC confidence checks, statistics on said tag, failed reads, packet relays, noise levels, and the tag data.
  • the server can create and preserve a Sarbanes-Oxley (SOX) archive, said SOX archive providing a human-legible total asset network history of critical events including time off shelf, when removed, physical inventory, date sold, reorder thresholds, and billing information.
  • SOX Sarbanes-Oxley
  • the system can further comprise a tool for data export from the server, said tool selected from the set consisting of Excel, CSV, HL7 and XML-RDF.
  • the IP address of a tag may be stored within the tag, for example in a nonvolatile memory. In such a case, the router learns the IP address by interrogating the tag.
  • the tag may simply have a unique hardware address, and the assignment of an IP address to the tag can take place in the router (the sidewinder). In such a case, router maintains within the router a correspondence between the assigned IP address and the hardware address of the tag.
  • the router may power the tag by bathing the tag in an RF energy field.

Abstract

The system employs full transceivers, each having peer-to-peer, client/server, and IP networking capabilities, and covering open-area ranges of up to 100 feet. The system uses Low Frequency for data communications so it can achieve both low cost (less costly than many RF-ID tags) and long battery life (10-15 years). Additionally, since these tags have batteries, static RAM maybe be added at very low cost, as well as sensors, LED's displays etc. The system also employs a sidewinder that communicates to said tag regularly, said sidewinder keeps the IP address of said tag. The system also employs an embedded VPN. The VPN includes a suite of diagnostic tools that run on a laptop. The diagnostic tools talk direct to the sidewinder, the tools read and program said tag providing the tools have correct IP address of the tag. The system also includes a visibility data server that communicates to the sidewinder by the VPN. The data server includes a virtual tag data base, said virtual tag data base updated by the sidewinder. The web enabled reports and control are managed by two “plugs”. The SQL plug supports data requests, and the Air Traffic Control (ATC) plug provides control (LED's, read rates). The system also employs a user web based ERP to create a real-time visibility reports and a user event export tools to create reports that fit a specific event.

Description

  • This application claims priority from U.S. application No. 60/805,020 filed Jun. 16, 2006, which application is incorporated herein by reference for all purposes.
  • BACKGROUND
  • Prior-art systems use RF tags that can be subjected to any Electromagnetic Interference (EMI) risk to hearing aid wearers, pacemakers, or IDC patients and had problems with Electromagnetic Compatibility worldwide.
  • Prior-art systems always had bandwidth as an issue. Prior-art systems also had high cost, low client count, short battery life and can only function in mild environment (away from steel and water). Many cost-sensitive, power “limited” applications exist (e.g., most industrial visibility networks) that may not require bandwidth, yet do require real-time, peer-to-peer networking with extended battery life.
  • The purpose for the below-described preferred embodiment to address above-listed problems within a long-wavelength network.
  • SUMMARY
  • The Visibility Network is designed to provide real-time web enabled asset visibility. The RuBee IV protocol was designed to work reliably in a local visibility network and provide real-time visibility for assets, people, and livestock, pedigree and provide chain of possession events.
  • RuBee works over a controlled-range, wide area (1′×1′ to 100′×100′) in harsh environments (that is, near metals, liquids and through earth), with an extended battery life (10-15 years), and a high safety standard. The network's design goal was to create a low cost two-way radio tag that is safe for use in hospital patient-based settings, hospital operating rooms, airports and other public facilities. RuBee could not accept any Electromagnetic Interference (EMI) risk to hearing aid wearers, pacemaker, or IDC patients and has no known or Electromagnetic Compatibility (EMC) issues worldwide. Yet, RuBee provides range and the reliability needed to produce a real-time visibility network. Every radio tag attached to an asset appears to be a mini-web asset server within the Visibility Network. The Long Wavelength ID (LWID) tag has an antenna operable at a low radio frequency not exceeding 1 megahertz The tag also has a radiating transceiver operatively connected to said antenna, the transceiver operates to transmit and receive data at low radio frequency. The tag also has a programmed data processor to process data received from the transceiver. The data processor usually is a low cost 4-bit processor capable of encrypting and decrypting and complex functions associated with managing IP addresses. The tag associated with a first IP address. The tag has a volatile memory that stores said IP address. The transceiver emits an identification signal based upon said IP address stored in the volatile memory. The tag also has an energy source used for activating the transceiver and the data processor. Any RuBee IV tag if enabled properly may be searched and discovered on Google or the VAI “Dot-Tag” network.
  • The local network of tags talks to a RuBee Router (Sidewinder). The Sidewinder manages the local tag net in real time in much the same way any WiFi router manages a TCP/IP network. The Sidewinder communicates by a VPN to a data server which manages a PostgresSQL database of virtual tags (the Dot-Tag Visibility Data Server).
  • Long wavelength, produces little, if any energy dissipated in the form of an electrical field (E). Long wavelength transmissions radiate energy (99.99%) in the form of a magnetic field (H). The RuBee radio tags are inductive tags and typically need a minimum signal of 0.1 milligauss to a maximum of about 300 milligauss for reliable communication. The strongest field near or on top of a base station antenna can be about 1200 milligauss, however most standard antennas are in the 100-300 milligauss range. To help provide some context for these values, the earth's magnetic field is 300-600 milligauss.
  • The systems are installed in several major retailers as in-store inventory visible systems, in hospitals to provide medical device visibility, other healthcare applications providing real time inventory visibility on high valued products throughout distribution, in agricultural applications providing visibility and age verification for cattle, and in other industries providing identity systems and visibility systems for patients, physicians, policemen, firemen, correctional officers and corporate employees.
  • The advantage of this system low cost to clients, low cost base stations and routers, long battery life tags, high client/tag counts within a single network, and work in harsh environments (near steel and water).
  • DESCRIPTION OF THE DRAWING
  • FIG. 1 shows a block diagram of a Visibility Network.
  • FIG. 2 shows a block diagram of a Dot-Tag Visibility Network and a User Application Visibility Network.
  • FIG. 3 shows a block diagram for the Dot-Tag Visibility Network.
  • FIG. 4 shows a block diagram of a Long Wavelength Tag.
  • FIG. 5 shows a block diagram of a diagnostic tools used in the Dot-Tag Visibility Network.
  • FIG. 6 shows a block diagram of a Part11 Data Flow.
  • FIG. 7 shows another block diagram of the Part11 Data Flow.
  • FIG. 8 shows a block diagram of a Visibility Data Flow.
  • FIG. 9 shows another block diagram of the Visibility Data Flow.
  • FIGS. 10-13 show example of a real life application of the Visibility Network.
  • DETAILED DESCRIPTION
  • FIG. 1 shows one exemplary Visibility Network 100 in accordance with one embodiment. The Visibility Network 100 includes six layers. The first layer 101 is a RuBee IV Network Layer. The second layer 102 is a RuBee wireless network connection. The third layer 103 is an embedded VPN connection between the second layer 104 and a forth layer 104. The forth layer 104 is a data plus control that creates and preserves a data in a virtual tag data base. The fifth layer 105 is a visibility ERP and the sixth layer 106 is a Visibility Export layer.
  • FIG. 2 shows a block diagram 200 of the Visibility Network 100 that includes a Dot-Tag Visibility Network 201 and a User Visibility Network 202.
  • FIG. 3 is a block diagram 300 that shows The Dot-Tag Visibility Network 201. The Dot-tag Visibility Network 201 starts with many local RuBee Networks' 301. In a RuBee Network 301 each sidewinder 302 communicates to the RuBee Tags 301 a through 301 n contained within its local net regularly. This time set by the user (each 10 minutes typical). The sidewinder 302 keeps a table of IP addresses and subnet addresses of all active and legible tags plus all tag data within its RuBee network. 301. If a tag 301 a has problems or is missing or has a bad CRC check it gets flagged in a trouble table. If any new tag appears within a Network it is placed in the new tag table. Each sidewinder 302 is connected to a Visibility Data Server 304 by a VPN link 303 and preserves a Virtual Tag Database (VTDB) 305.
  • The VTDB 305 is shared by many Sidewinders 302 within a Visibility Network 100 but effectively produces a PostgresSQL database that represents the tag, its data and reads over last human legible, comma separated, date time-stamped record of every tag transaction. It provides a total RuBee network history of critical evens including signal, errors, rereads, CRC checks and can be used for audits or for network statistics. Sidewinders 302 spool approximately 24 hours of tag data in a local database, providing protection and backup if any Network outages occur over the VPN 303.
  • FIG. 4 illustrates a block diagram 400 of the RuBee tag 301 a. The RuBee tag 301 a includes a transceiver 406. New long-wavelength (LW under 450 Khz) power efficient designs have made it possible to create active transceivers with IP addresses and peer-to-peer, on-demand, communications, with an acceptable range to work as a local network. The RuBee tag 301 a also includes a power unit 408. The power unit 408 could be a quarter-sized CR2525 Li battery with a 10-year or longer battery life. The communication is taken place through an antenna 408.
  • Current RuBee Networks 301 use a protocol known as RuBee IV, and consume only a few microamps in standby and less than 1 milliamp in active mode. RuBee tag 301 a may be fully programmable using low cost 4-bit processors 403 capable of encryption and decryption and complex functions associated with managing IP addresses (DCHP, ARP). RuBee tag 301 a is remotely driven form the standby mode to active mode the sidewinder 302.
  • RuBee Networks 301, offer the advantage of low cost tags and low cost base stations (<$100). Moreover, because RuBee tag 301 a have the power source 408, they may optionally be equipped with sensors 401, sRAM 404, displays 409, LEDs 402 and may also be low in cost (<$2 per tag). Some Rubee protocol designs also eliminate the battery and cost about 15 cents with a reduced range. Networks of thousands of peer-to-peer RuBee tags work reliably as a visibility network. RuBee tags are not affected by liquids, can be used underwater or as an implantable device, and are minimally affected by steel.
  • The base station apparatus employed may be that disclosed in U.S. application Ser. No. 11/462,981 filed Aug. 7, 2006, incorporated herein by reference. The tags employed can be those described in US 2007/0115132, published May 24, 2007, incorporated herein by reference for all purposes. The RF technology can be that described in US 2007/0063895, published Mar. 22, 2007, incorporated herein by reference for all purposes. The tag technology can be that described in U.S. Pat. No. 7,049,963, issued May 23, 2006, incorporated herein by reference for all purposes. The transceiver communicating with the tags can be that described in US 2007/0120649, published May 31, 2007, incorporated herein by reference for all purposes.
  • RuBee industrial visibility networks may be used to provide visibility on or near steel shelves and in harsh environments such as operating theaters (rooms), oil and chemical plants, warehouses and retail stores. Long wavelength, low bandwidth visibility systems and sensor networks are currently in use at industrial installations.
  • FIG. 5 shows a block diagram 500 of a diagnostic tools used in the Dot-Tag Visibility Network 201. The Dot-Tag Visibility Network 201 includes a suite of diagnostic tools 501 that run on a laptop. The diagnostic tools talk direct to the Sidewinder 302 and bypass the Linux kernel. The tools 501 drive the RuBee base station direct and make it possible to read and program an individual tag through the RuBee network 301. These tools 501 will work from anywhere in the world providing you have the correct IP address, passwords and VPN authority. They can collect tag statistics, read memory, change addresses, or almost any other maintenance diagnostic function as shown in Tables 502 and 503.
  • The tools 501 produce a data log consistent with Part11 logs and represent the supreme check on network and tag integrity.
  • FIG. 6 shows a block diagram 600 of a Part11 Data Flow. The Sidewinder 302 communicates by a VPN 303 to a data server 304 which manages a PostgresSQL database of virtual tags 305. These data links all Linux-Linux and use standard SQL protocols. The Visibility Data Server 304 creates and preserves off-site physical backups, as well as Part11 human legible records (Archive) 602 of every tag transaction. The Part11 records (Archive) 602 include tag signal strength, tag field boundaries, CRC confidence checks, statistics on each tag read, failed reads, packet relays, noise levels, and tag data.
  • Part11 data 602 may be encrypted using Tools Data Desk 601 and emailed to a subscriber every hour day or week, and will identify and diagnose tag, antenna or network problems before they happen. Statistics of reads and read errors for individual tags or millions of tags may be routinely viewed in a few seconds shown in Tables 604, 605 and 606. This data is written with an independently verified date time stamp to a WORM optical disk drive 603 to create an audit trail that meets 21CFRPart11 for all tag transactions. The Part11 audit trails also meet SEC Rule 17a-4, HIPAA, Sarbanes-Oxleyn (SOX), and DoD 5015.2 standards.
  • FIG. 7 shows another block diagram 700 of the Part11 Data Flow. The Sidewinder 302 communicates by a VPN 303 to a data server 304 which manages a PostgresSQL database of virtual tags 305. These data links all Linux-Linux and use standard SQL protocols. The Visibility Data Server 304 creates and preserves the SOX Archive 701. The SOX Archive 701 is a human readable comma separated, date time stamped certified record of every box or item transaction. It provides a human legible total product network history of critical events including time on shelf, when removed, physical inventory, date sold, reorder points, and billing information.
  • SOX data 701 may be encrypted using Tools Data Desk 601 and emailed to a subscriber day, week, or month and will identify and diagnose product inventory delivery problems before they happen. Statistics of product movement for individual items or millions of items may be routinely viewed in a few seconds. This data is written with an independently verified date time stamp to a WORM optical disk drive 603 to create an audit trail that meets SEC rules for all product transactions.
  • FIG. 8 and FIG. 9 shows a block diagram 800 and 900 of a Visibility Data Flow. User Web enabled Visibility Systems/reports and ERP's 806 are created by simple plugs to the Visibility Data server 304. The Vis-Data Server 304 contains the full Virtual Tag Database 305 updated by all Sidewinders 302. The Tag Database 304 is actively maintained but the sidewinders 302. Standard interfaces are available for PostgresSQL to JAVA, Ruby on Rails, Pentahoe and many other enterprise driven ERP systems 806. It is possible to create sophisticated and interactive systems, real-time visibility reports and systems using the Vis-Data Server and plug in in a matter of days.
  • The Air Traffic Control (ATC) ATC plug 805 is used to control functions within a RuBee network 301. For example to turn on a LED 402 on a tag the tag is accessed using a simple instruction with flash time etc through the ATC plug 805. The read times for tags, router start stop times, and antenna tune checks etc. are all controlled through the ATC plug 805. The SQL plug 804 is used to support a data requests. Real-time visibility reports are shown in Table 808.
  • The user ERP's 806 are also responsible for exports to a customer system 809. For example business rules linked to a billing event and all information tied to that are exported in Layer 6. The layer 6 includes a User Event Export Tools 807 that covert a real-time visibility reports into report that fits a specific event like billing. Examples of User Event Export Tools 807 are Excel, CSV, HL7 and XML-RDF.
  • FIGS. 10-13 show example of a real life application of the Visibility Network 100. FIG. 10 is a Smart Shelf RuBee Local Net 1000. Typical smart shelf application for medical devices. The devices are steel and are packaged in conductive Aluminum as shown in Pictures 1001-1003. Box's are stacked 6-8 high and two to three rows deep.
  • FIG. 11 is an example 1100 how the Dot-Tag Network 201 works in real life. The graph 1100 shows signal strength vs time for 24 hours. A full inventory is carried out each ten minutes for 203 Box's on the shelf. That means each box is checked about 130 times each day. The green dots represent reads, the red represent no-reads on an attempt. Important to not no miss-reads occur at a high signal. This usually means small burst of noise or that box has been removed.
  • RuBee Network 301 activated smart shelves 1001 has been placed as a network in Hospitals. Orthopedic implants have tags placed on outside of box. Note these devices are steel and are packaged with heavy aluminum sealed packages and stacked on steel shelves. The Part11 data 602 and tools shows 24 hours of reads (26,391 per day) and shows that 99.765% or 26,329 reads are 100% on first attempt. 0.129 were successful on second attempt and so on for 100% reads up to five attempts. Local noise, and individual moving or searching for a box etc. May lead to re-reads as shown in the Table 1102.
  • FIG. 12 and FIG. 13 how the Dot-Tag Network 201 works when an Orthopedic implants are removed from the smart shelves 1001 and placed in the cart that has two levels. Level one 1201 is the inventory pending and level two 1202 inventory used. The Part11 Log 602 provides an archive for all tag and network based transactions. The Sox Log 701 provides an archive for all product based transactions.
  • Tables 1301 and 1302 are examples of a real time access to the inventory of the shelf 1001. It also provided point of use data, usage statistics, and needs predictions.
  • It will thus be appreciated that the above discussion enables one to provide a system comprising:
      • a plurality of routers, each communicating via an internet with a server;
      • for each said router, a multiplicity of respective long-wavelength ID tags each disposed for attachment to an asset, each said tag comprising a tag antenna operable at a low radio frequency not exceeding 1 megahertz, a transceiver operatively connected to said antenna, said transceiver being operable to transmit and receive data at said low radio frequency, a programmed data processor to process data received from the transceiver, said tag having a unique hardware address, said transceiver emitting an identification signal upon interrogation by said router;
      • each said router communicating with its respective tags from time to time via said low radio frequency, said router maintaining an association between each said tag and a corresponding IP address;
      • each said router responsive to queries from the server with information from one or more of its respective tags.
  • The server can be a user web-based ERP, the server providing real-time visibility reports. 8. The user web-based ERP may be selected from the set consisting of Eclipse, Pentaho, Ruby on Rails, Google tools, Java, .Net and Weblogic.
  • At least one of the long-wavelength tags can include a sensor or a Light Emitting Diode (LED).
  • The server can create and preserve a Part11 human-legible record of tag transactions. The Part11 human legible records can include tag signal strength, tag field boundaries, CRC confidence checks, statistics on said tag, failed reads, packet relays, noise levels, and the tag data.
  • The server can create and preserve a Sarbanes-Oxley (SOX) archive, said SOX archive providing a human-legible total asset network history of critical events including time off shelf, when removed, physical inventory, date sold, reorder thresholds, and billing information.
  • The system can further comprise a tool for data export from the server, said tool selected from the set consisting of Excel, CSV, HL7 and XML-RDF.
  • The IP address of a tag may be stored within the tag, for example in a nonvolatile memory. In such a case, the router learns the IP address by interrogating the tag.
  • On the other hand, the tag may simply have a unique hardware address, and the assignment of an IP address to the tag can take place in the router (the sidewinder). In such a case, router maintains within the router a correspondence between the assigned IP address and the hardware address of the tag.
  • The router may power the tag by bathing the tag in an RF energy field.
  • It should be noted that the matter contained in the above description or shown in the accompanying drawings should be interpreted as illustrative and not in a limited sense. The following claims are intended to cover all generic and specific features described herein, as well as all statements of the scope of the present method and system, which, as a matter of language, might be said to fall there between.

Claims (20)

1. A system comprising:
a plurality of routers, each communicating via an internet with a server;
for each said router, a multiplicity of respective long-wavelength ID tags each disposed for attachment to an asset, each said tag comprising a tag antenna operable at a low radio frequency not exceeding 1 megahertz, a transceiver operatively connected to said antenna, said transceiver being operable to transmit and receive data at said low radio frequency, a programmed data processor to process data received from the transceiver, said tag having a unique hardware address, said transceiver emitting an identification signal upon interrogation by said router;
each said router communicating with its respective tags from time to time via said low radio frequency, said router maintaining an association between each said tag and a corresponding IP address;
each said router responsive to queries from the server with information from one or more of its respective tags.
2. The system of claim 1 wherein the server is a user web based ERP, and wherein the server provides real-time visibility reports.
3. The system of claim 1, wherein at least one of said long-wavelength tags includes a sensor.
4. The system of claim 1, wherein at least one of said long-wavelength tags includes a Light Emitting Diode (LED).
5. The system of claim 1, wherein said server creates and preserves a Part11 human-legible record of tag transactions.
6. The system of claim 5, wherein the Part11 human legible records include tag signal strength, tag field boundaries, CRC confidence checks, statistics on said tag, failed reads, packet relays, noise levels, and the tag data.
7. The system of claim 1, wherein said server creates and preserves a Sarbanes-Oxley (SOX) archive, said SOX archive provides a human legible total asset network history of critical events including time off shelf, when removed, physical inventory, date sold, reorder thresholds, and billing information.
8. The system of claim 2, wherein the user web based ERP is selected from the set consisting of Eclipse, Pentaho, Ruby on Rails, Google tools, Java, .Net and Weblogic.
9. The system of claim 1, further comprising a tool for data export from the server, said tool is selected from the set consisting of Excel, CSV, HL7 and XML-RDF.
10. The system of claim 1 wherein for at least one router and for at least one tag, the tag has its respective IP address stored therewithin, and wherein the router learns the IP address of the at least one tag by interrogating said tag.
11. The system of claim 1 wherein for at least one router and for at least one tag, the router assigns the IP address to the at least one tag, and the router maintains within the router a correspondence between the assigned IP address and the hardware address of the tag.
12. The system of claim 1 wherein for at least one router and for at least one tag, the at least one router powers the at least one tag by bathing the tag in an RF energy field.
13. A method for use with a system comprising a plurality of routers, each communicating via an internet with a server; for each said router, a multiplicity of respective long-wavelength ID tags each disposed for attachment to an asset, each said tag comprising a tag antenna operable at a low radio frequency not exceeding 1 megahertz, a transceiver operatively connected to said antenna, said transceiver being operable to transmit and receive data at said low radio frequency, a programmed data processor to process data received from the transceiver, said tag having a unique hardware address, said transceiver emitting an identification signal upon interrogation by said router; the method comprising the steps of:
for each router, communicating with its respective tags from time to time via said low radio frequency, said router maintaining an association between each said tag and a corresponding IP address;
for each router, responding to queries from the server with information from one or more of its respective tags.
14. The method of claim 13 wherein for at least one router and for at least one tag, the tag has its respective IP address stored therewithin, the method further comprising the step of:
at the at least one router, interrogating the at least one tag, thereby learning the IP address of the at least one tag.
15. The method of claim 13 wherein for at least one router and for at least one tag, the at least one tag does not have an IP address stored therewithin, the method further comprising the step of:
at the at least one router, assigning the IP address to the at least one tag, and
at the at least one router, maintaining within the router a correspondence between the assigned IP address and the hardware address of the tag.
16. The method of claim 13 wherein for at least one router and for at least one tag, the method further comprises the step of:
at the at least one router, powering the at least one tag by bathing the tag in an RF energy field.
17. A router, the router disposed for communication via an internet with a server;
the router comprising means for communication with a multiplicity of respective long-wavelength ID tags each disposed for attachment to an asset, each said tag comprising a tag antenna operable at a low radio frequency not exceeding 1 megahertz, a transceiver operatively connected to said antenna, said transceiver being operable to transmit and receive data at said low radio frequency, a programmed data processor to process data received from the transceiver, said tag having a unique hardware address, said transceiver emitting an identification signal upon interrogation by said router;
the router disposed to communicate with its respective tags from time to time via said low radio frequency, said router maintaining an association between each said tag and a corresponding IP address;
each said router responsive to queries from the server with information from one or more of its respective tags.
18. The system of claim 17 wherein for at least one tag, the tag has its respective IP address stored therewithin, and wherein the router learns the IP address of the at least one tag by interrogating said tag.
19. The system of claim 17 wherein for at least one tag, the router assigns the IP address to the at least one tag, and the router maintains within the router a correspondence between the assigned IP address and the hardware address of the tag.
20. The system of claim 17 wherein for at least one tag, the router powers the at least one tag by bathing the tag in an RF energy field.
US11/764,360 2006-06-16 2007-06-18 Visible Assets Dot-Tag Visibility Network Architecture Abandoned US20080094177A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
PCT/IB2007/052331 WO2007144859A2 (en) 2006-06-16 2007-06-18 Dot-tag visibility network architecture
US11/764,360 US20080094177A1 (en) 2006-06-16 2007-06-18 Visible Assets Dot-Tag Visibility Network Architecture
US12/705,115 US8115628B2 (en) 2006-06-16 2010-02-12 Dot-tag visibility network architecture

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US80502006P 2006-06-16 2006-06-16
US11/764,360 US20080094177A1 (en) 2006-06-16 2007-06-18 Visible Assets Dot-Tag Visibility Network Architecture

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/705,115 Continuation US8115628B2 (en) 2006-06-16 2010-02-12 Dot-tag visibility network architecture

Publications (1)

Publication Number Publication Date
US20080094177A1 true US20080094177A1 (en) 2008-04-24

Family

ID=38832197

Family Applications (2)

Application Number Title Priority Date Filing Date
US11/764,360 Abandoned US20080094177A1 (en) 2006-06-16 2007-06-18 Visible Assets Dot-Tag Visibility Network Architecture
US12/705,115 Expired - Fee Related US8115628B2 (en) 2006-06-16 2010-02-12 Dot-tag visibility network architecture

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/705,115 Expired - Fee Related US8115628B2 (en) 2006-06-16 2010-02-12 Dot-tag visibility network architecture

Country Status (2)

Country Link
US (2) US20080094177A1 (en)
WO (1) WO2007144859A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100017232A1 (en) * 2008-07-18 2010-01-21 StevenDale Software, LLC Information Transmittal And Notification System
CN106814675A (en) * 2016-12-31 2017-06-09 华晨汽车集团控股有限公司 Safety access method for verifying automotive diagnostic installation legitimacy

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7440842B1 (en) * 2003-05-09 2008-10-21 Dimitri Vorona System for transmitting, processing, receiving, and displaying traffic information
US8825356B2 (en) 2003-05-09 2014-09-02 Dimitri Vorona System for transmitting, processing, receiving, and displaying traffic information

Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030155415A1 (en) * 2001-12-28 2003-08-21 Kimberly-Clark Worldwide, Inc. Communication between machines and feed-forward control in event-based product manufacturing
US6681198B2 (en) * 2000-10-10 2004-01-20 Velquest Corporation Unified data acquisition system
US20040064382A1 (en) * 2002-09-27 2004-04-01 United Parcel Service Supply chain and inventory risk management system
US20040199543A1 (en) * 2003-04-04 2004-10-07 Braud Luke A. Facilitating data manipulation in a browser-based user interface of an enterprise business application
US20040222889A1 (en) * 2003-03-14 2004-11-11 Masaki Hoshina Contactless data communication system, contactless identification tag and contactless identification tag control program
US6901304B2 (en) * 2002-01-11 2005-05-31 Sap Aktiengesellschaft Item tracking system architectures providing real-time visibility to supply chain
US20050199716A1 (en) * 2004-03-10 2005-09-15 Microsoft Corporation Method and system for communicating with identification tags
US20060047787A1 (en) * 2004-09-01 2006-03-02 Microsoft Corporation Hot swap and plug-and-play for RFID devices
US7028339B2 (en) * 2000-08-28 2006-04-11 Visible Assets Inc. High security wireless key for asynchronous delivery drop boxes
US7049963B2 (en) * 2003-04-09 2006-05-23 Visible Assets, Inc. Networked RF tag for tracking freight
US20060164232A1 (en) * 2003-04-09 2006-07-27 Visible Assets, Inc. Auditable security for cargo containers and other repositories
US20060220857A1 (en) * 2004-09-28 2006-10-05 Visible Assets, Inc. RF Tags for Tracking and Locating Travel Bags
US20060293977A1 (en) * 2004-11-15 2006-12-28 Visible Assets, Inc. Auditable authentication of event histories for shipped and stored objects
US20070063895A1 (en) * 2005-02-14 2007-03-22 Visible Assets, Inc. Low frequency tag and system
US20070115132A1 (en) * 2005-06-10 2007-05-24 Visible Assets, Inc. Tagging and communication system and methods for use therewith
US20070120649A1 (en) * 2005-09-23 2007-05-31 Visible Assets, Inc. Method and apparatus for dynamically-tuned communication with one among myriad tags
US20070152825A1 (en) * 2003-04-09 2007-07-05 Visible Assets, Inc. Networked RF tag for tracking baggage
US20070152826A1 (en) * 2003-04-09 2007-07-05 Visible Assets, Inc. Networked RF tag for tracking baggage
US7242290B2 (en) * 2000-06-03 2007-07-10 Visible Assets, Inc. Testing methods for use with boxes
US7242301B2 (en) * 2004-07-20 2007-07-10 Visible Assets, Inc. RF-enablement of products and receptacles therefor
US20070171076A1 (en) * 2005-08-29 2007-07-26 Visible Assets, Inc. Low-frequency radio tag encapsulating system
US20070268137A1 (en) * 2005-11-25 2007-11-22 Visible Assets, Inc. System and method for visibility to consumer
US20070283160A1 (en) * 2000-08-28 2007-12-06 Visible Assets, Inc. Low Cost Secure ID Card and System
US7321290B2 (en) * 2005-10-02 2008-01-22 Visible Assets, Inc. Radio tag and system
US20080039126A1 (en) * 2005-12-13 2008-02-14 Visible Assets, Inc. Dot-Tag Visibility IP Protocol

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7414571B2 (en) * 2002-08-19 2008-08-19 Q-Track Corporation Low frequency asset tag tracking system and method
US20060020499A1 (en) * 2004-07-26 2006-01-26 Jethender Aitipamula Asset visibility management system with event correlator

Patent Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7242290B2 (en) * 2000-06-03 2007-07-10 Visible Assets, Inc. Testing methods for use with boxes
US20070205273A1 (en) * 2000-08-28 2007-09-06 Visible Assets, Inc. High Security Wireless Key For Asynchronous Delivery Drop Boxes
US20070283160A1 (en) * 2000-08-28 2007-12-06 Visible Assets, Inc. Low Cost Secure ID Card and System
US7028339B2 (en) * 2000-08-28 2006-04-11 Visible Assets Inc. High security wireless key for asynchronous delivery drop boxes
US6681198B2 (en) * 2000-10-10 2004-01-20 Velquest Corporation Unified data acquisition system
US20030155415A1 (en) * 2001-12-28 2003-08-21 Kimberly-Clark Worldwide, Inc. Communication between machines and feed-forward control in event-based product manufacturing
US6901304B2 (en) * 2002-01-11 2005-05-31 Sap Aktiengesellschaft Item tracking system architectures providing real-time visibility to supply chain
US20040064382A1 (en) * 2002-09-27 2004-04-01 United Parcel Service Supply chain and inventory risk management system
US20040222889A1 (en) * 2003-03-14 2004-11-11 Masaki Hoshina Contactless data communication system, contactless identification tag and contactless identification tag control program
US20040199543A1 (en) * 2003-04-04 2004-10-07 Braud Luke A. Facilitating data manipulation in a browser-based user interface of an enterprise business application
US7170413B1 (en) * 2003-04-09 2007-01-30 Visible Assets, Inc. Networked RF tag for tracking animals
US7277014B1 (en) * 2003-04-09 2007-10-02 Visible Assets, Inc. Networked RF tag for tracking animals
US20070152825A1 (en) * 2003-04-09 2007-07-05 Visible Assets, Inc. Networked RF tag for tracking baggage
US7164359B2 (en) * 2003-04-09 2007-01-16 Visible Assets, Inc Networked RF tag for tracking freight
US20060164232A1 (en) * 2003-04-09 2006-07-27 Visible Assets, Inc. Auditable security for cargo containers and other repositories
US7049963B2 (en) * 2003-04-09 2006-05-23 Visible Assets, Inc. Networked RF tag for tracking freight
US20070152826A1 (en) * 2003-04-09 2007-07-05 Visible Assets, Inc. Networked RF tag for tracking baggage
US20050199716A1 (en) * 2004-03-10 2005-09-15 Microsoft Corporation Method and system for communicating with identification tags
US7242301B2 (en) * 2004-07-20 2007-07-10 Visible Assets, Inc. RF-enablement of products and receptacles therefor
US20060047787A1 (en) * 2004-09-01 2006-03-02 Microsoft Corporation Hot swap and plug-and-play for RFID devices
US20060220857A1 (en) * 2004-09-28 2006-10-05 Visible Assets, Inc. RF Tags for Tracking and Locating Travel Bags
US20060293977A1 (en) * 2004-11-15 2006-12-28 Visible Assets, Inc. Auditable authentication of event histories for shipped and stored objects
US20070063895A1 (en) * 2005-02-14 2007-03-22 Visible Assets, Inc. Low frequency tag and system
US20070115132A1 (en) * 2005-06-10 2007-05-24 Visible Assets, Inc. Tagging and communication system and methods for use therewith
US20070171076A1 (en) * 2005-08-29 2007-07-26 Visible Assets, Inc. Low-frequency radio tag encapsulating system
US20070120649A1 (en) * 2005-09-23 2007-05-31 Visible Assets, Inc. Method and apparatus for dynamically-tuned communication with one among myriad tags
US7321290B2 (en) * 2005-10-02 2008-01-22 Visible Assets, Inc. Radio tag and system
US20070268137A1 (en) * 2005-11-25 2007-11-22 Visible Assets, Inc. System and method for visibility to consumer
US20080039126A1 (en) * 2005-12-13 2008-02-14 Visible Assets, Inc. Dot-Tag Visibility IP Protocol

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100017232A1 (en) * 2008-07-18 2010-01-21 StevenDale Software, LLC Information Transmittal And Notification System
CN106814675A (en) * 2016-12-31 2017-06-09 华晨汽车集团控股有限公司 Safety access method for verifying automotive diagnostic installation legitimacy

Also Published As

Publication number Publication date
US20100322168A1 (en) 2010-12-23
WO2007144859A3 (en) 2009-04-23
US8115628B2 (en) 2012-02-14
WO2007144859A2 (en) 2007-12-21

Similar Documents

Publication Publication Date Title
US10891449B2 (en) Self-monitoring wireless computing device
US10691992B2 (en) RF tag with memory management
US9858452B2 (en) Information RFID tagging facilities
US9710682B2 (en) Operating systems for an RFID tag
US20180277241A1 (en) Methods and systems for rf communications in fluid process procedures
US9471821B2 (en) External access to memory on an RFID tag
US9405950B2 (en) External access to memory on an RFID tag
US9430732B2 (en) Three-dimension RFID tag with opening through structure
US8368541B2 (en) Method for memory mapping in a composite RFID tag facility
EP2208390B1 (en) Methods and systems of sharing power in a multiple radio frequency network node rfid tag
US8269630B2 (en) Methods and systems of a multiple radio frequency network node RFID tag
EP2147399A1 (en) Multiple radio frequency network node rfid tag utilizing otp memory systems
US8115628B2 (en) Dot-tag visibility network architecture
WO2016054177A9 (en) Systems and methods for rfid information management
CA2990289A1 (en) Methods and systems for rf communications in blood-extraction procedures

Legal Events

Date Code Title Description
AS Assignment

Owner name: VISIBLE ASSETS, INC, CANADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:STEVENS, JOHN K.;CRAMER, DAVID;PACKERT, TOM;REEL/FRAME:020359/0386;SIGNING DATES FROM 20071217 TO 20080111

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION