WO2008115784A2 - Rfid reader enclosure and man-o-war rfid reader system - Google Patents

Rfid reader enclosure and man-o-war rfid reader system Download PDF

Info

Publication number
WO2008115784A2
WO2008115784A2 PCT/US2008/056981 US2008056981W WO2008115784A2 WO 2008115784 A2 WO2008115784 A2 WO 2008115784A2 US 2008056981 W US2008056981 W US 2008056981W WO 2008115784 A2 WO2008115784 A2 WO 2008115784A2
Authority
WO
WIPO (PCT)
Prior art keywords
rfid
storage container
rfid reader
enclosure
reader
Prior art date
Application number
PCT/US2008/056981
Other languages
French (fr)
Other versions
WO2008115784A3 (en
Inventor
Travis A. Phillips
Kenneth Andrew Tinnell
Adam Salvo
Robert Joseph Doeden
Original Assignee
Promega Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Promega Corporation filed Critical Promega Corporation
Priority to EP08732209.5A priority Critical patent/EP2137668B1/en
Publication of WO2008115784A2 publication Critical patent/WO2008115784A2/en
Publication of WO2008115784A3 publication Critical patent/WO2008115784A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10316Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves using at least one antenna particularly designed for interrogating the wireless record carriers
    • FMECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
    • F25REFRIGERATION OR COOLING; COMBINED HEATING AND REFRIGERATION SYSTEMS; HEAT PUMP SYSTEMS; MANUFACTURE OR STORAGE OF ICE; LIQUEFACTION SOLIDIFICATION OF GASES
    • F25DREFRIGERATORS; COLD ROOMS; ICE-BOXES; COOLING OR FREEZING APPARATUS NOT OTHERWISE PROVIDED FOR
    • F25D2700/00Means for sensing or measuring; Sensors therefor
    • F25D2700/08Sensors using Radio Frequency Identification [RFID]

Definitions

  • the present invention relates to an RFID reader apparatus, system, and method.
  • An RFK reading system has been developed which can, for example, read RFK) tags stored within a cabinet, a refrigerator, a room, etc. Based on the tags read, the system can determine inventory information.
  • RFK radio frequency
  • the present invention relates to an apparatus comprising: (a) an enclosure; and (b) an RFID reader disposed in the enclosure, wherein the enclosure is configured to be mounted on an exterior surface of a storage container, wherein the RFK) reader is configured to perform RFID reading for an area inside the storage container using an RFID antenna external to the enclosure, wherein the RFID antenna is disposed in the storage container, wherein the enclosure has an opening on a side of the enclosure, and wherein an electrical connection between the RFK) reader and the RFID antenna extends through the opening of the enclosure in such a manner that the electrical connection is not externally accessible when the enclosure is mounted on the exterior surface of the storage container.
  • the apparatus further comprises a human-machine interface including a display screen.
  • the apparatus further comprises a controller that is configured to (a) send an instruction to the RFlD reader to perform RFID reading, (b) receive a RFID scanning result from the RFID reader, and (c) send information in response to the RFID scanning result to a database system via a network connection.
  • the RFID antenna is disposed within a wall of the storage container but it is not required that it be so disposed.
  • the storage container is a cabinet.
  • the cabinet is a refrigerated cabinet.
  • a human-machine interface for the apparatus may use a display provided separately from the enclosure.
  • the opening of the enclosure communicates with an opening on the exterior surface of the storage container when the enclosure is mounted on the exterior surface of the storage container.
  • the present invention relates to an apparatus comprising: an RFID reader configured (a) to perform RFID reading for an area within a first storage container using a first antenna and (b) to perform RFlD reading for an area within a second storage container using a second antenna.
  • the apparatus is connected to the first storage container and the second storage container.
  • the apparatus is disposed between the first storage container and the second storage container.
  • the apparatus is connected to the first storage container and the second storage container so that an electrical connection between the RFID reader and the first antenna is not externally exposed and an electrical connection between the RFID reader and the second antenna is not externally exposed.
  • the present invention relates to a system comprising three of the aforementioned apparatuses, each scanning a respective one of three pairs of cabinets.
  • the present invention relates to a method comprising performing RFlD reading for an area within a first storage container and an area within a second storage container using an RFID reader connected both to a first antenna and a second antenna, the first antenna being used for performing reading for the area within the first storage container and the second antenna being used for performing reading for the area within the second storage container.
  • the present invention relates to a system comprising: (1) a first apparatus comprising a first RFID reader configured to perform RFID reading using a first antenna; and (2) a second apparatus comprising (a) a second RFID reader configured to perform RFID reading using a second antenna, and (b) a controller configured to (i) control the first RFID reader and the second RFID reader and (ii) communicate via a network connection with an inventory management system.
  • the first apparatus and the second apparatus are connected via a local area network, and the second apparatus further comprises a network connection between the second RFID reader and the controller.
  • the controller comprises a user interface for controlling the first RFID reader and the second RFID reader.
  • the controller is configured to control the first RFID reader to perform plural RFID scans, to obtain a first RFID scanning result in accordance with the plural RFID scans by the first RFID reader, to control the second RFID reader to perform plural RFID scans, to obtain a second RFID scanning result in accordance with the plural scans by the second RFID reader, and to communicate with the inventory management system in accordance with the first RFID scanning result and the second RFID scanning result.
  • the first RFID scanning is based on a difference between plural RFID scans.
  • the present invention relates to means for attaching an RFID reader to a refrigerator so that wiring between the RFID reader and an RFID antenna in the refrigerator is not externally exposed.
  • Yet another aspect of the present invention is a system comprising: (1) a master RFID reading apparatus comprising an RFID reader and (2) one or more secondary RFID reading apparatuses each comprising a respective RFID reader, wherein the master RFID reading apparatus further comprises control means for controlling (a) the RFID reader of the master RFID reading apparatus and (b) via networking between the master RFID reading apparatus and the one or more secondary RFID reading apparatuses, the RFID reader of each of the one or more secondary RFID reading apparatuses.
  • the master RFID reading apparatus uses the RFID reader to perform RFID scanning of a storage container, and the one or more secondary RFID reading apparatuses use their respective RFID readers to perform RFID scanning of a respective plurality of other storage containers.
  • FIG. 1 is a perspective view showing an embodiment of the present invention, an
  • RFID apparatus which is mounted on a storage container such as a refrigerator;
  • FIG. 2 is a schematic diagram showing the interconnection of parts of the RFID apparatus according to an embodiment of the present invention
  • FIG. 3 is a cross-sectional view showing the mounting of an RFID antenna in a wall of the storage container;
  • FIG. 4 is a perspective view showing the front and top sides of an enclosure of the
  • FIG. 5 is a perspective view showing the rear and top sides of the enclosure of the RFID apparatus according to an embodiment of the present invention.
  • FIG. 6 is a perspective view showing the bottom side of the enclosure of the RFID apparatus according to an embodiment of the present invention.
  • FIG. 7 is a perspective view showing a top side of the storage container
  • FIG. 8 is a perspective view from front to back of the enclosure, with the front side of the enclosure removed;
  • FIG. 9 is a schematic diagram showing a preferred circuit arrangement for the RFID apparatus according to an embodiment of the present invention.
  • FIG. 10 is a schematic diagram showing a system of three RFID scanning apparatuses, one of which has a controller;
  • FIG. 11 is a view of a preferred network interface for the enclosure of an embodiment according to the present invention.
  • FIG. 12 is a side view showing a system of three RFID scanning towers, two of which are slaves and one of which is a master;
  • FIG. 13 is a perspective view showing a human-machine interface, called the
  • FIG. 14 is a rear view of the 8-ball human-machine interface of FIG. 13;
  • FIG. 15 is a schematic view showing a multi-antenna RFID apparatus according to the present invention for scanning two shelves in a museum to check for tagged objects or artifacts;
  • FIG. 16 is a flowchart showing operation of the software of the apparatus where a human-machine interface is available, in a normal mode
  • FIG. 17 is a flowchart showing operation of the software of the apparatus where a human-machine interface is available, but the normal mode is bypassed;
  • FIG. 18 is a flowchart showing operation of the software of the apparatus in an apparatus where no human-machine interface is available;
  • FIG. 19 is a perspective view showing the front of an RFID apparatus of another embodiment of the present invention, with the front panel removed;
  • FIG. 20 is a perspective view showing the back of the RFID apparatus of that embodiment;
  • FIG. 21 is a perspective view showing the front of the RFID apparatus of that embodiment with the front panel present;
  • FIG. 22 is a schematic diagram showing another preferred circuit arrangement for the RFID apparatus according to an embodiment of the present invention.
  • FIG. 23 is a schematic view showing the front panel of an enclosure of an embodiment of the present invention, with a key lock.
  • Fig. 1 shows an embodiment of the present invention.
  • reference numeral 100 denotes an RFID apparatus for performing RFID reading
  • reference numeral 101 denotes an enclosure of the apparatus 100
  • reference numeral 200 identifies a storage container
  • reference numeral 201 indicates a door of the storage container 200 that can open and close
  • reference numeral 202 indicates the interior of the storage container 200, which is an area to be RFID scanned to determine the presence of any RFID tag or tags therein.
  • the apparatus further includes one or more of an ethernet connection (used for, e.g., TCP/IP communication over a network), a serial connection, an IEEE1394 connection, a USB connection, and a telephone connection.
  • a remote backend inventory management system e.g., database, ERP system, or financial packages such as Microsoft Dynamics or Quickbooks
  • the storage container may be, for example, a cabinet, ambient cabinet (i.e., room temperature cabinet), refrigerated cabinet (e.g., conventional refrigerator or freezer), etc.
  • ambient cabinet i.e., room temperature cabinet
  • refrigerated cabinet e.g., conventional refrigerator or freezer
  • apparatus 100 includes a modular enclosure 101 that can be mounted (i.e., is mountable) on storage container 200.
  • Enclosure 101 preferably contains at least an RFID reader.
  • Enclosure 101 may be mounted on storage container 200 in a variety of ways.
  • enclosure 101 may be mounted horizontally (e.g., on a side surface of storage container 200) or vertically (e.g., on a top or bottom of storage container 200).
  • enclosure 101 has corner holes through which enclosure 101 can be bolted to an exterior surface of storage container 200 (e.g., freezer, refrigerator, cabinet, etc.).
  • magnets could be used.
  • enclosure 101 is securely mounted so it will not easily move around or fall off.
  • An advantage of the enclosure design is that it is a portable, retrofitable modular enclosure that can be connected by a field engineer to any type of storage container, cabinet, shelf, or the like in the field.
  • the engineer could install an RFK) antenna in the wall of a standard, conventional refrigerator and could bolt the enclosure to an exterior surface of the refrigerator.
  • Fig. 2 depicts apparatus 100 in more detail.
  • reference numerals that are the same as those in other figures have the same meaning, unless otherwise specified.
  • reference numeral 102 denotes the RFID reader
  • reference numeral 103 denotes a controller (or controller circuit)
  • reference numeral 104 denotes an ethernet hub
  • reference numeral 106 is an RFID antenna
  • reference numeral 107 is an electrical connection between RFID reader 102 and RFID antenna 106
  • reference numeral 110 is an I/O block
  • reference numeral 1011 is an access port, opening, or hole in enclosure 101.
  • the depicted connection between ethernet hub 104 and RFID reader 102 is an ethernet connection
  • the connection between ethernet hub 104 and controller 103 also is an ethernet connection, preferably.
  • controller 103 communicates with RFID reader 102 (via ethernet hub 104) using an ethernet network connection.
  • controller 103 can control, for example, the timing of initiation of an RFID scan by RFID reader 102 by sending a command across the connection, and, through the connection, controller 103 can, for example, receive the results of the scan from RFID reader 102.
  • the invention is not limited to use of ethernet. Other communication techniques could instead be used (e.g., USB).
  • the enclosure 101 contains at least RFID reader 102; optionally, controller 103, ethernet hub 104, and I/O block 110 may also be included along with RFK) reader 102, or they may be omitted. Preferably, all are included, or I/O block 110 is included with RFID reader 102 while controller 103 and ethernet hub 104 are omitted.
  • reference numeral 1011 denotes an access port, opening, or hole of enclosure 101 (e.g., an opening on the exterior surface of enclosure 101) through which electrical connection (e.g., wire or wiring) 107 passes to connect RFID reader 102 and an RFID antenna 106.
  • electrical connection e.g., wire or wiring
  • RFID reader 102 can drive and control RFID antenna 106 to send and receive signals.
  • RFID antenna 106 is external to enclosure 101.
  • RFID antenna 106 for a storage container 200
  • the invention is not so limited. Instead, multiple RFID antennae 106 could be used for one storage container 200. Depending upon the type of products stored within the storage container 200, it may be preferable to have multiple RFID antennae 106 to scan one storage container 200.
  • apparatus 110 includes an I/O block 110.
  • I/O block 110 is connected to ethernet hub 104 by ethernet, and controller 103 is also connected to ethernet hub 104 by ethernet, so controller 103 can send and receive signals to and from I/O block 110.
  • I/O block 110 has a plurality of inputs and outputs (such as digital, analog, etc.) and has a built-in two-port ethernet hub. If controller 103 and ethernet hub 104 are omitted, the ethernet hub of I/O block 110 can be used to forward commands received from an external controller 103 to RFID reader 102.
  • I/O block 110 can connect to an authentication unit such as a passreader which reads any of a passcard, biometric information, etc. of the user, and provides the information read to controller 103.
  • I/O block 110 can also provide temperature information to controller 103.
  • I/O block 110 can also control a lock of storage container 200, at the direction of controller 103, to lock and unlock the door of storage container 200 to control access to the storage container 200.
  • RFID readers are commercially available and a conventional RFID reader may be used as RFID reader 102.
  • RFID reader 102 includes (a) circuitry to drive an RFID antenna to send RF signals and (b) circuitry to process any responses received back from an RFID tag or tags, i.e., RFID reader 102 performs RFID scanning.
  • the RFID reader that we prefer to use is capable of connecting to a plurality of RFID antennae.
  • RFID reader 102 also has an ethernet port providing a network connection by which it can be controlled.
  • RFID reader 102 has a command set by which it can be controlled, and commands can be sent to RFID reader 102 via its ethernet port to instruct RFID reader 102 to, for example, perform an RFID scan using RFID antenna 106 and return a list of tags read based on signals received from an RFID tag or RFID tags.
  • controller 103 preferably is a device, circuit, or computer (such as, for example, an embedded computer) for controlling RFID reader 102.
  • controller 103 authenticates a user seeking access to the storage container 200, sends a signal to unlock a door of the storage container 200 in response to authentication of the user, instructs RFID reader 102 to perform a scan in response to closing of the door, and calculates a difference between an RFID scan result returned by RFID reader 102 and an earlier RFID scan result returned by RFID reader 102 to determine if any RFID tags have been removed or added.
  • controller 103 calculates a difference (referred to as a "delta") between a first RFID scanning result obtained before the door of the storage container is opened (referred to as the "baseline” scan) and a second RFID scanning result obtained after the door of the storage container has been closed again.
  • a difference referred to as a "delta"
  • the determination is not so limited. For example, another possibility would be to perform an additional RFID inventory scan after the user's passkey is read but before the door is opened. This additional scan could be combined with the baseline scan to form a superset (i.e., containing any tags found in one or both of the baseline scan and the additional scan), to which the second RFID scanning result could be compared.
  • a “blinking tag” is a tag which might be read during one scan but not during another, for whatever reason. For example, a blinking tag might be read during 50% of scans. By performing both a baseline scan and the additional scan, it might be possible to discover the blinking tag even if it were not read during the baseline scan.
  • controller 103 communicates with RFID reader 102 via ethernet, and most preferably through an ethernet hub 104 that interconnects controller 103 and RFID reader 102 and that interconnects controller 103 and I/O Block 110. Most preferably, the controller 103, RFID reader 102, I/O Block 110, and ethernet hub 104 are all disposed inside enclosure 101. [0062] Preferably, as will be discussed below with respect to Fig. 9, controller 103 has a second ethernet controller (network interface) for connecting to a backend inventory management system through, for example, the internet. [0063] Preferably, controller 103 is a computer that uses an operating system such as
  • controller 103 is not so limited, and may take other forms of hardware or software as long as it supports the requirements of the system.
  • controller 103 will provide a human- machine interface (i.e., user interface), and controller 103's operating system will be Windows CE 5.0. Controller 103 preferably will also have Microsoft's .NET Compact Framework version 2.0 at a minimum installed. Of course, other operating systems can be used in place of Windows CE 5.0. Preferably, those other operating systems would also support the .NET Framework. This makes the software portable so that it may run on any Windows operating system that has .NET framework installed on it.
  • controller 103 is in the form of an all-in-one HMI (human-machine interface)/Embedded PC running Microsoft Windows CE 5.0. Future units may have the HMI separate from the controller or no HMI at all, depending on the needs of the individual customer.
  • the Windows CE image can either be provided by the vendor of apparatus, or a custom image can be created, tailed to the specific needs of a particular apparatus 100.
  • a computer program executed by controller 103 provides the functionality of apparatus 100 such as RFID scanning, inventory management, communication, etc. We will refer to this program as the Application Program.
  • Another related application developed for the apparatus 100 is simply referred to as the bootstrapper, which handles the updating of the Application Program, and its related files.
  • the Application Program is written on top of the Microsoft .NET Compact Framework version 2.0, using industry standard best practices. Development using the Compact Framework allows the Application Program to be redeployed on any Windows CE 5.0 device that has the compact framework installed. This includes devices that have a different underlying architecture such as ARM 4, x86 and MIPS. This level of flexibility allows the manufacturer of apparatus 100 to select or change controller 103 depending on customer needs, new technology offerings, and lower prices. In addition to moving from device to device, the Compact Framework will allow a smooth transition to newer versions of Windows CE, such as the new version 6.0. As an added benefit, the majority of the
  • Application Program can be easily recompiled to run under the full version of the Microsoft .NET Framework, and because of this, run on standard x86 hardware running Windows operating systems, such as Microsoft Windows XP, or Embedded Windows XP. This provides two key benefits, the first being additional flexibility for customers, the second being excellent opportunities for code reuse.
  • Windows CE supports multi-threaded applications, and the Application Program takes advantage of this to provide a robust and interactive experience to the user of the apparatus 100.
  • the Application Program can, for example, (a) handle communications between apparatus 100 and peripherals, (b) handle communications between apparatus 100 and backend system 1057, (c) display a user interface to the user, and (d) accept input from the user. This is considered a best practice, and will be what a user/customer expects.
  • the program is separated into a main executable, which contains the user interface screens, compiled for the Compact Framework, and several satellite assemblies (e.g., class libraries in the form of compiled DLL files).
  • One of the key features in the separation of components is the use of an Object Orientated design using Interfaces and Abstract Base Classes to build a foundation upon which the rest of the application can be built.
  • Interfaces allows for the main application logic of the Application Program to remain isolated from changes in hardware (RFID Readers, RFID Transponders, I/O blocks), as well as other pieces of software, such as communications and the data store.
  • Abstract Base classes which implement the signatures of the various interfaces to provide shared functionality.
  • An example of this design is the implementation of the logic in the Application Program to interface with the RFID reader 102.
  • the preferred model of RFID reader 102 that we use is the Magellan MARS reader (of course, we mention this model by way of example and not of limitation).
  • An Interface named IDevice was created, which all device logic must implement.
  • An abstract base class called DeviceBase implements IDevice and provides common functionality seen in the majority of devices we will be using.
  • Another Interface named IScanner provides the starting point for all RFID scanners, and again, the abstract class ScannerBase provides base functionality.
  • the Application Program supports remote updates of configuration parameters, as well as updates to the application itself. This is handled by the bootstrapper, which runs in place of the Application Program, so that the Application Program files can be updated (generally, one cannot update files that are in use).
  • new device drivers, OS hot fixes, and new advertisements can be downloaded to the apparatus 100 (e.g., via a network connection).
  • the data store for the Application Program is in the form of a Microsoft SQL 2005 Compact Edition database, the latest version of the mobile line of databases offered by Microsoft.
  • the database will store configuration information, transactions, and logging information.
  • the latest version of SQL mobile offers features usually found only in desktop and server versions of database, key among those being atomic transactions.
  • An atomic transaction guarantees that a group of data written to the database is either completely written, or none of it is written. This helps maintain consistency within the database, and makes the Application Program that much more robust.
  • SQL2005 is preferred, other data stores could be used. For example, a flat file could be used, or XML, among others.
  • Communication between the Application Program and peripherals associated with apparatus 100 is done over USB, Serial, or Ethernet, for example.
  • USB interface there is the option to hook up non-standard communication busses (such as RS-485) through the use of a USB converter.
  • Some of the devices that hook up via USB actually emulate an network interface card (NIC), or a virtual COM port. This is made possible due to the open, standards based approach taken with Windows CE.
  • Peripherals can be configured manually thru editing the configuration parameters via the HMI, or a semi- automated method can be used. In the semi-automated method, a user can instruct the Application Program to scan for new devices. The Application Program will report back devices that it has discovered but are currently not configured. The user can then select the device to associate and configure it with the Application Program. Peripherals can be identified by the COM port they are plugged into, their USB ID, or their Ethernet MAC address.
  • controller 103 may also provide a human-machine interface (HMI) (or user interface) to allow a user to interact with or control the apparatus 100.
  • HMI human-machine interface
  • the controller 103 and HMI may be integrated together, in which case references herein to HMI or controller should be considered the same device.
  • the controller 103 could drive a display provided on the enclosure to display the user interface.
  • Such a display could be mounted, for example, on a front surface of the enclosure 101, as shown by reference numeral 1052 in Fig. 12.
  • the display 1052 could be an LCD screen.
  • the HMI comprises, as the display 1052, a VGA 5.7" touch screen mounted to the front removable panel.
  • the display 1052 could show the status of the apparatus.
  • Controller 103 could also cause the display to display diagnostic information to allow an engineer to check the status of the machine or otherwise troubleshoot it.
  • the Application Program will support a variety of user personalization including but not limited to, localization (multiple language support), and target advertisements.
  • localization each user preferably will be able to choose a default language they wish to use when interacting with the UI portion of the Application Program; controller 103 could select a language for display based on the identity of the user. For example, controller 103 might display the user interface in Spanish if controller 103 concluded that such was the user's preferred language.
  • the Application Program will also support targeted advertising, to allow for sellers of apparatus 100 to configure and display advertisements to users of apparatus 100 based on their past and current purchases, and any ongoing sales promotions.
  • display 1052 could provide marketing advertisements targeted at a user of the apparatus, e.g., if it were recognized (e.g., by controller 103) that a user had purchased an item before, then controller 103 might control display 1052 to display an advertisement offering a sale price on that item to encourage the user to purchase the item again.
  • Targeted advertising may be, but is not limited to, a small area on the screen when the user is selecting which unit (i.e., storage container) they are trying to gain access to, a full screen advertisement after they select which unit they are going into, or a popup style advertisement that appears when the user first presents their pass.
  • controller 103 preferably also shall have the ability to run general advertising in addition to targeted advertising. General advertising will run while the unit is sitting not doing anything that requires a user present.
  • the apparatus 100 could be "headless", i.e., it would not have a display of its own. Instead, the apparatus could be configured so that it could be controlled remotely, e.g., across an ethernet, USB, or serial connection.
  • the HMI function or controller 103 be integrally provided in enclosure 101.
  • controller 103 and the HMI function thereof have been transferred out of enclosure 101 into an external enclosure 1054.
  • That enclosure is a pumpkin- shaped enclosure that we call an "8-ball", which includes a display screen 1052 and ethernet ports 1055 and 1056.
  • enclosure 101 can be made smaller.
  • Enclosure 1054 can be placed anywhere in the vicinity of the units (i.e., storage container or containers) it is controlling. Functionality is the same in all respects.
  • Ethernet port 1055 is used as an external network connection for reporting to the back end inventory management systems, depicted by reference numeral 1057 in Fig. 14.
  • communication between controller 103 and the backend system 1057 is through an ethernet interface using via standard web services provided on TCP port 80 or secure web services over TCP port 443 (SSL). Such communication includes but is not limited to software upgrades, diagnostic information, inventory transactions, and advertising.
  • communications are initiated from apparatus 100 only, e.g., from apparatus 100 to backend system 1057.
  • apparatus 100 could send inventory information via a network connection to backend system 1057.
  • An advantage of this is to provide a firewall-friendly and network administrator-friendly communication mechanism.
  • outbound communication is acceptable (for a firewall)
  • unsolicited inbound connections are considered taboo and could limit placement of the apparatus 100.
  • apparatus 100 and backend system 1057 will implement an HTTP reflector that allows for a persistent, firewall-friendly connection to be established.
  • HTTP reflector An example of this type of connection can be seen in online meeting service such as WebEx, and Microsoft Live Communications Server.
  • Microsoft Live Communications Server is one option we have for implementing this type of functionality.
  • the system's software shall support the dynamic discovery of devices as the number of connected secondary apparatuses 100 (as discussed below) increases.
  • the controller 103 shall (either by its operating system or by the Application Program) implement a DHCP server to handle IP addressing of devices (e.g., dynamic addressing) as they are connected. In other words, controller 103 will provide IP addresses to the secondary apparatuses 100 as they are connected. Controller 103 will then attempt to establish connections to the new devices (i.e., apparatuses 100).
  • the devices will be initialized and recognized by the controller 103 for use by attempting to send a given command set to see how the remote device responds. If the device accepts these commands, it will be initialized and installed for controller 103 to control. If the device does not accept these commands, controller 103 will move on to a next set of commands and repeat this process.
  • controller 103 shall also have a WatchDog timer available. This feature will allow the device to attempt to automatically recover if the software hangs.
  • RFID antenna 106 is external to the enclosure 101.
  • RFID antenna 106 could be disposed in a wall of storage container 200.
  • Fig. 3 depicts such an arrangement. In more detail, that figure shows two RFID antennae 106, each being located in a wall 203 of a respective one of a pair of storage containers 200 that sandwich apparatus 100.
  • That figure also shows another feature of the present invention.
  • the invention is not limited to having one RFID antenna 106 connected to RFID reader 102.
  • RFID reader 102 may be attached to plural RFID antennae 106.
  • the plural antennae may be used for reading areas within separate respective storage cabinets. For example, one antenna might be used to read an area within a first storage cabinet, while a second antenna might be used to read an area within a second storage cabinet. Again, such is shown in Fig. 3 which depicts a tower unit comprising top and bottom storage containers 200 sandwiching apparatus 100 and each having an RFlD antenna 106 connected to the same RFID reader 102 of apparatus 100.
  • RFID antenna 106 is a 13.56 MHz antenna, we prefer to provide a false back wall in the storage container 200, in which wall the antenna is integrally provided.
  • RFID antenna 106 is a 2.46 GHz antenna and storage container 200 is a refrigerator, we prefer to attach the antenna to the interior surface of the exterior metal chassis of the refrigerator. In that case, the antenna is disposed between the metal exterior wall of the refrigerator and the separate plastic wall of the interior of the refrigerator.
  • RFID antenna 106 could also be inside the storage container.
  • RFlD antenna 106 could be located on or within a shelf inside storage container 200. The location of RFID antenna 106 is not limited to any of the foregoing positions.
  • reference numeral 1001 denotes a front side of enclosure 101; 1002 denotes four screws for affixing front side 1001 to enclosure 101; 1003 denotes a top side of enclosure 101; 1004 denotes a back side of enclosure 101; 1005 denotes a ventilation system; 1006 denotes a power connector; 1007 denotes a power outlet; 1008 denotes an ethernet port; 1009 denotes a piano-style hinge that allows for the back side 1004 of enclosure 101 to fold down to grant access to the interior of enclosure 101 ; 1010 denote holes in enclosure 101 for use with bolts or screws; 1011 denote access ports (e.g., holes or openings) in enclosure 101, which can be used for wiring; 1012 denotes a Z bracket that allows for a tray with electronics to be slid
  • enclosure 101 is designed to hold the electronic components of apparatus 100.
  • Access ports 1011 i.e., openings or holes are located on, for example, the bottom (exterior) side of enclosure 101 and/or the top (exterior) side of enclosure 101.
  • two access ports or openings 1011 are located at the rear end of the bottom side, as shown in Fig. 6. These openings are used to run wiring from enclosure 101 into a storage container 200 located below apparatus 100. Such wiring may provide, for example, an electrical connection between RFK) reader 102 and RFID antenna 106 of this lower storage container (for the electrical connection, see item 107, as discussed above).
  • Two additional access ports 1011 optionally may be located at the rear end of the top side 1001. These openings are used to run wiring from enclosure 101 to a storage container 200 located above apparatus 100. Such wiring may provide, for example, an electrical connection between RFID reader 102 and an RFID antenna 106 of this upper storage container (for the electrical connection, see item 107, discussed above).
  • These wires may include but are not limited to antenna cables (such as, for example, item 107 as discussed above), power cables, and wiring for unit security. These wires then go directly into a storage container above or below the apparatus through holes 1013 in storage container 200 (shown in Fig. 7); this prevents the wires from being tampered with.
  • an advantage of the present invention is that, as discussed above, the enclosure is configured to defend the apparatus from attack, e.g., to prevent a person with wire snippers from cutting an electrical connection such as a wire connecting the RFID reader and the RFK) antenna.
  • the enclosure has an access port (e.g., opening) on a side of the enclosure that faces an exterior surface of the storage container. A wire from the RFID reader to the RFID antenna can pass through the opening and into the storage container through a corresponding opening in the storage container.
  • the wire is protected from attack because it is not externally accessible or exposed.
  • Enclosure 101 is also designed to be portable so that it can be easily attached and removed from on top of storage container 200. This is accomplished by attaching screws in the enclosure 101 into the storage container 200 above and/or below. For example, screws could be used in conjunction with holes 1010 in enclosure 101, as shown in Fig. 6, and holes 1014 in enclosure 200, as shown in Fig. 7, to fixedly mount enclosure 101 to storage container 200. [0116] In more detail, to connect the apparatus 100 to the storage container 200, a bolt would be inserted from inside the enclosure 101 through holes 1010 and 1014 and be screwed into the storage container 200.
  • the holes 1010 in the enclosure 101 will be slightly larger than the bolt so a washer will have to be placed on the bolt inside the enclosure 101. A wing nut will then be used to hold the storage container 200 and apparatus 100 together. As a result, the wiring holes 1011 will align with the wiring holes 1013 in the storage container 200. This allows for the wires to be secured inside the unit and not accessible on the outside.
  • a storage container 200 e.g., a cabinet
  • Screws or bolts do not have to be the only option; a magnetic locking mechanism using magnets, or some other locking mechanism could be used.
  • FIG. 12 shows three tower units 300.
  • the first tower unit 300 comprises a storage container 200 labeled Al attached to the top of the apparatus 100 labeled A, with another storage container 200 labeled A2 attached to the bottom of the apparatus 100.
  • the second tower unit 300 comprises a storage container 200 labeled Bl attached to the top of the apparatus 100 labeled B, with another storage container 200 labeled B2 attached to the bottom of the apparatus 100.
  • the third tower unit 300 comprises a storage container 200 labeled Cl attached to the top of the apparatus 100 labeled C, with another storage container 200 labeled C2 attached to the bottom of the apparatus 100.
  • the RFID reader 102 of the apparatus 100 can be connected to two RFID antennae, one for the top storage container 200 and one for the bottom storage container 200.
  • the enclosure's tray system [0121] Now we will describe a preferred arrangement within apparatus 100's enclosure 101. Inside the enclosure 101, preferably there are two trays. One tray is designed to hold the more stationary items (such as things that have wires running out the back of the apparatus) while the other holds all other components. [0123] Front side 1001 of apparatus 100 comes off when the four screws 1002 are removed in the front, as shown in Fig. 4. This provides access to the electronics.
  • Back side 1004 of the enclosure 101 is on hinge 1009. When two screws are removed, this piece (i.e., back side 1004) folds down providing additional access. [0125]
  • the front side 1001 and back side 1004 can be redesigned as necessary to change with hardware. This design does not affect the design of the enclosure 101's chassis, thus reducing the cost and maintaining modularity.
  • the trays in the apparatus 100 are on the rail mount system 1012.
  • the trays themselves have a din rail mounted to them so that the electronics can be easily mounted.
  • the trays are then able to slide out with the electronics on them so that the parts can be serviced.
  • There will be quick connectors on the appropriate wires so that when a drawer is taken out, the wires are not strained.
  • a multitude of trays can be installed in this configuration by adding the slide rails and appropriate tray to maintain the modular design. If hardware ever needs to be changed in the device, no work has to be done in the chassis itself; only the slidable electronics trays will need a redesign, thus reducing cost.
  • Back side (removable service panel) 1004 has several pieces that will be designed into it. They include but are not limited to an IPC power connector 1006, a US style power outlet 1007, at least one Ethernet coupler 1008 (as will be discussed below in more detail, preferably there are at least two Ethernet couplers, and more preferably, even more than two), and a ventilation system with 80mm fans 1005.
  • the US style power outlet should be interchangeable with any outlet style from around the globe.
  • the 80mm fans should have a low noise level ( ⁇ 45dBm) as well as a low to moderate air flow rating (25-60 cfm). One fan should blow air into the enclosure 101 while the other should blow air out.
  • the fans should be 24V.
  • Ethernet coupler there should be at least one Ethernet coupler to interface with a network (e.g., WAN).
  • a network e.g., WAN
  • there should be at least four connectors such as Ethernet couplers — one of which supplies the WAN connection while the other three are to be used to communicate to secondary apparatuses 100 when plural apparatuses 100 are networked together.
  • Fig. 11 shows that, for example, six ethernet connectors 1051 could be provided on the back side 1004 of enclosure 101 to provide connectivity such as that discussed above. [0129] Turning to the two trays (or drawers), the left drawer will hold the RFID reader 102, the Ethernet hub 104, and a 24V power supply.
  • the right drawer will contain an optional 24V UPS system with battery, an Ethernet based I/O block and any other hardware that may be needed.
  • the controller 103 is mounted to the inside of the front removable panel, preferably. [0130] Now, we will describe the preferred internal wiring in apparatus 100.
  • One feature of our new modular hardware design is a modular scalable bus for all the components to communicate across. To meet this requirement, an Ethernet bus was chosen. Connections using an Ethernet based bus are as follows starting from the controller 103, as shown in Fig. 9.
  • controller 103 has at least two ethernet ports — one for internal communications (e.g., to communicate with RFID reader 102 and ethernet I/O block 110) and one (e.g., a WAN link coupler) for connection to a network such as the internet for reporting back to headquarters (e.g., to a backend inventory management system database 1057).
  • An advantage of providing dual ethernet ports is for network segregation. This protects the end user's network (which would typically be connected to the WAN link coupler) from traffic not bound for their network (i.e., traffic between internal components such as controller 103 and reader 102) and protects the equipment (such as, for example, reader 102) from malicious access.
  • Controller 103 should act as an intermediary that allows access from outside apparatus 100 to internal components (e.g., reader 102) as necessary. Meanwhile, the network attached to apparatus 100's WAN link coupler will not be interrupted or interfered with by apparatus 100's traffic (i.e., traffic between components such as for example, reader 102 and controller 103).
  • ethernet hub 104 is an 8-port Ethernet din rail mountable hub and an ethernet cable connects controller 103 to hub 104. Another Ethernet cable connects the hub 104 to the RFID scanner 102 inside the apparatus 100. Another Ethernet cable connects the hub 104 to an Ethernet-based I/O block 110.
  • the controller 103, ethernet hub 104, and I/O block 110 are being supplied by B&R Automation.
  • incoming 120/240VAC power will connect through the switched IPC connector. Inside, this power will be split. One lead will run to a set of at least two outlets (these can be customized per country the system will be placed in) while the other will lead to a power supply.
  • the output of the power supply is 24V DC @ a minimum of 7 amperes.
  • This output has 3 possible options: (a) the power goes directly into a master relay that provides a hard reset capability; (b) the power goes into a battery charging system similar to the design of the current system then leading to a master relay that provides a hard reset capability; and (c) the power goes into a UPS system that controls the battery, charging and error reporting in relation to power. Power out of the UPS connects to a master relay that provides a hard reset capability.
  • the master relay has a control line that flows from the local I/O block 110. Out from the master relay, power will be moved to a distribution block. This can then be pushed out to the controller 103, I/O block 110, Ethernet hub 104, and RFID scanner 102 as the primary power consumers.
  • the controller 103 at present has at least two USB ports. This acts as a primary (or secondary) interface into the controller 103 in case it is malfunctioning in some way.
  • the access control method will connect into one of these ports — it may be a passkey (operating at 125KHz), a pin key (for those that do not have an HMI/controller 103 with a touch screen), a magnetic strip reader, or a biometric reader (retina, fingerprint, DNA, etc.), for example.
  • the other USB port will not be available externally.
  • a USB hub can be hooked up to either port on the controller 103 to expand USB usage.
  • a keyboard, mouse, and flash drive could then be used in the troubleshooting process or software update process. This also provides expandability for future devices to connect to the controller 103.
  • serial port There is one serial port on the controller 103 at present. As serial is an older technology, it is becoming harder to find and support devices that use a serial connection. However, we will provide the port as a means of connecting some external peripheral. This port can also be used as a means to interface with any legacy hardware that may want to be included.
  • FIG. 10 shows three apparatuses 100 networked tegether via ethernet connections.
  • One of the apparatuses 100 is considered to be the primary apparatus, while all other apparatuses 100 that connect to the primary apparatus 100 are secondary and connect via Ethernet.
  • the primary apparatus 100 is one that has the controller 103 in it.
  • primary apparatus 100 also includes ethernet hub 104 which connects to the RFID reader 102 and controller 103 in primary apparatus 100, as well as to the RFID readers 102 in each of the two secondary apparatuses.
  • the secondary apparatuses 100 preferably do not have a controller 103 in them.
  • Ethernet hub 104 there is also no Ethernet hub 104 inside the secondary apparatuses 100, although this does not mean one cannot be included. Instead, I/O block 110 is used as an ethernet hub.
  • the controller 103 controls the RFID reader 102 that is in the primary apparatus 100 in which the controller 103 is located, as well as the RFID readers 102 that are in each of the secondary apparatuses 100. Such control includes, as discussed above, generating commands to instruct the RFID reader 102 to initiate a scan, obtaining a list of tags read from the RFID reader, and determining a difference between that list and an earlier list to determine a change in inventory.
  • controller 103 More details of controller 103
  • the I/O block 110 in Fig. 9 has a two port Ethernet hub built into it.
  • An Ethernet line coming from the primary apparatus 100 would connect into a coupler on the secondary apparatus 100 and then connect to the I/O block 110.
  • the second I/O Ethernet port on the I/O block 110 would then be used to connect to the RFID scanner (i.e., RFID reader 102) inside the secondary apparatus.
  • controller 103's software program i.e., the Application Program
  • the Application Program shall be a multi-threaded program allowing access to one storage container 200 connected to one apparatus 100 in a network while another storage container 200 is being scanned by its RFID reader 102.
  • This RFID reader 102 can be in a master or secondary apparatus 100. Therefore if a user has accessed one storage container 200, and that container is being RFID scanned, another user can immediately come up to the same apparatus 100 where the controller 103 is located, present a pass to authenticate himself or herself, and then gain access to another container 200 provided that container 200 is not actively being RFID scanned at the time of access. If the user tries to gain access to any container 200 while it is being scanned, a please wait message would be displayed.
  • the Application Program flow control i.e., the Application Program
  • Fig. 16 shows operation of the apparatus 100 and its Application Program in a case where a human-machine interface (HMI) is available;
  • Fig. 17 shows operation in a case where a HMI is available, but a user bypasses normal operation to administer the apparatus; and
  • Fig. 18 shows operation in a case where an HMI is not available.
  • step 4000 represents the starting point of the flow control.
  • controller 103 powers up or reboots.
  • step 4002 the operating system (OS) of controller 103 is started. For example, where the OS is Windows CE, controller 103 boots into Windows CE.
  • step 4003 the Application Program is started. Unless otherwise specified, the remaining steps discussed represent flow control in the Application Program. The Application Program shall store an information transaction to indicate that the Application Program has begun the startup sequence.
  • step 4004 the Application Program starts the Hardware Watchdog Timer. The Application Program should ping the Watchdog continuously otherwise the device will reboot.
  • the Application Program shall check to see if the Application Program was properly shutdown.
  • the Application Program shall store an error transaction, if the Application Program was not properly shutdown.
  • the Application Program shall also clear a flag (indicating shutdown status).
  • the Application Program will check to see if a human-machine interface (HMI) is present.
  • HMI human-machine interface
  • the Application Program shall prevent denial-of-service (DoS) attacks against the unit (by letting a user continually try to bypass the sequence).
  • DoS denial-of-service
  • the Application Program shall provide this functionality as early in the process as possible to minimize a problem from occurring that would prevent access to the diagnostics.
  • step 4006 If it is determined at step 4006 that an HMI (e.g., touch screen display) is available for apparatus 100, then at step 4007, the Application Program shall wait for bypass. [0152] In more detail, the Application Program shall display a screen with the prompt, "Tap screen to bypass startup sequence". This screen shall allow the user the opportunity to interrupt the startup sequence for testing, diagnostics, tech support, etc. [0153] If in step 4008 it is determined that the user has tapped the screen to bypass the startup sequence within a predetermined amount of time (e.g., less than or equal to ten seconds), then flow control passes to step 4025 in Fig. 17, as discussed below.
  • a predetermined amount of time e.g., less than or equal to ten seconds
  • step 4008 If, on the other hand, it is determined in step 4008 that the user does not tap the screen to bypass the startup sequence within the predetermined amount of time, then flow control passes to step 4013.
  • step 4013 the Application Program loads communication configuration settings from a database so that the apparatus 100 can configure itself for communication.
  • the Application Program will connect to the backend system and send all currently stored transactions (e.g., records showing that a certain user has taken a certain tag or tags from a certain storage container) that have not been sent. [0157] This step will also allow the unit to receive any updates (e.g., software updates) from the backend system. If so directed by the backend system, the Application Program will run an application update routine to update software such as the Application Program. The Application Program should reboot after the application update, and thus return to step 4000. [0158] At step 4015, the Application Program will start peripherals. In more detail, it shall initialize the RF reader 102, the transponder, and the I/O block 110.
  • the Application Program will start peripherals. In more detail, it shall initialize the RF reader 102, the transponder, and the I/O block 110.
  • the Application Program shall connect to and initialize devices such as these based on the loaded configuration parameters.
  • the Application Program shall proceed as follows in this regard: (1) using reflection, create an instance of each required device library; (2) add device instance to device manager, verify that all devices successfully replied to ping command; and (3) engage locking mechanism.
  • the Application Program starts background processing (BP).
  • BP background processing
  • Application Program shall perform a standard diagnostic check, and the following additional diagnostics: (1) check door status and (2) perform a base inventory scan if the door is closed.
  • the Application Program shall then analyze diagnostics to determine if the unit should go into Interactive or Lockdown mode.
  • step 4017 The following is a list of conditions considered in step 4017 which could cause the apparatus 100 to enter into Lockdown mode in step 4019:
  • the Application Program shall enter Lockdown mode, if the interior temperature falls outside of specified range (as defined in the configuration); [0163] (2) the Application Program shall enter Lockdown mode, if a request has come in from the web service to enter this mode;
  • the Application Program shall compare the results of the base inventory scans with the last known scan and enter Lockdown mode if more then X number of products have been removed (X shall be a configuration parameter); [0165] (4) the Application Program shall enter Lockdown mode if there is no more space to store transactions (the application shall need enough storage space left to store an info-transaction to indicate lockdown);
  • the Application Program shall enter Lockdown mode if the door was open when the unit was turned on.
  • the Application Program needs to continue starting up and enter the interactive mode, so that the apparatus 100 can support multiple units (i.e., to support a configuration where one apparatus 100 handles multiple storage containers). In other words, if there are six storage containers, and one is open and five are closed, the apparatus 100 should not lockdown the five that are closed. Instead, the Application Program sends an information transaction to the backend system to indicate that the Application Program started up with the door open. Once the door is closed, the Application Program performs a baseline inventory scan (i.e., controls the RFID reader 102 to initiate RFID scanning to obtain a baseline inventory scan).
  • a baseline inventory scan i.e., controls the RFID reader 102 to initiate RFID scanning to obtain a baseline inventory scan.
  • the Application Program shall send (e.g., to the backend system) a diagnostics message, such as a message indicating that the unit has completed its startup sequence and is entering either Interactive or Lockdown mode.
  • the Application Program shall also send (as part of the same message) the results of the diagnostics.
  • Lockdown Mode is carried out.
  • the Application Program shall send a message to the web service (i.e., the backend system) that unit is in Lockdown mode.
  • the Application Program shall show advertisements as normal, and shall provide a screen display indicating that the device is in Lockdown mode.
  • the Application Program shall restrict the user from opening the door, unless the user authenticates to the full administrator role (i.e., authenticates himself as an administrator).
  • the Application Program shall continue to send heartbeats at configured intervals as part of the background processing.
  • the Application Program shall remain in Lockdown mode until the receipt of a Cancel Lockdown mode message from the web service (i.e., backend system).
  • the Interactive Mode is initiated. If an HMI is present, the Application Program will start displaying advertisements to the user on the display screen, and shall wait for the user to authenticate.
  • step 4009 the Application Program shall wait for a user to present a pass or credentials (e.g., PIN, biometrics, RFID badge, magnetic card, etc.) to authenticate himself.
  • a pass or credentials e.g., PIN, biometrics, RFID badge, magnetic card, etc.
  • step 4010 the user is authenticated by the Application Program based on the pass presented.
  • step 4011 the Application Program determines if the user's credentials are valid or not. If the user's credentials are invalid, then flow control passes to step 4012.
  • step 4012 the Application Program uses the HMFs display to inform the user that the user of his invalid login, and flow control returns to step 4009.
  • step 4011 If the user's credentials are found in step 4011 to be valid, the flow control passes to step 4020.
  • the Application Program enters a main processing loop that we refer to as the LaunchPad.
  • the Application Program shall display a screen on the HMI in response to the user being authenticated.
  • the screen shall include the following information: (1) welcome message with the user's first name; (2) a transaction confirmation screen; (3) an elevate permissions button — elevated permissions is the process of temporarily granting a user who is not a member of the full administrator role, full administration rights, after the completion of a challenge/response process (the duration of the elevated permission shall last until the user logs out); (4) a button for each storage container controlled by the Application Program (clicking the button will unlock that storage container); and (5) for limited and full administrator logins only, (a) an inventory restock button; (b) a maintenance button; and (c) a diagnostics button.
  • step 4008 If it is determined at step 4008 that the user has requested bypass (e.g., by tapping the screen within 10 or less seconds), then flow control continues with step 4025 in Fig. 17.
  • steps 4009, 4010, and 4012 are similar to those described above with respect to Fig. 16. Thus, the user will now need to authenticate himself. If the user is not authorized to bypass the startup sequence, then in step 4012, the Application Program shall display a screen with a message that reads, "You do not have access to bypass startup sequence" for 2 seconds indicating failure, and then continue the boot process, if the user presents invalid credentials or after 3 invalid attempts or 10 seconds have expired. If it is determined in step 4021 that the credentials are valid, then flow control continues to step 4022.
  • a diagnostics screen is displayed to the user, along with an option to load the configuration settings (here, the user can administer apparatus 100 by performing diagnostics or changing the configuration settings).
  • Fig. 18 shows the flow control where it is determined that an HMI is not available. This is similar to Fig. 16, but since there is no display, there is no advertising.
  • background processing is started in step 4016, the apparatus 100 is in a state where it is ready to unlock a storage container and, in response to closing of the door of the storage container, to perform RFID scanning as discussed above.
  • FIG. 12 Another network system is shown in Fig. 12.
  • the middle tower unit 300 is a master tower that houses the controller 103 (and HMI), whereas the left and right tower units 300 are secondary towers that do not have controllers 103.
  • the secondary towers connect to the master tower 300's controller 103 via ethernet so that controller 103 may control the RFID readers 102 of the two secondary towers. This enables the placement of several towers with the possibility of any storage type to be located in close proximity. This maintains the modular approach of mixing and matching the required storage while reducing the cost of hardware.
  • the invention has been discussed above with respect to a storage container, it is envisioned that the invention could also be applied to other areas intended to be RFID-scanned, such as, for example, an open-face shelf. In such a case, the enclosure 101 could be attached to the shelf. And RFID antenna 106 could be mounted on or in a shelf.
  • Another embodiment is an application of the invention for museum use or the like. For example, a system could be set up where personnel have limited access or registered access to a room or an area. Access would be provided in accordance with an RFID pass, biometric scan, or magnetic card swipe, for example.
  • any movement or removal of tagged objects or artifacts in the room would be registered (i.e., charged) to that individual person, thus allowing check-in and check-out of objects/artifacts from the room or area.
  • wiring connecting the apparatus 100 to the RFID antenna 106 would not be visible or externally accessible.
  • the antenna or antennae 106 could be placed on a shelf or shelves external to the apparatus 100.
  • FIG. 15 This alternate embodiment is schematically depicted in Fig. 15.
  • reference numeral 2001 indicates two artifacts or objects, each having an RFID tag 2002, which are respectively placed on a pair of open shelves 2003, each shelf having an RFID antenna 106.
  • Apparatus 100 uses the two RFID antennae 106 to detect the presence or absence of the tagged artifacts or objects.
  • Reference numeral 2004 denotes an authentication unit, connected to apparatus 100, that authenticates a user using a pass such as an RFID pass or magnetic card or the like or by using biometrics, and permits access to a room (indicated by the dotted line) in which the artifacts or objects are located.
  • each apparatus scanning a respective pair of cabinets i.e., the first RFID reader apparatus scans one pair of cabinets, the second RFID reader apparatus scans a second pair of cabinets, and the third RFID reader apparatus scans a third pair of apparatuses
  • the present invention is not limited to using only three RFID reader apparatuses. Instead, many more RFID reader apparatuses could be used.
  • the RFID reader apparatuses could be networked together as discussed above. In such a case, one RFID reader apparatus could be a primary apparatus and the other RFID reader apparatuses could be secondary apparatuses, as also discussed above. Preferably, the secondary apparatuses would be within an acceptable distance from the primary apparatus to facilitate their interconnection.
  • networking apparatuses 100 together using an Ethernet LAN as a preferred technique, they may also be connected by other techniques, such as WiFi (wireless), Bluetooth, etc. for operation.
  • RFID reader 102 While we have described above using any of an ethernet connection, serial connection, IEEE 1394 connection, USB connection, and telephone connection for connecting apparatus 100 to a remote backend inventory management system or another such apparatus, alternatively other techniques such as wireless (e.g., WiFi) or Bluetooth could be used.
  • RFID reader 102 and controller 103 could be connected by a cable such as, for example, a crossover cable. Such might be done if only one apparatus 100 were present.
  • I/O block 110 via ethernet (to controller 103 via ethernet hub 104), the invention is not limited to use of ethernet.
  • the controller 103 may also have other interfacing methods such as GPIO and I 2 C.
  • an alternative to using the ethernet-based I/O block 110 would be to instead use a non-ethernet-based interface board for polling and controlling I/O points. These I/O points would be controlled by the GPIO and I 2 C bus from the controller 103.
  • This non-ethernet-based interface board preferably would only be used in apparatus 100 where the controller 103 is present. Any remote I/O blocks preferably would remain Ethernet based.
  • the non-ethernet-based interface board preferably has a plurality of inputs and outputs (such as digital, analog, etc.) as well, can also provide temperature information to the controller, and can also control a lock on a storage container 200, at the direction of the controller 103, to lock and unlock the door of storage container 200 to control access to the storage container 200.
  • a plurality of inputs and outputs such as digital, analog, etc.
  • I/O block 110 is ethernet-based or not, as discussed above, preferably a door position sensor is provided (for apparatus 100), which sensor is connected to I/O block 110.
  • the door position sensor can be used to detect when the door is open and closed. This allows for RFID reader 102 to only scan storage container 200 when the door is in a closed, locked position. The sensor can also inform controller 103 when there is an illegal entry into storage container 200.
  • an authentication reader is provided (for apparatus 100).
  • the authentication reader is a device that interfaces with the controller 103 via serial, USB, etc., to authenticate an end system user (i.e., a user).
  • the device could be an LF (125KHz) pass reader, magnetic stripe reader, a biometric device, etc. to name a few.
  • controller 103 preferably communicates with RFID reader 102 via ethernet, the invention is not so limited. Alternatively, controller 103 could communicate with RFID reader 102 via Ethernet or USB.
  • the VO block 110 i.e., interface board
  • I 2 C bus I 2 C bus
  • controller 103 the controller 103's operating system could be Linux-based.
  • a Java or C++ based program could be used on controller 103 as well, as an alternative.
  • display 1052 has been described above in a preferred embodiment as an LCD screen, it could be, for example, a TTL or LVDS LCD screen, which would be connected to the controller 103.
  • antennas While we have described preferred antenna placement above, when 900MHz antennas are used, we prefer to attach the antenna to the interior surface of the exterior metal chassis of the refrigerator or cabinet.
  • the antenna is preferably disposed between the metal exterior wall of the refrigerator and the separate plastic wall of the interior of the refrigerator.
  • a 12V DC power system could be used to power the system.
  • the relay to provide a hard reset to the entire system is an optional device that may be omitted.
  • FIG. 1 A preferred embodiment which uses two trays to hold various components.
  • FIG. 19 through 21 A preferred embodiment which uses two trays to hold various components.
  • one tray could be used.
  • FIG. 19 through 21 A preferred embodiment which uses two trays to hold various components.
  • one tray 1060 inside enclosure 101 could be used to hold all electronics.
  • the front side 1001 of apparatus 100 is attached to the electronics tray 1060.
  • the HMI screen 1058 (corresponding to screen 1052 in the first embodiment) is attached to front panel 1001.
  • eight screws 1002 have to be removed as shown in Fig. 21.
  • the electronics tray 1060 and front panel 1001 then can slide out of enclosure 101 on drawer slides 1059 as shown in Fig. 20. This provides access to the electronics.
  • the back side 1004 of enclosure 101 as shown in Fig.
  • a hinge 1009 When the six screws 1002 are removed, the back panel folds down providing access to additional pieces.
  • the power outlets 1007 are mounted to a panel 1061 that can be replaced to allow for different power outlets.
  • An additional power switch 1062 controls AC power to the internal electronics. However, switch 1062 does not control power to outlets 1007.
  • Several Ethernet couplers 1008 can be seen in Fig. 20. This design could be used when connecting several tower units 300. [0200] While we have described above using a controller 103 that is separate from the RFID reader 102, the invention is not so limited. Some RFID readers allow installation of an application (i.e., a software program) on the RFID reader itself.
  • RFID readers do not offer (a) a convenient way for analog input (e.g., reading the temperature) or (b) a video display.
  • Another advantage of using a separate controller 103 is that it allows one to swap out RFID readers for different applications if needed.
  • apparatus 100 instead of communicating with a backend database system, apparatus 100 might instead be configured to communicate with a middleware system (such as BizTalk RFID or some other middleware system).
  • middleware system such as BizTalk RFID or some other middleware system.
  • the apparatus 100 can monitor the temperature of a cabinet for example.
  • the apparatus 100 can send such information via a network connection to a remote apparatus (e.g., backend 1057).
  • System health information other than temperature can also be sent.
  • controller 103's Application Program should send back to the remote apparatus a health status document as to how the system is doing, including, for example, memory usage, internet connectivity state, etc., as well as how any connected enclosures are doing, e.g., temperature, door status, etc.
  • smart devices e.g., a device external to apparatus 100
  • people may use in conjunction with products or items stored in storage container 200.
  • Such a smart device is a device that performs scientific testing upon a product or item stored in storage container 200.
  • these smart devices may allow for interfacing via a serial or USB connection.
  • a serial or USB connection For example, such a smart device could be connected to controller 103 via a connection such as, for example, serial or USB. This would allow for interfacing to the smart device.
  • the interfacing could be through the HMI or middleware/backend.
  • the smart device would then enjoy the same benefits of the system being connected to the middleware/backend.
  • the controller 103 could query the smart device for health information, e.g., how many runs the smart device had completed, and send on this report to the middleware/backend.
  • the smart device could also be configured to send results of scientific tests the device had been performing to the end user (via the connection to the middleware/backend) once the tests had been completed. Or the smart device could receive remote updates (from the middleware/backend) to its running software.
  • One example of a smart device as discussed above is Promega's Maxwell® 16 robotic DNA purification machine. This machine currently has a serial port integrated into the machine so that firmware upgrades can be performed on the machine. Thus, for example, the purification machine could be placed on top of enclosure 101 and connected to controller 103 via a serial connection. Fig.
  • controller 103 is a schematic diagram showing the serial interconnection between controller 103 and the purification machine, which is identified in the drawing by reference numeral 5001.
  • controller 103's Application Program knows that the purification machine 5001 is connected to it, and has established two way communication between controller 103 and the purification machine.
  • the controller 103 When the controller 103 communicates with the backend/middleware 1057 (via, for example, the Internet connection), it sees that the purification machine, which is connected to it by the serial connection, needs to have a new version of firmware applied. Therefore, the controller 103 downloads the update and then applies it to the purification machine via the serial connection. The controller 103 would then report back (to the backend/middleware 1057) the success or failure of the firmware upgrade.
  • the controller 103 could act as an intermediary between the purification machine and the backend/middleware 1057, i.e., to forward to the backend/middleware 1057 test results provided to controller 103 by the purification machine. Assume, for example, that the purification machine were running one of its purification runs. In conjunction with the purification machine printing out the results, the results could also be communicated by the purification machine to controller 103 via the serial connection. Controller 103 could then send the results back to the backend/middleware 1057 (via a network connection). An e-mail or other notification could be then sent (by the backend/middleware 1057) to the researcher who had started the run saying the run had been completed.
  • results could then be processed further or more calculations done on a computer that could not be performed on the purification machine. These in-depth results could then be e-mailed back to the researcher (from that computer). Or the results could be made available (by that computer) via a webpage. All previous results could also be saved and cross-referenced (by that computer). [0209] Furthermore, just as apparatus 100 can send its own system health information to the backend/middleware 1057, the purification machine could also report its system health information to controller 103 for sending back to the backend/middleware 1057 via a network connection. By way of example, assume that the purification machine has been operating under heavy load for some time. As with any mechanical device, parts and pieces may wear out.
  • the purification machine 5001 could send a warning to controller 103 (via the serial connection) saying that there are problems occurring with some component of the purification machine.
  • the component may not have failed, but may be close to failure. By reporting when a component is close to failure, this allows for a more proactive approach to remote service.
  • the controller 103 receives the warning, and sends a message to backend/middleware 1057 via a network connection. Once the backend/middleware 1057 receives the alarm or error, appropriate personnel can be alerted to fix the device or send replacement parts out. [0210] Furthermore, the backend/middleware 1057 could collect all this data (e.g., system health information from the purification machine 5001) and make it available to the end researchers.
  • the purification machine is only one example of a smart device that could be connected to controller 103.
  • Promega has several robotic devices that could be used in place of the Maxwell® 16 DNA purification machine. We envision that any lab device that could benefit from these types of services and reporting could be connected (to controller 103).
  • FIG. 23 is a schematic view showing the front panel 1001 secured by a key lock 5002 in an embodiment of the present invention that uses a locking mechanism.
  • the present invention provides an RFID reader with an enclosure that allows it be securely affixed to a storage container such as a refrigerator without exposing wiring to tampering, and thus has use as an improved mounting technique.
  • the present invention also provides an RFID reader that uses plural antennae to scan plural respective storage containers, thereby avoiding the need to have plural RFID readers, and thus has use as an improved RFID scanning technique.
  • the present invention also provides a networked system of master and slave RFID apparatuses, wherein a master RFID apparatus contains a controller for controlling the slave RFID apparatuses which lack such a controller, and thus has use as an improved RFID scanning system.

Abstract

An apparatus including an enclosure for an RFID reader to be affixed to a storage container; an RFID reader that scans a first storage container using a first antenna and a second storage container using a second antenna; and a networked system of RFID apparatuses including a primary RFID apparatus and secondary RFID apparatuses that are controlled by the primary RFID apparatus.

Description

RFID READER ENCLOSURE AND MAN-O-WAR RFID READER SYSTEM
[0001] CROSS-REFERENCE TO RELATED APPLICATIONS
[0002] This application is a continuation-in-part of U.S. Patent Appln. No. 11/687,272 filed March 16, 2007.
FIELD OF THE INVENTION
[0003] The present invention relates to an RFID reader apparatus, system, and method.
[0004] BACKGROUND OF THE INVENTION
[0005] An RFK) reading system has been developed which can, for example, read RFK) tags stored within a cabinet, a refrigerator, a room, etc. Based on the tags read, the system can determine inventory information. One example of such a system is Dearing, et al.'s US 2002/0183882 Al from Promega Corporation.
[0006] SUMMARY OF THE INVENTION
[0007] In one aspect, the present invention relates to an apparatus comprising: (a) an enclosure; and (b) an RFID reader disposed in the enclosure, wherein the enclosure is configured to be mounted on an exterior surface of a storage container, wherein the RFK) reader is configured to perform RFID reading for an area inside the storage container using an RFID antenna external to the enclosure, wherein the RFID antenna is disposed in the storage container, wherein the enclosure has an opening on a side of the enclosure, and wherein an electrical connection between the RFK) reader and the RFID antenna extends through the opening of the enclosure in such a manner that the electrical connection is not externally accessible when the enclosure is mounted on the exterior surface of the storage container. Preferably, the apparatus further comprises a human-machine interface including a display screen. Preferably, the apparatus further comprises a controller that is configured to (a) send an instruction to the RFlD reader to perform RFID reading, (b) receive a RFID scanning result from the RFID reader, and (c) send information in response to the RFID scanning result to a database system via a network connection. Preferably, the RFID antenna is disposed within a wall of the storage container but it is not required that it be so disposed. Preferably, the storage container is a cabinet. Preferably, the cabinet is a refrigerated cabinet. A human-machine interface for the apparatus may use a display provided separately from the enclosure. Preferably, the opening of the enclosure communicates with an opening on the exterior surface of the storage container when the enclosure is mounted on the exterior surface of the storage container.
[0008] In another aspect, the present invention relates to an apparatus comprising: an RFID reader configured (a) to perform RFID reading for an area within a first storage container using a first antenna and (b) to perform RFlD reading for an area within a second storage container using a second antenna. Preferably, the apparatus is connected to the first storage container and the second storage container. Preferably, the apparatus is disposed between the first storage container and the second storage container. Preferably, the apparatus is connected to the first storage container and the second storage container so that an electrical connection between the RFID reader and the first antenna is not externally exposed and an electrical connection between the RFID reader and the second antenna is not externally exposed. Preferably, wherein the first storage container is a cabinet and the second storage container is a cabinet, which cabinets may be refrigerated or ambient, for example. [0009] In yet another aspect, the present invention relates to a system comprising three of the aforementioned apparatuses, each scanning a respective one of three pairs of cabinets. [0010] In a still further aspect, the present invention relates to a method comprising performing RFlD reading for an area within a first storage container and an area within a second storage container using an RFID reader connected both to a first antenna and a second antenna, the first antenna being used for performing reading for the area within the first storage container and the second antenna being used for performing reading for the area within the second storage container.
- ? - [0011] In yet another aspect, the present invention relates to a system comprising: (1) a first apparatus comprising a first RFID reader configured to perform RFID reading using a first antenna; and (2) a second apparatus comprising (a) a second RFID reader configured to perform RFID reading using a second antenna, and (b) a controller configured to (i) control the first RFID reader and the second RFID reader and (ii) communicate via a network connection with an inventory management system. Preferably, the first apparatus and the second apparatus are connected via a local area network, and the second apparatus further comprises a network connection between the second RFID reader and the controller. Preferably, the controller comprises a user interface for controlling the first RFID reader and the second RFID reader. Preferably, the controller is configured to control the first RFID reader to perform plural RFID scans, to obtain a first RFID scanning result in accordance with the plural RFID scans by the first RFID reader, to control the second RFID reader to perform plural RFID scans, to obtain a second RFID scanning result in accordance with the plural scans by the second RFID reader, and to communicate with the inventory management system in accordance with the first RFID scanning result and the second RFID scanning result. Preferably, the first RFID scanning is based on a difference between plural RFID scans. [0012] In a still further aspect, the present invention relates to means for attaching an RFID reader to a refrigerator so that wiring between the RFID reader and an RFID antenna in the refrigerator is not externally exposed. [0013] Yet another aspect of the present invention is a system comprising: (1) a master RFID reading apparatus comprising an RFID reader and (2) one or more secondary RFID reading apparatuses each comprising a respective RFID reader, wherein the master RFID reading apparatus further comprises control means for controlling (a) the RFID reader of the master RFID reading apparatus and (b) via networking between the master RFID reading apparatus and the one or more secondary RFID reading apparatuses, the RFID reader of each of the one or more secondary RFID reading apparatuses. Preferably, the master RFID reading apparatus uses the RFID reader to perform RFID scanning of a storage container, and the one or more secondary RFID reading apparatuses use their respective RFID readers to perform RFID scanning of a respective plurality of other storage containers. [0014] These and other objects, aspects, advantages and features of the present invention will become more apparent from the following detailed description of the presently preferred embodiments taken in conjunction with the accompanying drawings.
[0015] BRIEF DESCRIPTION OF THE DRAWINGS
[0016] FIG. 1 is a perspective view showing an embodiment of the present invention, an
RFID apparatus which is mounted on a storage container such as a refrigerator;
[0017] FIG. 2 is a schematic diagram showing the interconnection of parts of the RFID apparatus according to an embodiment of the present invention; [0018] FIG. 3 is a cross-sectional view showing the mounting of an RFID antenna in a wall of the storage container;
[0019] FIG. 4 is a perspective view showing the front and top sides of an enclosure of the
RFID apparatus according to an embodiment of the present invention;
[0020] FIG. 5 is a perspective view showing the rear and top sides of the enclosure of the RFID apparatus according to an embodiment of the present invention;
[0021] FIG. 6 is a perspective view showing the bottom side of the enclosure of the RFID apparatus according to an embodiment of the present invention;
[0022] FIG. 7 is a perspective view showing a top side of the storage container;
[0023] FIG. 8 is a perspective view from front to back of the enclosure, with the front side of the enclosure removed;
[0024] FIG. 9 is a schematic diagram showing a preferred circuit arrangement for the RFID apparatus according to an embodiment of the present invention;
[0025] FIG. 10 is a schematic diagram showing a system of three RFID scanning apparatuses, one of which has a controller; [0026] FIG. 11 is a view of a preferred network interface for the enclosure of an embodiment according to the present invention;
[0027] FIG. 12 is a side view showing a system of three RFID scanning towers, two of which are slaves and one of which is a master; [0028] FIG. 13 is a perspective view showing a human-machine interface, called the
"8-ball", for use with an embodiment according to the present invention;
[0029] FIG. 14 is a rear view of the 8-ball human-machine interface of FIG. 13;
[0030] FIG. 15 is a schematic view showing a multi-antenna RFID apparatus according to the present invention for scanning two shelves in a museum to check for tagged objects or artifacts;
[0031] FIG. 16 is a flowchart showing operation of the software of the apparatus where a human-machine interface is available, in a normal mode;
[0032] FIG. 17 is a flowchart showing operation of the software of the apparatus where a human-machine interface is available, but the normal mode is bypassed;
[0033] FIG. 18 is a flowchart showing operation of the software of the apparatus in an apparatus where no human-machine interface is available;
[0034] FIG. 19 is a perspective view showing the front of an RFID apparatus of another embodiment of the present invention, with the front panel removed; [0035] FIG. 20 is a perspective view showing the back of the RFID apparatus of that embodiment;
[0036] FIG. 21 is a perspective view showing the front of the RFID apparatus of that embodiment with the front panel present;
[0037] FIG. 22 is a schematic diagram showing another preferred circuit arrangement for the RFID apparatus according to an embodiment of the present invention; and
[0038] FIG. 23 is a schematic view showing the front panel of an enclosure of an embodiment of the present invention, with a key lock.
[0039] DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0040] Fig. 1 shows an embodiment of the present invention. In that figure, reference numeral 100 denotes an RFID apparatus for performing RFID reading; reference numeral 101 denotes an enclosure of the apparatus 100; reference numeral 200 identifies a storage container; reference numeral 201 indicates a door of the storage container 200 that can open and close; and reference numeral 202 indicates the interior of the storage container 200, which is an area to be RFID scanned to determine the presence of any RFID tag or tags therein. [0041] As will be discussed hereinbelow in more detail, preferably, the apparatus further includes one or more of an ethernet connection (used for, e.g., TCP/IP communication over a network), a serial connection, an IEEE1394 connection, a USB connection, and a telephone connection. The foregoing can be used to send an RFID scanning result to a remote backend inventory management system (e.g., database, ERP system, or financial packages such as Microsoft Dynamics or Quickbooks), or to allow a plurality of the apparatuses to communicate with each other.
[0042] The storage container
[0043] The storage container may be, for example, a cabinet, ambient cabinet (i.e., room temperature cabinet), refrigerated cabinet (e.g., conventional refrigerator or freezer), etc.
[0044] The RFID apparatus
[0045] We will now describe RFID apparatus 100 in more detail. Preferably, apparatus 100 includes a modular enclosure 101 that can be mounted (i.e., is mountable) on storage container 200. Enclosure 101 preferably contains at least an RFID reader. [0046] Enclosure 101 may be mounted on storage container 200 in a variety of ways. For example, enclosure 101 may be mounted horizontally (e.g., on a side surface of storage container 200) or vertically (e.g., on a top or bottom of storage container 200). Preferably, enclosure 101 has corner holes through which enclosure 101 can be bolted to an exterior surface of storage container 200 (e.g., freezer, refrigerator, cabinet, etc.). Alternatively, magnets could be used. Preferably, enclosure 101 is securely mounted so it will not easily move around or fall off.
[0047] An advantage of the enclosure design is that it is a portable, retrofitable modular enclosure that can be connected by a field engineer to any type of storage container, cabinet, shelf, or the like in the field. For example, the engineer could install an RFK) antenna in the wall of a standard, conventional refrigerator and could bolt the enclosure to an exterior surface of the refrigerator.
[0048] Another advantage of the foregoing is that since the RFID reader with its circuitry for driving and controlling the RFID antenna preferably is all contained within the enclosure, rather than being disposed, for example, in the storage cabinet itself, it should be much cheaper and easier to access the RFID reader for servicing, upgrade, and the like. [0049] Fig. 2 depicts apparatus 100 in more detail. In this figure and all other figures, reference numerals that are the same as those in other figures have the same meaning, unless otherwise specified. In Fig. 2, reference numeral 102 denotes the RFID reader; reference numeral 103 denotes a controller (or controller circuit); reference numeral 104 denotes an ethernet hub; reference numeral 106 is an RFID antenna; reference numeral 107 is an electrical connection between RFID reader 102 and RFID antenna 106; reference numeral 110 is an I/O block; and reference numeral 1011 is an access port, opening, or hole in enclosure 101. [0050] The depicted connection between ethernet hub 104 and RFID reader 102 is an ethernet connection, and the connection between ethernet hub 104 and controller 103 also is an ethernet connection, preferably. In other words, in the preferred embodiment, controller 103 communicates with RFID reader 102 (via ethernet hub 104) using an ethernet network connection. Thereby, controller 103 can control, for example, the timing of initiation of an RFID scan by RFID reader 102 by sending a command across the connection, and, through the connection, controller 103 can, for example, receive the results of the scan from RFID reader 102. However, the invention is not limited to use of ethernet. Other communication techniques could instead be used (e.g., USB). [0051] As mentioned above, preferably the enclosure 101 contains at least RFID reader 102; optionally, controller 103, ethernet hub 104, and I/O block 110 may also be included along with RFK) reader 102, or they may be omitted. Preferably, all are included, or I/O block 110 is included with RFID reader 102 while controller 103 and ethernet hub 104 are omitted. [0052] As mentioned above, reference numeral 1011 denotes an access port, opening, or hole of enclosure 101 (e.g., an opening on the exterior surface of enclosure 101) through which electrical connection (e.g., wire or wiring) 107 passes to connect RFID reader 102 and an RFID antenna 106. By means of this electrical connection, RFID reader 102 can drive and control RFID antenna 106 to send and receive signals. Preferably, RFID antenna 106 is external to enclosure 101.
[0053] While we have described using one RFID antenna 106 for a storage container 200, the invention is not so limited. Instead, multiple RFID antennae 106 could be used for one storage container 200. Depending upon the type of products stored within the storage container 200, it may be preferable to have multiple RFID antennae 106 to scan one storage container 200.
[0054] The I/O Block
[0055] Preferably, apparatus 110 includes an I/O block 110. Preferably, I/O block 110 is connected to ethernet hub 104 by ethernet, and controller 103 is also connected to ethernet hub 104 by ethernet, so controller 103 can send and receive signals to and from I/O block 110. Preferably, I/O block 110 has a plurality of inputs and outputs (such as digital, analog, etc.) and has a built-in two-port ethernet hub. If controller 103 and ethernet hub 104 are omitted, the ethernet hub of I/O block 110 can be used to forward commands received from an external controller 103 to RFID reader 102. I/O block 110 can connect to an authentication unit such as a passreader which reads any of a passcard, biometric information, etc. of the user, and provides the information read to controller 103. I/O block 110 can also provide temperature information to controller 103. I/O block 110 can also control a lock of storage container 200, at the direction of controller 103, to lock and unlock the door of storage container 200 to control access to the storage container 200. [0056] The RFID reader
[0057] RFID readers are commercially available and a conventional RFID reader may be used as RFID reader 102. RFID reader 102 includes (a) circuitry to drive an RFID antenna to send RF signals and (b) circuitry to process any responses received back from an RFID tag or tags, i.e., RFID reader 102 performs RFID scanning. The RFID reader that we prefer to use is capable of connecting to a plurality of RFID antennae. Preferably, RFID reader 102 also has an ethernet port providing a network connection by which it can be controlled. In particular, RFID reader 102 has a command set by which it can be controlled, and commands can be sent to RFID reader 102 via its ethernet port to instruct RFID reader 102 to, for example, perform an RFID scan using RFID antenna 106 and return a list of tags read based on signals received from an RFID tag or RFID tags.
[0058] The controller [0059] Preferably, but optionally, the apparatus 100 may include the controller 103. Controller 103 preferably is a device, circuit, or computer (such as, for example, an embedded computer) for controlling RFID reader 102. Preferably, controller 103 authenticates a user seeking access to the storage container 200, sends a signal to unlock a door of the storage container 200 in response to authentication of the user, instructs RFID reader 102 to perform a scan in response to closing of the door, and calculates a difference between an RFID scan result returned by RFID reader 102 and an earlier RFID scan result returned by RFID reader 102 to determine if any RFID tags have been removed or added. [0060] Preferably, to determine whether a user has taken from a storage container or added to the storage container any tags or tagged items, controller 103 calculates a difference (referred to as a "delta") between a first RFID scanning result obtained before the door of the storage container is opened (referred to as the "baseline" scan) and a second RFID scanning result obtained after the door of the storage container has been closed again. However, the determination is not so limited. For example, another possibility would be to perform an additional RFID inventory scan after the user's passkey is read but before the door is opened. This additional scan could be combined with the baseline scan to form a superset (i.e., containing any tags found in one or both of the baseline scan and the additional scan), to which the second RFID scanning result could be compared. An advantage of this arrangement is to aid in scanning what we call "blinking tags". A "blinking tag" is a tag which might be read during one scan but not during another, for whatever reason. For example, a blinking tag might be read during 50% of scans. By performing both a baseline scan and the additional scan, it might be possible to discover the blinking tag even if it were not read during the baseline scan.
[0061] Preferably, controller 103 communicates with RFID reader 102 via ethernet, and most preferably through an ethernet hub 104 that interconnects controller 103 and RFID reader 102 and that interconnects controller 103 and I/O Block 110. Most preferably, the controller 103, RFID reader 102, I/O Block 110, and ethernet hub 104 are all disposed inside enclosure 101. [0062] Preferably, as will be discussed below with respect to Fig. 9, controller 103 has a second ethernet controller (network interface) for connecting to a backend inventory management system through, for example, the internet. [0063] Preferably, controller 103 is a computer that uses an operating system such as
Windows CE or Linux, and that executes a computer-executable computer program stored in a computer-readable memory associated with the computer to effect all of the actions, signals, and communication discussed in this application. However, controller 103 is not so limited, and may take other forms of hardware or software as long as it supports the requirements of the system.
[0064] Preferably, controller 103 will provide a human- machine interface (i.e., user interface), and controller 103's operating system will be Windows CE 5.0. Controller 103 preferably will also have Microsoft's .NET Compact Framework version 2.0 at a minimum installed. Of course, other operating systems can be used in place of Windows CE 5.0. Preferably, those other operating systems would also support the .NET Framework. This makes the software portable so that it may run on any Windows operating system that has .NET framework installed on it.
[0065] Most preferably, controller 103 is in the form of an all-in-one HMI (human-machine interface)/Embedded PC running Microsoft Windows CE 5.0. Future units may have the HMI separate from the controller or no HMI at all, depending on the needs of the individual customer. The Windows CE image can either be provided by the vendor of apparatus, or a custom image can be created, tailed to the specific needs of a particular apparatus 100. [0066] As mentioned above, preferably a computer program executed by controller 103 provides the functionality of apparatus 100 such as RFID scanning, inventory management, communication, etc. We will refer to this program as the Application Program. [0067] Another related application developed for the apparatus 100 is simply referred to as the bootstrapper, which handles the updating of the Application Program, and its related files.
[0068] The Application Program
[0069] We will now describe the Application Program in more detail.
[0070] Preferably, the Application Program is written on top of the Microsoft .NET Compact Framework version 2.0, using industry standard best practices. Development using the Compact Framework allows the Application Program to be redeployed on any Windows CE 5.0 device that has the compact framework installed. This includes devices that have a different underlying architecture such as ARM 4, x86 and MIPS. This level of flexibility allows the manufacturer of apparatus 100 to select or change controller 103 depending on customer needs, new technology offerings, and lower prices. In addition to moving from device to device, the Compact Framework will allow a smooth transition to newer versions of Windows CE, such as the new version 6.0. As an added benefit, the majority of the
Application Program can be easily recompiled to run under the full version of the Microsoft .NET Framework, and because of this, run on standard x86 hardware running Windows operating systems, such as Microsoft Windows XP, or Embedded Windows XP. This provides two key benefits, the first being additional flexibility for customers, the second being excellent opportunities for code reuse.
[0071] Windows CE supports multi-threaded applications, and the Application Program takes advantage of this to provide a robust and interactive experience to the user of the apparatus 100. The Application Program can, for example, (a) handle communications between apparatus 100 and peripherals, (b) handle communications between apparatus 100 and backend system 1057, (c) display a user interface to the user, and (d) accept input from the user. This is considered a best practice, and will be what a user/customer expects. [0072] Turning to the architecture of the Application Program, preferably the program is separated into a main executable, which contains the user interface screens, compiled for the Compact Framework, and several satellite assemblies (e.g., class libraries in the form of compiled DLL files). Great care was taken in the architecture of the Application Program with regard to the separation of functionality between components, which allows for code re-use in the Application Program itself, as well as in other related applications, ease of maintainability, and ease of upgradeability. [0073] One of the key features in the separation of components is the use of an Object Orientated design using Interfaces and Abstract Base Classes to build a foundation upon which the rest of the application can be built. The use of Interfaces allows for the main application logic of the Application Program to remain isolated from changes in hardware (RFID Readers, RFID Transponders, I/O blocks), as well as other pieces of software, such as communications and the data store. Building upon the interfaces are Abstract Base classes which implement the signatures of the various interfaces to provide shared functionality. In the event that a situation arises where the Abstract class is too specific, we have the interface to fall back on. [0074] An example of this design is the implementation of the logic in the Application Program to interface with the RFID reader 102. The preferred model of RFID reader 102 that we use is the Magellan MARS reader (of course, we mention this model by way of example and not of limitation). An Interface named IDevice was created, which all device logic must implement. An abstract base class called DeviceBase implements IDevice and provides common functionality seen in the majority of devices we will be using. Another Interface named IScanner provides the starting point for all RFID scanners, and again, the abstract class ScannerBase provides base functionality. Finally, the concrete class MarsReader was implemented to provide a specific implementation that conforms to the signatures of the interfaces, but in a way that allows for interaction with the Mars Reader. The main application logic in the Application Program does not have to be changed at all once the interfaces (which are used for all devices and all scanners) are defined. [0075] As a result, is that it is extremely easy to add new pieces of hardware to the apparatus 100 (e.g., to use a different model of RFID reader 102). To do so, one can simply create a new class library that implements the required interfaces, compile, and deploy. This is a major advancement over conventional systems, where new hardware would most likely result in a complete re-write of the application.
[0076] As with the current controller and software, the Application Program supports remote updates of configuration parameters, as well as updates to the application itself. This is handled by the bootstrapper, which runs in place of the Application Program, so that the Application Program files can be updated (generally, one cannot update files that are in use). In addition to updates related to the Application Program, new device drivers, OS hot fixes, and new advertisements can be downloaded to the apparatus 100 (e.g., via a network connection).
[0077] Preferably, the data store for the Application Program is in the form of a Microsoft SQL 2005 Compact Edition database, the latest version of the mobile line of databases offered by Microsoft. The database will store configuration information, transactions, and logging information. The latest version of SQL mobile offers features usually found only in desktop and server versions of database, key among those being atomic transactions. An atomic transaction guarantees that a group of data written to the database is either completely written, or none of it is written. This helps maintain consistency within the database, and makes the Application Program that much more robust. While SQL2005 is preferred, other data stores could be used. For example, a flat file could be used, or XML, among others. [0078] Communication between the Application Program and peripherals associated with apparatus 100 is done over USB, Serial, or Ethernet, for example. Given the USB interface, there is the option to hook up non-standard communication busses (such as RS-485) through the use of a USB converter. Some of the devices that hook up via USB actually emulate an network interface card (NIC), or a virtual COM port. This is made possible due to the open, standards based approach taken with Windows CE. Peripherals can be configured manually thru editing the configuration parameters via the HMI, or a semi- automated method can be used. In the semi-automated method, a user can instruct the Application Program to scan for new devices. The Application Program will report back devices that it has discovered but are currently not configured. The user can then select the device to associate and configure it with the Application Program. Peripherals can be identified by the COM port they are plugged into, their USB ID, or their Ethernet MAC address.
[0079] The human-machine (user) interface
[0080] As mentioned above, controller 103 may also provide a human-machine interface (HMI) (or user interface) to allow a user to interact with or control the apparatus 100. (Where controller 103 does support the HMI interface, the controller 103 and HMI may be integrated together, in which case references herein to HMI or controller should be considered the same device.) For example, the controller 103 could drive a display provided on the enclosure to display the user interface. Such a display could be mounted, for example, on a front surface of the enclosure 101, as shown by reference numeral 1052 in Fig. 12. The display 1052 could be an LCD screen. Preferably, the HMI comprises, as the display 1052, a VGA 5.7" touch screen mounted to the front removable panel. The display 1052 could show the status of the apparatus. Controller 103 could also cause the display to display diagnostic information to allow an engineer to check the status of the machine or otherwise troubleshoot it.
[0081] Localization [0082] The Application Program will support a variety of user personalization including but not limited to, localization (multiple language support), and target advertisements. [0083] As for localization, each user preferably will be able to choose a default language they wish to use when interacting with the UI portion of the Application Program; controller 103 could select a language for display based on the identity of the user. For example, controller 103 might display the user interface in Spanish if controller 103 concluded that such was the user's preferred language.
[0084] This will increase the number of international markets apparatus 100 will be able to be deployed to, as well as meet customer and possibly government requirements. [0085] Targeted and general advertising
[0086] The Application Program will also support targeted advertising, to allow for sellers of apparatus 100 to configure and display advertisements to users of apparatus 100 based on their past and current purchases, and any ongoing sales promotions. For example, display 1052 could provide marketing advertisements targeted at a user of the apparatus, e.g., if it were recognized (e.g., by controller 103) that a user had purchased an item before, then controller 103 might control display 1052 to display an advertisement offering a sale price on that item to encourage the user to purchase the item again. [0087] Targeted advertising may be, but is not limited to, a small area on the screen when the user is selecting which unit (i.e., storage container) they are trying to gain access to, a full screen advertisement after they select which unit they are going into, or a popup style advertisement that appears when the user first presents their pass. [0088] In more detail, controller 103 preferably also shall have the ability to run general advertising in addition to targeted advertising. General advertising will run while the unit is sitting not doing anything that requires a user present.
[0089] Users will be able to select an advertisement, and request more information. This will be handled by the Application Program sending a transaction back to the backend system 1057 in accordance with the selection. The backend system 1057 will forward the request on to the appropriate sales staff.
[0090] "Headless" configuration
[0091] It is not required that the HMI be included. Instead, the apparatus 100 could be "headless", i.e., it would not have a display of its own. Instead, the apparatus could be configured so that it could be controlled remotely, e.g., across an ethernet, USB, or serial connection.
[0092] Externally-provided HMI
[0093] It is not required that the HMI function or controller 103 be integrally provided in enclosure 101. In an alternative construction shown in Figs. 13 and 14, controller 103 and the HMI function thereof have been transferred out of enclosure 101 into an external enclosure 1054. That enclosure is a pumpkin- shaped enclosure that we call an "8-ball", which includes a display screen 1052 and ethernet ports 1055 and 1056. By transferring controller 103 with its HMI, along with a pass reader for authenticating the user, to enclosure 1054, enclosure 101 can be made smaller. Enclosure 1054 can be placed anywhere in the vicinity of the units (i.e., storage container or containers) it is controlling. Functionality is the same in all respects. To connect the 8-ball enclosure 1054, an Ethernet cable is used to connect from ethernet port 1055 to one of the ethernet ports on enclosure 101. Ethernet port 1056 is used as an external network connection for reporting to the back end inventory management systems, depicted by reference numeral 1057 in Fig. 14.
[0094] Communications with backend system
[0095] Preferably, communication between controller 103 and the backend system 1057 is through an ethernet interface using via standard web services provided on TCP port 80 or secure web services over TCP port 443 (SSL). Such communication includes but is not limited to software upgrades, diagnostic information, inventory transactions, and advertising. [0096] Preferably, communications are initiated from apparatus 100 only, e.g., from apparatus 100 to backend system 1057. For example, apparatus 100 could send inventory information via a network connection to backend system 1057. An advantage of this is to provide a firewall-friendly and network administrator-friendly communication mechanism. In more detail, generally, whereas outbound communication is acceptable (for a firewall), unsolicited inbound connections are considered taboo and could limit placement of the apparatus 100. However, there are times where a persistent connection between apparatus 100 and backend system 1057, and possibly multiple apparatuses 100 at different locations, would be desirable. In order to accomplish this, apparatus 100 and backend system 1057 will implement an HTTP reflector that allows for a persistent, firewall-friendly connection to be established. An example of this type of connection can be seen in online meeting service such as WebEx, and Microsoft Live Communications Server. In fact, Microsoft Live Communications Server is one option we have for implementing this type of functionality. [0097] Dynamically-configured networking
[0098] Preferably, the system's software shall support the dynamic discovery of devices as the number of connected secondary apparatuses 100 (as discussed below) increases. The controller 103 shall (either by its operating system or by the Application Program) implement a DHCP server to handle IP addressing of devices (e.g., dynamic addressing) as they are connected. In other words, controller 103 will provide IP addresses to the secondary apparatuses 100 as they are connected. Controller 103 will then attempt to establish connections to the new devices (i.e., apparatuses 100). The devices will be initialized and recognized by the controller 103 for use by attempting to send a given command set to see how the remote device responds. If the device accepts these commands, it will be initialized and installed for controller 103 to control. If the device does not accept these commands, controller 103 will move on to a next set of commands and repeat this process.
[0099] Watchdog feature [0100] Preferably, controller 103 shall also have a WatchDog timer available. This feature will allow the device to attempt to automatically recover if the software hangs.
[0101] The RFID antenna or antennae
[0102] Preferably, RFID antenna 106 is external to the enclosure 101. For example, RFID antenna 106 could be disposed in a wall of storage container 200. Fig. 3 depicts such an arrangement. In more detail, that figure shows two RFID antennae 106, each being located in a wall 203 of a respective one of a pair of storage containers 200 that sandwich apparatus 100.
[0103] That figure also shows another feature of the present invention. In particular, the invention is not limited to having one RFID antenna 106 connected to RFID reader 102.
Instead, RFID reader 102 may be attached to plural RFID antennae 106. The plural antennae may be used for reading areas within separate respective storage cabinets. For example, one antenna might be used to read an area within a first storage cabinet, while a second antenna might be used to read an area within a second storage cabinet. Again, such is shown in Fig. 3 which depicts a tower unit comprising top and bottom storage containers 200 sandwiching apparatus 100 and each having an RFlD antenna 106 connected to the same RFID reader 102 of apparatus 100.
[0104] Thereby, it is possible for a single RFID reader to be used for plural storage cabinets, as compared with conventional systems where each storage cabinet needs to have its own RFID reader including circuitry for controlling and driving an RFlD antenna. Because the present invention's circuitry can be used to scan plural storage cabinets, we think its utilization will be improved as compared to the conventional systems. [0105] Our idea of having one RFID reader using plural RFID antennae for plural storage cabinets is the genesis of the name "RFID man-of-war", given the vision of connections between the RFID reader and many respective plural antennae. If exactly eight antennae were provided, then the system might be referred to as an "RFlD octopus". [0106] When RFlD antenna 106 is a 13.56 MHz antenna, we prefer to provide a false back wall in the storage container 200, in which wall the antenna is integrally provided. When RFID antenna 106 is a 2.46 GHz antenna and storage container 200 is a refrigerator, we prefer to attach the antenna to the interior surface of the exterior metal chassis of the refrigerator. In that case, the antenna is disposed between the metal exterior wall of the refrigerator and the separate plastic wall of the interior of the refrigerator. [0107] Instead of being on or in a wall of the storage container 200, RFID antenna 106 could also be inside the storage container. For example, RFlD antenna 106 could be located on or within a shelf inside storage container 200. The location of RFID antenna 106 is not limited to any of the foregoing positions.
[0108] The enclosure and its mounting on the storage container [0109] Turning to Figs. 4 through 8, we will now describe a preferred embodiment of apparatus 100 and its enclosure 101 in more detail. In those figures, reference numeral 1001 denotes a front side of enclosure 101; 1002 denotes four screws for affixing front side 1001 to enclosure 101; 1003 denotes a top side of enclosure 101; 1004 denotes a back side of enclosure 101; 1005 denotes a ventilation system; 1006 denotes a power connector; 1007 denotes a power outlet; 1008 denotes an ethernet port; 1009 denotes a piano-style hinge that allows for the back side 1004 of enclosure 101 to fold down to grant access to the interior of enclosure 101 ; 1010 denote holes in enclosure 101 for use with bolts or screws; 1011 denote access ports (e.g., holes or openings) in enclosure 101, which can be used for wiring; 1012 denotes a Z bracket that allows for a tray with electronics to be slid in and out — it holds the tray in place as well; 1013 denote holes in storage container 200, which can be used for wiring; and 1014 denote holes in storage container 200, for use with bolts or screws. [0110] In more detail, as explained above, enclosure 101 is designed to hold the electronic components of apparatus 100. Access ports 1011 (i.e., openings or holes) are located on, for example, the bottom (exterior) side of enclosure 101 and/or the top (exterior) side of enclosure 101.
[0111] Preferably, two access ports or openings 1011 are located at the rear end of the bottom side, as shown in Fig. 6. These openings are used to run wiring from enclosure 101 into a storage container 200 located below apparatus 100. Such wiring may provide, for example, an electrical connection between RFK) reader 102 and RFID antenna 106 of this lower storage container (for the electrical connection, see item 107, as discussed above). [0112] Two additional access ports 1011 optionally may be located at the rear end of the top side 1001. These openings are used to run wiring from enclosure 101 to a storage container 200 located above apparatus 100. Such wiring may provide, for example, an electrical connection between RFID reader 102 and an RFID antenna 106 of this upper storage container (for the electrical connection, see item 107, discussed above). [0113] These wires (that run through access ports 1011) may include but are not limited to antenna cables (such as, for example, item 107 as discussed above), power cables, and wiring for unit security. These wires then go directly into a storage container above or below the apparatus through holes 1013 in storage container 200 (shown in Fig. 7); this prevents the wires from being tampered with.
[0114] In other words, an advantage of the present invention is that, as discussed above, the enclosure is configured to defend the apparatus from attack, e.g., to prevent a person with wire snippers from cutting an electrical connection such as a wire connecting the RFID reader and the RFK) antenna. To reiterate, preferably, the enclosure has an access port (e.g., opening) on a side of the enclosure that faces an exterior surface of the storage container. A wire from the RFID reader to the RFID antenna can pass through the opening and into the storage container through a corresponding opening in the storage container. Thus, when the enclosure is mounted on the exterior surface of the storage container, the wire is protected from attack because it is not externally accessible or exposed. Malcontents are prevented from tampering with or disabling the device — wiring can be made to be not externally accessible. [0115] Enclosure 101 is also designed to be portable so that it can be easily attached and removed from on top of storage container 200. This is accomplished by attaching screws in the enclosure 101 into the storage container 200 above and/or below. For example, screws could be used in conjunction with holes 1010 in enclosure 101, as shown in Fig. 6, and holes 1014 in enclosure 200, as shown in Fig. 7, to fixedly mount enclosure 101 to storage container 200. [0116] In more detail, to connect the apparatus 100 to the storage container 200, a bolt would be inserted from inside the enclosure 101 through holes 1010 and 1014 and be screwed into the storage container 200. The holes 1010 in the enclosure 101 will be slightly larger than the bolt so a washer will have to be placed on the bolt inside the enclosure 101. A wing nut will then be used to hold the storage container 200 and apparatus 100 together. As a result, the wiring holes 1011 will align with the wiring holes 1013 in the storage container 200. This allows for the wires to be secured inside the unit and not accessible on the outside. [0117] A storage container 200 (e.g., a cabinet) can also be attached to the top of the apparatus 100 using the exact same process. [0118] Screws or bolts do not have to be the only option; a magnetic locking mechanism using magnets, or some other locking mechanism could be used.
[0119] Combining two storage containers and one apparatus into a tower unit
[0120] Where two storage containers 200 (be they, for example, cabinets, freezers, refrigerators, cryo storage, etc.) are connected to one apparatus 100 with the apparatus 100 sandwiched in between, we refer to this combination as a tower unit. This tower will share all the electronic components thus reducing price and maintaining modularity. Fig. 12 shows three tower units 300. The first tower unit 300 comprises a storage container 200 labeled Al attached to the top of the apparatus 100 labeled A, with another storage container 200 labeled A2 attached to the bottom of the apparatus 100. The second tower unit 300 comprises a storage container 200 labeled Bl attached to the top of the apparatus 100 labeled B, with another storage container 200 labeled B2 attached to the bottom of the apparatus 100. The third tower unit 300 comprises a storage container 200 labeled Cl attached to the top of the apparatus 100 labeled C, with another storage container 200 labeled C2 attached to the bottom of the apparatus 100. In each of these tower units, the RFID reader 102 of the apparatus 100 can be connected to two RFID antennae, one for the top storage container 200 and one for the bottom storage container 200.
[0121] The enclosure's tray system [0122] Now we will describe a preferred arrangement within apparatus 100's enclosure 101. Inside the enclosure 101, preferably there are two trays. One tray is designed to hold the more stationary items (such as things that have wires running out the back of the apparatus) while the other holds all other components. [0123] Front side 1001 of apparatus 100 comes off when the four screws 1002 are removed in the front, as shown in Fig. 4. This provides access to the electronics.
[0124] Back side 1004 of the enclosure 101, as shown in Fig. 5, is on hinge 1009. When two screws are removed, this piece (i.e., back side 1004) folds down providing additional access. [0125] The front side 1001 and back side 1004 can be redesigned as necessary to change with hardware. This design does not affect the design of the enclosure 101's chassis, thus reducing the cost and maintaining modularity.
[0126] The trays in the apparatus 100 are on the rail mount system 1012. The trays themselves have a din rail mounted to them so that the electronics can be easily mounted. The trays are then able to slide out with the electronics on them so that the parts can be serviced. There will be quick connectors on the appropriate wires so that when a drawer is taken out, the wires are not strained. There will be slack in those wires that a quick connect cannot be used so that removal of a tray does not strain the wires. A multitude of trays can be installed in this configuration by adding the slide rails and appropriate tray to maintain the modular design. If hardware ever needs to be changed in the device, no work has to be done in the chassis itself; only the slidable electronics trays will need a redesign, thus reducing cost.
[0127] Other features of the enclosure
[0128] Back side (removable service panel) 1004 has several pieces that will be designed into it. They include but are not limited to an IPC power connector 1006, a US style power outlet 1007, at least one Ethernet coupler 1008 (as will be discussed below in more detail, preferably there are at least two Ethernet couplers, and more preferably, even more than two), and a ventilation system with 80mm fans 1005. Specifically, the US style power outlet should be interchangeable with any outlet style from around the globe. Specifically, the 80mm fans should have a low noise level (< 45dBm) as well as a low to moderate air flow rating (25-60 cfm). One fan should blow air into the enclosure 101 while the other should blow air out. The fans should be 24V. Specifically, there should be at least one Ethernet coupler to interface with a network (e.g., WAN). Nominally, there should be at least four connectors such as Ethernet couplers — one of which supplies the WAN connection while the other three are to be used to communicate to secondary apparatuses 100 when plural apparatuses 100 are networked together. Fig. 11 shows that, for example, six ethernet connectors 1051 could be provided on the back side 1004 of enclosure 101 to provide connectivity such as that discussed above. [0129] Turning to the two trays (or drawers), the left drawer will hold the RFID reader 102, the Ethernet hub 104, and a 24V power supply. The right drawer will contain an optional 24V UPS system with battery, an Ethernet based I/O block and any other hardware that may be needed. The controller 103 is mounted to the inside of the front removable panel, preferably. [0130] Now, we will describe the preferred internal wiring in apparatus 100. One feature of our new modular hardware design is a modular scalable bus for all the components to communicate across. To meet this requirement, an Ethernet bus was chosen. Connections using an Ethernet based bus are as follows starting from the controller 103, as shown in Fig. 9.
[0131] Preferably, controller 103 has at least two ethernet ports — one for internal communications (e.g., to communicate with RFID reader 102 and ethernet I/O block 110) and one (e.g., a WAN link coupler) for connection to a network such as the internet for reporting back to headquarters (e.g., to a backend inventory management system database 1057). An advantage of providing dual ethernet ports is for network segregation. This protects the end user's network (which would typically be connected to the WAN link coupler) from traffic not bound for their network (i.e., traffic between internal components such as controller 103 and reader 102) and protects the equipment (such as, for example, reader 102) from malicious access. Controller 103 should act as an intermediary that allows access from outside apparatus 100 to internal components (e.g., reader 102) as necessary. Meanwhile, the network attached to apparatus 100's WAN link coupler will not be interrupted or interfered with by apparatus 100's traffic (i.e., traffic between components such as for example, reader 102 and controller 103). Preferably, ethernet hub 104 is an 8-port Ethernet din rail mountable hub and an ethernet cable connects controller 103 to hub 104. Another Ethernet cable connects the hub 104 to the RFID scanner 102 inside the apparatus 100. Another Ethernet cable connects the hub 104 to an Ethernet-based I/O block 110. Currently, the controller 103, ethernet hub 104, and I/O block 110 are being supplied by B&R Automation. Three more Ethernet cables connect to three Ethernet couplers (see item 1051) that are mounted on the back of the apparatus 100. These can then connect to other apparatuses 100 in the nearby vicinity; in other words, plural apparatuses 100 can be networked together. We will discuss this in detail below. [0132] Before doing so, however, we will continue our description of the Fig. 9 circuit arrangement. Preferably, incoming 120/240VAC power will connect through the switched IPC connector. Inside, this power will be split. One lead will run to a set of at least two outlets (these can be customized per country the system will be placed in) while the other will lead to a power supply. The output of the power supply is 24V DC @ a minimum of 7 amperes. This output has 3 possible options: (a) the power goes directly into a master relay that provides a hard reset capability; (b) the power goes into a battery charging system similar to the design of the current system then leading to a master relay that provides a hard reset capability; and (c) the power goes into a UPS system that controls the battery, charging and error reporting in relation to power. Power out of the UPS connects to a master relay that provides a hard reset capability. [0133] The master relay has a control line that flows from the local I/O block 110. Out from the master relay, power will be moved to a distribution block. This can then be pushed out to the controller 103, I/O block 110, Ethernet hub 104, and RFID scanner 102 as the primary power consumers. Any other devices requiring power can also be supplied power in this manner. [0134] The controller 103 at present has at least two USB ports. This acts as a primary (or secondary) interface into the controller 103 in case it is malfunctioning in some way. The access control method will connect into one of these ports — it may be a passkey (operating at 125KHz), a pin key (for those that do not have an HMI/controller 103 with a touch screen), a magnetic strip reader, or a biometric reader (retina, fingerprint, DNA, etc.), for example. The other USB port will not be available externally. A USB hub can be hooked up to either port on the controller 103 to expand USB usage. A keyboard, mouse, and flash drive could then be used in the troubleshooting process or software update process. This also provides expandability for future devices to connect to the controller 103. [0135] There is one serial port on the controller 103 at present. As serial is an older technology, it is becoming harder to find and support devices that use a serial connection. However, we will provide the port as a means of connecting some external peripheral. This port can also be used as a means to interface with any legacy hardware that may want to be included.
[0136] Networking plural apparatuses together
[0137] As mentioned above, plural apparatuses 100 can be networked together. We will now describe a preferred arrangement of such a network system, with reference to Fig. 10. That figure shows three apparatuses 100 networked tegether via ethernet connections. One of the apparatuses 100 is considered to be the primary apparatus, while all other apparatuses 100 that connect to the primary apparatus 100 are secondary and connect via Ethernet. The primary apparatus 100 is one that has the controller 103 in it. Preferably, primary apparatus 100 also includes ethernet hub 104 which connects to the RFID reader 102 and controller 103 in primary apparatus 100, as well as to the RFID readers 102 in each of the two secondary apparatuses. The secondary apparatuses 100 preferably do not have a controller 103 in them. There is also no Ethernet hub 104 inside the secondary apparatuses 100, although this does not mean one cannot be included. Instead, I/O block 110 is used as an ethernet hub. In the Fig. 10 arrangement, the controller 103 controls the RFID reader 102 that is in the primary apparatus 100 in which the controller 103 is located, as well as the RFID readers 102 that are in each of the secondary apparatuses 100. Such control includes, as discussed above, generating commands to instruct the RFID reader 102 to initiate a scan, obtaining a list of tags read from the RFID reader, and determining a difference between that list and an earlier list to determine a change in inventory.
[0138] More details of controller 103
[0139] Preferably, the I/O block 110 in Fig. 9 has a two port Ethernet hub built into it. An Ethernet line coming from the primary apparatus 100 would connect into a coupler on the secondary apparatus 100 and then connect to the I/O block 110. The second I/O Ethernet port on the I/O block 110 would then be used to connect to the RFID scanner (i.e., RFID reader 102) inside the secondary apparatus.
[0140] Preferably, controller 103's software program (i.e., the Application Program) shall be a multi-threaded program allowing access to one storage container 200 connected to one apparatus 100 in a network while another storage container 200 is being scanned by its RFID reader 102. This RFID reader 102 can be in a master or secondary apparatus 100. Therefore if a user has accessed one storage container 200, and that container is being RFID scanned, another user can immediately come up to the same apparatus 100 where the controller 103 is located, present a pass to authenticate himself or herself, and then gain access to another container 200 provided that container 200 is not actively being RFID scanned at the time of access. If the user tries to gain access to any container 200 while it is being scanned, a please wait message would be displayed. [0141] The Application Program flow control
[0142] We will now provide a more detailed discussion of the preferred flow control of the Application Program's software program code with reference to the drawings. Of course, this flow control represents a preferred embodiment, and our invention is not so limited.
[0143] Fig. 16 shows operation of the apparatus 100 and its Application Program in a case where a human-machine interface (HMI) is available; Fig. 17 shows operation in a case where a HMI is available, but a user bypasses normal operation to administer the apparatus; and Fig. 18 shows operation in a case where an HMI is not available. [0144] Turning to Fig. 16 in more detail, step 4000 represents the starting point of the flow control.
[0145] At step 4001, controller 103 powers up or reboots.
[0146] At step 4002, the operating system (OS) of controller 103 is started. For example, where the OS is Windows CE, controller 103 boots into Windows CE. [0147] At step 4003, the Application Program is started. Unless otherwise specified, the remaining steps discussed represent flow control in the Application Program. The Application Program shall store an information transaction to indicate that the Application Program has begun the startup sequence. [0148] At step 4004, the Application Program starts the Hardware Watchdog Timer. The Application Program should ping the Watchdog continuously otherwise the device will reboot.
[0149] At step 4005, the Application Program shall check to see if the Application Program was properly shutdown. The Application Program shall store an error transaction, if the Application Program was not properly shutdown. The Application Program shall also clear a flag (indicating shutdown status).
[0150] At step 4006, the Application Program will check to see if a human-machine interface (HMI) is present. The Application Program shall prevent denial-of-service (DoS) attacks against the unit (by letting a user continually try to bypass the sequence). The Application Program shall provide this functionality as early in the process as possible to minimize a problem from occurring that would prevent access to the diagnostics.
[0151] If it is determined at step 4006 that an HMI (e.g., touch screen display) is available for apparatus 100, then at step 4007, the Application Program shall wait for bypass. [0152] In more detail, the Application Program shall display a screen with the prompt, "Tap screen to bypass startup sequence". This screen shall allow the user the opportunity to interrupt the startup sequence for testing, diagnostics, tech support, etc. [0153] If in step 4008 it is determined that the user has tapped the screen to bypass the startup sequence within a predetermined amount of time (e.g., less than or equal to ten seconds), then flow control passes to step 4025 in Fig. 17, as discussed below.
[0154] If, on the other hand, it is determined in step 4008 that the user does not tap the screen to bypass the startup sequence within the predetermined amount of time, then flow control passes to step 4013. [0155] At step 4013, the Application Program loads communication configuration settings from a database so that the apparatus 100 can configure itself for communication.
[0156] At step 4014, the Application Program will connect to the backend system and send all currently stored transactions (e.g., records showing that a certain user has taken a certain tag or tags from a certain storage container) that have not been sent. [0157] This step will also allow the unit to receive any updates (e.g., software updates) from the backend system. If so directed by the backend system, the Application Program will run an application update routine to update software such as the Application Program. The Application Program should reboot after the application update, and thus return to step 4000. [0158] At step 4015, the Application Program will start peripherals. In more detail, it shall initialize the RF reader 102, the transponder, and the I/O block 110. The Application Program shall connect to and initialize devices such as these based on the loaded configuration parameters. Preferably, the Application Program shall proceed as follows in this regard: (1) using reflection, create an instance of each required device library; (2) add device instance to device manager, verify that all devices successfully replied to ping command; and (3) engage locking mechanism. [0159] At step 4016, the Application Program starts background processing (BP). In BP, the
Application Program shall perform a standard diagnostic check, and the following additional diagnostics: (1) check door status and (2) perform a base inventory scan if the door is closed.
[0160] At step 4017, the Application Program shall then analyze diagnostics to determine if the unit should go into Interactive or Lockdown mode.
[0161] The following is a list of conditions considered in step 4017 which could cause the apparatus 100 to enter into Lockdown mode in step 4019:
[0162] (1) the Application Program shall enter Lockdown mode, if the interior temperature falls outside of specified range (as defined in the configuration); [0163] (2) the Application Program shall enter Lockdown mode, if a request has come in from the web service to enter this mode;
[0164] (3) the Application Program shall compare the results of the base inventory scans with the last known scan and enter Lockdown mode if more then X number of products have been removed (X shall be a configuration parameter); [0165] (4) the Application Program shall enter Lockdown mode if there is no more space to store transactions (the application shall need enough storage space left to store an info-transaction to indicate lockdown);
[0166] (5) the Application Program shall enter Lockdown mode if the door was open when the unit was turned on. [0167] Preferably, the Application Program needs to continue starting up and enter the interactive mode, so that the apparatus 100 can support multiple units (i.e., to support a configuration where one apparatus 100 handles multiple storage containers). In other words, if there are six storage containers, and one is open and five are closed, the apparatus 100 should not lockdown the five that are closed. Instead, the Application Program sends an information transaction to the backend system to indicate that the Application Program started up with the door open. Once the door is closed, the Application Program performs a baseline inventory scan (i.e., controls the RFID reader 102 to initiate RFID scanning to obtain a baseline inventory scan). [0168] At the end of step 4017, the Application Program shall send (e.g., to the backend system) a diagnostics message, such as a message indicating that the unit has completed its startup sequence and is entering either Interactive or Lockdown mode. The Application Program shall also send (as part of the same message) the results of the diagnostics. [0169] In step 4019, Lockdown Mode is carried out. The Application Program shall send a message to the web service (i.e., the backend system) that unit is in Lockdown mode. The Application Program shall show advertisements as normal, and shall provide a screen display indicating that the device is in Lockdown mode. The Application Program shall restrict the user from opening the door, unless the user authenticates to the full administrator role (i.e., authenticates himself as an administrator). The Application Program shall continue to send heartbeats at configured intervals as part of the background processing. The Application Program shall remain in Lockdown mode until the receipt of a Cancel Lockdown mode message from the web service (i.e., backend system). [0170] In step 4018, the Interactive Mode is initiated. If an HMI is present, the Application Program will start displaying advertisements to the user on the display screen, and shall wait for the user to authenticate.
[0171] In more detail, flow control will now pass to step 4009. At step 4009, the Application Program shall wait for a user to present a pass or credentials (e.g., PIN, biometrics, RFID badge, magnetic card, etc.) to authenticate himself. This allows the Application Program to check for an authorized user; the Application Program determines if the user has presented valid credentials.
[0172] At step 4010, the user is authenticated by the Application Program based on the pass presented. [0173] At step 4011, the Application Program determines if the user's credentials are valid or not. If the user's credentials are invalid, then flow control passes to step 4012.
[0174] At step 4012, the Application Program uses the HMFs display to inform the user that the user of his invalid login, and flow control returns to step 4009.
[0175] If the user's credentials are found in step 4011 to be valid, the flow control passes to step 4020. In this step, the Application Program enters a main processing loop that we refer to as the LaunchPad. In particular, preferably, the Application Program shall display a screen on the HMI in response to the user being authenticated. The screen shall include the following information: (1) welcome message with the user's first name; (2) a transaction confirmation screen; (3) an elevate permissions button — elevated permissions is the process of temporarily granting a user who is not a member of the full administrator role, full administration rights, after the completion of a challenge/response process (the duration of the elevated permission shall last until the user logs out); (4) a button for each storage container controlled by the Application Program (clicking the button will unlock that storage container); and (5) for limited and full administrator logins only, (a) an inventory restock button; (b) a maintenance button; and (c) a diagnostics button. In this LaunchPad mode, after the storage container or storage containers are unlocked, the user will be able to remove one or more tags or tagged items from the same or to add a tag or tagged item or items. After a storage container is locked, Application Program will generate a command for initiating RFID reading and communicate that command to the RFID reader responsible for that storage container.
[0176] If it is determined at step 4008 that the user has requested bypass (e.g., by tapping the screen within 10 or less seconds), then flow control continues with step 4025 in Fig. 17. In this figure, steps 4009, 4010, and 4012 are similar to those described above with respect to Fig. 16. Thus, the user will now need to authenticate himself. If the user is not authorized to bypass the startup sequence, then in step 4012, the Application Program shall display a screen with a message that reads, "You do not have access to bypass startup sequence" for 2 seconds indicating failure, and then continue the boot process, if the user presents invalid credentials or after 3 invalid attempts or 10 seconds have expired. If it is determined in step 4021 that the credentials are valid, then flow control continues to step 4022. In that step, a diagnostics screen is displayed to the user, along with an option to load the configuration settings (here, the user can administer apparatus 100 by performing diagnostics or changing the configuration settings). In step 4023, it is determined whether to shutdown the apparatus 100 or to reboot it. [0177] Fig. 18 shows the flow control where it is determined that an HMI is not available. This is similar to Fig. 16, but since there is no display, there is no advertising. When background processing is started in step 4016, the apparatus 100 is in a state where it is ready to unlock a storage container and, in response to closing of the door of the storage container, to perform RFID scanning as discussed above.
[0178] Of course, the foregoing represents the preferred flow control used by the Application Program, and is provided by way of example and not of limitation.
[0179] A network of tower units
[0180] Another network system is shown in Fig. 12. In that figure, there are three tower units 300, as discussed above. The middle tower unit 300 is a master tower that houses the controller 103 (and HMI), whereas the left and right tower units 300 are secondary towers that do not have controllers 103. The secondary towers connect to the master tower 300's controller 103 via ethernet so that controller 103 may control the RFID readers 102 of the two secondary towers. This enables the placement of several towers with the possibility of any storage type to be located in close proximity. This maintains the modular approach of mixing and matching the required storage while reducing the cost of hardware.
[0181] Additional or alternative embodiments or modifications of embodiments
[0182] While the invention has been discussed above with respect to a storage container, it is envisioned that the invention could also be applied to other areas intended to be RFID-scanned, such as, for example, an open-face shelf. In such a case, the enclosure 101 could be attached to the shelf. And RFID antenna 106 could be mounted on or in a shelf. [0183] Another embodiment is an application of the invention for museum use or the like. For example, a system could be set up where personnel have limited access or registered access to a room or an area. Access would be provided in accordance with an RFID pass, biometric scan, or magnetic card swipe, for example. Any movement or removal of tagged objects or artifacts in the room would be registered (i.e., charged) to that individual person, thus allowing check-in and check-out of objects/artifacts from the room or area. Preferably, wiring connecting the apparatus 100 to the RFID antenna 106 would not be visible or externally accessible. The antenna or antennae 106 could be placed on a shelf or shelves external to the apparatus 100.
[0184] This alternate embodiment is schematically depicted in Fig. 15. In that figure, reference numeral 2001 indicates two artifacts or objects, each having an RFID tag 2002, which are respectively placed on a pair of open shelves 2003, each shelf having an RFID antenna 106. Apparatus 100 uses the two RFID antennae 106 to detect the presence or absence of the tagged artifacts or objects. Reference numeral 2004 denotes an authentication unit, connected to apparatus 100, that authenticates a user using a pass such as an RFID pass or magnetic card or the like or by using biometrics, and permits access to a room (indicated by the dotted line) in which the artifacts or objects are located.
[0185] Still further embodiments
[0186] While we have described above an example in which three RFID reader apparatuses are used, each apparatus scanning a respective pair of cabinets (i.e., the first RFID reader apparatus scans one pair of cabinets, the second RFID reader apparatus scans a second pair of cabinets, and the third RFID reader apparatus scans a third pair of apparatuses), the present invention is not limited to using only three RFID reader apparatuses. Instead, many more RFID reader apparatuses could be used. Furthermore, the RFID reader apparatuses could be networked together as discussed above. In such a case, one RFID reader apparatus could be a primary apparatus and the other RFID reader apparatuses could be secondary apparatuses, as also discussed above. Preferably, the secondary apparatuses would be within an acceptable distance from the primary apparatus to facilitate their interconnection. [0187] While we have described above networking apparatuses 100 together using an Ethernet LAN as a preferred technique, they may also be connected by other techniques, such as WiFi (wireless), Bluetooth, etc. for operation.
[0188] While we have described above using any of an ethernet connection, serial connection, IEEE 1394 connection, USB connection, and telephone connection for connecting apparatus 100 to a remote backend inventory management system or another such apparatus, alternatively other techniques such as wireless (e.g., WiFi) or Bluetooth could be used. [0189] While we have described above connecting the RFID reader 102 to the controller 103 using an ethernet hub 104, it is not required that an ethernet hub 104 be used. Instead, RFID reader 102 and controller 103 could be connected by a cable such as, for example, a crossover cable. Such might be done if only one apparatus 100 were present. [0190] While we have described above connecting I/O block 110 via ethernet (to controller 103 via ethernet hub 104), the invention is not limited to use of ethernet. The controller 103 may also have other interfacing methods such as GPIO and I2C. Thus, an alternative to using the ethernet-based I/O block 110 would be to instead use a non-ethernet-based interface board for polling and controlling I/O points. These I/O points would be controlled by the GPIO and I2C bus from the controller 103. This non-ethernet-based interface board preferably would only be used in apparatus 100 where the controller 103 is present. Any remote I/O blocks preferably would remain Ethernet based. The non-ethernet-based interface board preferably has a plurality of inputs and outputs (such as digital, analog, etc.) as well, can also provide temperature information to the controller, and can also control a lock on a storage container 200, at the direction of the controller 103, to lock and unlock the door of storage container 200 to control access to the storage container 200.
[0191] Whether I/O block 110 is ethernet-based or not, as discussed above, preferably a door position sensor is provided (for apparatus 100), which sensor is connected to I/O block 110. The door position sensor can be used to detect when the door is open and closed. This allows for RFID reader 102 to only scan storage container 200 when the door is in a closed, locked position. The sensor can also inform controller 103 when there is an illegal entry into storage container 200.
[0192] Also, preferably an authentication reader is provided (for apparatus 100). The authentication reader is a device that interfaces with the controller 103 via serial, USB, etc., to authenticate an end system user (i.e., a user). The device could be an LF (125KHz) pass reader, magnetic stripe reader, a biometric device, etc. to name a few. [0193] While we have described above that controller 103 preferably communicates with RFID reader 102 via ethernet, the invention is not so limited. Alternatively, controller 103 could communicate with RFID reader 102 via Ethernet or USB. Likewise, instead of using ethernet, the VO block 110 (i.e., interface board) could connect to the controller 103 via the controller 103's GPIO port and I2C bus. Preferably, all these pieces (i.e., controller 103, RFID reader 102, I/O block 110, etc.) are disposed inside of enclosure 101. In this alternative scenario, there is no need for Ethernet hub 104, which may thus be omitted. [0194] While we have described above preferably using Windows CE 5.0, alternatively, controller 103's operating system could be Linux-based. A Java or C++ based program could be used on controller 103 as well, as an alternative.
[0195] While display 1052 has been described above in a preferred embodiment as an LCD screen, it could be, for example, a TTL or LVDS LCD screen, which would be connected to the controller 103.
[0196] While we have described above using DHCP for dynamic addressing of apparatuses 100, alternatively, where the controller 103 cannot implement a DHCP server, devices requiring IP addresses may be assigned statically. The Application Program would then scan the internal subnet looking for devices that are not already configured for use. Once new hardware devices are found, they would be configured for use in the system.
[0197] While we have described preferred antenna placement above, when 900MHz antennas are used, we prefer to attach the antenna to the interior surface of the exterior metal chassis of the refrigerator or cabinet. The antenna is preferably disposed between the metal exterior wall of the refrigerator and the separate plastic wall of the interior of the refrigerator. [0198] While we have described above using AC main power, alternatively, a 12V DC power system could be used to power the system. And the relay to provide a hard reset to the entire system is an optional device that may be omitted.
[0199] Furthermore, we have described above a preferred embodiment which uses two trays to hold various components. Alternatively, one tray could be used. Such is shown in another embodiment, which is depicted in Figs. 19 through 21. In this embodiment, one tray 1060 inside enclosure 101 could be used to hold all electronics. The front side 1001 of apparatus 100 is attached to the electronics tray 1060. The HMI screen 1058 (corresponding to screen 1052 in the first embodiment) is attached to front panel 1001. To open enclosure 101, eight screws 1002 have to be removed as shown in Fig. 21. The electronics tray 1060 and front panel 1001 then can slide out of enclosure 101 on drawer slides 1059 as shown in Fig. 20. This provides access to the electronics. In this embodiment, the back side 1004 of enclosure 101, as shown in Fig. 20, is on a hinge 1009. When the six screws 1002 are removed, the back panel folds down providing access to additional pieces. The power outlets 1007 are mounted to a panel 1061 that can be replaced to allow for different power outlets. An additional power switch 1062 controls AC power to the internal electronics. However, switch 1062 does not control power to outlets 1007. Several Ethernet couplers 1008 can be seen in Fig. 20. This design could be used when connecting several tower units 300. [0200] While we have described above using a controller 103 that is separate from the RFID reader 102, the invention is not so limited. Some RFID readers allow installation of an application (i.e., a software program) on the RFID reader itself. Thus, instead of providing a separate controller 103, one could omit that component and instead install an application onto the RFID reader 102 which would perform the steps described above with respect to the controller 103. An advantage of using a separate controller 103 is that RFID readers do not offer (a) a convenient way for analog input (e.g., reading the temperature) or (b) a video display. Another advantage of using a separate controller 103 is that it allows one to swap out RFID readers for different applications if needed.
[0201] While we have described above using a remote backend inventory management system such as, for example, a database, ERP system, or financial package such as Microsoft Dynamics or Quickbooks, the invention is not so limited. For example, instead of communicating with a backend database system, apparatus 100 might instead be configured to communicate with a middleware system (such as BizTalk RFID or some other middleware system).
[0202] While we have described above placing the RFID antenna in a wall, we do not mean to limit placement to a side wall — the antenna could also be located in other places such as the ceiling or the floor of a storage container, or in a shelf of the storage container, among other places. [0203] When we make reference above to cabinets, ambient cabinets, and refrigerated cabinets, we wish to emphasize that "cabinet" by itself is a broader term that encompasses any type of cabinet including ambient cabinets and refrigerated cabinets. [0204] While we have described above that the HMI can be provided in the controller 103, the invention is not so limited. We also envisage a handheld (i.e., portable) HMI that can communicate with apparatus 100 via WiFi or the like.
[0205] We have mentioned above that the apparatus 100 can monitor the temperature of a cabinet for example. The apparatus 100 can send such information via a network connection to a remote apparatus (e.g., backend 1057). System health information other than temperature can also be sent. Preferably, controller 103's Application Program should send back to the remote apparatus a health status document as to how the system is doing, including, for example, memory usage, internet connectivity state, etc., as well as how any connected enclosures are doing, e.g., temperature, door status, etc. [0206] Furthermore, there are many smart devices (e.g., a device external to apparatus 100) that people may use in conjunction with products or items stored in storage container 200. An example of such a smart device is a device that performs scientific testing upon a product or item stored in storage container 200. Preferably, these smart devices may allow for interfacing via a serial or USB connection. Thus, for example, such a smart device could be connected to controller 103 via a connection such as, for example, serial or USB. This would allow for interfacing to the smart device. The interfacing could be through the HMI or middleware/backend. The smart device would then enjoy the same benefits of the system being connected to the middleware/backend. The controller 103 could query the smart device for health information, e.g., how many runs the smart device had completed, and send on this report to the middleware/backend. From the report, maintenance could be scheduled in advance based on how many runs the smart device had completed or other information included in the health status reported back. The smart device could also be configured to send results of scientific tests the device had been performing to the end user (via the connection to the middleware/backend) once the tests had been completed. Or the smart device could receive remote updates (from the middleware/backend) to its running software. [0207] One example of a smart device as discussed above is Promega's Maxwell® 16 robotic DNA purification machine. This machine currently has a serial port integrated into the machine so that firmware upgrades can be performed on the machine. Thus, for example, the purification machine could be placed on top of enclosure 101 and connected to controller 103 via a serial connection. Fig. 22 is a schematic diagram showing the serial interconnection between controller 103 and the purification machine, which is identified in the drawing by reference numeral 5001. Of course, the invention is not limited to a serial connection and any other data connection could be used. In this embodiment, preferably, controller 103's Application Program knows that the purification machine 5001 is connected to it, and has established two way communication between controller 103 and the purification machine.
When the controller 103 communicates with the backend/middleware 1057 (via, for example, the Internet connection), it sees that the purification machine, which is connected to it by the serial connection, needs to have a new version of firmware applied. Therefore, the controller 103 downloads the update and then applies it to the purification machine via the serial connection. The controller 103 would then report back (to the backend/middleware 1057) the success or failure of the firmware upgrade.
[0208] As another feature in this embodiment, the controller 103 could act as an intermediary between the purification machine and the backend/middleware 1057, i.e., to forward to the backend/middleware 1057 test results provided to controller 103 by the purification machine. Assume, for example, that the purification machine were running one of its purification runs. In conjunction with the purification machine printing out the results, the results could also be communicated by the purification machine to controller 103 via the serial connection. Controller 103 could then send the results back to the backend/middleware 1057 (via a network connection). An e-mail or other notification could be then sent (by the backend/middleware 1057) to the researcher who had started the run saying the run had been completed. The results could then be processed further or more calculations done on a computer that could not be performed on the purification machine. These in-depth results could then be e-mailed back to the researcher (from that computer). Or the results could be made available (by that computer) via a webpage. All previous results could also be saved and cross-referenced (by that computer). [0209] Furthermore, just as apparatus 100 can send its own system health information to the backend/middleware 1057, the purification machine could also report its system health information to controller 103 for sending back to the backend/middleware 1057 via a network connection. By way of example, assume that the purification machine has been operating under heavy load for some time. As with any mechanical device, parts and pieces may wear out. The purification machine 5001 could send a warning to controller 103 (via the serial connection) saying that there are problems occurring with some component of the purification machine. The component may not have failed, but may be close to failure. By reporting when a component is close to failure, this allows for a more proactive approach to remote service. Next, the controller 103 receives the warning, and sends a message to backend/middleware 1057 via a network connection. Once the backend/middleware 1057 receives the alarm or error, appropriate personnel can be alerted to fix the device or send replacement parts out. [0210] Furthermore, the backend/middleware 1057 could collect all this data (e.g., system health information from the purification machine 5001) and make it available to the end researchers. For example, information regarding how much the purification machine has been used in the past 30 days could be provided by the backend/middleware 1057 for display. Detailed results can also be made available for all experiments conducted by the purification machine. Any number of reports could be generated from this data. [0211] Of course, the purification machine is only one example of a smart device that could be connected to controller 103. Promega has several robotic devices that could be used in place of the Maxwell® 16 DNA purification machine. We envision that any lab device that could benefit from these types of services and reporting could be connected (to controller 103). [0212] We have described above using screws to secure the front panel 1001; however, where screws are not a sufficient mechanism to deny access to the inside of enclosure 101, several different locking mechanisms could be employed such as, for example, a physical key lock, an electromagnet, or a deadbolt. Any of these devices could be used to secure the front panel 1001 and/or the back panel 1004. Fig. 23 is a schematic view showing the front panel 1001 secured by a key lock 5002 in an embodiment of the present invention that uses a locking mechanism.
[0213] INDUSTRIAL APPLICABILITY [0214] The present invention provides an RFID reader with an enclosure that allows it be securely affixed to a storage container such as a refrigerator without exposing wiring to tampering, and thus has use as an improved mounting technique.
[0215] The present invention also provides an RFID reader that uses plural antennae to scan plural respective storage containers, thereby avoiding the need to have plural RFID readers, and thus has use as an improved RFID scanning technique.
[0216] And the present invention also provides a networked system of master and slave RFID apparatuses, wherein a master RFID apparatus contains a controller for controlling the slave RFID apparatuses which lack such a controller, and thus has use as an improved RFID scanning system.
[0217] CONCLUSION
[0218] Except as otherwise disclosed herein, the various components shown in outline or in block form in the figures are individually well known and their internal construction and operation are not critical either to the making or using of this invention or to a description of the best mode of the invention.
[0219] Although specific embodiments of the present invention have been described above in detail, it will be understood that this description is merely for purposes of illustration. When we have said that something "is", "shall", "will", or "should be" the case, for example, we do not mean to limit the invention, but are merely providing a specific example or specific examples. Various modifications of and equivalent structures corresponding to the disclosed aspects of the preferred embodiments in addition to those described above may be made by those skilled in the art without departing from the spirit of the present invention which is defined in the following claims, the scope of which is to be accorded the broadest interpretation so as to encompass such modifications and equivalent structures.

Claims

WHAT IS CLAIMED IS:
1. An apparatus comprising: an enclosure; and an RFID reader disposed in said enclosure, wherein said enclosure is configured to be mounted on an exterior surface of a storage container, wherein said RFID reader is configured to perform RFID reading for an area inside the storage container using an RFID antenna external to said enclosure, wherein the RFID antenna is disposed in the storage container, wherein said enclosure has an opening on a side of said enclosure, and wherein an electrical connection between said RFID reader and the RFID antenna extends through the opening of the enclosure in such a manner that the electrical connection is not externally accessible when said enclosure is mounted on the exterior surface of the storage container.
2. An apparatus according to claim 1, wherein said apparatus further comprises a human-machine interface including a display screen.
3. An apparatus according to claim 2, wherein the human-machine interface for said apparatus uses a display provided separately from said enclosure.
4. An apparatus according to claim 1 , wherein said apparatus is configured to perform RFID reading using said RFID reader, obtain a RFID scanning result comprising a list of tags read from said RFID reader, and send information in response to the RFID scanning result to a middleware system via a network connection.
5. An apparatus according to claim 1, wherein said apparatus further comprises a controller that is configured to perform steps comprising (a) send an instruction to said RFlD reader to perform RFlD reading, (b) receive a RFID scanning result comprising a list of tags read from said RFID reader, and (c) send information in response to the RFID scanning result to a database system via a network connection.
6. An apparatus according to claim 1, wherein the RFID antenna is disposed within a wall of the storage container.
7. An apparatus according to claim 1, wherein the RFlD antenna is disposed within a floor or ceiling of the storage container, or in a shelf of the storage container.
8. An apparatus according to claim 1, wherein the storage container is a cabinet.
9. An apparatus according to claim 8, wherein the cabinet is a refrigerated cabinet.
10. An apparatus according to claim 1, wherein the opening of said enclosure communicates with an opening on the exterior surface of the storage container when said enclosure is mounted on the exterior surface of the storage container.
11. An apparatus according to claim 1, wherein software used by said apparatus comprises software implemented using an abstract base class that interfaces with a concrete class particular to a given item of hardware of said apparatus.
12. An apparatus according to claim 11, wherein the given item of hardware is said
RFID reader.
13. An apparatus comprising: an RFID reader configured (a) to perform RFID reading for an area within a first storage container using a first antenna and (b) to perform RFID reading for an area within a second storage container using a second antenna.
14. An apparatus according to claim 13, wherein said apparatus is connected to the first storage container and the second storage container.
15. An apparatus according to claim 13, wherein said apparatus is disposed between the first storage container and the second storage container.
16. An apparatus according to claim 15, wherein said apparatus is connected to the first storage container and the second storage container so that an electrical connection between said RFID reader and the first antenna is not externally exposed and an electrical connection between said RFID reader and the second antenna is not externally exposed.
17. An apparatus according to claim 13, wherein the first storage container is a cabinet and the second storage container is a cabinet.
18. An apparatus according to claim 13, wherein the first storage container is a refrigerated cabinet and the second storage container is a refrigerated cabinet.
19. An apparatus according to claim 13, wherein the first storage container is an ambient cabinet and the second storage container is an ambient cabinet.
20. An apparatus according to claim 13, wherein the first storage container is an ambient cabinet and the second storage container is a refrigerated cabinet.
21. A system comprising: three or more of said apparatuses according to claim 13; and three or more pairs of cabinets, each pair of cabinets being scanned by a corresponding one of said three or more apparatuses.
22. A system according to claim 21, wherein each of said three or more apparatuses has one of said cabinets attached to the top of said apparatus and one of said cabinets attached to the bottom of said apparatus.
23. A system according to claim 21, wherein only one of said apparatuses comprises a controller that generates commands to RFK) readers in said apparatuses to initiate RFK) scanning.
24. A method comprising: performing RFID reading for an area within a first storage container and an area within a second storage container using an RFID reader connected both to a first antenna and a second antenna, the first antenna being used for performing reading for the area within the first storage container and the second antenna being used for performing reading for the area within the second storage container.
25. A system comprising: a first apparatus comprising a first RFK) reader configured to perform RFID reading using a first antenna; and a second apparatus comprising (a) a second RFID reader configured to perform RFK) reading using a second antenna, and (b) one of (1) a controller configured to (i) control said first RFK) reader and said second RFID reader and (ii) communicate via a network connection with an inventory management system and (2) a controller configured to (i) control said first RFK) reader and said second RFID reader and (ii) communicate via a network connection with a middleware system.
26. A system according to claim 25, wherein said first apparatus and said second apparatus are connected via a local area network, and said second apparatus further comprises a network connection between said second RFID reader and said controller.
27. A system according to claim 25, wherein said controller comprises a user interface for controlling said first RFID reader and said second RFID reader.
28. A system according to claim 25, wherein said controller is configured to control said first RFID reader to perform plural RFID scans, to obtain a first RFID scanning result in accordance with the plural RFID scans by said first RFID reader, to control said second RFID reader to perform plural RFID scans, to obtain a second RFID scanning result in accordance with the plural scans by said second RFID reader, and to communicate with the system in accordance with the first RFID scanning result and the second RFID scanning result.
29. A system according to claim 28, wherein the first RFID scanning result is based on a difference between plural RFID scans.
30. An apparatus comprising: means for attaching a device comprising an RFID reader to an exterior surface of a storage container so that wiring between the RFID reader and an RFID antenna in the storage container is not externally exposed.
31. An apparatus according to claim 30, wherein the storage container is a refrigerator.
32. An apparatus according to claim 30, wherein the device further comprises an enclosure in which the RFID reader is positioned, and wherein the enclosure comprises an exterior panel which is secured to the enclosure by a key lock.
33. An apparatus according to claim 30, wherein said device further comprises means for sending to a remote apparatus via a network connection RFlD scanning results obtained using the RFlD reader.
34. An apparatus according to claim 33, wherein said device further comprises means for receiving system health information of another device from the another device via a data connection between said device and the another device and for sending the system health information to the remote apparatus via the network connection.
35. A system comprising: a master RFID reading apparatus comprising an RFID reader; and one or more secondary RFID reading apparatuses each comprising a respective RFlD reader, wherein said master RFID reading apparatus further comprises control means for controlling (a) said RFID reader of said master RFID reading apparatus and (b) via networking between said master RFID reading apparatus and said one or more secondary RFID reading apparatuses, said RFID reader of each of said one or more secondary RFlD reading apparatuses.
36. A system according to claim 35, wherein said master RFID reading apparatus uses said RFID reader of said master RFID scanning apparatus to perform RFID scanning of a storage container, and wherein said one or more secondary RFID reading apparatuses use their respective RFlD readers to perform RFID scanning of a respective plurality of other storage containers.
PCT/US2008/056981 2007-03-16 2008-03-14 Rfid reader enclosure and man-o-war rfid reader system WO2008115784A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP08732209.5A EP2137668B1 (en) 2007-03-16 2008-03-14 Rfid reader enclosure and man-o-war rfid reader system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/687,272 US7710275B2 (en) 2007-03-16 2007-03-16 RFID reader enclosure and man-o-war RFID reader system
US11/687,272 2007-03-16

Publications (2)

Publication Number Publication Date
WO2008115784A2 true WO2008115784A2 (en) 2008-09-25
WO2008115784A3 WO2008115784A3 (en) 2008-11-06

Family

ID=39667098

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/056981 WO2008115784A2 (en) 2007-03-16 2008-03-14 Rfid reader enclosure and man-o-war rfid reader system

Country Status (3)

Country Link
US (3) US7710275B2 (en)
EP (1) EP2137668B1 (en)
WO (1) WO2008115784A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7938326B2 (en) 2000-10-20 2011-05-10 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
WO2017173326A1 (en) * 2016-04-01 2017-10-05 Meps Real-Time, Inc. Rfid read system for verifying the contents of items in tray pockets
USRE47599E1 (en) 2000-10-20 2019-09-10 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags

Families Citing this family (53)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7911324B2 (en) 2001-02-16 2011-03-22 Automotive Technologies International, Inc. Method and system for obtaining information about RFID-equipped objects
US7258276B2 (en) 2000-10-20 2007-08-21 Promega Corporation Radio frequency identification method and system of distributing products
US20060173750A1 (en) * 2004-12-30 2006-08-03 Naley Martin R System and method for controlling access to a local inventory storage system via a remote e-commerce application
US7710275B2 (en) 2007-03-16 2010-05-04 Promega Corporation RFID reader enclosure and man-o-war RFID reader system
US7854374B2 (en) * 2007-09-28 2010-12-21 Dudley Joseph H Theft preventative mailbox with rear residential and storage vault door and remote unlocking activation mechanism
US20100141430A1 (en) * 2008-12-04 2010-06-10 Nortel Networks Limited Mobile tag local data reporting system
CN103548071B (en) 2009-07-14 2016-10-26 迪尔·美吉克有限公司 Adhesive closure
US8456302B2 (en) 2009-07-14 2013-06-04 Savi Technology, Inc. Wireless tracking and monitoring electronic seal
WO2011022412A1 (en) 2009-08-17 2011-02-24 Savi Networks Llc Contextually aware monitoring of assets
US8334773B2 (en) 2009-08-28 2012-12-18 Deal Magic, Inc. Asset monitoring and tracking system
FR2951516B1 (en) * 2009-10-20 2012-02-03 Sartorius Stedim Aseptics IMPROVEMENTS IN TRANSFER SYSTEMS BETWEEN AN ENCLOSURE AND A CONTAINER.
US9189769B2 (en) 2009-12-07 2015-11-17 Meps Real-Time, Inc. Real-time inventory re-supply system
US8204507B2 (en) 2010-03-12 2012-06-19 Research In Motion Limited Supplemental node transmission assistance in a wireless communications network
US8068011B1 (en) 2010-08-27 2011-11-29 Q Street, LLC System and method for interactive user-directed interfacing between handheld devices and RFID media
WO2013019736A1 (en) * 2011-07-29 2013-02-07 Vubiq Incorporated System and method for wireless communication in a backplane fabric architecture
US8990099B2 (en) 2011-08-02 2015-03-24 Kit Check, Inc. Management of pharmacy kits
US9449296B2 (en) 2011-08-02 2016-09-20 Kit Check, Inc. Management of pharmacy kits using multiple acceptance criteria for pharmacy kit segments
US9307756B2 (en) * 2011-10-26 2016-04-12 Warsaw Orthopedic, Inc. Portable RFID tagged carrier for sterile implants and biological products
US20140085052A1 (en) * 2012-09-27 2014-03-27 Interstate Battery System International, Inc. Modular rfid tag scanner for a product storage system
US20140108027A1 (en) 2012-10-12 2014-04-17 Mckesson Automation Inc. Apparatuses, systems, and methods for delivering medications from a central pharmacy to a patient in a healthcare facility
US9150119B2 (en) 2013-03-15 2015-10-06 Aesynt Incorporated Apparatuses, systems, and methods for anticipating and delivering medications from a central pharmacy to a patient using a track based transport system
AU2013344345B2 (en) 2012-11-19 2017-03-23 Omnicell, Inc. Storage cabinet with multiple RFID readers
WO2014092754A1 (en) 2012-12-12 2014-06-19 Life Technologies Corporation Self -locking door and product dispensing enclosure having a self -locking door
EP3025287B1 (en) * 2013-07-24 2020-01-01 Promega Corporation Processes for distribution and use of a mobile rfid container
US10133848B1 (en) 2013-08-05 2018-11-20 TouchStream Corp. Medication management
US10950333B2 (en) 2013-08-05 2021-03-16 TouchStream Corp. Medication management
US20150091705A1 (en) * 2013-09-27 2015-04-02 Mckesson Automation Inc. Systems, methods, apparatuses, and computer program product for inventory tracking and control
US10589111B2 (en) * 2013-11-26 2020-03-17 Physio-Control, Inc. High gain passive repeater antenna for medical device cabinets
US9171280B2 (en) 2013-12-08 2015-10-27 Kit Check, Inc. Medication tracking
JP6250464B2 (en) * 2014-04-18 2017-12-20 東芝テック株式会社 Reading apparatus and program
NZ731124A (en) 2014-10-24 2017-12-22 Life Technologies Corp Inventory management system and method of use
US11714975B2 (en) * 2014-10-28 2023-08-01 Avery Dennison Retail Information Services Llc High density read chambers for scanning and encoding RFID tagged items
CN112009933B (en) 2015-04-28 2022-04-19 佐藤控股株式会社 Storage vault
US10733816B2 (en) 2015-07-20 2020-08-04 Accuride International Inc. Electronically controlled drawer slide locking for cabinets and hub for same
WO2017059209A1 (en) 2015-10-02 2017-04-06 Hyperion Technology Group, Inc. Event detection system and method of use
US10062257B2 (en) * 2015-10-08 2018-08-28 Shenzhen Wale Intelligent System Limited Intelligent display system and method
US9665848B1 (en) * 2015-11-30 2017-05-30 O-Ring Sales & Service, Inc. Inventory management system and method of use
US9852320B2 (en) * 2016-02-04 2017-12-26 Michael M. Mardkha System for tracking items stored in a safe
JP2017228140A (en) * 2016-06-23 2017-12-28 東芝テック株式会社 Reading device and program
EP3282410A1 (en) * 2016-08-10 2018-02-14 Bayer Aktiengesellschaft Storage system and method for operating a storage system
US10482292B2 (en) 2016-10-03 2019-11-19 Gary L. Sharpe RFID scanning device
US10692316B2 (en) 2016-10-03 2020-06-23 Gary L. Sharpe RFID scanning device
US10565410B1 (en) * 2017-08-25 2020-02-18 Amazon Technologies, Inc. Overhead RFID antenna
US20190088354A1 (en) 2017-09-01 2019-03-21 Kit Check, Inc. Identifying discrepancies between events from disparate systems
CN107563171B (en) * 2017-09-11 2020-08-28 英业达科技有限公司 Storage device with biological characteristic identification module
HRP20231240T1 (en) * 2018-07-30 2024-02-16 Direct4Me D.O.O. Smart unattended home delivery box
IT201800020134A1 (en) * 2018-12-18 2020-06-18 Bridgestone Europe Nv Sa METHOD AND SYSTEM TO READ / WRITE DATA FROM / TO RFID TAGS INTEGRATED / APPLIED TO / ON TIRES TRANSPORTED ON CONVEYOR BELTS
US20220083957A1 (en) * 2019-05-08 2022-03-17 Hewlett-Packard Development Company, L.P. Kiosk device having storage bins
TWI704498B (en) * 2019-05-16 2020-09-11 啓碁科技股份有限公司 Receiving device
CN111990798B (en) * 2019-05-27 2022-04-12 启碁科技股份有限公司 Storage device
WO2021011593A1 (en) * 2019-07-15 2021-01-21 Avery Dennison Retail Information Services, Llc Method for missed item recovery in rfid tunnel environments
EP3816552A1 (en) * 2019-10-31 2021-05-05 Arçelik Anonim Sirketi Refrigerator with rfid function
SE545867C2 (en) * 2022-05-06 2024-02-27 Stora Enso Oyj Intelligent cabinet with improved rf shield

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005013496A2 (en) * 2003-07-25 2005-02-10 Meadwestvaco Corporation Apparatus for and method of using a diversity antenna
US20050247782A1 (en) * 2004-04-23 2005-11-10 Gougen Ambartsoumian Low temperature radio frequency identification tracking system
EP1679636A1 (en) * 2005-01-03 2006-07-12 Samsung Electronics Co., Ltd. Refrigerator with a reader for RFID tags
EP1701296A1 (en) * 2005-03-07 2006-09-13 Fuji Xerox Co., Ltd. RFID relay antenna, container comprising the RFID relay antenna, and method of arranging a plurality of these containers
WO2007142645A1 (en) * 2006-06-08 2007-12-13 Asyst Technologies, Inc. Extended read range rfid system

Family Cites Families (389)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3827053A (en) 1970-07-23 1974-07-30 E Willie Antenna with large capacitive termination and low noise input circuit
US3861433A (en) 1973-09-17 1975-01-21 Plastofilm Ind Inc Air tight food container
JPS5324200Y2 (en) 1973-11-30 1978-06-21
US4116512A (en) 1975-06-23 1978-09-26 Wiser John A Drawer latching device
US4118693A (en) 1977-05-09 1978-10-03 Knogo Corporation Method and apparatus for producing uniform electromagnetic fields in an article detection system
US4223830A (en) 1978-08-18 1980-09-23 Walton Charles A Identification system
US4227037A (en) 1979-05-29 1980-10-07 Gulf & Western Manufacturing Company Shielded non-metallic container
US5019815A (en) 1979-10-12 1991-05-28 Lemelson Jerome H Radio frequency controlled interrogator-responder system with passive code generator
US4354613A (en) 1980-05-15 1982-10-19 Trafalgar Industries, Inc. Microprocessor based vending apparatus
NL182109C (en) 1980-06-20 1988-01-04 Philips Nv ACTIVE AERIAL.
DE3143208C2 (en) 1981-10-30 1984-07-05 Max-E. Dipl.-Ing. 7320 Göppingen Reeb Identification arrangement in the form of a label-like strip which can be attached to an object and a method for the production thereof
US4636950A (en) 1982-09-30 1987-01-13 Caswell Robert L Inventory management system using transponders associated with specific products
US4496406A (en) 1982-09-30 1985-01-29 General Dynamics, Pomona Division Method of making a conductive resealable pouch
US4656463A (en) 1983-04-21 1987-04-07 Intelli-Tech Corporation LIMIS systems, devices and methods
US4580041A (en) 1983-12-09 1986-04-01 Walton Charles A Electronic proximity identification system with simplified low power identifier
US4862160A (en) 1983-12-29 1989-08-29 Revlon, Inc. Item identification tag for rapid inventory data acquisition system
US4688026A (en) 1984-05-15 1987-08-18 Scribner James R Method of collecting and using data associated with tagged objects
US4639875A (en) 1984-05-17 1987-01-27 Abraham Joseph N Quantity checking system and method
US4636634A (en) 1984-08-28 1987-01-13 Veeco Integrated Automation, Inc. Apparatus with intelligent bins indicating the presence and identity of stored coded articles
US4616694A (en) 1984-10-22 1986-10-14 Hsieh Shih Yung Fireproof cabinet system for electronic equipment
US4805207A (en) 1985-09-09 1989-02-14 Wang Laboratories, Inc. Message taking and retrieval system
US4806921A (en) 1985-10-04 1989-02-21 Ateq Corporation Rasterizer for pattern generator
IE863396L (en) 1986-01-02 1987-07-02 Roger H Tan System for constructing air conditioning cabinets and method for constructing same.
US4746830A (en) 1986-03-14 1988-05-24 Holland William R Electronic surveillance and identification
US4866661A (en) 1986-03-26 1989-09-12 Prins Maurits L De Computer controlled rental and sale system and method for a supermarket and the like
US4785969A (en) 1986-11-10 1988-11-22 Pyxis Corporation Medication dispensing system
US4847764C1 (en) 1987-05-21 2001-09-11 Meditrol Inc System for dispensing drugs in health care instituions
NL8701565A (en) 1987-07-03 1989-02-01 Nedap Nv IDENTIFICATION SYSTEM WITH TWO OPERATING MODES.
US4837568A (en) 1987-07-08 1989-06-06 Snaper Alvin A Remote access personnel identification and tracking system
US5573082A (en) 1987-08-20 1996-11-12 Diner-Mite, Inc. Manual food service system
US5144314A (en) 1987-10-23 1992-09-01 Allen-Bradley Company, Inc. Programmable object identification transponder system
AU628801B2 (en) 1988-02-11 1992-09-24 Peter Samuel Vogel Vending machine
US5021800A (en) 1988-03-31 1991-06-04 Kenneth Rilling Two terminal antenna for adaptive arrays
US5155847A (en) 1988-08-03 1992-10-13 Minicom Data Corporation Method and apparatus for updating software at remote locations
US5008814A (en) 1988-08-15 1991-04-16 Network Equipment Technologies, Inc. Method and apparatus for updating system software for a plurality of data processing units in a communication network
USRE35743E (en) 1988-09-12 1998-03-17 Pearson Ventures, L.L.C. Patient medication dispensing and associated record keeping system
US4881061A (en) 1988-12-05 1989-11-14 Minnesota Mining And Manufacturing Company Article removal control system
NL8803170A (en) 1988-12-27 1990-07-16 Nedap Nv IDENTIFICATION SYSTEM.
US5014875A (en) 1989-03-01 1991-05-14 Pyxis Corporation Medication dispenser station
US5038023A (en) 1989-06-28 1991-08-06 C. Itoh Information Systems Development, Inc. System for storing and monitoring bar coded articles such as keys in a drawer
US4961533A (en) 1989-09-27 1990-10-09 Viac Inc. Inventory control system
US5030807A (en) 1990-01-16 1991-07-09 Amtech Corporation System for reading and writing data from and into remote tags
US5225825A (en) 1990-04-05 1993-07-06 Meridian Incorporated Electronic interlock for storage assemblies
US5091713A (en) 1990-05-10 1992-02-25 Universal Automated Systems, Inc. Inventory, cash, security, and maintenance control apparatus and method for a plurality of remote vending machines
NL9001318A (en) 1990-06-11 1992-01-02 Ericsson Radio Systems Bv SYSTEM FOR DETECTING THE PRESENCE IN A RACK OF A PORTABLE UNIT SUITABLE FOR TRANSMITTING OR RECEIVING A SIGNAL WITH AN ASSIGNED IDENTIFICATION NUMBER.
US5528232A (en) 1990-06-15 1996-06-18 Savi Technology, Inc. Method and apparatus for locating items
US5640151A (en) 1990-06-15 1997-06-17 Texas Instruments Incorporated Communication system for communicating with tags
JP3100716B2 (en) 1991-01-04 2000-10-23 シーエスアイアール Identification device
US5147068A (en) 1991-01-16 1992-09-15 Wright Food Systems, Inc. Automated food vending system
US5099226A (en) 1991-01-18 1992-03-24 Interamerican Industrial Company Intelligent security system
KR0129519B1 (en) 1991-01-26 1998-04-08 강진구 Defrosting control method of a refrigerator
US5287414A (en) 1991-06-21 1994-02-15 Esselte Pendaflex Corporation Coded file locator system
US5208599A (en) 1991-08-28 1993-05-04 Ohio State University Serrated electromagnetic absorber
US5266925A (en) 1991-09-30 1993-11-30 Westinghouse Electric Corp. Electronic identification tag interrogation method
US5563402A (en) 1991-11-04 1996-10-08 Spectra-Physics Scanning Systems, Inc. Multiple-interface selection for computer peripherals
JP2877594B2 (en) 1991-11-14 1999-03-31 富士通株式会社 Visitor management system
US5214409A (en) 1991-12-03 1993-05-25 Avid Corporation Multi-memory electronic identification tag
US5240139A (en) 1992-03-06 1993-08-31 Munroe Chirnomas Package vending machine
US5450070A (en) 1992-03-17 1995-09-12 Massar; Sheppard Electronic missing file locator system
US5347453A (en) 1992-03-30 1994-09-13 Maestre Federico A Portable programmable medication alarm device and method and apparatus for programming and using the same
US5294931A (en) 1992-04-29 1994-03-15 Texas Instruments Deutschland Gmbh Method of interrogating a plurality of transponders arranged in the transmission range of an interrogating device and transponders for use in the said method
US5365551A (en) 1992-12-15 1994-11-15 Micron Technology, Inc. Data communication transceiver using identification protocol
US5500650A (en) 1992-12-15 1996-03-19 Micron Technology, Inc. Data communication method using identification protocol
US6144859A (en) 1993-08-27 2000-11-07 Aeris Communications, Inc. Wireless cellular communicator system and apparatus
US5889474A (en) 1992-05-18 1999-03-30 Aeris Communications, Inc. Method and apparatus for transmitting subject status information over a wireless communications network
US5787174A (en) 1992-06-17 1998-07-28 Micron Technology, Inc. Remote identification of integrated circuit
US6045652A (en) 1992-06-17 2000-04-04 Micron Communications, Inc. Method of manufacturing an enclosed transceiver
US5260690A (en) 1992-07-02 1993-11-09 Minnesota Mining And Manufacturing Company Article removal control system
US5831531A (en) 1992-07-27 1998-11-03 Micron Communications, Inc. Anti-theft method for detecting the unauthorized opening of containers and baggage
US5805897A (en) 1992-07-31 1998-09-08 International Business Machines Corporation System and method for remote software configuration and distribution
US5408443A (en) 1992-08-19 1995-04-18 Polypharm Corp. Programmable medication dispensing system
UA37182C2 (en) 1992-08-26 2001-05-15 Брітіш Текнолоджі Груп Лімітед Identification system and transponder for identification system
US5404147A (en) 1992-10-28 1995-04-04 Sensormatic Electronics Corporation EAS system loop antenna having three loops of different area
CA2103288C (en) 1992-11-18 2004-08-17 Michael John Camille Marsh Detection of multiple articles
US5314243A (en) 1992-12-04 1994-05-24 Automated Healthcare, Inc. Portable nursing center
US5410315A (en) 1992-12-08 1995-04-25 Texas Instruments Incorporated Group-addressable transponder arrangement
US5346297A (en) 1993-01-04 1994-09-13 Colson Jr Angus R Auxiliary storage and dispensing unit
US6108588A (en) 1993-01-25 2000-08-22 Diebold, Incorporated Restocking method for medical item dispensing system
US5912818A (en) 1993-01-25 1999-06-15 Diebold, Incorporated System for tracking and dispensing medical items
US5993046A (en) 1993-01-25 1999-11-30 Diebold, Incorporated System for dispensing medical items by brand or generic name
US5539775A (en) 1993-03-17 1996-07-23 Micron Technology, Inc. Modulated spread spectrum in RF identification systems method
US5491715A (en) 1993-06-28 1996-02-13 Texas Instruments Deutschland Gmbh Automatic antenna tuning method and circuit
US5765707A (en) 1993-07-02 1998-06-16 Kenevan; Timothy Paul Modular shipping container
US5347280A (en) 1993-07-02 1994-09-13 Texas Instruments Deutschland Gmbh Frequency diversity transponder arrangement
US6272394B1 (en) 1993-07-21 2001-08-07 Omnicell.Com Methods and apparatus for dispensing items
US6385505B1 (en) 1993-07-21 2002-05-07 Omnicell.Com Methods and apparatus for dispensing items
US5487276A (en) 1993-07-28 1996-01-30 Namisniak; Dianna Food inventory system
US5335509A (en) 1993-07-28 1994-08-09 Dianna Namisniak Food inventory system
WO1995004324A1 (en) 1993-07-29 1995-02-09 Morse Watchmans, Inc. System and device for storing objects
IT1270801B (en) 1993-08-02 1997-05-07 Paola Frau DISTRIBUTION NETWORK OF PRODUCTS AND INFORMATION
US5594740A (en) 1993-08-27 1997-01-14 Axion Logistics Corporation Wireless communications application specific enabling method and apparatus
US5541604A (en) 1993-09-03 1996-07-30 Texas Instruments Deutschland Gmbh Transponders, Interrogators, systems and methods for elimination of interrogator synchronization requirement
US5424858A (en) 1993-09-03 1995-06-13 Or-An Company International, Inc. Apparatus for locating file folders
US5392025A (en) 1993-09-24 1995-02-21 Intermark Corporation Electronic security system for display cabinets
US5479416A (en) 1993-09-30 1995-12-26 Micron Technology, Inc. Apparatus and method for error detection and correction in radio frequency identification device
US5478990A (en) 1993-10-14 1995-12-26 Coleman Environmental Systems, Inc. Method for tracking the production history of food products
US5421009A (en) 1993-12-22 1995-05-30 Hewlett-Packard Company Method of remotely installing software directly from a central computer
WO1995018491A2 (en) 1993-12-29 1995-07-06 Novalink Tech Inc Data communication device
US5453103A (en) 1994-01-21 1995-09-26 Environmental Technologies Group International, Inc. Reclaiming and utilizing discarded and newly formed coke breeze, coal fines, and blast furnace revert materials, and related methods
US5431299A (en) 1994-01-26 1995-07-11 Andrew E. Brewer Medication dispensing and storing system with dispensing modules
GB9401924D0 (en) 1994-02-01 1994-03-30 Jonhig Ltd System for road toll payment
US5446447A (en) 1994-02-16 1995-08-29 Motorola, Inc. RF tagging system including RF tags with variable frequency resonant circuits
US5539394A (en) 1994-03-16 1996-07-23 International Business Machines Corporation Time division multiplexed batch mode item identification system
GB9408588D0 (en) 1994-04-29 1994-06-22 Disys Corp Passive transponder
US5460294A (en) 1994-05-12 1995-10-24 Pyxis Corporation Single dose pharmaceutical dispenser subassembly
US5530702A (en) 1994-05-31 1996-06-25 Ludwig Kipp System for storage and communication of information
NL9402206A (en) 1994-06-09 1996-01-02 Cons Health Entrepreneurs Bv Pharmacy system and dispensing machine for such a system.
US5905653A (en) 1994-07-14 1999-05-18 Omnicell Technologies, Inc. Methods and devices for dispensing pharmaceutical and medical supply items
US5805456A (en) 1994-07-14 1998-09-08 Omnicell Technologies, Inc. Device and method for providing access to items to be dispensed
US5608298A (en) 1994-07-14 1997-03-04 Harrow Products, Inc. Privacy protection for electronic lock system
US5745366A (en) 1994-07-14 1998-04-28 Omnicell Technologies, Inc. Pharmaceutical dispensing device and methods
US5521369A (en) 1994-07-25 1996-05-28 Khyber Technologies Corporation Card shaped computer peripheral device
US5602538A (en) 1994-07-27 1997-02-11 Texas Instruments Incorporated Apparatus and method for identifying multiple transponders
US5489908A (en) 1994-07-27 1996-02-06 Texas Instruments Deutschland Gmbh Apparatus and method for identifying multiple transponders
US5629981A (en) 1994-07-29 1997-05-13 Texas Instruments Incorporated Information management and security system
US5923001A (en) 1994-08-05 1999-07-13 Surgical Resources, L.L.C. Automatic surgical sponge counter and blood loss determination system
US5637845A (en) 1994-12-12 1997-06-10 Usa Technologies, Inc. Credit and bank issued debit card operated system and method for controlling a prepaid card encoding/dispensing machine
US5528222A (en) 1994-09-09 1996-06-18 International Business Machines Corporation Radio frequency circuit and memory in thin flexible package
US5550547A (en) 1994-09-12 1996-08-27 International Business Machines Corporation Multiple item radio frequency tag identification protocol
US5565858A (en) 1994-09-14 1996-10-15 Northrop Grumman Corporation Electronic inventory system for stacked containers
US6760643B2 (en) 1994-10-11 2004-07-06 Omnicell, Inc. Methods and apparatus for dispensing items
NO301447B1 (en) 1994-10-12 1997-10-27 Mekatronikk As Consumer turnover system
US5910776A (en) 1994-10-24 1999-06-08 Id Technologies, Inc. Method and apparatus for identifying locating or monitoring equipment or other objects
JP3896550B2 (en) 1994-11-24 2007-03-22 Smc株式会社 Linear actuator
IT235078Y1 (en) 1994-11-25 2000-03-31 Vitrifrigo S N C Di Vitri Alce ROOM REFRIGERATOR WITH ELECTRONIC KEY FOR CONSUMPTION RECORDING
US5648767A (en) 1994-11-30 1997-07-15 Hughes Aircraft Transponder detection system and method
US5751221A (en) 1995-01-27 1998-05-12 Steelcase Inc. Electronic system, components and method for tracking files
US5583819A (en) 1995-01-27 1996-12-10 Single Chip Holdings, Inc. Apparatus and method of use of radiofrequency identification tags
US7079044B1 (en) 1995-01-27 2006-07-18 Steelcase Development Corporation Electronic system, components and method for tracking files
US5648765A (en) 1995-03-08 1997-07-15 Cresap; Michael S. Tag tansponder system and method to identify items for purposes such as locating, identifying, counting, inventorying, or the like
CA2187539C (en) 1995-03-13 2000-05-02 Thomas Joseph Walczak Method and radio frequency identification system for a novel protocol for reliable communication
USH1743H (en) 1995-03-17 1998-08-04 Hercules Incorporated Inventory management method and apparatus
US5600121A (en) 1995-03-20 1997-02-04 Symbol Technologies, Inc. Optical reader with independent triggering and graphical user interface
US5679945A (en) 1995-03-31 1997-10-21 Cybermark, L.L.C. Intelligent card reader having emulation features
US5621199A (en) 1995-04-03 1997-04-15 Datalogic, Inc. RFID reader
US5521601A (en) 1995-04-21 1996-05-28 International Business Machines Corporation Power-efficient technique for multiple tag discrimination
US5708423A (en) 1995-05-09 1998-01-13 Sensormatic Electronics Corporation Zone-Based asset tracking and control system
ES2284172T3 (en) 1995-05-30 2007-11-01 Sensormatic Electronics Corporation CONFIGURATION OF ANTENNAS FOR AN ELECTRONIC SYSTEM FOR MONITORING OF ARTICLES WITH DISTRIBUTION OF THE IMPROVED INTERROGATION FIELD.
US5764992A (en) 1995-06-06 1998-06-09 Apple Computer, Inc. Method and apparatus for automatic software replacement
EP0958672A4 (en) 1995-06-07 2002-05-22 Comm Inc E Low power telecommunication controller for a host computer server
US5798693A (en) 1995-06-07 1998-08-25 Engellenner; Thomas J. Electronic locating systems
US5955298A (en) 1995-06-26 1999-09-21 The United States Of America As Represented By The Secretary Of Agriculture Sequences for production of 2,4-Diacetylphloroglucinol and methods
US5774059A (en) 1995-07-20 1998-06-30 Vindicator Corporation Programmable electronic lock
DE69625083T2 (en) 1995-09-08 2004-02-26 Key-Trak, Inc., Ovieda CONTROL AND TRACKING SYSTEM FOR INVENTIBLE ITEMS
US6075441A (en) 1996-09-05 2000-06-13 Key-Trak, Inc. Inventoriable-object control and tracking system
US6056199A (en) 1995-09-25 2000-05-02 Intermec Ip Corporation Method and apparatus for storing and reading data
US6040773A (en) 1995-10-11 2000-03-21 Motorola, Inc. Radio frequency identification tag arranged for magnetically storing tag state information
US6218942B1 (en) 1995-10-11 2001-04-17 Motorola, Inc. Radio frequency identification tag exciter/reader
GB9521015D0 (en) 1995-10-13 1995-12-13 Minibar Production Ltd Open shelf bar
US5686928A (en) 1995-10-13 1997-11-11 Lockheed Martin Corporation Phased array antenna for radio frequency identification
US6036099A (en) 1995-10-17 2000-03-14 Leighton; Keith Hot lamination process for the manufacture of a combination contact/contactless smart card and product resulting therefrom
US5797515A (en) 1995-10-18 1998-08-25 Adds, Inc. Method for controlling a drug dispensing system
US5713485A (en) 1995-10-18 1998-02-03 Adds, Inc. Drug dispensing system
US5627517A (en) 1995-11-01 1997-05-06 Xerox Corporation Decentralized tracking and routing system wherein packages are associated with active tags
US5999808A (en) 1995-12-12 1999-12-07 Aeris Communications, Inc. Wireless gaming method
ES2239342T3 (en) 1995-12-29 2005-09-16 Dresser, Inc. DISPENSING SYSTEM AND CLIENT IDENTIFICATION METHOD WITH FREQUENCY RADIO.
KR100286008B1 (en) 1995-12-30 2001-04-16 윤종용 Method for automatically updating software program
US5809230A (en) 1996-01-16 1998-09-15 Mclellan Software International, Llc System and method for controlling access to personal computer system resources
DE19602821C1 (en) 1996-01-26 1997-06-26 Siemens Ag Method for producing a data card
JPH09215728A (en) 1996-02-07 1997-08-19 Yuyama Seisakusho:Kk Tablet dispensing method
GB9604459D0 (en) 1996-03-01 1996-05-01 Isr Logistics Ltd An apparatus for the control of inventory
US5689238A (en) 1996-03-08 1997-11-18 Lucent Technologies, Inc. Object locator system and methods therefor
US6185198B1 (en) 1996-03-20 2001-02-06 Aeris Communications, Inc. Time division multiple access downlink personal communications system voice and data debit billing method
US6088431A (en) 1996-03-20 2000-07-11 Aeris Communications, Inc. Method for transmitting voice or data in a wireless network depending on billing account status
US5960048A (en) 1996-03-26 1999-09-28 Telefonaktiebolaget Lm Ericsson Method and an arrangement for receiving a symbol sequence
US5804803A (en) 1996-04-02 1998-09-08 International Business Machines Corporation Mechanism for retrieving information using data encoded on an object
US5774053A (en) 1996-05-02 1998-06-30 Porter; David Storage device for the delivery and pickup of goods
US5842976A (en) 1996-05-16 1998-12-01 Pyxis Corporation Dispensing, storage, control and inventory system with medication and treatment chart record
US5894266A (en) 1996-05-30 1999-04-13 Micron Technology, Inc. Method and apparatus for remote monitoring
US5929779A (en) 1996-05-31 1999-07-27 Lucent Technologies Inc. Read/write protocol for radio frequency identification tags
US5786763A (en) 1996-06-20 1998-07-28 Sensormatic Electronics Corporation Antenna multiplexer with isolation of switching elements
US5892441A (en) 1996-06-26 1999-04-06 Par Government Systems Corporation Sensing with active electronic tags
US5959568A (en) 1996-06-26 1999-09-28 Par Goverment Systems Corporation Measuring distance
US5774876A (en) 1996-06-26 1998-06-30 Par Government Systems Corporation Managing assets with active electronic tags
US6011243A (en) 1996-06-27 2000-01-04 Emerson Electric Co Holding cabinet and method and apparatus for controlling a holding cabinet
US5887176A (en) 1996-06-28 1999-03-23 Randtec, Inc. Method and system for remote monitoring and tracking of inventory
US6362737B1 (en) 1998-06-02 2002-03-26 Rf Code, Inc. Object Identification system with adaptive transceivers and methods of operation
US5742618A (en) 1996-09-04 1998-04-21 Palomar Technologies Corporation RF transponder system having error detection and correction
US6006034A (en) 1996-09-05 1999-12-21 Open Software Associates, Ltd. Systems and methods for automatic application version upgrading and maintenance
US5745036A (en) 1996-09-12 1998-04-28 Checkpoint Systems, Inc. Electronic article security system for store which uses intelligent security tags and transaction data
US5771003A (en) 1996-09-24 1998-06-23 Elenco Electronics, Inc. Locating system and process
US5990794A (en) 1996-09-26 1999-11-23 Sensormatic Electronics Corporation Apparatus for data communication and deactivation of electronic article surveillance tags
US5777561A (en) 1996-09-30 1998-07-07 International Business Machines Corporation Method of grouping RF transponders
US5809251A (en) 1996-10-09 1998-09-15 Hewlett-Packard Company Remote installation of software by a management information system into a remote computer
US6812824B1 (en) 1996-10-17 2004-11-02 Rf Technologies, Inc. Method and apparatus combining a tracking system and a wireless communication system
US5836618A (en) 1996-11-06 1998-11-17 Brandeis University Stretchable thermoplastic labels for cryogenic storage containers
EP0956693A4 (en) 1996-11-19 2004-07-14 Prec Dynamics Corp Linkage identification system
US5999091A (en) 1996-11-25 1999-12-07 Highwaymaster Communications, Inc. Trailer communications system
US5930145A (en) 1996-12-03 1999-07-27 Yuyama Mfg. Co., Ltd. Method for medicament stock management by transponders and apparatus therefor
AU5687798A (en) 1996-12-03 1998-06-29 E.J. Brooks Company Programmable lock and security system therefor
US6039467A (en) 1996-12-05 2000-03-21 Omnicell Technologies, Inc. Lighting system and methods for a dispensing device
US6640159B2 (en) 1996-12-05 2003-10-28 Omnicell Technologies, Inc. Replacement liner and methods for a dispensing device
US5995898A (en) 1996-12-06 1999-11-30 Micron Communication, Inc. RFID system in communication with vehicle on-board computer
US6003006A (en) 1996-12-09 1999-12-14 Pyxis Corporation System of drug distribution to health care providers
US6021392A (en) 1996-12-09 2000-02-01 Pyxis Corporation System and method for drug management
US5950630A (en) 1996-12-12 1999-09-14 Portwood; Michael T. System and method for improving compliance of a medical regimen
US6009274A (en) 1996-12-13 1999-12-28 3Com Corporation Method and apparatus for automatically updating software components on end systems over a network
US5842118A (en) 1996-12-18 1998-11-24 Micron Communications, Inc. Communication system including diversity antenna queuing
US5798694A (en) 1996-12-19 1998-08-25 Motorola, Inc. Food storage apparatus and methods and systems for monitoring a food item
US6529446B1 (en) 1996-12-20 2003-03-04 Telaric L.L.C. Interactive medication container
JP3608926B2 (en) 1996-12-26 2005-01-12 株式会社日立製作所 Information recording device
US6034603A (en) 1997-01-24 2000-03-07 Axcess, Inc. Radio tag system and method with improved tag interference avoidance
US5883582A (en) 1997-02-07 1999-03-16 Checkpoint Systems, Inc. Anticollision protocol for reading multiple RFID tags
US5822714A (en) 1997-03-05 1998-10-13 International Business Machines Corporation Data processing system and method for accessing a plurality of radio frequency identification tags
US7978564B2 (en) 1997-03-28 2011-07-12 Carlos De La Huerga Interactive medication container
US5923300A (en) 1997-04-03 1999-07-13 Destron-Fearing Corporation Multi-phase transmitter with single receive antenna for transponder interrogator
US5886634A (en) 1997-05-05 1999-03-23 Electronic Data Systems Corporation Item removal system and method
US5963144A (en) 1997-05-30 1999-10-05 Single Chip Systems Corp. Cloaking circuit for use in a radiofrequency identification and method of cloaking RFID tags to increase interrogation reliability
AUPO714997A0 (en) 1997-06-03 1997-06-26 Automation & Machine Development Pty Ltd Computerised stock control system
US5929801A (en) 1997-07-11 1999-07-27 Texas Instruments Incorporated Method for repeating interrogations until failing to receive unintelligible responses to identify plurality of transponders by an interrogator
US5963134A (en) 1997-07-24 1999-10-05 Checkpoint Systems, Inc. Inventory system using articles with RFID tags
US6025780A (en) 1997-07-25 2000-02-15 Checkpoint Systems, Inc. RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system
KR100230548B1 (en) 1997-08-14 1999-11-15 구자홍 Computer-telephone integrating system and spreading method using thereof
US5927540A (en) 1997-08-20 1999-07-27 Omnicell Technologies, Inc. Controlled dispensing system and method
US5986570A (en) 1997-09-03 1999-11-16 Micron Communications, Inc. Method for resolving signal collisions between multiple RFID transponders in a field
JPH1185858A (en) 1997-09-05 1999-03-30 Hitachi Ltd Article management system
US6044461A (en) 1997-09-16 2000-03-28 International Business Machines Corporation Computer system and method of selectively rebooting the same in response to a system program code update
US5906228A (en) 1997-09-24 1999-05-25 Dresser Industries, Inc. Gasoline dispensing system and method with radio frequency customer identification antenna
US20020113082A1 (en) 1997-09-26 2002-08-22 Leatherman Russel Dean Antenna placement in a fueling and retail system
US6037879A (en) 1997-10-02 2000-03-14 Micron Technology, Inc. Wireless identification device, RFID device, and method of manufacturing wireless identification device
US5974454A (en) 1997-11-14 1999-10-26 Microsoft Corporation Method and system for installing and updating program module components
US6002344A (en) 1997-11-21 1999-12-14 Bandy; William R. System and method for electronic inventory
US6131399A (en) 1997-12-04 2000-10-17 Hall; Donald M. Refrigerated vending machine
JP2001510670A (en) 1997-12-05 2001-07-31 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Identification transponder
US6011999A (en) 1997-12-05 2000-01-04 Omnicell Technologies, Inc. Apparatus for controlled dispensing of pharmaceutical and medical supplies
US6249227B1 (en) 1998-01-05 2001-06-19 Intermec Ip Corp. RFID integrated in electronic assets
US6131812A (en) 1998-01-12 2000-10-17 Schneider; Gerald P. Appliance door with integrated computer means
GB2333095B (en) 1998-01-13 2002-01-16 David Stuart Archbold Container for goods
US6070070A (en) 1998-01-20 2000-05-30 Aeris.Net Method and apparatus for remote telephony switch control
US6830181B1 (en) 1998-02-09 2004-12-14 Intermec Ip Corp. Combined optical and radio frequency tag reader
US5936527A (en) 1998-02-10 1999-08-10 E-Tag Systems, Inc. Method and apparatus for locating and tracking documents and other objects
US6112502A (en) 1998-02-10 2000-09-05 Diebold, Incorporated Restocking method for medical item dispensing system
US6639509B1 (en) 1998-03-16 2003-10-28 Intermec Ip Corp. System and method for communicating with an RFID transponder with reduced noise and interference
US7181501B2 (en) 1998-03-19 2007-02-20 Isochron, Inc. Remote data acquisition, transmission and analysis system including handheld wireless equipment
US7020680B2 (en) 1998-03-19 2006-03-28 Isochron, Llc System and method for monitoring and control of beverage dispensing equipment
US5949335A (en) 1998-04-14 1999-09-07 Sensormatic Electronics Corporation RFID tagging system for network assets
US5955951A (en) 1998-04-24 1999-09-21 Sensormatic Electronics Corporation Combined article surveillance and product identification system
US6339826B2 (en) 1998-05-05 2002-01-15 International Business Machines Corp. Client-server system for maintaining a user desktop consistent with server application user access permissions
US6070012A (en) 1998-05-22 2000-05-30 Nortel Networks Corporation Method and apparatus for upgrading software subsystems without interrupting service
US6219587B1 (en) 1998-05-27 2001-04-17 Nextrx Corporation Automated pharmaceutical management and dispensing system
US6116461A (en) 1998-05-29 2000-09-12 Pyxis Corporation Method and apparatus for the dispensing of drugs
US6351215B2 (en) 1998-06-02 2002-02-26 Rf Code, Inc. Monitoring antenna system
US6154790A (en) 1998-07-10 2000-11-28 International Business Machines Monitoring and reporting hard disk drives identification using radio frequency
DE19916379A1 (en) 1998-07-20 2000-01-27 Liebherr Hausgeraete Freezer for storing frozen goods, providing user or operator with view of goods stored in freezer without high cost
US6031459A (en) 1998-07-22 2000-02-29 Micron Technology, Inc. Wireless communication devices, radio frequency identification devices, and methods of forming wireless communication devices and radio frequency identification devices
JP2000038202A (en) 1998-07-22 2000-02-08 Printec International:Kk Loan document managing device
US5959531A (en) 1998-07-24 1999-09-28 Checkpoint Systems, Inc. Optical interface between receiver and tag response signal analyzer in RFID system for detecting low power resonant tags
US5955950A (en) 1998-07-24 1999-09-21 Checkpoint Systems, Inc. Low noise signal generator for use with an RFID system
AU762475B2 (en) 1998-08-14 2003-06-26 3M Innovative Properties Company Applications for radio frequency identification systems
CN1312928A (en) 1998-08-14 2001-09-12 3M创新有限公司 Application for a radio frequency identification system
US6424262B2 (en) 1998-08-14 2002-07-23 3M Innovative Properties Company Applications for radio frequency identification systems
US5977875A (en) 1998-08-31 1999-11-02 Magnex Corporation Collective objects management system using R.F. object indentification
US6069564A (en) 1998-09-08 2000-05-30 Hatano; Richard Multi-directional RFID antenna
US6232876B1 (en) 1998-09-11 2001-05-15 Key-Trak, Inc. Mobile object tracking system
WO2000016564A1 (en) 1998-09-11 2000-03-23 Key-Trak, Inc. Object control and tracking system with zonal transition detection
CA2343404C (en) 1998-09-11 2002-11-12 Key-Trak, Inc. Object tracking system with non-contact object detection and identification
US6151536A (en) 1998-09-28 2000-11-21 Omnicell.Com Dispensing system and methods
US6107917A (en) 1998-10-16 2000-08-22 Carrender; Curtis L. Electronic tag including RF modem for monitoring motor vehicle performance with filtering
US6339732B1 (en) 1998-10-16 2002-01-15 Pyxis Corporation Apparatus and method for storing, tracking and documenting usage of anesthesiology items
JP2000137758A (en) 1998-10-29 2000-05-16 Hitachi Ltd Method and device for managing article
US6147655A (en) 1998-11-05 2000-11-14 Single Chip Systems Corporation Flat loop antenna in a single plane for use in radio frequency identification tags
US6260049B1 (en) 1998-11-10 2001-07-10 Electronic Paper Solutions, Inc. Automated shelf management system and process for tracking and purging file folders in a file storage facility
FR2786876B1 (en) 1998-12-03 2001-08-31 Nicolas Bara REFRIGERATED ENCLOSURE FOR STORING ARTICLES PROVIDED WITH MEANS FOR CONTROLLING THE CONTENT OF THE SPEAKER
US6211782B1 (en) 1999-01-09 2001-04-03 Heat-Timer Corporation Electronic message delivery system utilizable in the monitoring of remote equipment and method of same
US6147601A (en) 1999-01-09 2000-11-14 Heat - Timer Corp. Electronic message delivery system utilizable in the monitoring of remote equipment and method of same
US6160477A (en) 1999-01-09 2000-12-12 Heat-Timer Corp. Electronic message delivery system utilizable in the monitoring of remote equipment and method of same
JP2000251156A (en) 1999-03-02 2000-09-14 Sanyo Electric Co Ltd Refrigerated item replenishment system
JP2000276335A (en) 1999-03-29 2000-10-06 Nec Soft Ltd System for automatically updating program
US6109477A (en) 1999-03-31 2000-08-29 Marconi Commerce Systems Inc. Signature pulse generator and method of detecting tampering with a fueling operation
JP2000310476A (en) 1999-04-27 2000-11-07 Hitachi Ltd Containing compartment
US6517000B1 (en) 1999-05-03 2003-02-11 Psc Scanning, Inc. Dual ended cable for connecting electronic article surveillance antenna with RFID equipment
US6169483B1 (en) 1999-05-04 2001-01-02 Sensormatic Electronics Corporation Self-checkout/self-check-in RFID and electronics article surveillance system
US6121880A (en) 1999-05-27 2000-09-19 Intermec Ip Corp. Sticker transponder for use on glass surface
US6784789B2 (en) 1999-07-08 2004-08-31 Intermec Ip Corp. Method and apparatus for verifying RFID tags
JP2001052054A (en) 1999-08-04 2001-02-23 Fuji Xerox Co Ltd Article taking-out management system
US20020038167A1 (en) 1999-08-07 2002-03-28 Munroe Chirnomas Method and apparatus for vending goods
US6714121B1 (en) 1999-08-09 2004-03-30 Micron Technology, Inc. RFID material tracking method and apparatus
US6771766B1 (en) 1999-08-31 2004-08-03 Verizon Services Corp. Methods and apparatus for providing live agent assistance
US6147662A (en) 1999-09-10 2000-11-14 Moore North America, Inc. Radio frequency identification tags and labels
US6843720B2 (en) 1999-09-13 2005-01-18 Sierra Design Group Apparatus and method for dispensing prizes
US6327576B1 (en) 1999-09-21 2001-12-04 Fujitsu Limited System and method for managing expiration-dated products utilizing an electronic receipt
US6677852B1 (en) 1999-09-22 2004-01-13 Intermec Ip Corp. System and method for automatically controlling or configuring a device, such as an RFID reader
US6121583A (en) 1999-09-28 2000-09-19 Alto-Shaam, Inc. Food warming unit with humidity control
US6595418B1 (en) 1999-09-28 2003-07-22 Hitachi Kokusai Electric Inc. Enhanced article management system and method
JP2001097512A (en) 1999-09-28 2001-04-10 Hitachi Kokusai Electric Inc Article control system
DE19950145C1 (en) 1999-10-18 2001-05-10 Lucatron Ag Baar Process for reading and writing RFID transponders
US6590498B2 (en) 1999-10-19 2003-07-08 Lucent Technologies Inc. Method and apparatus for improving the interrogation range of an RF-Tag
US6170285B1 (en) 1999-10-26 2001-01-09 Crane Co. Vending machine
JP3870639B2 (en) 1999-12-03 2007-01-24 富士ゼロックス株式会社 Parallel identification system
JP3390389B2 (en) 1999-12-08 2003-03-24 チェックポイント・マニュファクチュアリング・ジャパン株式会社 Resonance tag
US20010053980A1 (en) 1999-12-16 2001-12-20 Suliman Douglas M. Method and system for blind electronic warranty registration
US6512478B1 (en) 1999-12-22 2003-01-28 Rockwell Technologies, Llc Location position system for relay assisted tracking
US6838989B1 (en) 1999-12-22 2005-01-04 Intermec Ip Corp. RFID transponder having active backscatter amplifier for re-transmitting a received signal
US6294999B1 (en) 1999-12-29 2001-09-25 Becton, Dickinson And Company Systems and methods for monitoring patient compliance with medication regimens
US20010045894A1 (en) 2000-02-04 2001-11-29 Richard Slavin Locator apparatus system
AU2001236981A1 (en) 2000-02-14 2001-08-27 Reid M Rubsamen Method for acquiring and analyzing a list of a patient's prescription medications
US6552663B2 (en) 2000-02-16 2003-04-22 Display Edge Technology, Ltd. Product information display system with expanded retail display functions
US6451154B1 (en) 2000-02-18 2002-09-17 Moore North America, Inc. RFID manufacturing concepts
JP2001229263A (en) 2000-02-18 2001-08-24 Fuji Xerox Co Ltd Article managing system
US6761637B2 (en) 2000-02-22 2004-07-13 Creative Kingdoms, Llc Method of game play using RFID tracking device
GB0004455D0 (en) 2000-02-26 2000-04-19 Glaxo Group Ltd Manufacturing method
JP4514880B2 (en) 2000-02-28 2010-07-28 大日本印刷株式会社 Book delivery, returns and inventory management system
JP2001317862A (en) 2000-02-28 2001-11-16 Dainippon Printing Co Ltd Automatic refrigerating system for food and refrigerator
EP1174667A4 (en) 2000-02-28 2004-08-11 Dainippon Printing Co Ltd Automatic refrigerator system, refrigerator, automatic cooking system, and microwave oven
WO2001072107A2 (en) 2000-03-24 2001-10-04 International Paper Rfid tag for authentication and identification
US6356197B1 (en) 2000-04-03 2002-03-12 Sensormatic Electronics Corporation Electronic article surveillance and identification device, system, and method
RU2168761C1 (en) 2000-04-18 2001-06-10 Кудряков Игорь Владимирович Method and apparatus for controlling process for realizing service of home delivery of goods
JP2001317859A (en) 2000-05-09 2001-11-16 Matsushita Refrig Co Ltd Refrigerator with inventory control function
WO2001088828A2 (en) 2000-05-18 2001-11-22 Alaris Medical Systems, Inc. Distributed remote asset and medication management drug delivery system
AU2001274896A1 (en) 2000-05-22 2001-12-03 Avery Dennison Corporation Trackable files and systems for using the same
US6917853B2 (en) 2000-05-23 2005-07-12 Munroe Chirnomas Method and apparatus for controlling rented or leased or loaned equipment
JP2002056244A (en) 2000-05-31 2002-02-20 Biznet Corp Ordering and order receiving method using electronic mail
GB0013619D0 (en) 2000-06-06 2000-07-26 Glaxo Group Ltd Sample container
US6265976B1 (en) 2000-06-23 2001-07-24 Single Chip Systems Corporation Method and apparatus for providing receiver dual channel coupling in a reader for RFID tags
US6229443B1 (en) 2000-06-23 2001-05-08 Single Chip Systems Apparatus and method for detuning of RFID tag to regulate voltage
US6686830B1 (en) 2000-06-28 2004-02-03 Applied Wireless Identifications Group Homodyne I/Q transceiver for a spread spectrum reader
US6483473B1 (en) 2000-07-18 2002-11-19 Marconi Communications Inc. Wireless communication device and method
JP4273641B2 (en) 2000-07-18 2009-06-03 株式会社デンソーウェーブ Charge settlement system
US20020198795A1 (en) 2000-07-25 2002-12-26 Dorenbosch Jheroen Pieter Home inventory management system and method
FR2812350B1 (en) 2000-07-26 2003-01-24 Asco Joucomatic IMPROVEMENTS TO PNEUMATIC DISTRIBUTION SYSTEMS
AU2001278132A1 (en) 2000-08-02 2002-02-13 Sicel Technologies, Inc. Evaluation of irradiated foods and other items with telemetric dosimeters and associated methods
AU2001284768B2 (en) 2000-08-11 2006-07-13 Escort Memory Systems RFID passive repeater system and apparatus
US6724308B2 (en) 2000-08-11 2004-04-20 Escort Memory Systems RFID tracking method and system
US20030074106A1 (en) 2000-08-30 2003-04-17 Crane Co. System and method of extracting data from vending machines
AU2001288799A1 (en) 2000-09-05 2002-03-22 Capitol Vial, Inc. A system and mathod for maintaining, tracking and identifying the integrity of adisposable specimen container with a re-usable transponder
US6392544B1 (en) 2000-09-25 2002-05-21 Motorola, Inc. Method and apparatus for selectively activating radio frequency identification tags that are in close proximity
US6568596B1 (en) 2000-10-02 2003-05-27 Symbol Technologies, Inc. XML-based barcode scanner
US6975834B1 (en) 2000-10-03 2005-12-13 Mineral Lassen Llc Multi-band wireless communication device and method
EP1328912A4 (en) 2000-10-10 2005-05-11 Escort Memory Systems Modular rfid antenna system
US6883710B2 (en) 2000-10-11 2005-04-26 Amerasia International Technology, Inc. Article tracking system and method
US20020183882A1 (en) * 2000-10-20 2002-12-05 Michael Dearing RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US7258276B2 (en) 2000-10-20 2007-08-21 Promega Corporation Radio frequency identification method and system of distributing products
KR100793464B1 (en) 2000-11-20 2008-01-14 시게이트 테크놀로지 엘엘씨 Rfid tag attachment to a disc drive
FR2817355B1 (en) 2000-11-27 2003-01-03 Jouan Sa ASSEMBLY COMPRISING A WORKING SPEAKER, A PRODUCT RECEIVING BODY, AND A CORRESPONDING RADIO FREQUENCY WAVE INFORMATION COMMUNICATION SYSTEM, SPEAKER AND BODY
US7253717B2 (en) 2000-11-29 2007-08-07 Mobile Technics Llc Method and system for communicating with and tracking RFID transponders
US6664895B2 (en) 2001-01-02 2003-12-16 Magnex Corporation R.F. suppression technique for collective objects management system using R.F. object identification
US6407669B1 (en) 2001-02-02 2002-06-18 3M Innovative Properties Company RFID tag device and method of manufacturing
CN1230270C (en) 2001-02-27 2005-12-07 中国兵器工业第五九研究所 Computerized control method for photopelecronically controlled automatic rod material sawing
TW499114U (en) 2001-03-14 2002-08-11 Wintecronics Ltd Remote control for bi-directional central access control system
US6861954B2 (en) 2001-03-30 2005-03-01 Bruce H. Levin Tracking medical products with integrated circuits
US20020140966A1 (en) 2001-04-02 2002-10-03 Meade William K. Systems and methods for managing software updates for printing systems
US6732923B2 (en) 2001-04-04 2004-05-11 Ncr Corporation Radio frequency identification system and method
US6793127B2 (en) 2001-04-04 2004-09-21 Koninklijke Philips Electronics N.V. Internet enabled resource constrained terminal for processing tags
US7009515B2 (en) 2001-04-11 2006-03-07 Battelle Memorial Institute K1-53 Frequency-hopping RFID system
US6539281B2 (en) 2001-04-23 2003-03-25 Accenture Global Services Gmbh Online medicine cabinet
US20020180588A1 (en) 2001-06-05 2002-12-05 Erickson David P. Radio frequency identification in document management
US6532399B2 (en) 2001-06-05 2003-03-11 Baxter International Inc. Dispensing method using indirect coupling
US6707381B1 (en) 2001-06-26 2004-03-16 Key-Trak, Inc. Object tracking method and system with object identification and verification
US6970100B2 (en) 2001-07-05 2005-11-29 Long Range Systems, Inc. Temperature tag and system for monitoring, recording, and reporting temperature readings
CN1565135A (en) 2001-08-07 2005-01-12 马尔斯公司 Vending audit system
US20030052783A1 (en) 2001-09-17 2003-03-20 Sitzman William B. Dock door RFID system
US6737973B2 (en) 2001-10-15 2004-05-18 3M Innovative Properties Company Amplifier modulation
KR100429165B1 (en) 2001-11-20 2004-04-29 주식회사 기가밉스 System conversion of monitor and TV
US6908034B2 (en) 2001-12-17 2005-06-21 Zih Corp. XML system
US20030117281A1 (en) 2001-12-21 2003-06-26 Timur Sriharto Dynamic control containment unit
US8321302B2 (en) 2002-01-23 2012-11-27 Sensormatic Electronics, LLC Inventory management system
US6836215B1 (en) 2002-01-22 2004-12-28 The Standard Register Company Printable identification band with top strip for RFID chip attachment
US20040069850A1 (en) 2002-01-31 2004-04-15 De Wilde Eric D. Truck cargo management rfid tags and interrogators
US20030171998A1 (en) 2002-03-11 2003-09-11 Omnicell, Inc. Methods and systems for consolidating purchase orders
US20050113138A1 (en) 2002-03-18 2005-05-26 Greg Mendolia RF ID tag reader utlizing a scanning antenna system and method
US6687609B2 (en) * 2002-06-13 2004-02-03 Navcom Technology, Inc. Mobile-trailer tracking system and method
US6700491B2 (en) 2002-06-14 2004-03-02 Sensormatic Electronics Corporation Radio frequency identification tag with thin-film battery for antenna
US6859757B2 (en) 2002-07-31 2005-02-22 Sap Aktiengesellschaft Complex article tagging with maintenance related information
FR2843816B1 (en) * 2002-08-26 2005-03-18 Jouan Sa PRODUCT PROCESSING FACILITY AND CORRESPONDING DATA ACQUISITION ELEMENT (BIS)
US6927692B1 (en) 2002-09-05 2005-08-09 American Greetings Corporation RF inventory system
US7009519B2 (en) 2002-11-21 2006-03-07 S.C. Johnson & Sons, Inc. Product dispensing controlled by RFID tags
US6982640B2 (en) 2002-11-21 2006-01-03 Kimberly-Clark Worldwide, Inc. RFID system and method for tracking food freshness
JP4185397B2 (en) 2002-12-25 2008-11-26 株式会社キーエンス Optical detector
US6989796B2 (en) * 2003-04-25 2006-01-24 Mobile Aspects Antenna arrangement and system
US6829520B1 (en) * 2003-06-03 2004-12-07 The Boeing Company Time-and-temperature sensitive material tracking
US20040263316A1 (en) 2003-06-24 2004-12-30 Case, Llc Reprogrammable vehicle access control system
US6970141B2 (en) 2003-07-02 2005-11-29 Sensormatic Electronics Corporation Phase compensated field-cancelling nested loop antenna
US7178416B2 (en) 2003-07-08 2007-02-20 Alexeter Technologies, Llc. Radio frequency identification (RFID) test information control and tracking system
US7043166B2 (en) 2003-07-08 2006-05-09 Hewlett-Packard Development Company, L.P. Methods and systems for providing firmware to a printing device
US6892520B2 (en) 2003-08-14 2005-05-17 Rowse Hydraulic Rakes Co., Inc. Foldable hay rake
US20060244599A1 (en) * 2003-10-22 2006-11-02 Mobile Aspects, Inc. Identification apparatus
US20050088305A1 (en) * 2003-10-22 2005-04-28 Mobile Aspects Identification apparatus
US6989749B2 (en) 2003-11-21 2006-01-24 The United States Of America As Represented By The Secretary Of The Navy Electronic check out system
US20060006999A1 (en) 2004-01-22 2006-01-12 Vanderbilt University Monitoring people, objects, and information using radio frequency identification
US7753272B2 (en) * 2004-04-23 2010-07-13 Winware, Inc. Object tracking in an enclosure
US6987392B1 (en) 2004-05-05 2006-01-17 Harris Corporation Electromagnetic protection test and surveillance system
US7432874B2 (en) 2004-07-22 2008-10-07 Feig Electronic Gmbh Antenna array
US7348884B2 (en) 2004-07-29 2008-03-25 Omnicell, Inc. RFID cabinet
KR20060060343A (en) * 2004-11-30 2006-06-05 삼성전자주식회사 A refrigerator improving recognition rate of a rfid tag
US7455225B1 (en) * 2005-02-22 2008-11-25 Sabioso, Inc. Method and system for monitoring and controlling goods while in transit
US7268742B2 (en) * 2005-03-22 2007-09-11 Mobile Aspects, Inc. Antenna arrangement
US20060289650A1 (en) * 2005-06-27 2006-12-28 Mobile Aspects, Inc. Networked monitoring system
US20090298514A1 (en) * 2006-09-14 2009-12-03 Shah Ullah Real world behavior measurement using identifiers specific to mobile devices
US7710275B2 (en) * 2007-03-16 2010-05-04 Promega Corporation RFID reader enclosure and man-o-war RFID reader system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005013496A2 (en) * 2003-07-25 2005-02-10 Meadwestvaco Corporation Apparatus for and method of using a diversity antenna
US20050247782A1 (en) * 2004-04-23 2005-11-10 Gougen Ambartsoumian Low temperature radio frequency identification tracking system
EP1679636A1 (en) * 2005-01-03 2006-07-12 Samsung Electronics Co., Ltd. Refrigerator with a reader for RFID tags
EP1701296A1 (en) * 2005-03-07 2006-09-13 Fuji Xerox Co., Ltd. RFID relay antenna, container comprising the RFID relay antenna, and method of arranging a plurality of these containers
WO2007142645A1 (en) * 2006-06-08 2007-12-13 Asyst Technologies, Inc. Extended read range rfid system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7938326B2 (en) 2000-10-20 2011-05-10 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
USRE46326E1 (en) 2000-10-20 2017-02-28 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
USRE47599E1 (en) 2000-10-20 2019-09-10 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
WO2017173326A1 (en) * 2016-04-01 2017-10-05 Meps Real-Time, Inc. Rfid read system for verifying the contents of items in tray pockets

Also Published As

Publication number Publication date
EP2137668B1 (en) 2016-02-10
WO2008115784A3 (en) 2008-11-06
US8031072B2 (en) 2011-10-04
US20100187307A1 (en) 2010-07-29
US20080224875A1 (en) 2008-09-18
EP2137668A2 (en) 2009-12-30
US8258961B2 (en) 2012-09-04
US20110315766A1 (en) 2011-12-29
US7710275B2 (en) 2010-05-04

Similar Documents

Publication Publication Date Title
EP2137668B1 (en) Rfid reader enclosure and man-o-war rfid reader system
AU2021203026B2 (en) A medical technology station and method of use
US11410118B2 (en) Package management system
JP6937764B2 (en) Systems and methods for controlling access to physical space
US20190043296A1 (en) Multifunctional access control device
US8854822B2 (en) Data center equipment cabinet information center
EP1840854B1 (en) Radio frequency identification method and system of distributing products
CN111869024B (en) Service terminal equipment configuration
US20120233006A1 (en) Wireless device operable cash drawer having biometric, database, and messaging capabilities
US20120062363A1 (en) Wireless device operable cash drawer
US20110025502A1 (en) Computer Room Security
US11948411B2 (en) Electronic lock, system, and take over lock module, and method of managing the same
US20180007809A1 (en) Mechanism to provide physical location information to any network device
US11315373B2 (en) Device storage isolation
KR102287295B1 (en) Information Provider System for Electronic Device in Store with Security Function
US20190005481A1 (en) Combined scanner and point-of-sale (pos) terminal
TW202207686A (en) Remote desktop support kiosk and dispenser
JP6726483B2 (en) Electric lock control system, storage system, electric lock control device, and electric lock control method
WO2020159488A1 (en) Device component distribution
JP6726484B2 (en) Electric lock control system, storage system, electric lock control device, and electric lock control method
KR20200137000A (en) Receptacle isolation
NZ742542B2 (en) A medical technology station and method of use
AU2014280950A1 (en) Improvements in Computer Room Security

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08732209

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2008732209

Country of ref document: EP