AU2008200798A1 - RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags - Google Patents

RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags Download PDF

Info

Publication number
AU2008200798A1
AU2008200798A1 AU2008200798A AU2008200798A AU2008200798A1 AU 2008200798 A1 AU2008200798 A1 AU 2008200798A1 AU 2008200798 A AU2008200798 A AU 2008200798A AU 2008200798 A AU2008200798 A AU 2008200798A AU 2008200798 A1 AU2008200798 A1 AU 2008200798A1
Authority
AU
Australia
Prior art keywords
antenna
rfid
scans
area
scan
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2008200798A
Inventor
Michael Dearing
Julia E Krueger
John Linton
William A Linton
Gediminas Vidugiris
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Promega Corp
Original Assignee
Promega Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2006252255A external-priority patent/AU2006252255B2/en
Application filed by Promega Corp filed Critical Promega Corp
Priority to AU2008200798A priority Critical patent/AU2008200798A1/en
Publication of AU2008200798A1 publication Critical patent/AU2008200798A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Description

18/02 2008 14:16 FAX 61 3 92438333 GRIFFITH HACK 4IPAUSTRALIA aoll
AUSTRALIA
Patents Act 1990 COMPLETE SPECIFICATION Standard Patent Applicant(s): PROMEGA CORPORATION Invention Title: RF POINT OF SALE AND DELIVERY METHOD AND SYSTEM USING COMMUNICATION WITH REMOTE COMPUTER AND HAVING FEATURES TO READ A LARGE NUMBER OF RF TAGS The following statement is a full'description of this invention, including the best method for performing it known to me/us: COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:16 FAX 61 3 92438333GRFIH AC PASALAI02 GRIFFITH HACK 4 IPAUSTRALIA R012 00 la RF POINT OF SALE AND DELIVERY METHOD AND SYSTEM USING COMM4UNICATION WITH REMOTE COMPUTER AND HAVING FEATURES TO READ A LARGE NUMBER OF RF T AGS 00 RELATED APPLICATIONS This application is a continuation-in-pant of Application No. 09/981,219 filed on 00 October 16, 2001. Application No. 09/981,219, claims the beniefit of Provisional S Application No. 60/241,907, filed on October 20, 2000.
00 BACKGROUND OF THE INVENTION 0 o The present invention relates to methods and systems for distributing products to customers. More particularly, the invention relates to a system :that tracks the use of products using radio frequency tags and provides information to a central computer to enable automated restocking, inventory, tracking, or reordering of the products.
A variety of paper-based, electronic, and Internet ordering systems are available and in use today. In addition, a number of inventory tracking systems, including systems that use bar coding are also in use. Beyond bar codes, it has been proposed that inventory tracking can be accomplished using HF tags. However, commercially acceptable RF systems, particularly systems that are able to track hundreds of items in relatively small areas, have not yet been developed. Furthermore, commercially acceptable integrated systems that allow consumers to order and receive goods at a lo( ation proximate to where the goods are used and that also automatically, and with limited human intervention, track usage and initiate reordering are also not available.
SUMMARY OF THlE INVENTION Accordingly, there is a need to improve the distribution and tracking of goods so that consumers experience distribution of goods at a location proximate to where the consumer will use the goods without requiring paper or computer ordering. There is also a need for a distribution system that is able to track numerous HF tagged items positioned in relatively small areas or volumes.
The invention provides a system and method where a user need only find the product of interest and take that product. As compared to most Internet-based systems and HAtuiniKXcp\Speh%20032f 7534 DI V.DOC 22f 122ID COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:16 FAX 61 3 92438333GIFIhHC *PASALA Iji GRIFFITH HACK 4 IPAUSTRALIA IA013 00 2- Cl methods, the invention is "clickless." In other words, the invention requires little or no manual input from users. The invention provides a system for distributing a plurality of products. Each of the products has a radio frequency tag. As used herein, radio frequency means electromagnetic radiation that lies between audible and infrared radiation, including microwave radiation. Each tag is encoded.with a unique identifying 00 code. In one embodiment, the system is accessed by individuals possessing a radio frequency user badge with an identifying code. Alternatively, the system could rely on o magnetic swipe cards, password systems, biometric devices (such as a retinal scanner, 00 thumb or finger print reader, voice identification unit,' or the like), bar code cards, or other systems for limiting access to authorized individuals.
The system includes one or more cabinets, refrigerators, similar storage units, (generically referred to as "micro-wrehue") or even secured rooms that are stocked with the RE tagged products and accessed by individuals through one of the mechanisms described above. In one embodiment, each micro-warehouse defines an REF cavity, has a door that may be equipped with a lock (such as an electric-actuated lock), an antenna or antenna array mounted on or in the micro-warehouse, a client controller (or similar programmable device) coupled to the lock and the antenna, a badge or key reader, and an output or user-feedback device such as a light, audio device, or display. Using a signal from the badge or key reader, the client controller checks the identity of the individual accessing the micro-warehouse, such as by reading the code of the user badge. The user feedback device is then activated to indicate whether the individual attempting to access the micro-warehouse is authorized to access the unit. If the code or other identifier matches stored records of authorized users, the client controller opens the door and the user may remove desired products from the micro-warehouse. COnce the user closes the door (and in some embodiments, the door is locked), the client controller performs a scan of the products remaining in the micro-warehouse to determine the identity of each of the products. The client controller then generates a message including the identity of each of the products or other message related to the products taken. That message or a second message based on the first is sent to a server. The server tracks product and user information automatically, that is, without relying on user input 'The server also generates orders for products taken from the micro-warehouse by the user. The server can be H:ALtdsaP~epSmAZ02o 17S34 DIVDOC 2212106 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:16 FAX 61 3 92438333 GRIFFITH HACK 4IPAUSTRALIA Q 014 00 0 programmed to automatically place those orders. This eliminates the need for the customer to re-order consumed items.
00 Alternatively, the system can operate like a vending machine, but with the product exit chamber, the area behind a door through which a user reaches for the product after it 5 has fallen from its storage area, arranged as the RF cavity. Tags on products that fall into 00 0the pick up area can be read before or as the user picks them up.
Each user badge may also include billing information and form-of-payment 00 information in addition to having identification information. As should be apparent, 0 obilling information could take the form of the entity to be billed, which may or may not be C' 10 the individual associated with the tag. Form-of-payment information may include account information, credit card information, or the like.
Thus, the present invention provides an apparatus comprising: a detecting device that is configured to detect, using RFID, removal from an area of an object having a RFID tag, by comparing results of plural RFID scans of the same area, wherein an XML message is generated in response to detection by said detecting device of removal of the object from the area, wherein another apparatus receives the XML message, and wherein the another apparatus comprises means for, in accordance with the XML message and a predetermined rule, placing an order to cause another such object to be delivered to the area.
Preferably the XML message is sent from said apparatus to the another apparatus via a wireless connection.
Preferably the XML message is sent from said apparatus to the another apparatus via a network.
Preferably said apparatus is a vending machine.
H:.olIktkhSpecoi2006252235.DOC 9/152007 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:17 FAX 61 3 92438333 GRIFFITH HACK 4 IPAUSTRALIA Q015 00 3a 0 0 Preferably the apparatus further comprises: -a smarteard reader that is configured to read a smartcard containing a [preloaded monetary equivalent; and 00 a debiting unit that is configured to debit the preloaded monetary equivalent in accordance with the detection by said detecting device of the object.
00 Preferably said apparatus is a vending machinel 0 0 Preferably said detecting device further detects, using RFID, placement into 00 the area of an object having a RFID tag.
0 ~Preferably the area is selected from the group consisting of a refrigerator, a freezer, a container, a room, a cabinet, and an apparatus.
The invention also provides an apparatus comprising: detecting means for detecting, using RFID, removal from an area of an object having a RFID tag, by comparing results of plural RFID scans of the same area, wherein an XML message is generated in response to detection by said detecting means of removal of the object from the area, wherein another apparatus receives the XML message, and wherein the another apparatus comprises means for, in accordance with the XML message and a predetermined rule, placing an order to cause another such object to be delivered to the area.
Preferably the XML message is sent from said apparatus to the another apparatus via a wireless connection.
Preferably the XML message is sent from said apparatus to the another apparatus via a network.
Preferably said apparatus is a vending machine.
H:olaik.ce.pSpeci2006252f55.DOC 915/201)7 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:17 FAX 61 3 92438333 GRIFFITH HACK IPAUSTRALIA Q016 00 3b 0 0 0, Preferably the apparatus further comprises: Ssmartcard reading means for reading a smartcard containing a preloaded [monetary equivalent; and 00 debiting means for debiting the preloaded monetary equivalent in accordance with the detection by said detecting means of the object.
00 SPreferably said apparatus is a vending machine.
0 0 C, The invention also provides a method comprising: 00 detecting, using RFID, removal from an area of an object having a RFID ~tag, by comparing results of plural RFID scans of the same area; generating an XML message in response to the detection by said detecting step of removal of the object from the area; and determining, in accordance with the XML message and a predetermined rule, whether to place an order to cause another such object to be delivered to the area.
Preferably the method further comprises the steps of: debiting a preloaded monetary equivalent on a sminartcard in accordance with the detection by said detecting step of the object.
The invention also provides an apparatus comprising: a detecting device that is configured to detect, using RFID, removal from an area of a RFID tag, by comparing results of plural RFID scaris of the same area, wherein a markup language message is generated in response to detection by said detecting device of removal of the RFID tag from the area, wherein another apparatus receives the markup language message, and wherein the another apparatus comprises means far, in accordance with the markup language message and a predetermined rule, placing an order to cause an object corresponding to the RFID tag to be delivered to the area.
HAi k\ epSp[2006252255.DOC 9/5/2007 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:17 FAX 61 3 92438333 GRIFFITH HACK 4IPAUSTRALIA Ia017 03c 0 0 The invention further comprises an apparatus comprising: detecting means for detecting, using RFID, removal from an area of a RFID tag, by comparing results of plural RFID scans of the same area, 00 wherein a markup language message is generated in response to detection by said detecting means of removal of the RFID tag from the area, wherein another apparatus receives the markup language message, and 00 wherein the another apparatus comprises means for, in accordance with the markup language message and a predetermined rule, placing an order to cause an object 001 corresponding to the RFID tag to be delivered to the area.
o01 The invention further comprises a method comprising: detecting, using RFID, removal from an area of a RFID tag, by comparing results of plural RFID scans of the same area; generating a markup language message in response to the detection by said detecting step of removal of the REID tag from the area; and determining, in accordance with the markup language message and a predetermined rule, whether to place an order to cause an object corresponding to the RFID tag to be delivered to the area.
In one embodiment, an array of antennas is positioned within the door of each MW. Each antenna may have a transmission line of sight and be configured to emit a signal at one or more predefined frequencies. The antenna array generates an electromagnetic field within the MW. The products are positioned in one or more bins, compartments, or similar devices located within the MW. Preferably, the electromagnetic field is altered within the cavity defined by the micro-warehouse through the use of reflectors or devices that move the antennas within the array. In one embodiment, material that is reflective to RF signals is placed near the door/cabinet gap to prevent the escape of RF energy. This helps reduce accidental reading of tags outside the MW but near the gap, and exposure of people and things outside the MW to RF radiation.
In one preferred embodiment, tagged products are positioned such that each tag on each product is organized in an orderly fashion such that 1) the likelihood of a tag being shadowed by an RF absorbing substance within the cavity is reduced, 2) the likelihood of H tJodzlk~ecp\Spee.0062522sy.DOC 9!512007 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:17 FAX 61 3 92438333 GRIFFITH HACK 4 IPAUSTRALIA R018s 3d one tag sharing energy with another due to too close proximity is reduced, and 3) the orientation of the tags located in the fringe RF areas, and in the nulls of the cavity, increases the RF cross-section and energy absorbency of each such tag. Some of the above three desirable characteristics may be achieved by placing the tags such that they are generally orthogonal to the transmission line of sight (as opposed to being positioned generally parallel) of at least one antenna within the array. In addition, at least two of the H: o I i\ktep\Speci\2u62152255.DOC 9/52007 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:17 FAX 61 3 92438333 GRFIhHC PASALA [01 GRIFFITH HACK 4 IPAUSTRALIA U019 004 Plurality Of Products may be spaced a distance from each other, such that energy sharing is reduced, ("Energy sharing" is a phenomenon where one or more tags positioned in close proximity share energy from an electromagnetic wave traveling through the volume such 00 that one or more of the tags fails to receive sufficient energy to be energized and, therefore, fail to emit an identifying signal.) In one form of the invention, the distance is 00 based on the wavelength of the signal(s) from the antenna array and is a fraction thereof.
In one preferred embodimnt, the distance is about 3 to about 6 cm.
0 It is also preferable that each tag have the ability to cloak itself for a predetermined o0 amount of time. The amount of time may be in a range that is based on the maximum number of tags in the micro-warehouse and the temperature of the tags. In one embodiment, this time is about 1-5 seconds when the tagged products are stored at a temperature of -20" C. However, the amount of time is variable and depends on the temperature inside the MW, the tag type, the tag transmission algorithm, and the existence or not of a wake or decloak function. The cloaking time is selected to allow de-cloaking such that another scan can be done within an algorithmically acceptable time period.
A controller (often referred to as a "client controller") is coupled to the antenna ar-ray and is operable to control the antenna array such that a series of scans or runs are performed. In a preferred embodiment, the controller is operable to perform a baseline run, an inventory ran, ada background run. The controller generates messages indicative of changes in the presence of tagged items within the micro-warehouse and stores those messages in a queue or buffer. The controller also calculates an integrity value, compares that value to a predetermined integrity value, and reports the comparison in the message.
As is apparent from the above, it is an advantage of the present invention to provide a method and system of inventorying and distributing products. Other features and advantages of the present invention will become apparent by c onsideration of the detailed description and accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINCGS In the drawings: Fig. I is a schematic illustration of a system embodying the invention.
COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:18 FAX 61 3 92438333GRFIH AC PUTALAI00 GRIFFITH HACK IPAUSTRALIA R020 00 Fig. 2 is a schematic diagram of servers and a client d vice used in the system shown in Fig. 1.
00 Fig. 3 is a schematic illustration of fulfillment inventory, and other information flow among components in the system shown in Fig. 1.
00 5 Fig. 4 is a schematic illustration of a system embodying the invention.
sytmFig. 5 is a schematic illustration of information flow among components of the sytmshown in Fig. 4.
00 o Fig. 6 is a perspective view of an exemplary micro-warehouse in the form of a freezer.
Fg sacosscinlve ftedo ftemco*rhuesoni i.6 Fig. 7 is a cross-sectional view of th door of th micro-warehouse howninig.e6 according to another embodiment of the invention.
Fig. 9 is a perspective, partially phantom view of a chest capable. of holding multiple drawers suitable for use in the micro-warehouse of Fig. 6 and a drawer.
Fig. 10 is a schematic diagram of a control system used in a micro-warehouse.
Fig. I I is a diagram of an exemplary embodiment of the control system shown in Fig. Fig. 12 is a schematic diagram of electromagnetic fields within a micro-warehouse.
Fig. 13 is a perspective view of an exemplary packaged product illustrating possible locations for RF tags on the product.
Fig. 14 is a flowchart of software used in one embodiment of the invention.
Fig. 15 is a flowchart of software of one embodiment of the invention.
Fig. 16 is a flowchart of software of one embodiment of the invention.
Fig. 17 is a flowchart of software of one embodiment of the invention.
COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:18 FAX 61 3 92438333GRFIH AC- PUTALAIoz GRIFFITH HACK 4 IPAUSTRALIA Q021 00 6 Fi .10safo c ato ot aeofo ee b d m n ft eiv nin 0 Fig. 18 is a flowchart of software of one embodiment of the invention.
~0 Fig. 19 is a flowchart of software of one embodiment of the invention.
00 Fig. 21 is a graph of product tag read times versus the number of tagged products in a micro-warehouse, oFig. 22 is a focatof software ofoeembodiment ofteinvention.
00 Fig. 23 is a flowchart of software of one embodiment of the invention.
ci Fig. 24 is a flowchart of software of one embodiment of the invention.
DETAILED
DESCRIPTION
Before embodiments of the invention are explained in detail, it is to be understood that the invention is not limited in its application to the details of the construction and the arrangements of the components set forth in the following description or illustrated in the drawings. The invention is capable of still other embodiments anid of being practiced or being carried out in various ways, Also, it is to be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting.
Fig. I illustrates an exemplary system 25 embodying the invention. The system includes two servers (maintenance and comnmerce) 26 and 27 that create and maintain user lists, perform inventory, account ordering functions, and monitoring functions, such as micro-warehouse status, monitoring temperature, and other faults. Servers 26 and 27 may communicate with a client (and, more particularly, a computer or similar device such as the controller in a micro-warehouse discussed below) using standard protocols such as TCP/IP, UDP, or other protocols over a network 28. The network 28 may be the Internet, a telephone network, a wireless network, power line carrier -network, or other type of network and combinations thereof In the embodiment shown, servers 26 and 27 include standard hardware and operating system software (not shown). Running on top of the hardware and operating system software is a MW enterpise application 29. The COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:18 FAX 61 3 92438333 GRIFFITH HACK 4IPAUSTRALIA R 022 MW enterprise application 29 accesse, module 31, an order history module 32 module 34. Each of the modules 31 27. The modules may be confi gred system administrator using protocols fc As best seen by reference to Fig numerous functions. Broadly, the MW administration of the radio frequency id or keys (discussed below), manages con server 27, maintains an inventory of pro and 27, checks inventory of MWs, and i specific MW of interest, before ordering provides system administration functiom clients connected to the servers.
The registration module 31 (Fig.
the server 27 by providing access to info, connected to the server 27. In one emboc of MWs. The registration module also pr persons assigned to a particular MW and information for each MW. The registratic The order history module 32 provi product preferences for each MW 36, The screens for payment authorization, user inj request module 34 controls inventory reph customer requests and similar information.
The server 27 also accesses a con from a client (or MW) to generate orders di (not shown). The fulfillment infrastructure 7 a profile database 30 that includes a registration an account set-up module 33, and a stock request 4 is maintained for each client coupled to the server ith web. content designed to be accessible by a r the World Wide Web section of the Internet, 2, the MW enterprise application 29 performs enterprise application 29 controls the ratification ("RFID") badges or other user badges rnunication sessions with clients connected to the Jucts for each client connected to the servers 26 i some embodiments, other MWs local to the a product, manages security of communications, klity, and monitors and maintains the health of provides part of the inventory functionality of mation regarding the location of clients iment of the invention, the clients take the form avides access to information regarding sales he identification, location, and similar n module 31 may access a MW database 34A.
Jes a history of orders for each MW 36 and account set-up module provides administrative brnation, and similar information, The stock nishment based on usage and on specific erce engine 35 that uses information received at arc delivered to a fulfillment infrastructure produces products to be distributed using the COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:18 FAX 61 3 92438333GRFIH AC- PUSALA102 GRIFFITH HACK 4 IPAUSTRALIA R023 00 8 0 system and method of the invention. The information may be used by a manufacturing infrastructure and marketing, customer relation management billing, and other systems and functions (all not shown). For example, the invention may be used in the 00 distribution of life science research prducts such as enzymes, assays, cloning vectors, competent cells, and the like. (Of course, a wide variety of non-biological products could 00 be distributed using the invention.) The information provided by the server 27 is used in ON the manufacturing infrastructure to ensure proper production of products according to the o demand for such products. As noted above, the server 27 may be coupled to a plurality of Cl clients or MWs. An exemplary client in the form of the MW 36 is shown in Fig. 1. While 00 only one client is shown, the number of clients connected to the server 27 is limited only c-I by the server's internal capacity and the capacity of the network 28.
The MW 36 may take the form of a refrigerated cabinet, a freezer, or other storage container. A secured storeroom, similar location, or other defined area could also be outfitted with a client controller and other components, as described herein, and be used to store products. In the embodiment shown, the MW 36 includes' a door 37. While it is preferred, it is not required that the MW 36 have a door. Devices (such as light curtains) that sense when access to the interior of the MfW is being attempted may al so be used. As noted, in another embodiment, the system may utilize a defined area to enclose the tagged products rather than a cabinet. The defined area uses an access point (not shown) to serve as its entryway. The products within the area are fitted with identification tags and specifically positioned in the area to be read by a RF inventory interrogator (such as a controller 45 and antenna array (discussed below)). Product scans begin when a sensor (such as, a proximity sensor) senses a user passing through the access point. The access point is controlled by a processor, such as the client controller 45, and is able to control doors, portals, alarms, or other mechanisms to restrict access to the area and products.
As shown, the MW 36 may also include an electric actuated lock 39, a proximity sensor 40, and a user feedback or, more generally, an output device that may take the form of an audio device or light 41. Other output devices such as a voice synthesis device, a dispiay screen, and the like may also be used. The MW 36 is configured with an antenna COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:19 FAX 61 3 92438333 GRIFF1TH HACK 4IPAUSTRALIA Q 024 009 0 array 43. The antenna array 43 is coupled to the client controller 45. In one embodiment, the invention may include an antenna array with six vertically. or circularly polarized antennas. The antenna array 43 is a RF receive and transmit system that communicates 0with transponder devices or tags (discussed in greater detail below). In one embodiment, each tag is a passive tag and powered by energy from the antenna array 43.
00 The MW 36 may include a specialized badge or card reader 47 (generically a "key reader") in the form of a magnetic card swipe device, an antenna, a fingerprint reader, or 0similar device. The reader 47 is coupled to the client controller 45 via a communication 0link 49. The MW 36 may also include internal and ambient tenperature sensors 55 and 0 10 56. The temperature sensors 55 and 56 are coupled to the client controller 45 to provide temperature information to the client controller. Additional information may be provided to the client controller through optional input devices. The location of the MW 36 may be monitored by a global positioning system (GPS) device (not shcwn) plus inertial frame recognition for fine measurement and for interpolation between GPS satellite acquisitions.
Motion and shock of transport may be monitored with an accelerometer (not shown). The voltage, current, and other characteristics of electrical supply lines may be monitored and provided to the client controller 45 by a power-line-monitoring device (also not shown).
The on/off duty cycle of the current supplied to the refrigeration compressor can be used, with the internal and ambient temperatures, to indicate the relative health of the compressor. Additional input devices, such as cameras, microphones, sensors, etc., could be coupled to the client controller to monitor environmental and other conditions.
A smartcard reader (not shown) may also be coupled to the controller 45. A smarteard, in addition to identifying the customer for admittance purposes, can contain a preloaded monetary equivalent that can be debited at the time of door closure for any products taken during the door open session.
The client controller 45 includes software to carry out several finctions that are discussed in greater detail below. If desired, the client controller 415 may be a consumer grade device, such as a Palm Pilot® personal digital assistant Packet PC device, or a personal computer, modified according to the teachings herein. Depending on the COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:19 FAX 61 3 92438333 GR1FFITH HACK 18/0 208 1:19FAX 1 3924833 GRIFI~ HAK IPAUSTRALIA Z~025 00 0 hardware used, the client controller 45 may be configured with a graphical user interface to facilitate interaction between the system 25 and its users.
0) 00 The client controller 45 includes software (discussed below) which may interrogate the RE tagged products within the MW 36. The interrogation process involves sending 00 5 signals from antennas and receiving signals from passive, transponder RFID tags.
Preferably, interrogation is accomuplishedi in such a way as to eliminate or reduce interference problems that are typically associated with reading! RE signals from multiple devices. The system. 25 could also be implemented with active tags (not shown), although 0 presently available active tags need to be improved so as to performn in the temperatures that the embodiments of a system for distribution of life science research products are expected to operate within and at roughly the same cost and power consumption.
In one embodiment of the system 25, one or more REID access badges 75 (Figs. 1 and 3) are be generated. Preferably, the REID badges 75, as well as the other RFID tags (discussed below) are passive transponder tags. Preferably, the REFID badges 75 are encoded with unique identifying information from the account se t-up module 33 based on digital signatures. In addition, it is preferred that the digital signatures encoded on the REID badges 75 used by restocking services provide one-time access to a specific
MW,
and thereafter expire, and be disposable. One-time access badges may be set to expire after a certain amount of time or at a set time. However, the badges 75 may also take a form that ca be enabled again for one-tim access at the next restocking event. The REID access badges may be fixed on a carton of products 80 (Fig. Alternatively, they may be delivered separately to the facility where the MW of interest is located. Alternatively, they may be the badges of field personnel or designated on-site authorized support personnel.
As best seen by reference to Fig. 3, the carton of products 80 includes a plurality of individual products 90 each with an identification tag 95. Each identification tag 95 may be structurally the same as an REID badge 75, but coded with different information and configured such that the digital signature on tag 95 will generally niot expire. In one form of the invention, each tag 95 has a 16-bit group identification code and a 32- bit item identification code. The 16-bit group identification code may be programmed with COMS ID No: ARCS-i 79673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:19 FAX 61 3 92438333GIFIhHC- PASALAI12 GRIFFITH HACK 4 IPAUSTRALIA Q026 0 information such as the manufacturer or distribution channel of the product. The latter allows routing of the transaction involving a product to the pn~per enterprise system. The C)32-bit item identification code is used to provide descriptive inl'formation. regarding the 00 ~Product such as serial number, product type, date, lot numberand similar infonnation, or a unique ID, Which corresponds to such information in a database on a server.
00 Once aft the products 90 have been fitted with unique RYfl) tags 95, the products 0 may be shipped in the carton 80 to a designated MW such as the MW 36. The carton 80 is 00 packed according to a fulfillment request that is based on either an initial order froma o customer (not shown) or MW specific business rules followed by the server 27. The carton 80 may be fitted with RFID access badge 75 or the RFID access badge 75 may be shipped separately to the location of the MW of interest- If fitted with an RFITI access badge 75, the carton 80 may be shipped by a delivery service contracted to deliver the package to the MW 36. Once the carton is delivered, the recipient or user may use the RFID access badge 75 to open the door 37 of the MW 36 by passing access badge 75 in front of the reader 47, Client controller 45 reads the digital signature of the RED access badge 75 and confirms reading of the code by actuating a user feedback device such as a voice synthesis module or the light 41. Since, the server 27 provides a locally based user list to the client controller 45, the client controller 45 oversees authentication of the digital code read from the RFID access badge 75. Client controller 45 checks the authenticity of the read code by matching the code to the user list. Client controller may then optionally read the temperature sensors 55 and 56 and transmit temperature information to the server 26. If used, the temperature sensors 55 and 56 are preferably read on a periodic basis, with the temperature infonmation being transmitted to the server 26 each time the temperature is read. Client controller 45 can also be programmed to 2S transmit temperature data if the internal temperature falls beneath or above a predetermined range. In many instances, it will be important to ensure that the temperature of the MW is within an appropriate range to store the products 90. If the temperature of the MW 36 is within an appropriate range, and the user is authenticated, the client controller 45 then actuates the lock 39 to open the door 37 (of course, the MW need not be equipped with the lock 39). If the temperature of the MW 316 is not within an appropriate range, then access to the MW 36 may be prevented by maintaining the lock 39 COMS ID No: ARCS-i 79673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:19 FAX 61 3 92438333GRFIhHC PASALAIJ7 GRIFFITH HACK 4 IPAUSTRALIA Z027 00 12 0 0 in a closed state. This allows a refigeration unit (not shown) associated with the MW 36 to cool the interior space of the MW 36 to a desired temperaturte before ambient air is allowed into the MW 3 6 by opening of the door. This also provides for product 00 integrity during a power failure.
Once the door 37 opens (which may be sensed by the prximity sensor 40), or access to the interior of the MW 36 is gained, a communication session between the MW 36 and sewver 27, which may be segmented based on appropriatb events to optimize user response and network usage, begins. Having full access to the MW 36, the employee of a 0 carrier or logistic service (such as UPS, Airborne Express, etc.) who delivered the carton 80 now proceeds to place the individual items 90 into the MW 316. Once the carton of products 80 is empty, the delivery employee then closes the door 37, and removes the carton, if necessary. The proximity sensor 40 senses the closing,;of the door 37. The client controller 45 seatses the status of the sensor. Preferably, the lock 39 (if used) resets automatically alter being unlocked for a predetermined time, for example five seconds.
The user has that predetermined time to open the door. Power to the antenna array 43 is disabled once the door 37 opens. When the door 37 closes or access is prohibited, a scan of the products 90 placed within the MW 36 is performed. Upon completing the scan, the client controller 45 sends a change-in-invenuory message 100 to the commerce server 27.
To ensure integrity of the inventory change billed to the customer, the client controller employs an integrity algorithm when the MW 36 is scanned. The algorithmn is based on statistical information, historical information, and other factors including RF algorithms and delay data.
As will be explained firther below, it was found, for one embodiment, that to accurately determine the mnber of tagged items in a MW 36 provide acceptable integrity in the system), it is best to scan the tagged items multiple times. Further, in the embodiment where the MW takes the form of a freezer, refrigerator, or other cabinet, achieving integrity generally requires choosing a superset of tagged items from all scans as well as noting the set that represents the majority set (over 50%) of the scans, the number of scans in non-cloaked mode (which may be an empirical number, found to be ten for the MW 36 illustrated in Fig. and the number of scans in the cloaked mode (which for the COMS ID No: ARCS-i 79673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:20 FAX 61 3 92438333 GRIFFITH HACK 4IPAUSTRALIA Q 028 013 0, same embodiment was empirically found to be three). To achieve greater system integrity (which in one embodiment is no more than one error in five-*housand tagged items), )information from scans or interrogations is held on the server 27 for a predetermined 00 amount of time twenty-four hours). During this time, artd while the subject MW is not being accessed by a customer, the controller 45 performs background inventory 00 checks. The background inventory checks are used to increase the inventory sample population data set to statistically significant levels whose cross section corresponds to the 0 I in 5000 level. Preferably, any anomalies found are sent to the server 27 where they are N-i used to modify information held on the server 27.
00 The MW 36 may be accessed by a customer at the MW, location using a separate RFID badge 75 (or other identifying badge or key) shipped directly to that customer.
Alternatively, and as noted above, the reader 47 may be configured as a smartcard, a magnetic card swipe device, a barcode device, a fingerprint reader, or some similar device that controls access to the MW 36. Regardless of its exact configuration, the reader preferably reads the badge or key, compares the ID information contained in the key with the list of authorized users stored in the client controller 45, and:if the user's key matches one of those authorized, the client controller 45 acknowledges authorization by generating an output such as by lighting the light 41. The list of authorized users is sent to the client controller 45 and updated as needed by the server 26. The server 26 may be configured with the capability to authenticate a user's key as well. Once authentication takes place, the client controller 45 then opens the door 37 allowing the customer or user to access the interior of the MW 36. The customer then removes one or more products 90 from the interior of the MW 36 and then closes the door 37. Once the door is closed, client controller 45 scans the products 90 in the MW 36 and sends an inventory message identifying the missing or added products 90 to the server 27. The server 27 compares the previous inventory prior to opening to the current inventory. From the comparison, the server 27 determines the missing or added items in the MW 36. The inventory information is then communicated to the commerce engine 35, which preferably stores the information for future use for both marketing and inventory functions. Receipts for the used products can then be sent via electronic mail or printed and shipped via regular mail COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:20 FAX 61 3 92438333 GIF~ AK-IASRLAIjz GRIFFITH HACK IPAUSTRALIA [a029 00 14 0 to the customer at the MW location, Invoicing can also occur using other electronic and ~0 noni-electronic communication mechanisms.
00 The inventory message can. be used for other purposes as well. For example, the inventory message includes information regarding individual p roducts 90. Therefore, the amount of time a particular product 90 spends in any MW 36 may be recorded by the 00 server, as well as the product's temperature history. If time is recorded, it is also possible o to compare the amount of time any particular product 90 spends in a MW 36 to a shelf life 0 or acceptable usable life for that product. Temperature history can also be stored and o0 compared to other data. If the shelf life is passed, then an expiration message, such as a pick list, may be generated and sent to the MW 36 or an electronic mail address of a user of the system to inform the user that certain products should be -removed from the MW 36 and not used. Temperature history and time sent by the MW 36; to the server 27 may also be used to calculate a "storage-degree.cay" value to for each product 90 in the MW 36.
This value may, in turn, be used to make an activity projection and expiry threshold for the subject products 90. The administrator of the MW 36 may then use this infonnation to remove expired products from the MW 36.
In yet another implementation, the inventory message may be used to determine the type of products 90 in the MW 36. If any of the products present within the MW 36 are subject to a recall by the manufacturer, the MW 36 may be placed in a "Jock down" condition, whereby access to the MW 36 is denied until an administrator or other authorized individual remtoves the recalled product or otherwise addresses the situation. In addition to its use to protect against the use of recalled products, the lock down feature is useful for controlling the distribution of potentially spoiled or degraded products and other products where exacting product specifications and quality controls are desired, such as pharmaccutical products and controlled substances.
Figs. 4 and 5 illustrate additional features of the system 25.. As shown in Fig. 4, the system 25 may be implemented such that the MW 36 communicates with a telephone systemn or similar access point 105 through a wireless communicati on link 107. The access point 105 may be connected to a network ser-vice provider such as Mn Internet service provider 110. The service provider 110 may provide a connection to the network COMS ID No: ARCS-i 79673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:20 FAX 61 3 92438333 GRIFFITH HACK 4IPAUSTRALIA U 030 00 0 0 28 (which is shown as the Internmet in Fig. Fig. 5 provides additional details concerning the exemplary fulfillment infrastructure noted above. Servers 26 and 27 may be configured in a cluster 112 with a middleware server 114, which in one form of the 00 invention takes the form of an extensible markup language middleware server 114. The cluster 112 is protected by a firewall 116 and communicates with an enterprise 00 computer 118 (such as a mainframe) which may rui various enterprise resource planning CRM, manufacturing, and other business process programs. The enterprise 0 computer 118 communicates with an enterprise database 120, which is also accessible by the server 27. It should be understood that the cluster 112 may consist of any number of 00 o 0 hardware or software servers and that the exact configuration may be modified depending on how the invention is implemented. In general, it is possible to combine functionality on one server or to separate out operations and functionality on multiple servers beyond those shown and described herein.
In the embodiment shown, information received from tagged items 90 within each MW 36 is sent to the web cluster 112, particularly the server 27, in an XML format. The XML formatted messages are transferred from the server 27 to the middleware server 114, which hosts XML middleware 120 (Fig. 5) such as Biz Talk® so-ftware. The XML software 120 communicates with other software/systems such as ERP system 124, web ordering system 126, an RFID badge, key, or passkey administration system 128, and a MW administration system 130. The ERP system 124 may be configured to assign RF tags 95 to selected products or lots of products; assign identities to each MW 36; handle inventory planning; handle re-supplying of MWs; and handle sales orders. The web ordering system 126 may be configured to process customer order inquiries; inventory inquiries; passkey updates; and purchase order updates.
Fig. 6 illustrates an exemplary micro-warehouse in the form of a freezer 230. In the embodiment of the invention described and illustrated, components are tuned to work efficiently in a micro-warehouse having a volume of about five cubic feet (about 142 liters) and that can hold hundreds of RF tagged items. However, other embodiments are possible, including, for example, a 21 cu. ft. (about 425 liters) freezer and a 15 cu. ft.
(about 595 liters) room temperature hospital supply cabinet. The freezer 230 includes a COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:20 FAX 61 3 92438333 GIF~ AKIAShLA1h3 GRIFFITH HACK 4 IPAUSTRALIA R031 00 16 housing 232 with an opening 234 and an interior 235. A door 236 is attached to the housing 232 such that the door 236 can be closed to occlude thle opening 234 and opened to Provide access to the interior 235 of the freezer 232. A number of shelves 238 are 00 positioned within the interior 235. Each shelf 238 may hold one or more cabinets 240.
Each cabinet 240 may include one or more drawers 242. E-ach! drawer 242 may hold 00 multiple packaged products (discussed below). Products, particularly larger products, may also be positioned within a bin 244. The package dimensions of larger products often o create a desirable separation of tags (which, as discussed below, reduces energy sharing).
0 The freezer 232 can be constructed using a standard fret'.zer modified and equipped as desertbed herein. For example, the door 23 6 may be constrted from a door provided with a standard freezer. Insulation in the standard door is removed or otherwise formed or positioned and various components needed to scan RF tags on products stored within freezer 230 in the drawers 242 in the cabinets 240) are added. The freezer 230 may be equipped with a strip (not shown) of RE reflective material positioned around the perimeter of opening 234 to prevent or reduce the escape or leakage of RE energy.
As best seen by reference to Figs. 6 and 7, the door 23 6 includes a front panel 250, which in one embodiment has curved sides such that a cavity or depression 252 is formed by the panel 250. Insulation 254 is positioned within the depressfon 252. Near the center of the panel 250 the insulation 254 is hollowed out or otherwise formed or positioned such that a controller 256 (discussed further below) may be positioned within the door 236. A second portion of the insulation 254, near one corner of the panel 250, is also hollowed out or otherwise formed or positioned such that a badge or key reader 258 or similar device may be positioned within the door 236. The insulation 254, the controller 256, and the key reader 258 are maintained within the depression 252 by a mountinkg plate 260. Preferably, the mounting plate 260 is made from metal. The mounting plate 260 supports an array of antennas 261. In one preferred embodiment the array of antennas 261 includes antenna 262, antenna 263, antenna 264, antenna 265, antenna 266, and antenna 267 (Fig. 6).
Although six antennas are shown, the number and positioning of the antennas within the door 23 6 is dependent on a variety of factors, such as antenna gain,,' beamn shape and directionality, transmitted power, RE cavity geometry, reactivity and reflectivity, COMS ID No: ARCS-i 79673 Received by IP Australia: Time 15:29 Date 2008-02-18 it/OR 2008 14:21 FAX 61 3 92438333 GIFT AK.?IASRLAti GRIFFITH HACK 4 IPAUSTRALIA Q032 00 17 0 convenijence of location, distanc from transmitter, cost, antenna-antenna interference, effective use Of antenna beam volume, prevention of RE energ Iy escape from cavity, antenna size and shape, antenna-tag orientation, antenna multiplexing pattern, and other 00 factors. Thus, the invention is not limited to the array shown and other arrays could be used and may be more suitable for different mnicro-warehouses. The array of antennas 261 00 can also either singly, or in some combination, be rotated through a small arc by using one or more actuators or similar devices to shift the beam interference pattern or electromagnetic field in the RE cavity, for example, to mitigate-any RE nulls or shadows.
Cl The antennas may also be activated at different times and patterns to shift t he beam 00 interference pattern or alter the electromagnetic field within the RE cavity.
The presence of shelves 23 8, cabinets 240, drawers 242, products, and tags may affect the electromagnetic field within the freezer 230. While most of the items just mentioned are preferably made from substantially RE transparent material, they nevertheless can block or diminish the strength of RE signals. Furthermore, the tags on the products and the products themselves are not made from RE tran'sparent material and they may block or otherwise interfere with other tags receiving RE signals. These phenomena can be vaniously known as shadowing. The effects of shadowing may be reduced by positioning tagged products in the cabinets 240 and drawers 242., bin 244, or in other compartments, receptacles, or devices that can help provide separation.
The waves from each antenna and reflections off of the interior surfaces of the freezer 230 interact to create an electromagnetic field with many nulls (areas where waves combine to cancel each other such that there is insufficient energy: to energize passive
RE
tags). The effects of nulls may be reduced by moving the field within the interior of the freezer 230 at a speed and with a pattern such that any nulls generated change position over time. Alternatively, this can also be done by changing the geometry of one or more reflective surfaces in the RE cavity, such as with an acute sawtooth pattern, or by adjusting the power to minimize internal reflected power, or by selection or -variation of antenna power and frequency. In some cases, more than one of these altertnatives is used.
Preferably, reflectors such as the reflector 670 (Fig. 12) are used. (As shown, the reflector 670 is positioned at the rear of the freezer 230, but other placements within the freezer are COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:21 FAX 61 3 92438333GRFIH ACIAURAA 103 GRIFFITH HACK 4 IPAUSTRALIA Q033 0 also possible.) However, actuators, pivots, and other devices could be used to move the antennas 262-267 to generate many different interference Patterns and alter the position of nulls in the interior 235 such that no tag is positioned at or within a null for any significant 00 length of time. For example, as shown in Fig. 8 the antennas 262-267 could be mounted on pivots 269 and coupled to small, electricay or pneumatically powered actuators 270 00 located within the cavity 252 and mounted on the mounting plate 260. Antennas suitable for use in at least some embodiments. of the invention include fluber Suhner model 2400/70/9/0/CP antennas, which are available from commercial sources. Preferably, the N antennas 262-267 are protected by a RF-transparent radome 272. The radome 272 also 0o 10 helps position the antennas 262-267 at desired locations along dhe door 236. As will be discussed in greater detail below, the controller 256 sends and receives signals from the antennas 262-267. Signals transmitted by the antennas 262-267 are used to excite passive RE transponder tags 270 (Fig. 13) attached to products 272 (Fig 13) stored within the freezer 230 or applicable MW. In preferred embodiments, the Products are in the drawers 242 of the cabinets 240 or bins (when larger products are stored). Signals generated by the transponder tags 270 are received by the antennas 262-267 and processed by the controller 256.
Before discussing embodiments of the invention in greater detail, some premises of their design, particularly the designs shown in Figs. 6 and higher, need to be addressed.
First for those embodiments implemented in a mnicro-warehouse, RF cavity considerations are important. Second, the particular embodiments described are designed to be compliant with Part 15 of the regulations issued by the United States Federal Communications Commission Part 15 of the FCC regulations places limitations on antenna powers and frequencies that may be used in systems, such as the cumrrent one, where RF tags are scanned. In order to meet the requirements of Part 15 as well as the requirements of scanning numerous tags within a relatively small volume (or RE cavity), an antenna frequency in the GI~z range (or microwave range) was chosen. In' particular, the inventors discovered that a frequency of about 2.45 GHz was best suited for the applications discussed herein. Nevertheless, alternative embodiments of the invention could be configured to operate at different power ratings and frequencies (for example, M1Hz COMS ID No: ARCS-179673 Received by P1 Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:21 FAX 61 3 92438333 GRIFFITH HACK 18/0 208 1421 AX 1 3 243333GRIFITHHAC IPAUSTRALIA Q~1034 00 19 c-iembodiments), as would be apparent to one of ordinary skill in, the art after reviewing.. the designs and teachings set forth herein.
00 Fig. 9 illustrates an exemplary cabinet 240 used in the freezer 230. The cabinet 240 includes a top 280, a bottom 282, a rear 284, and sides 286 and 288. In the 00$ embodiment shown, the cabinet 240 includes four bays 290. Ea4ch bay 290 is configured to accept a drawer 242. Each drawer includes a pull knob 300 or similar device and a 0 Plurality of angled separators 302. The angled separators 302 define a plurality of slots 3 04 in which packaged products 2 70 with RE transponder tags 272 may be positioned.
0 The separators 302 are configured to position products within the interior 235 of the freezer 230 such that tags 272 on the products 270 contained within any one drawer 242 are maintained at a minimum separation distance and, in one embodiment, in a generally orthogonal position with respect to the transmission line of sight'of the antennas located most proximate to the subject drawer 242. Orthogonal positioning is not necessary, however. The purposes of spacing tagged products include reducing energy sharing among and between proximate tags such that eachb tag on each product within the freezer 230 is energized at its requisite level, which for one embodiment is a minimnum of about 0.23 mW/cm 2 In the embodiment shown, the distance between the separators 302 may be based upon the frequency of the signals from the antennas 262-267. In particular, spacing corresponding to a fraction of, and in one preferred embodiment, approximately Vz of the wavelength of the 2.45 GM~ excitation signal (approximately 3 to:6 cm) has been found to reduce energy sharing among the tags. Preferably, the smallest po ssible spacing is used and shorter separation distances than those specified have been found to be adequate in some circumstances, particularly where other parameters such as frequency, antenna power, and others are different from the particular examples provided herein.
Instead of drawers and cabinets, bins or similar items with separators could be placed directly on the shelves or surfaces within the freezer 230. In addition, in some applications, the impact of energy sharing may be reduced through the selection of frequency, RF power, and transponder design (mainly size) such that products can be placed in a random or haphazard manner within the freezer 230.
COMS ID No: ARCS-i 79673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:22 FAX 61 3 92438333 GRIFFITH HACK 4IPAUSTRALIA 1a035 00 0 Fig. 10 schematically illustrates one exemplary embodiment of the architecture of the controller 256. The controller 256 includes a central processing unit or processor 400 that receives time signals time f day) from a real-time clock 402. In one 00 embodiment, the real-time clock is slnchronized periodically to a standard time reference, such as the atomic standard clock at t ie National Institute of Standards ("NISr'), 00 connected to the real time clock 402 tirough the network 28. Synchronization of the realtime clock 402 helps ensure accuracy in time stamping the transactions taking and o placing tagged products in the freezer 230) controlled by the controller 256. The processor ci 400 receives inputs from an optional t iometric device 404, a badge or key reader or 0 10 similar device 408, and the antennas 2 52-267. The antennas 262-267 receive information c-i from the tagged products 270 within i e freezer 230. The tags 2!72 on the products 270 produce identifying signals in respons. to being excited by signals transmitted from the antennas 262-267. The processor 400 bends signals to the antenaas 262-267 through a controller 412. The controller 412 projides a command signal to a multiplexer 413, which addresses each antenna 262-267. One controller suitable for use as the controller 412 is an SCS 511 scanner with 100 398 multiplexer available from Single Chip Systems
(SCS")
Corporation, San Diego, California, TIe interrogation operation (energization of and then reading of signals emitted by the tags) erformed by the controller 412 and antenna array 261 will be discussed in further detail below.
The processor 400 reads and writes data to a memory 414. The processor 400 also controls a display 416, which is used to communicate with users of the freezer 230. The display 416 may be a simple lighted logI display which when lit indicates authorization of access to the freezer 230 and when unlit or lit in another color indicates denial of access to the freezer 230. A proximity sensor, e.g. the sensor 420, may be positioned on the door 236 or around the opening 234 to provide information to the processor 400 regarding whether the door 236 is opened or closed or the area comprising the MW has been accessed. Information relevant to operation of the freezer 230 and protection of the products therein, such as temperature, pojver status, and the like (sometimes referred to as "operational status," "heartbeat," or "heal h" information), is received over one or more input lines represented by communication link 422 from temperature, power, mid positioning sensors, which are represente by the box 424. Communication between the COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:22 FAX 61 3 92438333 GRIFFITH HACK -)IPAUSTRALIA R036 021 0processor 400 and the servers 26 and 27 (or server cluster 112) may be accomplished using 0 a variety of technologies and hardware. Fig. 10 illustrates a wireless system 425 that is connected to an access port 430 via a communication link 432. 802.11 b wireless links, 00 available from many vendors, are suitable for use in the invention. In one preferred embodiment, wireless links from Aerocomm are used. The access port 430 may take the 00 form of a modem or network interface device which may, in turh, be connected to an appropriate and compatible communication link such as a landline 434, wireless network o 436, local area network 438, or the like. The access port 430 ultimately connects to a 0q communication link or network (such as the network 28) that is linked to the server cluster 00 112.
Fig. 11 illustrates one implementation of the processor 400 shown in Fig. 10. The implementation includes an example of the processor 400 in the form of a MI 6C/80 chip from Mitsubishi, As would be apparent to those of ordinary skill' in the art, a variety of other chips could be used. The processor 400 receives a clock signal from an oscillator 600, power from a supply circuit 601, and timo signals from the real-time clock 402.
Software instructions used by the processor 400 are stored on a non-volatile memory (such as EEPROM) 602. The memory 602 may be implemented using a 512 kB Flash memory integrated circuit 603 and a 512 kB SRAM integrated circuit 604.
Operational status ("health") and related information of the relevant MW is received from a MW temperature sensor 605 and an ambient temperature sensor 606. A battery monitor 608 monitors power supplied to the processor 400. A current switch 609 is used to monitor the on/off duty cycle of the current supplied to the refrigeration compressor (not shown) in the freezer 230. Information from the switch 609 as well as information from the internal and ambient temperature sensors 6051 and 606 can be used to determine the relative health of the compressor.
The processor 400 is connected to a power failure/lockdown circuit 610. The power failure lockdown circuit 610 is coupled to the supply circuit 601 and works in conjunction with an alarm circuit 612. If power is cut off to the processor 400, the power failure lockdown circuit 610 causes the alarm circuit 612 to generate an audio signal in COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:22 FAX 61 3 92438333 GRIFFITH HACK 4 PAUSTRALIA Q~037 00 22 ci order to alert users to the Power failure condition. In addition, the lockdown/powerfajl circuit locks the lock 613 (Fig- 10) on the freezer 230 in order to prevent additioa access to the freezer- This action Protects against inventory theft and assists in maintaining the 00 internal temperature Of the freezer (which is important to protectn prdcsthri)b maintaining the integrity of the insulated volume of air within the freezer.
00 In the embodiment shown in Fig. 11, two mechanical switches, ado wtho sensor 614 and a key switch 615, are used. The sensor 614 is equivalent to the sensor 420 00 and Provides and indication of whether the door 236 is open or c'losed (or whether ingress 0 or egress to a controlled or restricted access area has occurred as, detected by some other sensor). The key switch 615 provides a mechanical mechanism !for rebooting the processor 400 (a "hard" reboot). In addition, when turned to an off or disarm position (not shown) the key switch 615 provides an input to the processor 409 that causes the processor 400 to shut off, With the processor 400 shut off, the freezer 23 0 May be operated, if desired, as a normal freezer without any access restriction or inventory monitoring. As should be apparent, it is preferred that distribution of the key or keys compatible with the key switch 615 be limited to service or other authorized personnel.
The processor 400 sends control signals to an electro-ruag netic lock (if used) on line 617, which is coupled to an eleetronmagneac actuator 619 in the lock 613.
Informnation regarding the stability of the freezer 23 0 is provided by an accelerometer 62 1. The accelerometer 621 can detect vibration or other motion caused by a variety of situations such as improper positionn of the freezer 230 or an att empt to tamper or otherwise obtain access to the freezer 230 by breaking the door 236 or lock 613 (if used).
The processor 400 may control an output light such as a logo light 624, which may be used to display the brand name of the manufacturer of the products placed within the applicable MW 36. The processor 400 may also provide output indicative of granting or denying access to the freezer 230 to a user through green LED 626 and red LED 628.
Audio output, such as processor failure or similar status information, is delivered to an audio circuit 630. The processor 400 also receives inputs from an implementation of a COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:22 FAX 61 3 92438333GIFIhHC- PASRLA403 GRIFFITH HACK 4 IPAUSTRALIA U038 00 23 ci badge or key reader in the form of reader 636. A reader suitable for use in the invention is a Visonics Key Reader, available from Visonios Inc.
0) 00 Comm un ication between the processor 400 and other devices such the server cluster 112 may be accomplished using a dual universal asynchronous receive transmit 00 5 ("UART") integrated circuit 638, For example, the circuit 638 may communicate with the wireless system 425. The circuit 638 may also commnunicate with a GPS system (not S shown) through an interface circuit 640. Communication between the processor 400 and the controller 412 occurs through two lines 642 and 644. The controller 400 may also 0 Fig. 12 illustrates a simplified field model of the electromagnetic field within the freezer 230. Each antenna in the array 261 has a line of sight or' bore sight represented by a straight line emanating from the respective antenna 262-267. Electromagnetic waves having a frequency of about 2.45 (1Hz travel outward from each' antenna 262-267 into the space definied by the walls of the freezer 23 0 the RIF cavity. The energy of the waves diminishes. The mode! shown includes two lines indicating where energy of the waves is at about -1 0dB and at about -20 dB level.
Fig. 13 illustrates an exemplary packaged item in the form of product 270 that may be stored in the freezer 230. In the embodiment shown, the prodtict 270 includes one or more vials 702 containing a biological assay. The product 270 also includes packaging that includes a pouch 704 and a periphery 706. The vials 702 are positioned withiin the pouch 704. Each product 270 also includes one tag 272, preferably a passive RF tag. Fig.
13 illustrates multiple possible locations for the tag 272 on the periphery 706 (shown in phantom) and the pouch 704. The tag 272 may be a folded-dipole, read-only tag, but other tags having other antenna geometries, such as bow-tie, may be suitable in some embodiments. Read-only tags suitable for use in at least some of the embodiments discussed and illustrated are available from SCS Corporation. As noted, in at least one embodiment, it is preferred that each product 270 be placed in one of the drawers 242 so that it is generally orthogonal to the transmission line of sight of those antennas 262-267 that are adjacent to the subject drawer 242. It is also preferable that the tag 272 be COMS ID No: ARCS-i 79673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:23 FAX 61 3 92438333GRFIH AC- PUSALAijs GRIFFITH HACK 4 IPAUSTRALIA 10039 00 24 0 ci Positioned on a portion Of the Packaging such that it will not be bent when placed within ~0 one of the drawers 242. Placement of the tag 272 On the Pouch 704 Provides a location that is les subject to bending than positions on the periphery 706. Alternatively, a rigid 00 tag substrate or a rigid cover label may be used to prevent bending.
00 Having described much of the mechanical and hardware, aspects of embodiments of ON the invention, additional details of the software will be further described. As noted above, 0 in general, the controller 256 activates the antenna array 261. The antennas 262-267 emit 00 signals that energize the tags 272 on the products within the freezer 230. Each tag 272 0 emits an identifying signal. The identifying signals from the tags 272 are received by the antennas 262-267 and delivered to the controller 256.
As may be apparent, the eniergization of multiple tags in a relatively small, defined volume the RE cavity defined by the interior walls of the freezer 23 0) causes the tags 272 to simultaneously or nearly simultaneously emit identifying signals. The signals interfere with each other such that identifying any individual signal from any one specific tag 272 is difficult, and in some cases nearly impossible. In order to read numerous tags 272, a "cloaking" system can be used. In general, cloakin Ig refers to shutting down or otherwise disabling transmission of the tag once it has been energized and identified by an interrogator (for example, controller 256). While cloaking is generally known, the inventors developed the specific use of the cloaking techniques described herein, including the specifications for minimum and maximum cloak time, and the cloak time distribution, with respect to RE cavity temperature.
The controller 256 executes in-ventory control software. In the embodiment described, the software carries out six basic steps. First, the contro[I er 256 is initialized.
Second, a baseline scan is performed. Third, access to the freezer 230 or relevant microwarehouse is controlled based upon sensing the presence of and determining the validity of a user passkey using the badge or key reader 258 or similar device. .Fourth, the operational status or health of the micro-warehouse is checked. Fifth, the inventory level of products is checked after a user has accessed the micro-warehouse (as sensed, fhr example, by COMS ID No: ARCS-i 79673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:23 FAX 61 3 92438333 GRIFFITH HACK 4, IPAUSTRALIA 040 00
O
0 closing of the freezer door 236). Lastly, information gatherediby the controller 256 is Scommunicated to the server cluster 112.
00 A more specific definition of the procedures performed by the inventory control software is set out in Table 1.
00 5 Table 1 2Scan A single request for a list of inventory identifiers ("Inventory IDs") identifying codes stored in the tags) with Sno duplicates. The scan continues until: S(a) a specified time limit has been reached, CN a specified rate of IDs per second is exceeded, or a specified limit of interval time between tag reads has been reached.
There are two modes of execution, 1. cloaked, and 2. uncloaked.
Run A series of one or more Scans continued either until a specified number of Scans has been reached, a specified time limit has been reached, a specified integrity level has been reached, or an event (such as an RF power failure) has occurred which terminates a scan, Each of is a mode of execution, ard one or more modes can be requested. A run is terminated on the first occurrence of a mode. Each Scan is separated b a secified time interval.
Inventory ID A 6-byte, binary hexadecimal string, unique to 2 values. The nventory ID identifies a tagged product in a micro-warehouse.
integrity Level A percentage expressed as "0.90." Invento List A single list of all Inventory IDs present in a micro-warehouse ReadTime The amount of time elapsed from the start of a Scan to the last tag being read. This time may also be a set and includes the time elapsed to the reading of each of any number of tags ReadTemp The temperature of any one tag as reported by the tag during a Scan (assumes that system is implemented using tags that are Scaable of reporting their temperature).
ScanTime Time limit for one Scan Scanlnterval Time between tag ReadTimes in one Scan NumScans Number of Scans to perform in a Run ScanWaitTime Time to wait between Scans for de-cloakin ReadRate Rate of ta s read per second during one Scan COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:23 FAX 61 3 92438333 GRIFFITH HACK IPAUSTRALIA 041 00 26
O
0 As noted in Table 1, the read time (or for the specific embodiment discussed, "ReadTime") of a scan is the elapsed time from the start of a scan to the reading of any or C all of the tags in the field generated by the antennas. The read time can be collected in 00 either the non-cloaked or cloaked mode. The read time (which can also be a set of read times) can be sent to the server cluster 112 as part of each transaction that results from a 00 scan. The read time can be used as a composite indicator of several operating parameters, such as temperature, product tag position in the RF cavity, RF interference in the cavity, O etc. For instance, a gradual lengthening of the read time(s) for all tags in a RF cavity can Scorrespond to an increase in interior temperature. It is possible to quantify a temperature o 10 change from the shift in a tag versus read time curve (such as the curve 725 shown in Fig 21). As another instance, the shape of the curve of tag versus read time for the last few tags that were read can be used as an indicator of an RF anomaly in the RF cavity that is preventing the tags from getting enough power to respond. In this case, the normally linear curve becomes exponential for the last few tags. Operating parameters read from other sensors in the RF cavity, such as the temperature sensor, can be used with the read time curve to predict the condition that resulted in the change in the read time curve.
In one embodiment, the inventory control software includes three classes of runs: a base line run, an inventory run; and a background run. Definitions for Methods corresponding to these runs are set out in Table 2.
Table 2 Method Function Baseline Run A run in cload or uncloaked mode to Output:IntegLyl, ReadTime, ReadTemp) nn oak o se^dod t o Output:IntegLvi, ReadTime, ReadTemp) establish the starting inventory list.
Input: (NumScans, RunTime, IntegLvl, ScanInterval, ScanWaitTime, ScanTime, ReadRate) Inventory Run A run or runs in uncloaked (or cloaked) Outut:(Pusnvento ryList, mode to determine a new inventory list.
ainuslventoryList IntegLvl, Uses master inventory list established at ReadTime, ReadTemp) baseline, and returns the change in inventory between the master inventory In ut Scans RunTime, teLv list and the new invento list as us delta COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:23 FAX 61 3 92438333 GRIFFITH HACK 4, IPAUSTRALIA 1042 00 27
O
ReadRate) nput: (NumScans, RunTime, IntegLvl, O Scanlnterval, ScanWaitTime, ScanTime, ReadRate) O oReveal Inventory c Output: (MlasterInventoryList) C- Classes of Runs Baseline Run A run in cloaked mode to establish the starting inventory list If IntegrityLvel is not specified, the actual read integrity level is returned, that is, the number of times the majority scan list occurs. Creates the ft master inventory list, consisting of the superset of all inventory IDs read throughout the baseline scans. The read integrity is returned even when an input integrity level has been set Inventory Run A run or runs in uncloaked (or cloaked) mode to determine changes to the inventory list. Uses the superset of all inventory run scans as the new list of inventory. Uses master inventory list (from baseline and/or background) or most recent temporary between master inventory list and new inventory list, as plus delta inventory and minus delta inventory. Creates new temporary master inventory list., A continuous series of scans in cloaked mode until a termination event occurs. Uses a superset of all scans as the inventory list. Creates new master inventory list.
Reveal Inventory No scans. Returns most recent master inventory list.
One useful feature of the embodiments described herein is that the manner in which the controller 256 controls the antenna array 261 may be adjusted. The adjustment may be accomplished by modifying certain software parameters, including those noted in Tables 1 and 2 (such as integrity level, read time, run time, wait time, scan interval, etc.) as circumstances change (for example, changes in temperature, tag type, RF cavity, etc.). As explained in additional detail below, these changes can be performed remotely by sending the changed parameters to the controller 256 from the server cluster 112.
COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:24 FAX 61 3 92438333 GRIFFITH HACK IPAUSTRALIA Q043 o 28 0An overview of the operations performed by the invenory control software is set 0out in Fig. 14. At step 750, the controller 256 is reset via a hard reset by, for example, )turning the key switch 615 to an arm position (not shown). At' step 752, the controller 0checks the server cluster 112 to see if a new version of the controller software is available.
If a new version is available, that version is downloaded and loaded into the memory 602 0and a soft reset is performed, as shown at step 754. Once any necessary software updates have been performed, the controller 256 loads required paramelers, reloads saved 0 transactions, and reloads any master inventory information, if it exists, as shown at step 756. At step 758, the controller 256 checks its status. At step 760, the controller 256 0 10 determines whether a lockdown condition exists. Ifa lokdown condition exists, the ci controller sets a flag or similar device to indicate the presence of a lockdown condition (as shown at step 762) and continues to check for the presence of a Ilockdown condition (as shown by loop 764).
Once it is determined that a lockdown condition does not exist, the controller 256 performs a baseline run, queues (or places in a buffer) the inventory master value, and sets the lockdown flag to "off," as shown at step 766. The controller 256 then executes a control idle loop (step 768) or, more broadly, a main processing loop. In the embodiment illustrated, the control idle loop includes five basic operations: a check diagnostic command operation (step 770), a poll user pass operation (step 772), a poll status operation (step 774), an update saved status operation (step 776), and a check alarm conditions operation (step 778). These steps are discussed in greater detail below. In summary, during these operations, the controller 256 determines whether the user has an authorized key and whether any alarm or other conditions are present. If any of the alarm or status conditions meet the requirements of a loekdown situation (as determined at step 780), the lockdown flag is set to "on" (step 782), information obtained about the inventory in and status of the MW 36 is sent to the server cluster 112 (step 784, background communication) and the control idle loop is executed again (as shown by loop 786).
If a lockdown condition does not exist, the controller 256 determines whether a user has accessed the MW (step 788) as determined, for example, by the controller 256 sensing an opening and closing of the door 236. If a user has accessed the MW, an inventory run is requested and the information from the run is queued in a transaction COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:24 FAX 61 3 92438333 GRIFFTH HACK -4IPAUSTRALIA IA044 29 0 0 buffer, as shown in block 792. The information gathered from the inventory run is then sent to the server cluster 112 (as shown at step 784). The controller 256 continues to Cexecute the software until reset.
Figs. 15 through 21 provide additional information regarding the operations (or routines) discussed above with respect to Fig. 14.
00 As shown in Fig. 15, when the contoller 256 executes the control idle loop, it o--determines whether any diagnostic commands need to be processed (step 793). If commands are unprocessed, the controller 256 processes those commands (step 794) and o then returns to the control idle loop (step 768).
As shown in Fig. 16, after processing any diagnostic commands, the controller 256 checks the validity of any key or pass presented by a user, If the key is invalid, appropriate feedback is provided by, for example, lighting the red LED 628 (step 796).
The controller then returns to the control idle loop. If the key is Valid, the controller checks for the existence of a lockdown condition (step 798). If a lockdown condition exists, the controller denies access to the MW and returns to the control idle loop. If a lockdown condition does not exist, access is permitted and appropriate feedback provided by, for example, lighting the green LED 626 (step 799).
Fig. 17 illustrates the operations performed during a poll status operation (step 774). The controller 256 retrieves information from the various sensors (temperature, power, etc.) and returns to the control idle loop (step 768). As shdwn in Fig. 18, updating saved status information involves assigning the information retrieved during polling (step 774) to variables or registers holding prior status information.
As shown in Fig. 19, checking alarm conditions (step 778) involves comparing or otherwise evaluating the status information and other information, tor example, shelf life, to predetermined thresholds (step 800). In the event any information exceeds or fails to meet the predetermined thresholds, as the case may be, an alarm transaction is queued (step 802). Then control is returned to the control idle loop (step 768).
Fig. 20 illustrates the functions performed by controller 256 when it executes
RF
inventory operations. As shown at steps 804-806, the controller 256 first determines COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:24 FAX 61 3 92438333GIFIhHC- IASALA104 GRIFFITH HACK 4 IPAUSTRALIA R045 00 0 whtherthescanning Operation to be Performed is a baseline run or scan, an inventory run, Or at background run. The type of run to be Performed is passed from the control idle loop to the REF inventolry module. Depending on the type of run requested, the appropriate 00 Parameters are loaded, as shown at steps 807-810. once the parameters are loaded, an appropriate scan is performed, as shown at step 812. If the results of the scan are higher 00 than a Predetermined integrity level, a union set based On the results is formed as shown at steps 814 and 816. If the results do not meet the predeterminec i integrity level, additional scans are Performed until the integrity level is met or exceeded, as shown by loop 8 18S If the type of run or scan performed was an inventory run (step 81,9), changes between the 0010 inventory run and previously stored information (in the example shown, the inventory 0 master) are determined, as shown at step 820. Control is then returned to the control idle loop, as shown at step 822.
The number of scans to be used in any run is variable and is set to ensure a predetermined integrity, which, in the ideal case, is I00e integrity of recorded inventory.
In one embodiment of the invention, a plurality of scans is perfor.med such that the specified integrity level is achieved based on experimental data. A superset or union of all the scan sets is then formed. For example, in order to achieve an:: integrity level of the number of identical scans must be the majority set. In one embodiment, experiments have shown that the number of scans, in non-cloaked mode, should be about ten and in cloaked mode, about three, Additionally, an order (a product rem oval or purchase transaction), based on inventory recorded before door opening and after door closure, can be aged or buffered, that is, held for processing, either la the conttoller or at the server, for some tune until further transactions are recorded. If the additionak scans from these further transactions reveal a product recorded as taken in Whe previous transaction, the erroneous transaction can be corrected before billing a customer. While it is possible for the system to miss a tagged item during a scan, testing of embodiments of the invention has not resulted in a situation where a scan indicated the presence of items not physically present in the relevant MW. In any case, anomalies in recorded inventory that are picked up in later scans can be used to correct the billing information. In actual use, it is believed, and limited tests have shown, that this type of correction will be seldom ly required. Further, the baseline run and the background run are not necessary in all applications, and can be COMS ID No: ARCS-i 79673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:24 FAX 61 3 92438333 GRIFFITH HACK -IPAUSTRALIA Q~046 31 0 selected to be used on any particular MW at the time Of manufacture, field installation, or Servieinterval.
00 Tlags 272 may be equipped with the ability to report their temperature during a scan. A finction of the temperature information obtained from the tags 272 can be used to 00 adjust the scan and scan wait times (defined in Table I as Scan and Scan Wait) to adjust for 00 cloak time changes due to temperature in order to ensure inventory integrity during anly o All of the instances mentioned in the above paragraph ref~r to readtienclad eatm0n lae mode.
00 0 Once the controller 256 has scanned the tagged products in the MW 36 or freezer 230, a message containing information regarding the scan is seat: to the server cluster 112.
As shown in Fig. 22, in the particular embodiment shown, the message takes the form of a background communication (step 784). The controller 256 chec :ks, at step 850, whether a communication session or transaction between the controller 256 and the cluster 112 has already been started. If a transaction or comumunication. has not been started, the controller 256 checks to see whether there is any information to send to the:, cluster 112, at step 852.
If there is information to send, the controller 256 creates a connection to the server cluster 112, as shown at step 8 54.
If no transactions are being processed or queued, the contioller 256 determines whether it should synchronize the real-time clock 402 with a standlard time reference (step 855). For example, if a certain amount of time has passed since the last synchronization has occurred, the real time clock 402 is synchronized again to comkpensate for any variations that might have occurred since the last sycrnzain: If no synchronization is needed, the background comnmunication module is exited and control is returned to the control idle: loop. If synchronization is required, the clock is updated (as shown at steps 8 56 and 857).
If a transaction has been started or a transaction is queued, the controller 256 processes the next transaction or message to be communicated to the cluster 112 (as shown at step 860). Processing of the next transaction includes sending inVentory, status, alarm, COMS ID No: ARCS-i 79673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:25 FAX 61 3 92438333GRFIhHC- PASALAI04 GRIFFYM HACK 4 IPAUSTRALIA Q047 00 32 Oheartbeat, and passkey information to the server cluster 112. Onice these transactions have been processed, the controller 256 processes input transactions1 for transnmission to the ~0C) server cluster 112 (step 62). Information such as updated passkey information, updated 00 parameters, resets, Iockdown information, software updates, status requests, and passkey lists are sent to the server cluster 112.
00 Figs. 23 and 24 illustrate operations performed by the controller 256 upon the 00N occurrence of key switch and interrupt events. As noted above, a transition of the key 0 switch 615 from an arm position to a disarm position causes the: controller to reboot or 00 reset itself (as shown in steps 875 and 877 in Fig. 23). If a trans Ition from the ann position 010 to the disarm position occurs, the controller 256 initiates a shutdown sequence and saves Cl information in the transaction queue (as shown at steps 879 and 8 81).
Various events cause the controller 256 to perform. certain functions. For the embodiment described, the condition of a power failure causes a power fail transaction to be queued (steps 890 and 892 in Fig. 24). The need to input or output information on a serial port causes the controller to place the input informnation in an I/0 buffer (steps 894 and 896). Operational status (or health or heartbeat) checks are carried out at predefined times. If the time for a status check has occurred, a status check is performed and the information obtained during the check is queued for transmission to the server cluster 112 (steps 900 and 902). If the door switch or sensor is toggled, the time of day and temperature of the MW 36 are recorded (steps 904 and 906). If the current sensor senses a toggling of the AC current, the toggle is recorded (steps 908 and 91 Finally, if the controller must provide user feedback (such as providing and indication of the validity of a passkey), the user feedback is provided and appropriate feedback flags are toggled (steps 912 and 914).
As can be seen from the above, the present invention provid es an RE inventory and distribution system with features to diminish the effects of energy sharing, nulls, shadowing, and other effects that degrade integrity in recording inventory changes.
Various features and advantages of the invention are set forth in the following claims.
COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18

Claims (44)

1. A method comprising: an antenna for performing RFID scanning, said 0s antenna being movably mounted on a portion of said apparatus; and an antenna moving unit that is configured to 0 automatically move said antenna.
2. An apparatus according to claim 3, wherein said 00 antenna is mounted on a pivot, and said antenna moving §unit causes said antenna to pivot.
3. An apparatus according to Claim 1, wherein said is apparatus is a freezer.
4. An apparatus according to Claim 3, wherein said antenna is movably mounted within a door of said freezer.
5. An apparatus according to Claim 3, wherein said antenna performs RFID scanning to detect an RFID tag Positioned within said freezer.
6. An apparatus according to Claim 5 wherein the REID tag is positioned on a shelf within said freezer.
7. An apparatus according to Claim 5, wherein the RFID tag is positioned in a drawer within said freezer.
8. An apparatus according to Claim 1, wherein there is more than one said antenna.
9. An apparatus comprising: an RFID scanning unit mounted on a portion of said apparatus, said RFID scanning unit being configured to perform RFID scanning of an area within said apparatus, wherein said RFID scanning unit comprises a kel.^ Cas ,antml530 5399953679AU.11SpeciAPs3679AU SpecifiWjr 1 200O2-I8do )I OR COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:25 FAX 61 3 92438333 GRIFFITH HACK IPAUSTRALIA 050 00 0 Smovable part configured to change an arrangement of an electromagnetic field in the area, and (bp) means for automatically controlling the motion of Said movable part. An apparatus according to Claim 9, wherein said movable part is an antenna. 00 S11. An apparatus according to Claim li0 wherein said Santenna is mounted on a pivot. 0 00
12. An apparatus according to Claim 9, wherein the area Q comprises a drawer of said apparatus.
13. An apparatus according to Claim 9j wherein the area comprises a shelf of said apparatus.
14. An apparatus according to Claim 9, wherein said apparatus is a freezer.
15. A method comprising: providing an apparatus having an RFID scanning unit mounted on a portion thereof, the RFID scaning unit being configured to perform RFID scanning of an area within the apparatus, wherein the RFID scanning unit comprises a movable part configured to change an arrangement of an electromagnetic field in the area; and automatically moving the movable part to change an arrangement of the electromagnetic field in the area.
16. An apparatus comprising: a first antenna; a second antenna, said first antenna and said second antenna being used to perform RFID scanning by sending signals for RFID tag interrogation and by receiving RFID tag-generated signals; and means for activating said first antenna and said second antenna at different times to perform the RFID N fle\Cysepattr533oo-3gggxpss 7 Q-Au nISp.W5iC3679.AU.I Speiflcadon 200 2 -8cdoc I W/08 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:25 FAX 61 3 92438333 GRIFFITH HACK IPAUSTRALIA 1051 00 36- 0 o scanning. ci
17. A method comprising: Sproviding plural antennae for performing RFID 005 scanning by sending signals for RFID tag interrogation and by receiving RFID tag-generated signals; and 00 activating a first antenna of the plural antennae 00 and a second antenna of the plural antennae at different times to perform the RID scanning. 0 o o 10 00 A method comprising: 0 performing plural RFID scans of an area and generating therefrom a result, wherein said step of generating therefrom a result comprises creating a superset of all tags read during the plural scans, (b) determining the number of scans in which the superset of tags was read, and calculating the percentage of the plural scans in which the superset of tags was read by dividing the number of scans in which the superset of tags was read by the number of scans of the plural scans; comparing the result to a predetermined integrity level; and selectively performing a subsequent RFID scan in accordance with the comparison.
19. A method according to claim 18, wherein said step of selectively performing a subsequent scan in accordance with the comparison is a step of selectively performing a subsequent scan in accordance with a determination that the result is less than the predetermined integrity level. A method according to Claim 18 further comprising repeating said step of selectively performing a subsequent scan in accordance with comparison of a result of the subsequent scan to the predetermined integrity level. N.\e u^ tW \I3000.5 3p.AU, I \p 3679.AU.l Speificadon 200,-2-I8. 1,02M8 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:26 FAX 61 3 92438333 GRIFFITH HACK IPAUSTRALIA I?052 00- 37- 0 S21. An apparatus comprising: Smeans for performing plural RFID scans and Sobtaining a result, comprising means for creating a superset of all tags read during the plural scans, (b) 5 determining the number of scans in which the superset of tags was read, and calculating the percentage of the 00plural scans in which the superset of tags was read by Sdividing the number of scans in which the superset of tags 0was read by the number of scans of the plural scans; o 0 means for comparing the result to i a predetermined 00 integrity level; and 0 means for determining whether or not to perform a c subsequent RFID scan in accordance with the comparison.
22. A method of distributing a plurality of products from an area, the method comprising: providing each product with a radio frequency identification tag; positioning at least one antenna within the area, the at least one antenna configured to emit a signal at at least one predefined frequency and generate at least one electromagnetic field within the area; positioning the plurality of products within the area; performing a first scan of the area using the at least one antenna, the scan generating a ftrst result; comparing the first result to a predetermined integrity level; and performing one or more subsequent scans if the first result does not equal or exceed the predetermined integrity level.
23. A method as claimed in Claim 22, wherein each subsequent scan generates a subsequent result; the performing of one or more subsequent scans continuing until at least one of the subsequent results equals or exceeds the integrity level, the method further N.WRCa tS pc. WS9.M ys W 9.AU.1 Speeflcauon 200«-2-18.dac 18/02/08 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:26 FAX 61 3 92438333 GRIFFITH HACK 4 IPAUSTRALIA Q053 00 -38 0 0 comprising: determining a number of the plurality of products; and 0 5 determining a change in the number of plurality of products by subtracting a value based on the first result or one of the/subsequent results from the number of the 00 Plurality of products.
24. A method as claimed in Claim 22, the method further 0 comprising cloaking one or more of the plurality of tags 0 during the first scan or one of the subsequent scans. 0 A storage container comprising: an RFID scanning unit that is configured to perform an RFID scan of a space within said storage container, wherein said storage container has a non-flat reflective surface disposed on an interior wall of said storage container.
26. A storage container according to Claim 25, wherein the non-flat reflective surface is on a member attached to the interior wall of said storage container.
27. A storage container according to Claim 21, wherein the member has a sawtooth cross-section.
28. A storage container according to Claim 25 further comprising a reflector attached to the interior wall of said storage container, said reflector having the non-flat reflective surface.
29. A storage container according to Claim 28, wherein the non-flat reflective surface comprises a sawtooth patern. N:.Me)houm ^atno-530O53999P5w679.AU. ISpei S3679.AU.I Sp cifcgtji 2008-2-1s.doc I02/M0 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:26 FAX 61 3 92438333 GRIFFITH HACK 1 IPAUSTRALIA 054 39 A method of distributing a plurality of products from an area, the method comprising: providing each product with a radio frequency identification tag; providing at least one antenna, the at least one antenna being configured to emit a signal at at least one predefined frequency and generate at least one electromagnetic field within the area; positioning the plurality of products within the area; reading identification information; permitting access to the area if the identification information read is authenticated; detecting an end of access to the area; performing a first scan of the area using the at least one antenna, the scan generating a first result, comparing the first result to a predetermined integrity level, and performing one or more subsequent scans if the first result does not equal or exceed the predetermined integrity level.
31. A method according to Claim 30; wherein said step of reading identification information comprises one of (a) 2S reading a fingerprint and reading an RiFPID badge.
32. A method according to Claim 31 wherein said method comprises step
33. A method according to Claim 31 wherein said method comprises step
34. A method according to Claim 31, wherein the area is within a freezer, wherein said step of detecting an end of access to the area comprises detecting closing of a door of the freezer by sensing output of a proximity sensor, MVMclbou C.3 P53i7,.AU, SPc 536e79.Au. Specificaion 2008-2- 1.doc 8/02A>8 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:26 FAX 61 3 92438333 GRIFFITH HACK IPAUSTRALIA Q055 00 40 0 Swherein said step of performing the first scan is c performed in response to detection that the door of the Sfreezer has closed, Swherein an inventory message is enerated in 00 s accordance with a difference between two scans, wherein said permitting access step comprises controlling a solenoid of an electric actuated lock with 00 00 which the freezer is equipped, wherein the at least one antenna is mounted on or in the freezer, and 00 wherein passive tags are used in step of providing 00 Seach product with a radio frequency identification tag. A method according to Claim 34, wherein the Plurality of products comprises a biological product.
36. A method according to Claim 35, wherein the biological product is selected from the group consisting of an enzyme, an assay, and a cloning vector.
37. A method according to Claim 30, wherein said detecting performs the detection in response to closing of a door.
38. An apparatus according to Claim 37 wherein said apparatus is a refrigerated cabinet, and the door is a door of the refrigerated cabinet.
39. A storage container according to Claim 25, wherein said storage container is a refrigerated enclosure. A storage container according to Claim 25, wherein said storage container is a freezer.
41. An apparatus comprising: an RFID scanning unit that is configured to perform an RFID scan of a space within said apparatus, 5 .ISpcclcatin 2008 2 -jI.doc I210,/0 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:26 FAX 61 3 92438333 GRIFFITH HACK 4 IPAUSTRALIA R056 00- 41- 0 o wherein said apparatus has a non-flat reflective surface disposed on an interior wall of said apparatus, C) and O wherein the non-flat reflective surface comprises a 00 5 sawtooth pattern. 00
42. A method of distributing a plurality of products from an area, the method comprising: providing each product with a radio frequency identification tag; 0 0 positioning an antenna; 0Positioning the plurality of products within the ci area; performing plural scans of the area using the antenna, the scan generating a first result based on output of the plural scans; comparing the first result to a ptedetermined integrity level; and Performing a subsequent scan if the first result does not equal or exceed the predetermined integrity level, wherein said step of generating a ifirst result based on output of the plural scans comprises creating a superset of all tags read during the plural scans, (b) determining the number of scans in which the superset of tags was read, and calculating the percentage of the plural scans in which the superset of tags was read by dividing the number of scans in which the superset of tags was read by the number of scans of the plural scans.
43. A method as claimed in Claim 42, wherein the subsequent scan generates a subsequent result, wherein the performing a subsequent scan is repeated until the subsequent result equals or exceeds the integrity level, and wherein the method further comprises: determining a number of the plurality of products; N RUbo'ni z e 53O 53999 53679.AU.Ip P53679.AU. Spe-uimk 2 0 08-2-8.dc I 8/02/0O COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:26 FAX 61 3 92438333 GRIFFITH HACK IPAUSTRALIA R057 00 42 0 o and determining a change in the number of plurality of )products caused by a user removing a product from the area Sby subtracting a value based on the first result or one of 5s the subsequent results from the number of the plurality of products. 00 0
44. A method as claimed in Claim 42, the method further Scomprising cloaking one or more of the plurality of tags during a scan of the plural scans or the subsequent scan. 0 4 5 A method as claimed in Claim 42, wherein the CM predetermined integrity level is
46. A method as claimed in Claim 42, wherein the predetermined integrity level is
47. A system comprising: RFID scanning means for using RFI to scan an access-controlled area, wherein said RFID scanning means comprises an antenna and means for automatically moving the antenna; inventory determining means for determining an inventory in accordance with a result of scanning by said RFID scanning means; and access control means for controlling access of a user to the access-controlled area in accordance with reading of a RFID badge of the user.
48. A system according to Claim 47, further comprising reordering means for automatically reordering an object so as to cause the object to be delivered to the access- controlled area in accordance with the inventory: determined by said inventory determining means and a predetermined business rule.
49. A system according to Claim 47 further comprising N."bnme l-.1 e5 POr-c.5399 579AU pei\P 79 Spe icao 2 00 8 0208 COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:27 FAX 61 3 92438333 GRIFFITH HACK IPAUSTRALIA 058 00 43 Smeans for determining how much time an RFID tag has spent in the access-controlled area. A system according to Claim 47, further comprising 00 S means for determining whether an object having an RPID tag, the object being disposed in the access-controlled 00 area, has been recalled.
51. A system according to Claim 47, Wherein said RFID scanning means further comprises means for obtaining a Slist identifying all RFID tags read during any of a 0 Plurality of RFID scans, and means for determining whether 0 or not to perform an additional RFID scan in accordance with the determination of the list.
52. A system according to Claim 47, wherein said RFID scanning means further comprises another antenna and means for activating the antenna and the another antenna at different times when performing RFID scanning.
53. A system according to Claim 47, further comprising: reordering means for automatically reordering an object so as to cause restocking of the same to the access-controlled area, in accordance with the inventory determined by said inventory determining means and a predetermined business rule; and: means for determining whether an object corresponding to an RFID tag, the RFID tagIbeing disposed in the access-controlled area, has been recalled, wherein said RFID scanning means further comprises another antenna and means for activating said antenna and said another antenna at different times when performing RFID scanning.
54. A system according to Claim 53, wherein the object corresponding to the RFID tag is attached to the RFID tag. NAlbmmC .Patc C-53999P53679AU.SpeciAP3679 AU. I Specifcadon 2008-2- doc 18/02/O COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18 18/02 2008 14:27 FAX 61 3 92438333 GRIFFITH HACK IPAUSTRALIA 059 00 44 -ock of a door of the refrigerated cabinet. 00 0
56. A system according to Claim 47, wherein the coinventory is a is thnvent ory of any biolof ial rigeraodu cabinetts 1 tored in therein said access-controlled area, eah such product Oaving a passiv e RFID tag and being selected from the lock Of a door of the refrigerated cabinet. 0 group consisting of an enzyme, an assay, and a cloning 0g vector, wherein the inventory is determined in accordance with a differential comparison between two RFID scanning operations, wherein the lock is an electric actuated lock comprising a solenoid, whetein the refrigerated cabinet comprises sensing means for sensing opening and closing of the door of the refrigerated cabinet by sensing output of a proximity sensor, wherein said antenna is mounted on or in the refrigerated cabinet, and wherein the lock is further controlled in accordance with the temperature within the refrigerated cabinet. N \^elbourcatcm3000-5399"53679.AU pccP379.AUj Specific sion200&218.dc IBMI2oN COMS ID No: ARCS-179673 Received by IP Australia: Time 15:29 Date 2008-02-18
AU2008200798A 2002-02-21 2008-02-18 RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags Abandoned AU2008200798A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2008200798A AU2008200798A1 (en) 2002-02-21 2008-02-18 RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10/080,330 2002-02-21
AU2006252255A AU2006252255B2 (en) 2002-02-21 2006-12-22 RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
AU2008200798A AU2008200798A1 (en) 2002-02-21 2008-02-18 RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
AU2006252255A Division AU2006252255B2 (en) 2002-02-21 2006-12-22 RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags

Publications (1)

Publication Number Publication Date
AU2008200798A1 true AU2008200798A1 (en) 2008-03-13

Family

ID=39244043

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2008200798A Abandoned AU2008200798A1 (en) 2002-02-21 2008-02-18 RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags

Country Status (1)

Country Link
AU (1) AU2008200798A1 (en)

Similar Documents

Publication Publication Date Title
USRE46326E1 (en) RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US7735732B2 (en) Radio frequency identification method and system of distributing products
USRE47599E1 (en) RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
AU2006252255B2 (en) RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
AU2008200798A1 (en) RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags

Legal Events

Date Code Title Description
NB Applications allowed - extensions of time section 223(2)

Free format text: THE TIME IN WHICH TO MAKE A FURTHER APPLICATION FOR A DIVISIONAL APPLICATION HAS BEEN EXTENDED TO 18 FEB 2008.

MK4 Application lapsed section 142(2)(d) - no continuation fee paid for the application