US20110068906A1 - Systems, methods, and apparatuses for managing configurable monitoring devices - Google Patents
Systems, methods, and apparatuses for managing configurable monitoring devices Download PDFInfo
- Publication number
- US20110068906A1 US20110068906A1 US12/636,564 US63656409A US2011068906A1 US 20110068906 A1 US20110068906 A1 US 20110068906A1 US 63656409 A US63656409 A US 63656409A US 2011068906 A1 US2011068906 A1 US 2011068906A1
- Authority
- US
- United States
- Prior art keywords
- ping
- signal
- node
- tag
- location
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10366—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
- G06K7/10475—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications arrangements to facilitate interaction with further interrogation devices, e.g. such that at least two interrogation devices may function and cooperate in a network of such devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2462—Asset location systems combined with EAS
Definitions
- Embodiments of the present invention relate generally to network and network management technology and, more particularly, relate to the management of networks that include dynamically configurable monitoring devices for use in connection with monitoring, tracking, and locating activities associated with one or more articles such as retail products.
- EAS electronic article surveillance
- conventional systems are often limited to the narrow scope of providing security functionality.
- an EAS gate located at an exit of a retail business establishment may be configured to alarm when an article with an EAS tag passes through the gate.
- many conventional systems provide nothing more to the users of the systems, such as store owners, store managers, and the like.
- store owners are considering the purchase and installation of a conventional security system in a retail establishment, the limited functionality offered by the systems can detrimentally affect the cost-benefit analysis of installing and maintaining the system.
- identifying the location of products within a retail store has often relied on product placement.
- approaches to finding products are often based on placing similar types of products near each other in the store, thereby allowing the products' relative placement to assist both customers and store personnel in finding a desired product.
- Another approach has been to use large signs above the aisles of products, which identify which types of products should be in each aisle.
- using a sign and/or simply organizing a store with areas for similar products has proven insufficient under many circumstances. As a result, customers and store personnel are demanding more accuracy with respect to locating products within retail and other environments.
- Some example embodiments of the present invention are therefore provided that support security system functionality, as well as, additional functionalities that would be beneficial to store owners, store managers, and customers.
- some example embodiments support inventory and marketing functionality, as well as, advanced security functionality.
- a system for managing and locating configurable monitoring devices and/or the products they are attached to.
- a configurable monitoring device may be a microprocessor-based wireless communication device that can assume configurable roles or modes of operation within the system.
- a mode of operation may be implemented based on configuration information stored on the configurable monitoring device.
- the configuration information may be pre-loaded on the configurable monitoring device, or configurable monitoring devices may receive the configuration information via a wireless connection from a remote device.
- the system may include any number of configurable monitoring devices configured to operate, for example, as a network, such as a mesh network, hybrid mesh network, star network, hybrid star network, or the like.
- the network may include a gateway node that supports a monitoring terminal (sometimes referred to herein as a coordinator).
- the gateway node may operate as an interface between the configurable monitoring device network and the monitoring terminal, for example, via an external network.
- the monitoring terminal may be configured to interact with the configurable monitoring devices and the configurable monitoring device network to implement a variety of functionalities.
- one or more of the monitoring devices can include a processor, which can be configured to receive an indication of a triggering event. In response to receiving the indication of the triggering event the processor can be configured to cause the monitoring device to transition into a triggered role.
- the triggered role being one of a tag role or a node role, among others.
- the tag role includes configuring the processor to determine location information relating to the monitoring device.
- the tag role can include, instead of or in addition to locally determining location information, configuring the processor to repeat, or relay, any received data to a network entity, which can then help determine the location of the monitoring device.
- the location information can be relatively complex or simple (e.g., an identifier number of one or more other nodes the monitoring device “hears”).
- the monitoring device's node role can include configuring the processor to transmit a ping signal.
- a ping signal can comprise a relatively small amount of data (e.g., only the node identifier information) or a relatively larger amount data (such as at least the amount and type of data common to “beacon” signals used in wireless communications, some of which may be 802.11.4 compliant).
- the node role can also comprise configuring the processor to forward a tag communication to a network entity.
- the monitoring device can be configured to receive data that includes instructions to transition the monitoring device.
- the instructions can be included in the indication of the triggering event and/or be sent by a network entity.
- the monitoring device's processor can be further configured to receive a second indication of a second triggering event and, in response, transition from the triggered role to a second triggered role.
- the monitoring device can transition from a tag role, to a node role, back to a tag role.
- the indication of the triggering event can be a wireless signal that is broadcast wirelessly and received by one or more monitoring devices' antennas.
- the indication of the triggering event can include a monitoring device identifier or other information that causes only one of the monitoring devices to execute its transition into the triggered role.
- a directional antenna (which may allow only one monitoring device or a subset of the monitoring devices to receive the indication), any other means, and/or a combination thereof can be used to target one or more monitoring devices for transitioning.
- the indication of the triggering event can be, for example, an output of a sensor.
- the sensor can be integrated inside the housing of the monitoring device, making the sensor an internal component of the monitoring device.
- Some examples of internal components include a motion detector (e.g., jiggle switch, accelerometer, etc.), a tamper detection component (which can be separate from or part of a mounting device used to affix the monitoring device to an article), or any other internal component that could be integrated into the monitoring device, some additional examples of which are discussed herein.
- the sensor can be configured to detect the triggering event and output the indication of the triggering event.
- the triggering event could be movement and, in response to the sensor determining that the monitoring device is moving, the sensor can output the indication to the monitoring device's processor (and/or any other component or device).
- the senor can be external to the monitoring device, such as, e.g., in an external device.
- the sensor can produce an output that is then relayed wirelessly or by any other means to the monitoring device.
- the external device can be another device functioning as a node device.
- Other examples of external devices that can send the monitoring device the indication of a triggering event include, e.g., an RFID device (such as those that are handheld or mounted in a counter or other piece of furniture), a network entity, an EAS gate, or any other device that can be configured to emit and/or generate an indication of a triggering event and/or an alarm event.
- the monitoring device can also include an audio device configured to emit audio signals.
- the audio device may only be operable when the monitoring device is in the tag role.
- the monitoring device's processor can be further configured to receive an alarm indication of an alarm event while in the tag role and send a signal to the audio device, causing the audio device to emit the audio signal.
- An alarm event can be similar to or a type of triggering event and an alarm indication can be similar to or a type of an indication of the triggering event.
- the alarm event can be an event, such as determining someone is trying to steal the article to which the monitoring device is attached (based on, e.g., suspicious movement profile).
- the alarm indication can be any type of indication, including a wireless or other type of signal that corresponds with an alarm event and/or can convey, to the monitoring device and/or network entity, that an alarm event occurred.
- the monitoring device's processor and/or the network entity can receive the alarm indication from an external security device, such as an EAS gate and/or internal component that is configured to generate an output in response to being in communication proximity with an EAS gate.
- an external security device such as an EAS gate and/or internal component that is configured to generate an output in response to being in communication proximity with an EAS gate.
- a node can be placed near a store's exit and the monitoring device can be configured to interpret hearing that node's ping signal as an alarm indication (with the alarm event being that monitoring device being too close to the store's exit).
- the external security device can be a second monitoring device.
- the external security device can be in communication proximity to the monitoring device and the external security device and/or the monitoring device can be affixed to a retail product.
- the external security device can be located at a store's exit and be used to detect an alarm event.
- “communication proximity” refers to the distance in which direct communications can exist wirelessly between two devices. This distance can be dependent on a number of variables includes power output, frequency, signal reception factors (including physical and electrical interference variables), and/or any other variable. For example, if a monitoring device is in communication proximity of a node device, the monitoring device can “hear” the node device's ping signal(s) (e.g., receive the ping signal and determine the node identifier).
- the monitoring device can comprise a battery and/or various other components.
- the monitoring device can comprise a mounting device configured to affix the monitoring device to a retail article.
- the monitoring device can also comprise memory configured to store attribute information (e.g., bar code data, color data, price data, etc.) associated with the retail article.
- the monitoring device can include a display configured to display human-readable information and/or a light emitting component (which can be used to indicate battery power, an error message, communication functionality, etc.).
- the monitoring device can be configured for position tracking of an article (such as a retail item, book, computer, casino chip, money, personal identification card, passport, etc.).
- the monitoring device's processor can be configured to receive a ping signal from a ping node; determine location information relating to the monitoring device based at least in part on receiving the ping signal; and report the location information to a network entity.
- the network entity can comprise one or more additional apparatuses, including a server and network management and/or monitoring system.
- the monitoring device and/or network entity can determine a location zone of the monitoring device in response to the monitoring device receiving a ping signal from the ping node or other device functioning as a ping node (both of which are sometimes referred to herein as a “node device” or “node”).
- the monitoring device's processor can then retrieve (e.g., request and receive), from local or remote memory, a zone-based functionality profile that corresponds with the location zone.
- the functionality profile is downloaded from remote memory (such as, e.g., the memory of a network entity)
- the processor can be configured to store the functionality profile in the monitoring device's internal memory.
- the functionality profile can be zone-based and correspond with one or more zones that represent an area of a physical space, such as a retail store or warehouse.
- the zones can also be relative to the position of one or more other devices, such as a node device, door, etc.
- the monitoring device can comprise an audible alarm that is activated by the processor in response to the zone-based functionality profile including an event signal activation instruction, such as an alarm activation instruction and/or any other instructions (such as, e.g., an unlocking instruction for the monitoring device's attachment mechanism, etc.).
- an alarm may also be initiated at the network entity in response to determining an alarm event has occurred.
- the monitoring device's processor can be further configured to, in response to receiving the ping signal from the ping node, determine a location zone. Determining a location zone can include, for example, determining the ping node's identifier which is broadcast as or encoded within the ping signal.
- the network entity can be configured to determine the applicable zone-based functionality profile for the monitoring device, in response to the monitoring device repeating the ping signal(s) the monitoring device received. The monitoring device's processor can then retrieve, from the network entity, the zone-based functionality profile that corresponds with the monitoring device's location zone.
- the monitoring device and the ping node can establish and execute a uni-directional communication protocol.
- the uni-directional communication protocol can allow, for example, the ping node to wirelessly broadcast data (as, e.g., a ping signal), which the monitoring device can receive.
- the data can include, e.g., the ping node's identifier and/or other information.
- the ping node can be configured to only send data to the monitoring device (e.g., lack the components necessary to receive data from the monitoring device).
- the ping node can receive data from a network entity, even though the ping node lacks the ability to receive data from a monitoring device.
- the monitoring device may be configured to respond to (e.g., confirm receipt for) all ping node signals it receives.
- the uni-directional communication protocol lacks the monitoring device transmitting data intended for the ping node.
- the monitoring device can also establish and execute a bi-directional communication protocol with the ping node and/or the network entity.
- the bi-directional communication protocol can allow for two way communications, including sending and receiving of signals between each device participating in the communication protocol.
- the monitoring device can be further configured to receive a second ping signal from a second ping node.
- the second ping signal can be used by the monitoring device and/or network entity to determine second location information (such as identifying information of the second ping node) relating to the monitoring device.
- the uni-directional, bi-direction or any other communication protocol can be established between the monitoring device and the second ping node.
- the communication protocol between the monitoring device and the second ping node can be related to or independent from the communication protocol used between the monitoring device and the first ping node.
- a location zone can be determined by the monitoring device and/or the network entity based on the first location information and the second location information.
- the first and second location information can respectively comprise the first ping node's and the second ping node's identification data.
- the network entity and/or the monitoring device knowing where those ping nodes are physically located, can then derive the approximate position of the monitoring device. In such embodiments, a more accurate location can be derived from, e.g., more ping node information.
- the location (relative to the ping node and/or absolute in a given space) can be used to access memory (remote or local to the monitoring device) and retrieve a zone-based functionality profile that can include instructions and other executable commands for the monitoring device and/or other device(s).
- the monitoring device can comprise an audible alarm that is activated by the processor in response to receiving a type of event signal activation instruction (e.g., an alarm activation instruction) included in the zone-based functionality profile.
- the monitoring device can comprise a mounting device that is unlocked in response to the zone-based functionality profile including an unlock instruction, wherein the mounting device is configured to affix the monitoring device to a retail article.
- the monitoring device can also include an antenna that the processor uses to transmit and/or receive data associated with the location zone to the network entity, ping node device, and/or any other external device.
- the monitoring device's processor can be further configured to engage an internal timer; and subsequently receive an indication of a trigger event, wherein the indication results from the timer expiring.
- any other type of time keeping component can be implemented, including a clock, etc.
- the monitoring device can enter a wake mode and subsequent to reporting the location information to the network entity, reset the timer and enter a sleep mode.
- a timer can be started in response to receiving a triggering event.
- a triggering event can cause the creation of a corresponding event signal, which can, among other things, cause the initiation of a timer.
- the monitoring device and/or network entity can send a first signal for instructing the one or more ping nodes to power down to a minimum threshold and incrementally power up simultaneously or near simultaneously.
- the monitoring device can then monitor (e.g., listen) for subsequent ping signals from the ping nodes.
- the monitoring device can be configured to receive a location signal from either of the ping nodes.
- the monitoring device can determine locally or utilize a network entity to determine its location and/or relate that location information to an article to which the monitoring device is coupled to.
- the location information can be associated with a first location corresponding with the location of a first ping node if the location signal was generated by the first ping node. Or, as another example, the location information can be associated with a second location corresponding with the location of the second ping node if the location signal was generated by the second ping node.
- the monitoring device can be configured to report the location information to a network entity.
- the monitoring device and/or network entity can then send a first signal for instructing the one or more ping nodes to power up to a maximum threshold and then simultaneously or near simultaneously incrementally power down.
- the monitoring device can then monitor (e.g., listen) for subsequent ping signals from the ping nodes. Subsequent to determining that both the first ping node and the second ping node have powered up, the monitoring device can be configured to receive location signals. Subsequent to determining that both the first ping node and the second ping node have powered up, determining whether a final ping signal is received from the first ping node or the second ping node.
- the monitoring device In response to receiving the final ping signal, determining the location information relating to the article, wherein the location information is associated with a first location of the first ping node if the final ping signal was generated by the first ping node or the location information is associated with a second location of the second ping node if the final ping signal was generated by the second ping node.
- the monitoring device can determine its location based upon the last ping node it hears.
- the monitoring system may be implemented that is configured to support the locating of tags.
- the monitoring system may be comprised of a plurality of ping, gateway and/or other nodes that provide ping and/or other types of signals that are detected by a tag.
- a tag that is able to receive a signal from a ping and other nodes can be defined as having a positional relationship with the node(s).
- a tag may be configured to determine a closest ping node to the tag based on the ability to receive a signal from a ping node.
- a locating procedure may be undertaken to identify the ping node closest to the tag or within communication range with a tag.
- the ping nodes may be configured to, upon request, adjust the pings' respective signal powers to a common level (e.g., a minimum level or a maximum level) and incrementally modify the power of the signal to determine when a targeted tag begins receiving or communicating, or fails to receive or communicate, the signals being provided by the ping nodes.
- a common level e.g., a minimum level or a maximum level
- the tag may be configured to determine which ping node is closest to the tag. The tag may then be associated with the ping node such that the tag is indicated as being located near the ping node within the environment.
- FIG. 1 a is a schematic block diagram of a monitoring system including a number of configurable monitoring devices according to example embodiments;
- FIG. 1 b is another schematic block diagram of a monitoring system including a number of configurable monitoring devices according to an example embodiment of the present invention
- FIG. 1 c is another rendering of a monitoring system including a number of configurable monitoring devices according to example embodiments
- FIG. 1 d illustrates a flow chart of an example tag according to example embodiments
- FIG. 2 illustrates a block diagram of a monitoring terminal according to example embodiments
- FIG. 3 illustrates a diagram of various configurable monitoring devices implemented in an example retail environment according to example embodiments
- FIG. 4 illustrates an example configurable monitoring device with specialized hardware for performing some of the functionality within the role of a key according to example embodiments
- FIG. 5 a is an illustration of an example retail environment having ping nodes and tags located within the environment according to example embodiments;
- FIG. 5 b illustrates a tag information window for displaying attribute information for a tag according to example embodiments
- FIG. 6 is an illustration of a signaling and communications period for a ping node according to example embodiments
- FIG. 7 is an illustration of a situation where a tag is within range of more than one ping node according to example embodiments
- FIG. 8 is an illustration of a example procedure where the signal powers of the ping nodes have been dropped to a minimum level and incrementally increased to perform locating according to example embodiments;
- FIG. 9 is a flowchart of an example method for determining the location of a tag from the perspective of a monitoring terminal or a tag according to example embodiments;
- FIG. 10 is a flowchart of an example method for determining the location of a tag from the perspective of a ping node according to example embodiments
- FIG. 11 illustrates an example of a flow diagram illustrating an example method for managing configurable monitoring devices according to example embodiments
- FIG. 12 illustrates an example user interface window implemented by a monitoring terminal and depicting a representation of a monitoring system according to example embodiments
- FIG. 13 illustrates an example user interface window implemented by a monitoring terminal and depicting a representation of a monitoring system in accordance with some embodiments
- FIG. 14 illustrates an example of a flow diagram illustrating an example method for managing configurable monitoring devices according to example embodiments
- FIG. 15 illustrates an example tag information window for displaying attribute information associated with a tag or node according to example embodiments
- FIG. 16 illustrates a hub information window for displaying attribute information for a node according to example embodiments.
- FIG. 17 illustrates a tag battery level window for displaying the battery level for a tag according to example embodiments.
- the term “circuitry” refers to not only hardware-only circuit implementations including analog and/or digital circuitry, but at least also to combinations of circuits with corresponding software and/or instructions stored on a computer-readable storage medium.
- example embodiments of the present invention may be configured to support various security, inventory, marketing, and other functionalities in, for example, a retail sales environment or other given space.
- configurable monitoring devices may be installed within the retail sales environment.
- a description of some example embodiments of configurable monitoring devices, and the monitoring systems that may support configurable monitoring devices, is provided in U.S. Provisional Patent Application 61/244,320 filed Sep. 21, 2009, entitled “A Configurable Monitoring Device”, the content of which is hereby incorporated by reference in its entirety.
- the configurable monitoring devices may be wireless communication devices that can be dynamically configured to assume one or transition among roles within the operation of a monitoring system.
- the configurable monitoring devices may include a processor, memory, communications interface (e.g., radio transmitter/receiver, Radio Frequency ID (RFID) module, or the like). Based on a role that a configurable monitoring device is expected to assume or transition to, the configurable monitoring device may also include more specialized hardware components such as, an alarm, a sensor, a display, and the like.
- RFID Radio Frequency ID
- a configurable monitoring device may be configured as a security tag that is attached to an article via a mounting device.
- the security tag may be configured to alarm or transmit an alarm message, if the security tag determines that an alarm condition has been met.
- a configurable monitoring device may be configured to operate as a node within a monitoring system.
- the configurable monitoring device may support communications and message routing within the communications network defined by the system.
- the node may be configured to determine routing paths within the network for the efficient delivery of messages.
- a configurable monitoring device may be configured to operate as a gateway between the monitoring system and an external network such as a wired local area network (LAN) or the Internet. Further, a configurable monitoring device may be configured to operate as a security key for locking and unlocking a mounting device associated with a security tag. In this regard, the security key may be configured to activate or deactivate electronic security features of a security tag.
- LAN local area network
- the security key may be configured to activate or deactivate electronic security features of a security tag.
- a configurable monitoring device configured to operate in node mode will be referred to as a “node”
- a configurable monitoring device configured to operate in tag mode will be referred to as a “tag”
- a configurable monitoring device configured to operate in gateway mode will be referred to as a “gateway”
- a configurable monitoring device configured to operate in key mode will be referred to as a “key”.
- U.S. Provisional Patent Application No. 61/248,269, filed Oct. 2, 2009, entitled “Key for Commissioning, Decommissioning and Unlocking Configurable Monitoring Devices,” discusses examples of key devices and was incorporated above by reference in its entirety.
- FIG. 1 a illustrates an example monitoring system 60 that includes a number of configurable monitoring devices in various roles.
- Tags 68 e.g., tags 68 a - 68 i
- Nodes 66 e.g., nodes 66 a - 66 c
- network level activities such as communications routing, tag locating, and the like.
- Gateway node 64 may be configured as a gateway node to provide a network interface between the monitoring system 60 and the external network 30 .
- a monitoring terminal 62 may be in communication with the gateway node 64 , for example, via the external network 30 or via a direct connection to the gateway node 64 , to facilitate management of the configurable monitoring devices by the monitoring terminal 62 and to further facilitate the aggregation and analysis of data received from the configurable monitoring devices.
- a gateway node may interface with a cellular network to gain access to other networks, such as the Internet.
- a gateway node may support USB and Ethernet connectivity for connection to USB or Ethernet networks.
- the gateway node 64 may also include or be associated with a network coordinator.
- the network coordinator may be configured to oversee and manage various network operations. For example, the network coordinator may implement the forming of the network, allocate network addresses to entities of the network, and maintain a binding table for the network.
- the communications network of the monitoring system may be any type of network (e.g., mesh network, hybrid mesh network, star network, hybrid star network, any other type of network, or combination thereof), in some example embodiments, the network may be configured to perform aspects similar to a mesh network.
- the monitoring system 60 may be made up of a plurality of communication devices (e.g., such as a plurality of configurable monitoring devices) in communication with each other via device-to-device communication to form, for example, a mesh network.
- the network may include a plurality of devices that transmit signals to and receive signals from a base site or access point, which could be, for example a base site or access point of a data network, such as a local area network (LAN), a metropolitan area network (MAN), and/or a wide area network (WAN), such as the Internet.
- a base site or access point of a data network, such as a local area network (LAN), a metropolitan area network (MAN), and/or a wide area network (WAN), such as the Internet.
- LAN local area network
- MAN metropolitan area network
- WAN wide area network
- FIG. 1 b depicts another example network configuration in accordance with some example embodiments, where the nodes 66 are connected in a star or cluster fashion to the gateway node.
- FIG. 1 c provides another illustration of an example monitoring system with a communications network.
- the PAN coordinator gateway with network management functionality
- the powered routers communications nodes
- the gate alarm gate node
- the pings pings nodes
- the tags and the manager's key
- the PAN coordinator gateway with network management functionality
- the powered routers communications nodes
- the gate alarm gate node
- pings pings nodes
- tags and the manager's key
- the manager's key may each include a configurable monitoring device configured for a particular role.
- processing elements or devices may be coupled to a configurable monitoring device to access the monitoring system 60 .
- POS point of sale terminals and/or the like
- Other devices such as processing elements or devices (e.g., personal computers, server computers, displays, point of sale (POS) terminals and/or the like) may be coupled to a configurable monitoring device to access the monitoring system 60 .
- the configurable monitoring devices may be enabled to receive configuration modifications dynamically and perform various functions or tasks in connection with network devices or other configurable monitoring devices based on the current configuration of the configurable monitoring devices.
- the configurable monitoring devices, and the monitoring system 60 may utilize any wireless communication technique for communicating information between the devices or to the monitoring terminal 62 .
- the configurable monitoring devices may be configured to support communications protocols built on the IEEE 802.15.4 standard, such as Zigbee or a proprietary wireless protocol.
- the communications within the monitoring system 60 may be performed based on a Route Under MAC (Media Access Control) (RUM) protocol or a modified RUM protocol.
- REM Route Under MAC
- RUM Remote MultiMedia Access Control
- communications within the monitoring system may be associated with a network identifier, such as a personal area network (PAN) identifier.
- PAN personal area network
- configurable monitoring devices might not be permitted to communicate within the monitoring system without having a matching network identifier.
- the monitoring system may regularly or irregularly change the network identifier and transition to a new network identifier for security purposes.
- a system-wide synchronized clock may be implemented. Synchronization of the clock may be maintained via a clock signal.
- Configurable monitoring devices may include real time clock circuitry to support the synchronized clock and to regulate the use of precise communications windows.
- the configurable monitoring devices may also support RFID communications, such as communications based on Generation II Ultra High Frequency (UHF) RFID standards.
- a configurable monitoring device includes a radio (e.g., an IEEE 802.15.4 radio) and an RFID module
- the configurable monitoring device may be configured to operate as an interface that allows RFID devices to access the monitoring system 60 .
- an RFID reader or other RFID device that does not include a configurable monitoring device, may communicate with a configurable monitoring device, such as a tag, and the configurable monitoring device may relay such communications to entities connected to the monitoring system.
- the tag may relay communications originating on the monitoring system to an RFID device that has interfaced with a tag.
- the configurable monitoring devices may operate as gateway to the monitoring system for RFID communications.
- the monitoring system 60 may be configured to operate as a mesh network, hybrid mesh network, star network, hybrid star network, cluster tree network, any other type of network, or any combination thereof.
- the monitoring system 60 may support message hopping and network self-healing.
- the nodes 66 may be configured to receive communications from nearby or assigned tags 68 .
- the nodes 66 may be configured to determine a system architecture and/or efficient pathways for communicating messages to the various entities within the network.
- the nodes 66 may be configured to generate and maintain routing tables to facilitate the efficient communication of information within the network.
- tag 68 h may be configured to communicate that the product that tag 68 h is affixed to has been moved or is being moved from its display location.
- Tag 68 h may be configured to communicate this information to tags 68 g and 68 d , because the products affixed to tags 68 g and 68 d are related products that a customer may be interested in purchasing, given tag 68 h 's determination that the customer may have decided to purchase the product affixed to tag 68 h .
- tag 68 h may generate and transmit a message addressed to tags 68 g and 68 d .
- the message may be received by node 66 c , and node 66 c may be configured to determine how to route the message, given current network traffic, such that the message is efficiently received by tags 68 g and 68 d . For example, using generated routing tables, node 66 c may determine that the message can first be transmitted directly to tag 68 g , since tag 68 g is connected to or in direct communication with the node 66 c . To transmit the message to tag 68 d , node 66 c may determine that the message should be forwarded to node 66 b . Node 66 b may perform a similar analysis and determine that the message can be forward to tag 68 d , directly from node 66 b . Tag 68 h may also be configured to transmit the message to the monitoring terminal 62 . Node 66 c may route the message accordingly, such that the gateway 64 may forward the message to the monitoring terminal 62 .
- the nodes 66 may be configured to perform communications routing within the monitoring system 60 .
- nodes 66 may operate to extend the range of the monitoring system.
- all configurable monitoring devices within the monitoring system 60 may be configured to perform routing functionality.
- configurable monitoring devices configured to operate both as tags and as nodes may communicate directly with each other, if within range, without having to route the communications through another node.
- the monitoring system 60 may be configured to support self-healing.
- messages may be automatically routed via a path that does not involve the failed node.
- a tag may be connected (via, e.g., a wireless connection) to more than one node.
- the tag may simply cause messages to be routed through another node to which the tag is connected.
- a tag may be triggered, directed, or otherwise configured to implement node functionality (e.g., stored in the memory of the tag and implemented by a processor of the tag). The tag may therefore become a node to support communications of other tags.
- configurable monitoring devices that are installed and configured with the intention that the devices be primarily utilized as nodes may be powered through a building's wired power system or be mains powered (in contrast to being only battery powered). Since nodes may be involved in the frequent transmission of communications, power utilization of a node may be relatively high. As such, since configurable monitoring devices configured to operate primarily as tags would likely be battery powered for mobility purposes, an example embodiment that implements node functionality within a tag may be a temporary solution to maintain network continuity while the failed node is repaired.
- the monitoring system 60 may be configured to compensate for interference and multi-path conditions that can arise in enclosed environments, such as retail stores, individually or collectively (such as, e.g., retail mall). To do so, the monitoring system 60 may be configured, for example by the monitoring terminal 62 , to modify the signal power of select nodes and tags to minimize interference. Other examples signal power instructions and adjustments are discussed below. According to some example embodiments, directional antennas may also be used by configurable monitoring devices to minimize interference.
- the monitoring system 60 may be configured to interface with any number of other types of networks and/or systems.
- the monitoring system 60 may interface with EAS systems, RFID systems, closed circuit television systems, inventory systems, security systems, sales systems, shipping systems, point of sale terminals, advertising systems, marketing compliance systems, ordering systems, restocking systems, virtual deactivation systems, Lojack® systems, and the like.
- the monitoring terminal 62 may be configured to coordinate operations of the monitoring system 60 , as well as, retrieve, aggregate, and analyze data provided by the configurable monitoring devices of the system.
- the nodes may be configured to provide a wireless signal that may be received by tags that are within range.
- the range of a node or the power level, used to generate the wireless signal provided by the node may be set based on the size of the area that the node is responsible for. For example, if the node is associated with a small floor display, the signal power may be relatively low. On the other hand, if a node is responsible for a large shelf unit, the signal power may be set to a higher level to ensure coverage of the entire shelf unit.
- Tags may be configured to receive a signal that is provided by a node and respond to the node indicating that the tag is now associated with the node, for example, because the tag is located on the floor display associated with the node.
- a tag may be configured to periodically or pseudo-randomly power up (e.g., based on a wake-up timer or other trigger event), listen for a node signal (e.g., a ping node can be configured to broadcast a ping signal), perform a time synchronization based on the node's signal, and transmit a message to a network entity indicating which node the tag has received a signal from (based on, e.g., determining a node identifier embedded in the node's signal). Subsequently, a tag may perform a second clock synchronization with the node or other network entity and then power down into a sleep mode for another period of time or until another triggering event.
- the tag may receive and determine a unique identifier and/or other data associated with the node.
- the tag may store the identifier and/or other data in its local storage device(s). As such, the tag would know to which node the tag has been associated.
- the tag and the node can establish and execute a uni-directional communication protocol.
- the uni-direction communication protocol can allow, for example, the ping node to wirelessly broadcast data (as, e.g., a ping signal), which the tag can receive.
- the data can include, e.g., the ping node's identifier and/or other data.
- the ping node can be configured to only send data to the tag (e.g., lack the components or functionality necessary to receive or respond to data from the tag).
- the ping node can receive data from a network entity (via, e.g., BlueTooth or WiFi), even though the ping node lacks the ability to receive data from a tag or other monitoring device (via, e.g., another wireless protocol).
- the tag may be configured to respond to (e.g., confirm receipt for) all ping node signals it receives, even if the node may not act on the tag's response.
- the uni-directional communication protocol lacks the tag transmitting data intended for the ping node.
- the tag can also establish and execute a bi-directional communication protocol with the ping node and/or any other the network entity.
- the bi-directional communication protocol can allow for two way communications, including sending and receiving of signals between each device participating in the communication protocol.
- the node may receive communication signals from the tag including a unique identifier of the tag, and the node may therefore know to which tag(s) the node is associated.
- the node may also be configured to report the node/tag associations back to a monitoring terminal, monitoring system coordinator, and/or other network entity. Via these and other types of defined tag/node relationships, various functionalities, as mentioned above and otherwise herein, may be implemented.
- a tag may include a jiggle switch and/or other motion detection component, the actuation of which may indicate that a tag is being moved.
- the tag may determine a trigger event has occurred and, in response, may move from a sleep state into an awake state.
- the tag may perform one or more clock synchronizations with a node and determine the identifier of the node to which the tag is currently connected.
- the tag may also transmit a message indicating the identifier of the node to which the tag is currently connected (possibly a new node since movement may have occurred).
- the tag may generate location information, representing the fact that the tag is out of range of any node, and access its functionality profile (which may be saved on the tag and/or on a network entity).
- the functionality profile can include an alarm instruction, which causes the tag to alarm, should the tag determine it is out of range of any node.
- a tag that has detected a node may engage a movement wait timer to facilitate determining whether further movement of the tag is occurring. In the event that further movement is detected during the movement wait time, the tag may attempt to detect a node and again perform a time synchronization.
- FIG. 1 d illustrates a flow chart of the operation of an example tag consistent with that described above.
- FIG. 2 illustrates basic block diagram of a monitoring terminal 62 according to an exemplary embodiment.
- the monitoring terminal 62 may include various components that support both the basic operation of the monitoring terminal 62 and the relatively more sophisticated operation of the monitoring terminal 62 as a coordinator of a monitoring system. Some examples of these components are shown in FIG. 2 . However, it should be appreciated that some example embodiments may include either more or less than the example components illustrated in FIG. 2 . Thus, the example embodiment of FIG. 2 is provided by way of example and not by way of limitation.
- the monitoring terminal 62 may include a processor 250 and a communication interface 252 .
- the monitoring terminal 62 may include a user interface 258 .
- the processor 250 may in turn communicate with, control or embody (e.g., via operation in accordance with corresponding instructions) a monitoring system manager 256 .
- the processor 250 may be configured to, for example, execute stored instructions (in a, e.g., functionality profile) and/or operate in accordance with programmed instructions to control the operation of the monitoring terminal 62 .
- the processor 250 may be embodied in a number of different ways.
- the processor 250 may be embodied as one or more of various processing means or devices such as a coprocessor, a microprocessor, a controller, a digital signal processor (DSP), a processing element with or without an accompanying DSP, or various other processing devices including integrated circuits such as, for example, an ASIC (application specific integrated circuit), an FPGA (field programmable gate array), a microcontroller unit (MCU), a hardware accelerator, a special-purpose computer chip, or the like.
- the processor 250 may be configured to execute instructions stored in a memory device (e.g., memory device 254 of FIG. 2 ) or otherwise accessible to the processor 250 .
- the instructions may be permanent (e.g., firmware) or modifiable (e.g., software) instructions and be organized in any manner (such as one or more functionality profiles).
- the processor 250 may be configured to execute hard coded functionality.
- the processor 250 may represent an entity (e.g., physically embodied in circuitry) capable of performing operations according to embodiments of the present invention while configured accordingly.
- the processor 250 may be specifically configured hardware for conducting the operations described herein.
- the instructions may specifically configure the processor 250 to perform the algorithms and/or operations described herein when the instructions are executed.
- the processor 250 may include, among other things, a clock, an arithmetic logic unit (ALU) and logic gates configured to support operation of the processor 250 .
- ALU arithmetic logic unit
- the memory device 254 may include, for example, one or more volatile and/or non-volatile memories.
- the memory device 254 may be an electronic storage device (e.g., a computer-readable storage medium) comprising gates (e.g., logic gates) configured to store data (e.g., bits) that may be retrievable by a machine (e.g., a computing device including a processor such as processor 250 ).
- the memory device 254 may be configured to store information, data, applications, instructions or the like for enabling the monitoring terminal 62 to carry out various functions in accordance with exemplary embodiments of the present invention.
- the memory device 254 could be configured to buffer input data for processing by the processor 250 .
- the memory device 254 could be configured to store instructions for execution by the processor 250 .
- the user interface 258 may be in communication with the processor 250 to receive user input via the user interface 258 and/or to present output to a user as, for example, audible, visual, mechanical or other output indications.
- the user interface 258 may include, for example, a keyboard, a mouse, a joystick, a display (e.g., a touch screen display), a microphone, a speaker, or other input/output mechanisms.
- the processor 250 may comprise, or be in communication with, user interface circuitry configured to control at least some functions of one or more elements of the user interface.
- the processor 250 and/or user interface circuitry may be configured to control one or more functions of one or more elements of the user interface through computer program instructions (e.g., software and/or firmware) stored on a memory accessible to the processor 250 (e.g., volatile memory, non-volatile memory, and/or the like).
- the user interface circuitry is configured to facilitate user control of at least some functions of the monitoring terminal 62 through the use of a display configured to respond to user inputs.
- the processor 250 may also comprise, or be in communication with, display circuitry configured to display at least a portion of a user interface, the display and the display circuitry configured to facilitate user control of at least some functions of the monitoring terminal 258 .
- the communication interface 252 may be any means such as a device or circuitry embodied in either hardware, software, or a combination of hardware and software that is configured to receive and/or transmit data from/to a network and/or any other device or module in communication with the monitoring terminal 62 .
- the communications interface 252 may include an appropriately configured configurable monitoring device.
- the communication interface 252 may include, for example, an antenna (or multiple antennas) and supporting hardware and/or software for enabling communications with a wireless communication network 30 or other devices (e.g., other configurable monitoring devices).
- the communication interface 252 may alternatively or additionally support wired communication.
- the communication interface 252 may include a communication modem and/or other hardware/software for supporting communication via cable, digital subscriber line (DSL), universal serial bus (USB) or other mechanisms.
- the communication interface 252 may support communication via one or more different communication protocols or methods.
- the communication interface 252 may be configured to support relatively low power, low data rate communication.
- a low power and short range communication radio e.g., radio transmitter/receiver
- the radio transmitter/receiver may include a transmitter and corresponding receiver configured to support radio frequency (RF) communication in accordance with an IEEE (Institute of Electrical and Electronics Engineers) communication standard such as IEEE 802.15.
- RF radio frequency
- some embodiments may employ Bluetooth, Wibree, ultra-wideband (UWB), WirelessHART, MiWi or other communication standards employing relatively short range wireless communication in a network such as a wireless personal area network (WPAN).
- IEEE 802.15.4 based communication techniques such as ZigBee or other low power, short range communication protocols such as a proprietary technique based on IEEE 802.15.4 may be employed.
- the communication interface 252 may additionally or alternatively be configured to support communication via radio frequency identification (RFID) or other short range communication techniques.
- RFID radio frequency identification
- the monitoring terminal 62 may be configured to interface configurable monitoring devices, in addition to conventional RFID tags and modules.
- the monitoring terminal 62 may be configured to interface a barcode scanner, or other data entry devices.
- monitoring terminal 62 may be directly connected to the monitoring system via a configurable monitoring device configured as a gateway, or the monitoring terminal 62 may be connected to the monitoring system 60 via a gateway and an external network 30 .
- the network 30 to which the communication interface 252 may connect may be a local network (e.g., a WPAN) that may in some cases further connect to or otherwise communicate with a remote network on either a periodic or continuous basis.
- the network 30 may include a collection of various different nodes, devices or functions that may be in communication with each other via corresponding wired and/or wireless interfaces.
- the processor 250 of the monitoring terminal 62 may be embodied as, include or otherwise control the monitoring system manager 256 .
- the monitoring system manager 256 may be any means such as a device or circuitry operating in accordance with firmware/software or otherwise embodied in hardware or a combination of hardware and firmware/software (e.g., processor 250 operating under software control, the processor 250 embodied as an ASIC or FPGA specifically configured to perform the operations described herein, or a combination thereof) thereby configuring the device or circuitry to perform the corresponding functions of the monitoring system manager 256 , as described herein.
- a device or circuitry e.g., the processor 250 in one example
- executing the software forms the structure associated with such means.
- the monitoring system manager 256 of the monitoring terminal may be configured to coordinate, manage, and configure the operation of configurable monitoring devices.
- the monitoring system manager 256 may be configured to perform a number of activities with regard to a monitoring system as further described below and otherwise herein. While the monitoring system manager 256 may be configured to perform all of the functionality described with respect to the monitoring system manager 256 herein, it is also contemplated that the monitoring system manager 256 could be configured to perform any sub-set of the described functionality.
- the monitoring system manager 256 may be configured to define, assign, and manage the role configuration of the configurable monitoring devices. To do so, the monitoring system manager 256 may generate configuration information that indicates the role or mode of operation for a target configurable monitoring device and transmits the configuration information to the configurable monitoring device for storage on the device. Configurable monitoring devices may each be assigned a unique identifier that may be used for communication message addressing. As such, configuration information may be generated by the monitoring system manager 256 and addressed to a target configurable monitoring device to configure the configurable monitoring device for a particular role.
- the configuration information may include role policy information that indicates the functionality that the configurable monitoring device should perform within the device's assigned role, and attribute information, such as associated product attributes.
- Attribute information may be data that a configurable monitoring device may utilize within the role to perform functionality. For example, if a product that the configurable monitoring device is attached to is clothing, the attribute information may include a clothing classification (e.g., shirt, pants, tie, dress, etc.), a color or colors indicator, a size indicator, a price indicator, a lot indicator, and/or the like.
- the functionality performed by a configurable monitoring device may be determined. For example, configurable monitoring devices configured with the same role policy information, may trigger different types of alarm responses based on the price of the product.
- attribute information may be stored in a central location, rather than at the configurable monitoring device, and the configurable monitoring devices may access this information remotely via the network of the monitoring system as needed.
- the configuration information may include executable code that is, possibly decompressed, and stored on the configurable monitoring device for subsequent execution by the configurable monitoring device.
- a configurable monitoring device may be manufactured with executable code in the form of configuration information stored within the memory of the device.
- a hardware device such as a memory device or preconfigured processing device with pre-stored configuration information may be inserted into and/or electrically connected to the configurable monitoring device to provide configuration information and assign a role to the configurable monitoring device.
- the pre-stored configuration information may be directed to a number of possible roles that the configurable monitoring device could be configured to perform.
- the monitoring system manager 256 may provide a message including a data indicator of which role the configurable monitoring device is to perform.
- the configurable monitoring device may receive the indicator and begin performing (e.g., transition into) the role described by the indicator by executing the appropriate portion of the pre-stored configuration information.
- a configurable monitoring device Once a configurable monitoring device is assigned a role via the configuration information, the device may begin operating within its respective role.
- Roles or configurations may be simple or complex based on, for example, the processing capabilities and the memory storage available to a configurable monitoring device.
- a configurable monitoring device may be configured to perform minimal data processing, and a monitoring terminal may be configured to perform incrementally more processing of data.
- some configurable monitoring devices may include relatively higher processing power and larger memory storage to support increased data processing at the configurable monitoring device, rather than at the monitoring terminal.
- attribute information describing the article to which a configurable monitoring device is attached may be stored at the monitoring terminal.
- a inquiry device e.g., price scanner, inventory scanner
- the tag may communicate the request to the monitoring terminal, and the monitoring terminal may provide the attribute information to the inquiry device, either though the monitoring device or through a connection external to the monitoring device.
- attribute information describing the article to which a configurable monitoring device is affixed may be stored, e.g., local to the tag, within the storage memory of the tag.
- an inquiry device e.g., price scanner, inventory scanner
- the tag may directly communicate, or initiate the communication of, the attribute information from the tag to the inquiry device.
- a configurable monitoring device may include a processor and a memory.
- the processor may be configured to support network communications.
- the processor may be configured, for example, via instructions stored on the memory (e.g., instructions derived from configuration information), to support communications in accordance with a role defined by configuration information.
- the processor of the configurable monitoring device may include input/output (I/O) ports (or pins).
- the I/O ports may be configured to interface with any number of external devices such as, electronic security devices, merchandising displays, tags on equipment, employee identification cards, alarms, speakers, microphones, lights (e.g., light emitting diodes (LEDs)), buttons, keypads, monitors, displays (e.g., for changeable pricing labels), sensors (e.g., accelerometers, movement sensors, light sensors, temperature sensors), cameras, security gates, store audio systems, customer counters, lighting switches, employee communicators (e.g., headsets, handheld radios), door strike mats, jewelry case mats, Lojack® devices, global positioning system (GPS) devices, and the like.
- the I/O ports may be configured to support one or more roles that the configurable monitoring device may be configured to perform.
- the I/O ports of a configurable monitoring device may interface with a display for a price tag, when the configurable monitoring device is configured as a tag.
- the price depicted on the display may be set to reduce at a given time.
- the time may monitored by the processor of the tag and when the given time is reached, the processor may direct the I/O ports and the connected display to depict a reduced price.
- an example that includes triggering at the monitoring terminal level may include the time being monitored by the monitoring terminal, and the monitoring terminal may communicate a message including a reduced price, or an indication to reduce the price, to the tag at the given time to trigger the tag to reduce the price accordingly.
- the I/O ports may interface with a camera, and the configurable monitoring device may be configured to control the movement of the camera, detect events, and capture still camera pictures for forwarding to store personnel or the authorities, and the like.
- FIG. 3 which illustrates an example of a given space, namely retail environment 100 , is referred to in order to describe some of the roles that may be implemented by the configurable monitoring devices within an exemplary monitoring system.
- FIG. 3 illustrates a diagram of various configurable monitoring devices configured to define a monitoring system.
- FIG. 3 depicts an exemplary retail environment 100 including a stock room 110 where excess inventory is maintained, an office space 120 from which monitoring activity may be coordinated or otherwise viewed (e.g., via a monitoring terminal 62 ), fitting rooms 130 in which articles of clothing may be tried on by potential buyers, a retail floor 140 on which various products may be displayed or otherwise made available for buyers to purchase and restrooms 150 .
- FIG. 3 also depicts a point of sale (POS) terminal 160 at which payment may be made for products and a door 170 through which customers may enter and exit the retail floor 140 .
- POS point of sale
- various different products may each be provided with a corresponding configurable monitoring device operating as a tag.
- several other configurable monitoring devices may be provided at various locations throughout the retail environment to operate, for example, as nodes.
- the location of a node within the retail environment may be known (e.g., coordinates of the nodes may be known) to, for example, the monitoring terminal 62 and the monitoring system manager 256 to facilitate implementation of a real-time location system (RTLS) for the tags via the nodes.
- RTLS real-time location system
- FIG. 3 Several configurable monitoring devices operating in a tag mode are illustrated in FIG. 3 as circles with the letter “T” therein. Some other configurable monitoring devices may be configured during commissioning to operate in a node mode.
- FIG. 3 Examples of configurable monitoring devices operating in node mode are shown in FIG. 3 as circles with the letter “N” therein.
- An example of a configurable monitoring device operating in a gateway mode is shown in FIG. 3 as a circle with the letter “G” therein.
- the circles with the letter “C” may be configurable monitoring devices configured to operate with customer counting devices (e.g., strike pads, and the like).
- the circles with the letter “D” may be configurable monitoring devices configured to operate with door opening monitoring devices configured to determine and report a number of times customers open, for example a freezer door in grocery frozen food section.
- the circle with the letter “P” may be configurable monitoring devices configured to operate with a camera to capture digital photographs when an event, such as the alarming of a tag has occurred.
- the configurable monitoring device interfacing with the camera may be configured to control the movement of the camera and forward video or pictures. Still others (or a single configurable monitoring device) may be configured to operate as gates or in a hub or gateway mode. While configurable monitoring devices may be configured as tags, nodes, gateways, etc., each of these roles may be further refined, for example via configuration information, to specialize the functionality of a configurable monitoring device within a particular role (such as, e.g., a ping node within the broader node role).
- a specific network identifier e.g., PAN ID
- PAN ID e.g., PAN ID
- low transmission power association and dissociation may be implemented using close proximity signaling.
- switches e.g., DIP (dual in-line package) switches
- jumpers e.g., DIP (dual in-line package) switches
- MAC address filtering e.g., MAC address filtering
- button actuated association/dissociation e.g., button actuated association/dissociation
- separate communications link associating/dissociating e.g., a barcode scanners
- a configurable monitoring device configured to operate as a tag may perform functionalities supporting security functions, inventory functions, marketing functions, combinations thereof, and the like.
- a commissioning or binding procedure may be performed prior to commissioning.
- a configurable monitoring device may be configured as a tag, but the device may not yet be associated with, or attached to, a product.
- the tag may be commissioned.
- the monitoring terminal 62 and the monitoring system manager 256 may manage the commissioning and decommissioning of tags via wireless communications with the tags.
- the procedure for commissioning and decommissioning a tag may include RFID scanning the tag, a barcode scanning the tag, and/or hardware (e.g., specialized microchip) attachment or connection.
- the monitoring system manager 256 may provide a signal to the tag indicating that the tag is now active with respect to its configured role.
- alarming, inventory, and marketing functionality may be downloaded and/or activated.
- a functionality profile including various electronic instructions, may be downloaded and/or activated. While commissioned, the tag may continue to receive instructions or other information useful for making determinations as to the functionality to be employed and the corresponding role/mode of operation to assume.
- Decommissioning of the tag may include powering down the tag, clearing or resetting data (e.g., product-specific and/or functional data), and/or directing the tag to enter an idle or non-transmitting mode in order to conserve battery power until the tag is re-commissioned.
- the tag may be decommissioned by instructions and/or signals received from the monitoring terminal 62 and the monitoring system manager 256 .
- Decommissioning may occur at a point of sale, such as POS 160 .
- a node associated with the point of sale (POS node) may be configured, via configuration information, to perform decommissioning functionality.
- the POS node may be configured to decommission the tag when the product is entered into a sales transaction.
- the monitoring system manager 256 may be configured to interface with a sales database or sale system to monitor transactions. Upon detecting a transaction, data about the product involved in the transaction may be acquired, and, based on the acquired data, a decommission signal may be transmitted to the affected tag.
- direct access to a sales database or sales system may not be available due to concerns regarding the confidentiality of sales and customer information. In these situations, example embodiments of the present invention may implement a barcode scanning wedge as an interface to the transaction activities without accessing the sales database or sales system.
- a battery check may be performed by a tag during decommissioning.
- the configurable monitoring device may include the hardware and software (e.g., processor configured by instructions) to provide for monitoring the battery charge level. If the battery charge level for a tag has fallen below a given threshold, the tag may alarm or otherwise indicate to the store personnel that the tag should be removed from service for recharging or battery replacement. Tags that have battery levels above the given threshold may be decommissioned and identified as being available for re-commissioning. According to some example embodiments, a tag having a battery level that has fallen below a given threshold may be prevented from being re-commissioned until the battery charge level is sufficiently improved. This would also desirably limit the need for a store clerk to retrieve low battery tags from the field or store environment.
- the barcode scanning wedge may be installed in-line between a barcode scanner and a point of sale checkout terminal for receiving data acquired by the barcode scanner.
- the wedge may be configured to intercept some or all data acquired by the barcode scanner and to provide the data to a monitoring system, for example, via a POS node, without otherwise interrupting the flow of data to the point of sale terminal.
- the wedge may be configured to facilitate the commissioning or decommissioning of a communications tag that is part of a monitoring system. For example, when a cashier scans a barcode of a product during a purchase transaction, data confirming the transaction may be uploaded to the monitoring system and the monitoring system manager 256 via the wedge. Confidential consumer and sales information may not be uploaded to the retail security network in some embodiments.
- the monitoring system manager 256 may be configured to transmit a decommission signal to an associated tag attached to the purchased product to cause the tag to be decommissioned. Decommissioning may be associated with removal of the tag from the product and/or removal or modification of a record or information (e.g., inventory information) for the tag stored by the monitoring system manager 256 , for example, in the memory device 254 .
- a configurable monitoring device may also be configured as a manager's key to be implemented within the monitoring system.
- FIG. 4 a depicts an example block diagram of a key, such as manager's key.
- the key of FIG. 4 a is depicted as using the Zigbee protocol, but any protocol may be used.
- a mounting device that mechanically attaches the configurable monitoring device to a product may be unlockable by the implementation of a key.
- a tag having a mounting device may take the form of a pin tag (for protecting a clothing), a keeper or plastic enclosure (for protecting compact disks, software, cologne, and the like), a Spider WrapTM or wire wrap device (for protecting larger boxed products), or the like.
- One such mounting device may be configured to attach to the shaft of a golf club or similar article such as the device disclosed in U.S. Pat. No. 7,266,979 herein incorporated by reference in its entirety.
- Other such mounting devices may be configured to attach to a bottle neck or a bottle cap such as the devices disclosed in U.S. Pat. Nos. 7,259,674 and 7,007,523, both herein incorporated by reference in their entirety.
- Still other mounting devices may be configured to attach through a product such as an article of clothing or a blister pack such as the hard-tag disclosed in U.S. Pat. No. 6,920,769 incorporated herein by reference in its entirety.
- Alpha Security Products' Spider WrapTM which is disclosed in U.S. Pat. No. 7,162,899 and herein incorporated by reference in its entirety, may also be configured to operate as a mounting device.
- a cable lock such as the Alpha Security Products' CablelokTM device disclosed in U.S. Pat. No. 7,249,401 or a keeper, such as that disclosed in U.S. Pat. No. 6,832,498 may be a mounting device.
- the key may be embodied in many different ways.
- the key may be a specially formed device that mates mechanically with some portion of the mounting device in order to disable a locking mechanism of the mounting device.
- the key may be a magnetic device configured to interface with a locking mechanism of the mounting device to enable the mounting device to be unlocked to permit removal of the mounting device from the corresponding product to which the mounting device is affixed or otherwise attached.
- the key may actually include an electrical component for exchanging signals or information with the tag associated with the mounting device to enable unlocking of the mounting device.
- the key could be an embodiment of a configurable monitoring device that is provided with specific configuration information defining functionality for the configurable monitoring device to function as the key for unlocking the mounting devices of tags.
- the key (or the configuration information associated with the key) may include a software component or code that is unique to a particular individual (e.g., a specific manager or assistant manager).
- the key may also report unlocking activities and/or other information regarding other devices encountered or activities undertaken to monitoring system manager 256 , so that activity of the key (or persons possessing the key) may be monitored, logged, and/or tracked.
- activity of the key or persons possessing the key
- authenticity of the code may be defined or verified so that, for example, if a particular manager's key is lost or a manager leaves, the corresponding code for the manager's key may be invalidated so that further unlocking operations with the manager's key may not be possible.
- the key may be configured to alarm and/or destroy necessary aspects of the key's functionality if the key is, for example, improperly removed from the retail environment. For example, the key may clear the memory of the key, rendering the key useless.
- Utilization of the key for unlocking security devices may be limited by rules stored on the key or at a monitoring terminal.
- rules for using the key may be defined with respect to the location of the key (e.g., inside/outside the store, inside/outside a department zone), the employee using the key (e.g., as indicated by a passcode or detection of a user's RFID tag), a time of day, a day of the week, a work schedule. Use of the key in violation of the rules may cause the key to alarm.
- the key may be useful for setting an alarm or turning an alarm on or off.
- a button on the key may be actuated which indicates that the key is preparing to or is performing a locking or unlocking function.
- An indication that the button has been pressed may be commutated to the tag that is to be interacted with or the monitoring terminal.
- the key may be located and tracked, and zones of use (e.g., the key cannot be used in the stock room 110 ) and other rules may be defined and enforced with respect to the key.
- a configurable monitoring device configured as a tag, whether commissioned or decommissioned, may provide a status signal (or heartbeat signal) to the monitoring system.
- the status signal may be a short transmission of a unique identifier associated with the tag.
- the status signal may also provide other types of indications, such as whether the battery is or is not yet drained and/or whether the tag is otherwise properly functioning.
- the status signal may also be used for real time locationing system (“RTLS”) purposes, some examples of which are further described below.
- the status signal may be received by the monitoring system manager 256 .
- the monitoring system manager 256 and/or the tag may maintain a log of the most recent receipt of a status signal from a tag and/or node.
- nodes of the monitoring system may be configured to provide ping signals.
- the tags may be configured to receive a ping signal and communicate information in response to receipt of a ping signal. For example, battery status, alarm status, received signal strength, and the like may be provided in response to a ping signal.
- tags may be configured to operate as or with EAS tags, such that when the tag passes through an EAS gate, the EAS gate may detect the tag (or a connected EAS tag), and possibly sound an alarm.
- the monitoring terminal 62 may have received a communication regarding the alarm condition.
- configurable monitoring devices may be configured to operate as tags to be detected, or as gate nodes for detecting tags.
- the configurable monitoring device may assume the role of a gate node, such as gate nodes 180 located at the doorway 170 .
- the gate nodes may be configured to detect passing EAS tags, such as a conventional EAS tag or a configurable monitoring device configured to operate as an EAS tag, and sound an alarm (e.g., an alarm included on the tag, an alarm included with the gate node, a storewide alarm).
- a gate node may directly sound a local alarm, or the gate node may communicate with the monitoring system manager 256 to sound an alarm.
- any configurable monitoring device may be configured to operate as a gate node.
- EAS gates may be implemented dynamically at many locations within a retail environment.
- configurable monitoring devices that have been configured to operate as tags and are affixed to a product on a shelf within the retail environment may also be re-configured to operate as a gate node for the aisle where the products are located.
- a monitoring system may be configured to perform additional advanced security functionality. Some advanced security features, as well as a number of other inventory, marketing, and other features may rely upon implementation of an RTLS within a monitoring system.
- configurable monitoring devices may be configured as locating nodes.
- the ping signals generated by the nodes may be used for locating a tag.
- a tag may be configured to report to, for example, the monitoring terminal that the tag is currently within the range of a ping signal provided by a particular node.
- the nodes may be configured to randomly, based on an algorithm, modify the ping signal strength. When the signal strength is modified, some tags that were in range may no longer be in range, or some tags that were previously in range may now be within range of the ping signal. As tags come in and out of range, due to the changing signal strength, the signal strength at the time may be used to determine the distance that a tag is from a particular node. In some cases, if the distance is determined with respect to multiple nodes, a physical location of the tag can be determined.
- standard operating power settings (describing standard fluctuations in power discussed below) may be utilized in a standard locating mode.
- an active locate power setting may be utilized in an active locate mode.
- a locating node may be configured to use multilateration, hyperbolic positioning, time difference of arrival (TDOA), trilateration, triangulation, received signal strength indication (RSSI), global positioning systems (GPS), any other locating mechanisms, or combination thereof to support identifying the location of a tag within a retail environment.
- a locating node may operate in isolation to detect the presence, and possibly the strength of a signal to determine when a tag is nearby. Locating nodes may take signal measurements and forward the information to, for example, the monitoring system manager 256 to analyze the signal and determine a location.
- locating nodes may be placed at strategic locations within the retail environment to support accurate locating of tags.
- a signal power optimization procedure may be performed by the monitoring system, for example, directed by the monitoring terminal, to minimize interference and determine optimum signal strength for ping signals.
- the signal strength of the various nodes may be modified to determine settings where minimal interference and node signal overlap occurs.
- FIG. 5 a illustrates an example retail environment 500 , where a monitoring system has been installed and implemented, such as the monitoring system described in U.S. Provisional Patent Application 61/244,320, filed Sep. 21, 2009, the content of which was incorporated by reference in its entirety above, and U.S. Provisional Patent Application No. 61/246,393, filed Sep. 28, 2009, the content of which was also incorporated by reference in its entirety above.
- the monitoring system may include tags, ping nodes, communication routing nodes, and a network coordinator and gateway node.
- the tags and nodes of the monitoring system may be configurable monitoring devices, such as those described in U.S. Provisional Patent Application 61/244,320 filed Sep. 21, 2009, the content of which is hereby incorporated by reference in its entirety, and U.S. Provisional Patent Application No. 61/246,388, filed Sep. 28, 2009, the content of which is also incorporated by reference in its entirety.
- the monitoring system may also include a monitoring terminal (not depicted in FIG. 5 a ) that provides a user interface to the monitoring system and provides control over the operations of the monitoring system.
- the monitoring terminal may be connected directly to the monitoring system as a peer, or the monitoring terminal may be connected to the monitoring system via another network, such as the Internet.
- the monitoring terminal may include a server that is configured to control the monitoring system on-site, where the monitoring system is installed.
- a user may interface with the monitoring system by establishing a connection between a remote device (e.g., a personal computer) and the server.
- the server may be configured to perform predefined operations, and log information received from the tags and nodes.
- the server may be connected to a gateway or coordinator node, and the server may communicate with tags and nodes via the gateway or coordinator node.
- the retail environment 500 houses a number of ping nodes (e.g., ping nodes 510 , 520 , 530 , 540 , 550 , 560 , and 570 ) and tags (e.g., tags 590 and 591 ).
- the ping nodes may be configured to provide ping signals at regular (or irregular) intervals.
- the ping signals may include information regarding the ping node that has transmitted the signal.
- a ping signal may provide a unique identifier of the ping node that is providing the signal.
- the ping signal may also include timing or time code information.
- the ping signal is considered location information.
- the corresponding ping signals when a tag's location can be determined based upon it's position relative to one or more stationary ping nodes, the corresponding ping signals, which have a unique identifier that identifies the broadcasting ping node, can be considered to include location information.
- the tag may log the location and other information it extracts from the ping signal and/or report (i.e., send, upload, etc.) some or all of the information to a network entity, such as monitoring system manager 256 . After saving and/or reporting the information, the tag can engage its timer and enter a sleep mode (as discussed above), and enter a sleep mode to conserve power while waiting for another triggering event (such as detection of movement or the timer expiring).
- the ping nodes are also configured to receive signals and communications from other entities connected to the monitoring system such as tags, fixed nodes, or the monitoring terminal.
- the ping nodes may listen, possibly periodically, to the fixed nodes.
- communications with the ping nodes may occur directly between a tag and a ping node, or tags and ping nodes may communicate via the fixed nodes.
- a fixed node may be a node that support network communications and may be stationary relative to a given space, which may or may not be moving.
- the given space could be the cabin of an elevator, airplane or cruise ship.
- the location of the fixed nodes may be known, and as such, the fixed nodes may be used as reference locations for identifying the locations of the ping nodes or tags as described in further detail below.
- FIG. 5 b depicts another representation of the retail environment 100 which includes fixed nodes 515 , 525 , and 535 .
- the fixed nodes may be a node that support network communications and may be stationary. In some example embodiments, the fixed nodes may be mains powered.
- the fixed nodes may be configured to support communications between tags and the monitoring system, or nodes and the monitoring system.
- the fixed nodes may also be configured to support locationing within a monitoring system with respect to the ping nodes.
- the fixed nodes 515 , 525 , and 535 may be configured to listen for ping signals or other communications from the ping nodes and determine the position of the ping nodes. While ping node may be relatively stationary, according to some example embodiments, ping nodes may be positioned on movable shelving or displays. As such, when ping nodes are moved or when new ping nodes are introduced to the environment, the monitoring system may need to determine the location of the ping nodes. With the assistance of the fixed nodes, the locations of the ping nodes may be determined using various techniques including but not limited to received signal strength indication (RSSI) techniques, angle of arrival techniques, time of arrival and time difference of arrival techniques, and the like. Since the locations of the fixed nodes are known, the locations of the fixed nodes may be used as reference points for determining the locations of the fixed nodes.
- RSSI received signal strength indication
- a signaling and communications period 600 for a ping node may include a first portion 610 dedicated to transmitting repeated ping signals 620 , and a second portion 630 dedicated to support network communications.
- a ping node may be configured to repeat the signaling and communications period 600 indefinitely, or until an instruction is received by the ping node that causes the ping node to change its operation.
- Tags such as tags 590 and 591 , may be configured to determine and store the identifier of the closest ping node.
- the tags may also be configured to report the identity of the closest ping node to the monitoring terminal.
- a tag may enter a “seek closest ping node” state (i.e., seek_closest state), where the tag is configured to identify the ping node that is closest to the tag.
- seek_closest state When a tag receives only one ping signal, the tag may determine that the ping node providing the only received ping signal is the closest ping node.
- a locating procedure according to various example embodiments of the present invention may be triggered.
- ping nodes may be placed within the given space, such as a retail environment, in a manner that provides sufficient ping signal coverage to the environment.
- a ping signal may have an associated signal strength, and the strength of the signal may determine the range of the ping signal.
- the strength of a ping signal may fade as the distance between the ping node and the measurement point is increased.
- the range of a ping node may be defined by a distance from the ping node where the signal strength is at a range threshold. Signals below the range threshold may still be received by tags, but the tags may be configured to ignore signals having signal strengths below the range threshold.
- the range threshold may define a circle (or sphere) with the ping node at the center of the circle.
- ping nodes may be set to have as large of a range as possible, while also minimizing overlap.
- ping nodes may be associated with a given space comprising or consisting of at least a portion of a particular display shelving unit or rack.
- the ping node may be configured to define a range that merely encompasses the display, shelving unit, or rack, so as not to associate tags with the ping node that are not placed on the display, shelving node, or rack.
- pings nodes may be configured to ensure coverage of some or all areas of the sales floor, or configured for a specific purpose to provide coverage of, for example, a particular display.
- a ping node signal strength optimization procedure may be undertaken by the monitoring system, possibly controlled by the monitoring terminal.
- the signal strengths of the various ping nodes may be modified to determine optimal settings considering factors such as coverage, desired range for a particular ping, interference, range overlap, reflections, and the like. Based on criteria such as these, an optimal settings for the ping normal operating signal power levels may be determined.
- FIG. 5 a shows the retail environment 500 with the placement of a number of ping nodes and their associated ranges.
- Ping node 510 has been set to provide a ping signal strength such that the range threshold is for ping node 510 is reached at a range 511 .
- Ping node 520 having a range 521 may be a ping node that covers a larger area of the retail environment, such as a departmental area (e.g., the shoe department).
- Ping nodes 570 and 580 having respective ranges 571 and 581 , may also provide coverage to respective departmental areas.
- Ping nodes 530 , 540 , 550 , and 560 may provide coverage to small floor display, where it may be important to be able to determine precisely which floor display a particular tagged product is located on.
- the coverage areas of the ping nodes may overlap.
- a tag may receive a sufficiently strong ping signal from more than one ping node.
- a locating procedure may be employed (when necessary) to determine which ping node is closer to the tag.
- ping signal reflections may also create issues.
- signal reflections within the environments may create situations where ping signals are received by nodes as reflected signals.
- a tag may not be located within an overlap area as defined by the range of the ping nodes, but the tag may still receive signals from multiple ping nodes due to reflections.
- the receipt of reflected signals may occur dynamically, and not in a predicable pattern.
- the movement of customers, store personnel, and other objects can cause dynamically changing signal reflection issues.
- Non-uniform architecture of the shopping floor may also contribute to reflection issues.
- some locating procedures provided herein overcome the issues that arise from ping range overlap, as well as, the issues that can arise from signal reflections.
- tag 590 is located within range of ping node 570 .
- tag 590 receives a ping signal from only the ping node 570 .
- the tag may detect and receive the ping signal associated with ping node 570 and associate the location of tag 590 with ping node 570 .
- the tag 590 may be configured to store the identifier of ping node 570 , as provided in the ping signal, and report the association of the tag 590 with the ping node 570 to the monitoring terminal via the monitoring system.
- tag 591 is located in an overlap region between ping node 510 and ping node 580 .
- Tag 591 receives ping signals, having sufficient signal strength, from both ping node 510 and 580 . Since tag 591 has received ping signals from more than one ping node, a locating procedure may be undertaken to determine which ping node is closer to the tag.
- FIG. 7 illustrates the ping nodes 510 and 580 , and the tag 591 in isolation from the rest of the retail environment 500 of FIG. 5 a , for illustration purposes.
- the tag 591 having transitioned into a seek_closest state may report to the monitoring terminal that the tag 591 is currently receiving ping signals from more than one ping node.
- the tag 591 may be configured to report the identities of the ping nodes to the monitoring terminal.
- the monitoring terminal may generate a signal power modification instruction, and transmit the signal power modification instruction to the identified ping nodes 510 and 580 .
- the affected tag 591 may be configured to generate the signal power modification instruction and transmit the signal power modification instruction to the identified ping nodes 510 and 580 .
- the ping nodes 510 and 580 may be configured to reduce the power output, used to generate of their respective ping signals, to a minimum threshold level.
- the minimum threshold level need not be the absolute minimum value, but can be a relative value that is preprogrammed into at least two nodes configured to implement this type of locationing.
- the minimum threshold level could be 20 mW, 10 W, and/or any other given value.
- ping node 510 may reduce the power output, thereby reducing the ping signal to range 511 a .
- ping node 580 may also reduce its power output to the same value as ping node 510 , and its ping signal will have the same range as ping node 510 , as shown by range 581 a .
- ping nodes 510 and 580 initially (i.e., before the nodes received the signal power modification instructions) transmitted ping signals at different signal strengths resulting in different starting ranges, possibly for coverage reasons.
- the ping nodes in response to receiving the signal power modification instruction, are configured to modify their respective signal strengths to an equal or substantially equal power level, or so their ranges are equal or substantially equal.
- the ping nodes may be configured to begin a process of incrementally increasing the signal strength of the ping signals.
- the ping nodes may be configured to perform periodic step increases in the signal strength, thereby causing a period step increase in signal range.
- the power level can increase such that the corresponding signal range increase some distance (e.g., 2 inches, 2 feet, or any other acceptable distance) every set amount of time (e.g., 0.2 seconds, 2 seconds, 20 seconds, or any other acceptable amount of time).
- the ping nodes may include clocks that are synchronized with each other and/or the broader monitoring system, and the ping nodes may use the synchronized clocks to trigger the incremental changes to the signal strength at regular intervals. Having lost the ping signals from the ping nodes 510 and 580 , due to the reduction of signal strength, the tag 591 may be configured to detect or listen for the first ping signal that is received after the signal power modification instruction is issued, or after the tag 591 reports the reception of multiple ping signals to the monitoring terminal.
- the ping nodes 510 and 580 may increase their respective ping signal strength by an equal or substantially equal amount.
- the ping nodes 510 and 580 may be configured to increase the signal strength to achieve the ranges 511 b and 581 b , respectively.
- the ping nodes 510 and 580 may again increase their respective ping signal strength by an equal or substantially equal amount.
- the ping nodes 510 and 580 may be configured to increase the signal strength to achieve the ranges 511 c and 581 c , respectively.
- the tag 591 may receive the ping signal from ping node 510 , but not from ping node 580 . As a result, the tag 591 may be configured to determine that the tag 591 is closer to ping node 510 . The tag may store the identifier of ping node 510 , and report the tag's association to ping node 510 to the monitoring terminal and/or other network entity.
- the process of incrementing the power may cease.
- the power incrementing may cease in response to an end power modification instruction issued by the tag 591 , the monitoring terminal and/or other network entity, and received by the ping nodes 510 and 580 .
- the ping nodes 510 and 580 may be configured to return to their respective original or normal operating ranges 511 and 581 , respectively.
- a similar example procedure may be undertaken where the signal strength is first increased to a maximum threshold level. Subsequent to increasing the ping signal strength to the maximum level, the signal strength of the involved ping nodes may be reduced periodically by incremental amounts until the node receives a signal from only one ping node. The last ping node that the tag receives a signal from may be identified as the closest ping node to the tag.
- the ping nodes involved in the locate procedure may reduce/raise the signal strength to the current lowest/highest signal strength of the ping nodes involved in the locate procedure. Based on whether the tag receives a signal from a single ping after modifying the signal strengths in this manner, the tag may be configured to determine whether the further procedure of incrementally increasing/decreasing the signal strength of the ping nodes is required. In this manner, according to various example embodiments, the procedure for locating the closest ping node may be expedited.
- a tag in addition to determining which pings nodes that a tag is receiving ping signal from, a tag may be configured to measure the signal strength of the ping signals.
- information about signal strength and distances may be acquire from the data included in a communication in consideration of the modulation that was used to transmit the data, and analysis of the data may reveal information about signal strength and distance information.
- the tag may consider the signal strength of ping signals that the tag is receiving when determining which ping node is closer. For example, signal strengths may fluctuate for a number of reasons (e.g., movement of customers or products within a retail environment).
- the tag may be configured to determine the closest ping node by monitoring the signal strengths over a period of time to, for example, determine an absolute maximum signal strength or determine an average signal strength, and identify the closest ping node based on these values.
- received signal strength indication (RSSI) techniques may be used to assist in identifying a closest ping node.
- an averaging scheme may be utilized in an attempt to normalize or remove incorrect closest ping node determinations.
- a tag may keep a running log and average of signal strength values detected from a particular ping node or a closest ping node. And if signals or communications are received that are determined to be outside of a threshold range from the running average, those deviations in signal strength may be disregarded as being a result of a reflection or other unexplained occurrence. If a given number of signals or communications (e.g., 10) are received that are outside the threshold, a change in the placement of ping nodes may have occurred, and the generation of a new running average may be triggered.
- the log and running average can include the last 10, 100, 1000, or any other suitable number of signals or communication values.
- the number of suitable signal or communication values can be time dependent (e.g., a running average can be made from each signal or communication received over the past hour, 10 hours, day, two days, week, or any other suitable period of time).
- FIG. 9 illustrates an example method of the present invention that may be implemented by a tag or a monitoring terminal.
- the example method begins at 900 , where an indication that a tag is receiving ping signals from multiple ping nodes may be received.
- a tag may receive this indication internal to, for example, the processor of the tag, or the monitoring terminal may receive this indication.
- the identification of each of the ping nodes that the tag is receiving ping signals from may be determined.
- a signal power modification instruction may be generated. The signal power modification instruction may be addressed to the ping nodes identified at 910 .
- the signal power modification instruction may be transmitted to each of the identified ping nodes.
- the identified ping nodes may subsequently perform the operations of a power modification procedure at 940 , for example, as indicated in FIG. 10 .
- an indication of the identified ping node that is closest to the tag may be received at 950 .
- the tag may then be associated with the closest node for location purposes.
- FIG. 10 illustrates an example method of the present invention that may be implemented by a ping node.
- the example method begins at 1000 , where a signal power modification instruction may be received.
- the signal strength may be lowered to a minimum threshold level (or raised to a maximum threshold level).
- the signal strength of the ping signal may be periodically increased (or decreased) by an incremental amount.
- the ping node may return the signal strength to a normal operating level at 1030 .
- FIGS. 11 and 12 illustrate the modification of normal operating levels for ping nodes. It is noteworthy that the ping nodes in FIGS. 11 and 12 are stationary, but the normal operating levels of the ping nodes have changed.
- a monitoring system via a tag, fixed node, or other ping nodes. As described above, the monitoring system may perform an optimization procedure to determine the normal operating levels of the ping nodes. In this regard, the normal operating levels may be optimized based on identified signal reflection issues, area coverage, and the like. According to some example embodiments, the normal operating levels of the various ping nodes may be modified to achieve particular goals with respect to, for example, locating a particular tag or group of tags. By dynamically changing the normal operating levels of the ping nodes, different gradients of coverage density may be generated within a given space or portion thereof.
- FIG. 11 depicts a number of ping nodes on the left side of the space that may be associated with aisles of a department store, which are positioned in a uniform manner with associated ping nodes on the shelving or the like.
- the right side of the environment may be representative of a non-uniform floor space where a number of displays are located close together. Tags located in the right side may be more likely to interact with multiple ping nodes configured as shown in FIG. 11 .
- the normal operating levels of the ping nodes may be modified resulting in a different gradient of coverage density within the environment.
- the normal operating levels of the ping nodes can be modified from those depicted in FIG. 11 .
- the coverage is increased on the right side of the space, resulting in increased overlap in some ping node coverage.
- the left side of the environment coverage has been decreased such that there is little or no interaction between the respective ping signals.
- the right portion of the space, which included substantial overlap in coverage in FIG. 11 now has little or no overlap in coverage.
- a triggering event may occur.
- a triggering event may be, as described above, a detected theft event, an inventory sweep, regular modification of normal operating levels, or the like.
- the ping nodes may be communicated a normal operating level modification message.
- the ping nodes may adjust the normal operating level accordingly.
- FIGS. 9 and 10 illustrate flowcharts of example systems, methods, and/or computer program products according to example embodiments of the invention. It will be understood that each operation of the flowcharts, and/or combinations of operations in the flowcharts, can be implemented by various means. Means for implementing the operations of the flowcharts, combinations of the operations in the flowchart, or other functionality of example embodiments of the present invention described herein may include hardware, and/or a computer program product including a computer-readable storage medium (as opposed to a computer-readable transmission medium which describes a propagating signal) having one or more computer program code instructions, program instructions, or executable computer-readable program code instructions stored therein.
- a computer-readable storage medium as opposed to a computer-readable transmission medium which describes a propagating signal
- program code instructions may be stored on a memory device of an example apparatus (e.g., a tag, a monitoring terminal, a ping node, etc.) and executed by a processor of the apparatus.
- any such program code instructions may be loaded onto a computer or other programmable apparatus from a computer-readable storage medium to produce a particular machine, such that the particular machine becomes a means for implementing the functions specified in the flowcharts' operations.
- These program code instructions may also be stored in a computer-readable storage medium that can direct a computer, a processor, or other programmable apparatus to function in a particular manner to thereby generate a particular machine or particular article of manufacture.
- the instructions stored in the computer-readable storage medium may produce an article of manufacture, where the article of manufacture becomes a means for implementing the functions specified in the flowcharts' operation(s).
- the program code instructions may be retrieved from a computer-readable storage medium and loaded into a computer, processor, or other programmable apparatus to configure the computer, processor, or other programmable apparatus to execute operations to be performed on or by the computer, processor, or other programmable apparatus.
- Retrieval, loading, and execution of the program code instructions may be performed sequentially such that one instruction is retrieved, loaded, and executed at a time.
- retrieval, loading and/or execution may be performed in parallel such that multiple instructions are retrieved, loaded, and/or executed together or simultaneously.
- Execution of the program code instructions may produce a computer-implemented process such that the instructions executed by the computer, processor, or other programmable apparatus provide operations for implementing the functions specified in the flowcharts' operations.
- the execution of instructions associated with the operations of the flowcharts by a processor, or storage of instructions associated with the blocks or operations of the flowcharts in a computer-readable storage medium support combinations of operations for performing the specified functions.
- one or more operations of the flowcharts, and combinations of blocks or operations in the flowcharts may be implemented by special purpose hardware-based computer systems and/or processors which perform the specified functions (e.g., field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), or combinations of special purpose hardware and program code instructions.
- FPGAs field programmable gate arrays
- ASICs application specific integrated circuits
- tags may be configured to provide locating signals (e.g., status signals) that may be received, for example, by configurable monitoring devices configured as locating nodes. Indications of the locating signals may be provided to the monitoring system manager 256 for analysis to determine the location of the tags within the retail environment. Upon determining the location of a tag, the monitoring system manager 256 may be configured to output the location of the tag on a map displayed via the user interface 258 as shown for example in FIG. 13 .
- locating signals e.g., status signals
- Indications of the locating signals may be provided to the monitoring system manager 256 for analysis to determine the location of the tags within the retail environment.
- the monitoring system manager 256 may be configured to output the location of the tag on a map displayed via the user interface 258 as shown for example in FIG. 13 .
- the monitoring system manager 256 may be configured to consider the location information of a tag with respect to defined rules, alarm conditions, and alarm responses.
- zones of interest within a retail environment may be defined, and when the monitoring system manager 256 determines that a tag has entered a zone of interest security functionality, such as an alarm response, may be implemented.
- store personnel may wish to define an alarm condition when products enter the restroom area 150 of FIG. 3 .
- a zone of interest may be defined for the restroom area 150 .
- an alarm signal or message may be generated, and an alarm response may be implemented sounding an alarm.
- the alarm signal or message may be sent to the tag, and an alarm on the tag may be activated.
- a notification may be provided to store personnel, via for example, a mobile communications terminal and/or a remote alarm may be activated.
- zones of interest may be defined with respect a variety of areas within the retail environment (e.g., the stock room, point of sale, fitting room, etc.). Additionally, zone-based functionality profiles can be used by the tags.
- zone-based functionality profiles can be stored and accessed locally within the tag and/or at a network entity, such as monitoring system manager 256 .
- the zone-based functionality profile can include instructions and other commands that are specific to a particular location zone of the given space.
- a location zone of interest may also be associated with additional parameters, such as a time interval or duration, which may be included in the tag's zone-based functionality profile for the location zone.
- a customer for example, may be permitted to bring an article with a tag into the fitting room 130 , but only for a threshold duration of time.
- Store personnel may, for example, wish to set a thirty minute duration for the fitting room.
- the monitoring system manager 256 may be configured to define a duration of time, such as thirty minutes, for a zone of interest.
- the monitoring system manager 256 may be configured to implement a timer based on the threshold duration. The timer may continue to run while the tag is located within the zone of interest and, when the time reaches the threshold, an event signal can be generated.
- the event signal may include an alarm instruction and be based on the zone-based functionality profile.
- the alarm instruction can be executed, causing an alarm signal or alarm message (e.g., an automatically generated e-mail to a user device, etc.) to be generated and transmitted by and/or to the monitoring system manager 256 and/or tag.
- the event signal can include other types of instructions and/or other data may not include or initiate an alarm signal.
- the event signal can comprise data that indicates the tag's, includes tag location information, causes the tag's or other device's light(s) to illuminate, cause another network device (such as a closed circuit video camera) to flag data as relevant, and/or any other type of data that can cause any other type of desired response.
- the event signal can cause the monitoring system manager 256 to determine that the tag has moved out of the zone of interest (such as a fitting room) and, in response, the monitoring system manager 256 and/or the tag may be configured to reset the timer. In this manner, the monitoring system can implement a delay before alarming; thereby giving the customer time to try on an article of clothing before determining that a suspicious event may have occurred or be occurring.
- the zone of interest such as a fitting room
- Locating a tag may also allow for tracking the movement of a tag and the associated product through the store. Tracking the movement of the product may provide inventory, security, and marketing functionality. With respect to security functionality, it has been determined that many experienced shoplifters move about a store in a particular manner. Based on the location information determined for a tag, the movement of a product may be tracked by the monitoring system manager 256 and a movement profile may be generated and compared to suspicious activity movement profiles. If a match is identified, a notification may be provided to a manager, security guard, or the like via a mobile communications terminal to investigate the situation.
- the monitoring system manager 256 may have configured other tags, or may signal (e.g., send alarm instructions to) other tags on nearby devices to alarm when a match is identified to, for example, assist in locating the shoplifter. Adjacent tags could then provide an alarming pattern that “follows” a would-be shoplifter around or through the retail environment.
- the monitoring system manager 256 and/or other network entity may be configured to interface, via a network connection or the like, with customer information terminals 195 to support security functionality.
- Customer information terminals 195 may be computing devices including a display and audio output capabilities (e.g., speaker, speaker driver, etc.).
- a customer information terminal may be located at strategic security locations such as exits and entrances.
- the monitoring system manager 256 may be configured to interface with the customer information terminals 195 , via for example a network connection, to provide output to customers and would-be shoplifters.
- a customer information terminal and a movable video camera may be located at the exit of a retail environment. The moveable video camera may be controlled by the monitoring system manager 256 .
- the movable camera may move to capture the image of the individual carrying the tag (and the associated product).
- the video captured by the camera may be displayed on the customer information terminal to indicate to the shoplifter that they are being recorded and thereby have a deterrent effect.
- the store's background music system may be quieted or muted and/or other noise overcoming strategies may be implemented, in response to the monitoring system 256 determining that a tag has moved into a zone of interest and/or entered an alarm state.
- tags entering a store may be considered.
- the monitoring system manager 256 may be configured to cause the customer information terminal to either visually and/or audibly direct the customer to the customer service desk for product returns.
- configurable monitoring devices may also be configured to operate as gate nodes via the locating functionality described above or based on a determination that a tag is within range of a gate node's ping signal.
- a gate node may detect the proximity of a tag by receiving communications from the tag in response to a ping signal provided by the gate node.
- guard nodes may be implemented. The guard nodes may be located near an exit and may be configured to prevent tags within the store from improperly associating themselves to the gate nodes and causing erroneous alarming.
- a gate node may be connected to mains power, and may include a battery to support operation when mains power is lost.
- the gate node may transmit regular ping signals, which include the gate node's unique identifier, and listen for responses from tags that are within range. If a tag detects that the strongest ping signal that the tag is receiving is from a gate node, the tag may transmit a message including the tag's unique identifier to the gate node and the tag may enter a first alarm mode.
- a tag may maintain a list of identifiers for gate nodes to determine when a signal is being detected from a gate node.
- the tag may be configured to emit an audible chirp every second (or other predetermined time period), providing a deterrent indication to an individual holding the article to which the tag is affixed. While in the first alarm mode, the tag may continue to listen for ping signals from other nodes, and if a ping signal from a non-gate node becomes the strongest ping signal detected by the tag, the tag may transfer from the first alarm mode to a normal mode (e.g., since the tag has apparently moved away from the gate node and the exit). However, if the strongest received ping signal continues to be the signal from the gate node, and the received signal strength passes a predefined gate node signal strength threshold, the tag may transfer into a second alarm mode.
- the tag may be configured to alarm continuously. Again, the tag may continue to listen for ping signals from other nodes, and if a ping signal from a non-gate node becomes the strongest ping signal detected by the tag, the tag may transfer from the second alarm mode to the first alarm mode or a normal mode (e.g., since the tag has apparently moved away from the gate node and the exit).
- tag tracking may also provide marketing benefits. Movement of tags associated with particular products may logged by the monitoring system manager 256 over a period time, and the monitoring system manager 256 may be configured identify customer trends by aggregating the data. Using the trends, product layout within a store may be modified to increase sales. The customer trends may reveal purchasing patterns, customer traffic patterns, in-store dead-spots, and the like, which may not have otherwise been identified. Further, information regarding the effects of moving product display racks and associated products within the store may be determined based on the movement of customers and the sales of the associated products.
- the monitoring system and the monitoring system manager 256 may be configured to make suggestions to customers for purchasing other products. For example, movement of a tag associated with a dress shirt may be detected, and the movement may be tracked to a sales area for neck ties.
- the monitoring system manager 256 may be configured to consult a database to suggest a neck tie that matches the shirt, based on attribute information associated with the tag affixed to and associated with the shirt. To implement the suggestion procedure, the monitoring system manager 256 may interface with a customer information terminal 195 located near the neck tie retail area.
- Example marketing compliance applications and functionality may also be implemented by the monitoring system.
- some retail stores may have requirements for how the store should be set (i.e., where particular products should be located within the store).
- a floor plan or set design may be followed for setting the store.
- the location of tags may be queried.
- Tags associated with particular products may be checked against a stored, electronic set design to ensure that the products are located in the correct locations within the store. For example, the location of the winter sweaters within the store may be queried, to determine if the winter sweaters have been located on a table at the entrance of the store in accordance with a set design.
- the results of the query may be compared to the set design to determine whether the store complies in this regard.
- a tag may be configured to change the price of a product (or suggest the change of a price for the product) based on various factors.
- a tag may be configured to implement a timer and determine, for example, a “time on the sales floor” value. If the time on the sales floor value reaches a threshold level, the price for the article that the tag is associated with may be modified.
- a time and date threshold for the article may be defined. For example, a thirty day threshold may be set.
- the tag When thirty days has passed, as determined by the tag or the monitoring terminal, the tag may be configured to, or the monitoring terminal may direct the tag to, modify or suggest modification of the price of the article. Additionally, or alternatively, the tag may alarm when the threshold is reached indicating to sales personnel that the tag should be moved to the clearance rack.
- the price may also be modified based on the sales of related products. For example, if sales of a particular product have been increasing, the price could be raised.
- Another example marketing application may involve a tag being associated with, or assigned to, a specific customer (customer tag).
- the customer tag may be permanently assigned to a customer (e.g., the customer leaves the retail store with the tag), or the tag may be temporarily assigned to a customer upon visiting the retail store (e.g., the customer returns the tag upon leaving the store).
- the tag and/or the monitoring system may be configured to store profile information about the customer in association with the tag.
- the customer's profile information may be stored on the tag or at the monitoring terminal.
- the tag may be configured to wirelessly interface with a cell phone to retrieve profile information.
- the profile information may include the customer's name, age, gender, home address, phone numbers, credit card numbers, credit information, purchasing preferences, and the like.
- the profile information may also include information indicative of a customer loyalty level.
- various loyalty program features may or may not be available to the customer.
- tags associated with a customer having a particular customer loyalty level may be configured to allow a customer to use the self check out lane at a retail store, open a display case without the assistance of store personnel, open a security device that protects a product, purchase a product using pre-stored credit card information, de-commission security tags associated with a purchased product, and the like.
- the customer tag may also be configured to provide for tracking and positioning the customer in the store. Further, the customer tag may be configured to receive, for example via the monitoring system, a product list (e.g., a grocery list), and the customer tag may assist the customer in locating the products on the list.
- the product list may be provided to the monitoring system via, for example, the monitoring system's internet connection.
- the product list may have been created remotely from, e.g., the user's home computer running a web application, cellular phone, and/or any other remote device.
- the monitoring system can provide real-time inventory data associated with a particular store and the remote device can enable the user to reserve one or more particular products for pick-up and/or purchase at the store.
- a tag such as a tag configured for security functionality, marketing functionality, inventory functionality, or as a key (e.g., a manager's key) may be configured to provide for assisting an individual with locating another tag and the associated product.
- a locator tag in the possession of an individual attempting to locate a target tag, may be configured to provide a user with an indication of the where the target tag is located or how far the target tag is away from the locator tag.
- the locating tag and/or the target tag may be configured to provide audible and/or visual feedback to the user to indicate the location of the target tag.
- the locating tag and/or the target tag may be configured to output audible beeps or clicks (similar to the sound of a Geiger counter), the frequency of which may increase as the locating tag moves closer to the target tag.
- the output may be based on locating that is performed via the ping nodes described above, or via signal strength detection directly between the locating tag and the target tag.
- a locator tag such as a tag configured as a manager's key, may be used to locate tags that have reached a threshold battery charge level.
- a tag with a low battery level where the tag includes battery monitoring circuitry (e.g., via a processor) may be configured to alarm to indicate the low battery condition.
- a tag with low battery level may be configured to provide a wireless signal indicating the low battery condition. The wireless signal may be detected by the locator tag and the locator tag may be configured to provide an indication of the location of the low battery level to a user of the locator tag.
- tags near a low battery level tag may be configured to relay the low battery level indication via a wireless signal to neighboring tags, and the neighboring tags may report the low battery power condition to provide for locating the low battery level tag, even after the low battery level tag can no longer communicate.
- the monitoring system manager 256 may be configured to track inventory generally, as well as track the location of inventory via tags.
- the monitoring system manager 256 may be configured to track inventory by monitoring and logging status signals provided by the tags, in addition to commissioning and decommissioning activities.
- the monitoring system manager 256 may also assist in locating particular inventory to, for example, assist in a sale.
- the monitoring system manager 256 may be configured to receive requests for a particular product (e.g., brown slacks, waist size 32, in-seam length 30 ) and communicate with tags that meet the criteria of the request to cause the tags to alarm.
- An alarm in this regard may be a subtle, soft audio alarm that would assist a sales person and a customer in locating the desired product.
- a tote may be a shipping container, such as a plastic shipping container, that can hold smaller, and often higher value, products, such as pharmaceuticals, makeup, batteries, film, jewelry, and the like. Totes may be loaded at a warehouse, or another store, and shipped to a destination store.
- a tote may include a mechanical locking mechanism that requires, for example, a magnetic key or mechanical interaction with a key, to open the tote and access the products inside the tote.
- a tote may also include a configurable monitoring device configured as a tote tag.
- a tote tag may be used for locating the tote, similar to the manners described above.
- a tote tag may also be configured to detect the presence of tags, and associated products within the tote. In this manner, a tote tag may operate similar to a node, with respect to the tags stored within the tote.
- the tote tag may maintain an inventory of the products within the tote by virtue of communication with each respective tagged product in the tote and the extraction and/or storage of product related information associated with each respective tag. As the tote moves from the warehouse to a destination store, the inventory information may be verified at both locations to ensure that the contents of the tote have not been tampered with or stolen.
- the tote tag may also interface with a key, such as a manager's key.
- the key may be enabled to deactivate security functionality of the tote tag, such as alarming.
- the tote tag may be configured to alarm if an attempt is made to open the tote without the key or with an unapproved key.
- the tote tag may also alarm if communication is lost with the tag of one or more of the tagged products within the tote.
- a key may be configured to interface with the tote tag, either directly or through the monitoring system, to deactivate, or activate, the tote tag's alarming functionality.
- the monitoring system, or the tote tag may be configured to manage access to the contents of the tote by, for example, maintaining a list identifying the particular keys or the types of keys (e.g., high level manager's key) that have been enabled to open the tote.
- the tote tag may alarm.
- FIG. 14 illustrates an example method for managing configurable monitoring devices in accordance with various example embodiments of the present invention that may be implemented by the monitoring system manager 256 .
- configuration information for a configurable monitoring device may be generated that defines a role for the target configurable monitoring device. Specific parameters such as rules, alarming conditions, alarming responses, attribute information, and the like may be defined and included in the configuration information.
- the configuration information may be provided to a target configurable monitoring device via, for example, a wireless network connection.
- the target configurable monitoring device may receive and store the configuration information and subsequently operate within the role defined by the configuration information. If the configuration information defines the role of a node or a gateway, role-based communications may be received from, and transmitted to, the node or gateway during the operation of the configurable monitoring device as a node or gateway.
- a commission signal may subsequently be provided to commission the tag at 1430 .
- role-based communications may be received from, and transmitted to, the tag at 1440 during the operation of the configurable monitoring device as a tag.
- the tag may later be provided a decommission signal to decommission the tag 1450 .
- the tag may await re-commissioning at 1430 by providing another commission signal.
- FIGS. 13 and 15 - 17 illustrate example windows for displaying aspects of a user interface that may be implemented on a monitoring terminal.
- FIG. 13 illustrates an example window 1300 displaying a rendered representation of a monitoring system.
- the tag map 1310 illustrates an example sales floor for a retail environment.
- the tag map 1310 includes location-based representations of nodes (referred to as “hubs”) that are positioned at various locations throughout the sales floor.
- the nodes are uniquely identified by a label (e.g., “Hub 14 ”) followed by an associated tag count in parentheses, indicating the number of nearby tags (or tags within range of the signals (e.g., ping signals) being provided by the nodes.
- the tag map 1310 also depicts POS nodes (e.g., “Pos 2 ”, “Pos 3 ”, etc.). Near the entry area a gate node, “Gate 1 ”, is depicted which is configured to protect the entry/exit area.
- the tag map 1310 also includes a gateway node, “Root 0 ” configured to interface with an external network, to which the monitoring terminal may be connected.
- the example window 1300 also includes a tag tree 1320 .
- the tag tree 1320 includes a listing of the nodes that are members of the monitoring system.
- a node that has tags within range, such as Hub 16 may be expanded to display entries for each tag that is currently within range of, or otherwise associated with the node.
- the tag tree 1320 may be updated to show the current associations between the tags and the nodes.
- the tag tree 1320 also includes a status legend 1321 for describing the status of the tags or nodes.
- the monitoring terminal may be configured to highlight, for example, an alarming tag red, an unresponsive tag purple, and a low battery tag yellow, or some other color/highlighting scheme may be employed.
- the example window 1300 also includes an event log 1330 .
- the information depicted in the event log may be linked to the currently selected item in the tag tree 1320 .
- event information for the selected tag may be displayed.
- a time stamp may be associated with each event.
- Example events may include tag movement between node events, alarm events, failed communications events, tamper events, low battery events, etc.
- FIG. 15 illustrates an example tag information window 1500 for attribute information associated with a tag or node.
- the example tag information window 1500 depicts attribute information for a tag.
- An image 1510 of an article to which the associated tag is affixed may be provided in the example tag information window 1500 .
- additional attribute information may be provided in the tabular area 1520 , such as the tag address, the current battery level, the currently associated hub, a description of the affixed article, a stock-keeping unit (SKU) value, the time/date of the last report from the tag, the time/date of the last transition between nodes for the tag, the time/date of the last commission of the tag, the time/date of the last decommission of the tag, and the like.
- SKU stock-keeping unit
- FIG. 16 illustrates an example hub information window 1600 .
- the hub information window 1600 may include a tabular area 1610 that includes information about the hub (or node).
- Example hub attribute information may include the hub address, the hub label or description, the battery level for the hub, the current number of associated tags, the date/time that the hub last reported, for example, to the monitoring terminal, and the like.
- FIG. 17 illustrates an example battery level window 1700 for a tag.
- the battery level window may include a graphical representation of the past and current battery level on a line graph.
- the graph may be provided with respect to voltage on the y-axis, and time on the x-axis.
- a threshold battery level 1730 may also be included on the graph, which may indicate the battery level that would place the tag in a low battery status.
- the communications interface 252 of the monitoring terminal 62 may communicate with a separate bridge device to forward and receive information and data to and from configurable monitoring devices.
- the bridge device may operate unilaterally or in conjunction with the monitoring terminal 62 to manage configurable monitoring devices.
- the bridge device which may be a hand-held scanner-type device, can be configured to operate in one of two communication modes to interface with tags affixed to retail products for security, inventory, and other purposes. In a first communication mode, the bridge device is configured to communicate with tags that are configured for RFID type communications.
- the tags and the bridge device may be configured to communicate in accordance with the Generation II Ultra High Frequency (UHF) RFID standards.
- the bridge device is configured to communicate with tags using a protocol built on the IEEE 802.15.4 standard, such as ZigBee or a proprietary protocol built on IEEE 802.15.4.
- the bridge device may include a transmitter/receiver and an antenna configured to support IEEE 802.15.4, as well as, a modulator/demodulator, and possibly a separate antenna, to support RFID communications.
- the bridge device may include a configurable monitoring device configured to operate a bridge device.
- a single, possibly hand-held, bridge device can operate as a tag reader, and may be used to communicate with disparate types of tags. Communications with the tags may be performed for a variety of reasons, such as for counting inventory, price checking, tag firmware upgrades, tag encoding, and the like.
- the flexible nature of the configurable monitoring device and the monitoring system of embodiments of the present invention may enable dynamic configuration of configurable monitoring devices within a network to introduce robust capabilities for providing services and functionality and, for providing updates to existing capabilities with updated configuration information.
- Embodiments of the present invention may be implemented by various means, such as hardware, firmware, processor, circuitry and/or other device associated with execution of software including one or more computer program instructions.
- one or more of the procedures or activities described above may be embodied by computer program instructions.
- the computer program instructions which embody the procedures or activities described above may be stored by a memory device of an apparatus employing an embodiment of the present invention and executed by a processor in the apparatus.
- any such computer program instructions may be loaded onto a computer or other programmable apparatus (e.g., hardware) to produce a machine, such that the resulting computer or other programmable apparatus embody means for implementing the functions specified in the corresponding procedure or activity.
- These computer program instructions may also be stored in a computer-readable storage memory (as opposed to a computer-readable transmission medium such as a carrier wave or electromagnetic signal) that may direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture the execution of which implements the function specified in the corresponding procedure or activity.
- the computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the corresponding procedure or activity described above.
- the terms “substantially,” “about,” “approximately” or the like as used herein are intended to reflect variances in a value or relationship that may be due to various factors such as the effects of environmental conditions, common error tolerances, or the like. It should further be understood that although some values or other relationships may be expressed herein without a modifier, these values or other relationships may also be exact or may include a degree of variation due to various factors such as the effects of environmental conditions, common error tolerances, or the like.
Abstract
Description
- This patent application claims priority from U.S. Provisional Patent Application No. 61/244,320, filed Sep. 21, 2009, entitled “A Configurable Monitoring Device;” U.S. Provisional Patent Application No. 61/246,393, filed Sep. 28, 2009, entitled “Systems, Methods and Apparatuses for Managing Configurable Monitoring Devices;” U.S. Provisional Patent Application No. 61/246,388, filed Sep. 28, 2009, entitled “A Configurable Monitoring Device;” U.S. Provisional Patent Application No. 61/248,223, filed Oct. 2, 2009, entitled “Employment of a Configurable Monitoring Device as an Inventory Management Tool;” U.S. Provisional Patent Application No. 61/248,228, filed Oct. 2, 2009, entitled “Employment of a Configurable Monitoring Device as a Marketing Tool;” U.S. Provisional Patent Application No. 61/248,242, filed Oct. 2, 2009, entitled “Configurable Monitoring Device Having Bridge Functionality;” U.S. Provisional Patent Application No. 61/248,233, filed Oct. 2, 2009, entitled “Employment of a Configurable Monitoring Device as a Personal Identifier for Facilitating Transactions;” U.S. Provisional Patent Application No. 61/248,239, filed Oct. 2, 2009, entitled “Employment of a Configurable Monitoring Device as a Security Tool;” U.S. Provisional Patent Application No. 61/248,269, filed Oct. 2, 2009, entitled “Key for Commissioning, Decommissioning and Unlocking Configurable Monitoring Devices;” and U.S. Provisional Patent Application No. 61/248,196, filed Oct. 2, 2009, entitled “Systems, Methods and Apparatuses for Locating Configurable Monitoring Devices,” which are each hereby incorporated herein by reference in its entirety.
- Embodiments of the present invention relate generally to network and network management technology and, more particularly, relate to the management of networks that include dynamically configurable monitoring devices for use in connection with monitoring, tracking, and locating activities associated with one or more articles such as retail products.
- Conventional retail security systems, such as electronic article surveillance (EAS) systems, operate effectively to prevent shoplifting and the like. However, conventional systems are often limited to the narrow scope of providing security functionality. For example, an EAS gate located at an exit of a retail business establishment may be configured to alarm when an article with an EAS tag passes through the gate. Other than performing this important alarming functionality, many conventional systems provide nothing more to the users of the systems, such as store owners, store managers, and the like. Additionally, when store owners are considering the purchase and installation of a conventional security system in a retail establishment, the limited functionality offered by the systems can detrimentally affect the cost-benefit analysis of installing and maintaining the system.
- Additionally, identifying the location of products within a retail store has often relied on product placement. In other words, approaches to finding products are often based on placing similar types of products near each other in the store, thereby allowing the products' relative placement to assist both customers and store personnel in finding a desired product. Another approach has been to use large signs above the aisles of products, which identify which types of products should be in each aisle. However, using a sign and/or simply organizing a store with areas for similar products has proven insufficient under many circumstances. As a result, customers and store personnel are demanding more accuracy with respect to locating products within retail and other environments.
- Some example embodiments of the present invention are therefore provided that support security system functionality, as well as, additional functionalities that would be beneficial to store owners, store managers, and customers. For example, some example embodiments support inventory and marketing functionality, as well as, advanced security functionality.
- According to some example embodiments, a system is provided for managing and locating configurable monitoring devices and/or the products they are attached to. A configurable monitoring device may be a microprocessor-based wireless communication device that can assume configurable roles or modes of operation within the system. A mode of operation may be implemented based on configuration information stored on the configurable monitoring device. The configuration information may be pre-loaded on the configurable monitoring device, or configurable monitoring devices may receive the configuration information via a wireless connection from a remote device.
- The system, referred to as a monitoring system, may include any number of configurable monitoring devices configured to operate, for example, as a network, such as a mesh network, hybrid mesh network, star network, hybrid star network, or the like. The network may include a gateway node that supports a monitoring terminal (sometimes referred to herein as a coordinator). The gateway node may operate as an interface between the configurable monitoring device network and the monitoring terminal, for example, via an external network. The monitoring terminal may be configured to interact with the configurable monitoring devices and the configurable monitoring device network to implement a variety of functionalities.
- Within the network, one or more of the monitoring devices can include a processor, which can be configured to receive an indication of a triggering event. In response to receiving the indication of the triggering event the processor can be configured to cause the monitoring device to transition into a triggered role. The triggered role being one of a tag role or a node role, among others. In some embodiments, the tag role includes configuring the processor to determine location information relating to the monitoring device. In other embodiments, the tag role can include, instead of or in addition to locally determining location information, configuring the processor to repeat, or relay, any received data to a network entity, which can then help determine the location of the monitoring device. The location information can be relatively complex or simple (e.g., an identifier number of one or more other nodes the monitoring device “hears”).
- The monitoring device's node role can include configuring the processor to transmit a ping signal. A ping signal can comprise a relatively small amount of data (e.g., only the node identifier information) or a relatively larger amount data (such as at least the amount and type of data common to “beacon” signals used in wireless communications, some of which may be 802.11.4 compliant). The node role can also comprise configuring the processor to forward a tag communication to a network entity.
- Among other things, the monitoring device can be configured to receive data that includes instructions to transition the monitoring device. The instructions can be included in the indication of the triggering event and/or be sent by a network entity.
- In some embodiments, the monitoring device's processor can be further configured to receive a second indication of a second triggering event and, in response, transition from the triggered role to a second triggered role. For example, the monitoring device can transition from a tag role, to a node role, back to a tag role. In some embodiments, the indication of the triggering event can be a wireless signal that is broadcast wirelessly and received by one or more monitoring devices' antennas. Despite a plurality of monitoring devices receiving the indication, the indication of the triggering event can include a monitoring device identifier or other information that causes only one of the monitoring devices to execute its transition into the triggered role. As another example, a directional antenna (which may allow only one monitoring device or a subset of the monitoring devices to receive the indication), any other means, and/or a combination thereof can be used to target one or more monitoring devices for transitioning.
- The indication of the triggering event can be, for example, an output of a sensor. The sensor can be integrated inside the housing of the monitoring device, making the sensor an internal component of the monitoring device. Some examples of internal components include a motion detector (e.g., jiggle switch, accelerometer, etc.), a tamper detection component (which can be separate from or part of a mounting device used to affix the monitoring device to an article), or any other internal component that could be integrated into the monitoring device, some additional examples of which are discussed herein.
- The sensor can be configured to detect the triggering event and output the indication of the triggering event. For example, the triggering event could be movement and, in response to the sensor determining that the monitoring device is moving, the sensor can output the indication to the monitoring device's processor (and/or any other component or device).
- In some embodiments, the sensor can be external to the monitoring device, such as, e.g., in an external device. The sensor can produce an output that is then relayed wirelessly or by any other means to the monitoring device. For example, the external device can be another device functioning as a node device. Other examples of external devices that can send the monitoring device the indication of a triggering event include, e.g., an RFID device (such as those that are handheld or mounted in a counter or other piece of furniture), a network entity, an EAS gate, or any other device that can be configured to emit and/or generate an indication of a triggering event and/or an alarm event.
- The monitoring device can also include an audio device configured to emit audio signals. In some embodiments, the audio device may only be operable when the monitoring device is in the tag role. The monitoring device's processor can be further configured to receive an alarm indication of an alarm event while in the tag role and send a signal to the audio device, causing the audio device to emit the audio signal. An alarm event can be similar to or a type of triggering event and an alarm indication can be similar to or a type of an indication of the triggering event. For example, the alarm event can be an event, such as determining someone is trying to steal the article to which the monitoring device is attached (based on, e.g., suspicious movement profile). The alarm indication, for example, can be any type of indication, including a wireless or other type of signal that corresponds with an alarm event and/or can convey, to the monitoring device and/or network entity, that an alarm event occurred. For example, the monitoring device's processor and/or the network entity can receive the alarm indication from an external security device, such as an EAS gate and/or internal component that is configured to generate an output in response to being in communication proximity with an EAS gate. As another example, a node can be placed near a store's exit and the monitoring device can be configured to interpret hearing that node's ping signal as an alarm indication (with the alarm event being that monitoring device being too close to the store's exit).
- In some embodiments, the external security device can be a second monitoring device. The external security device can be in communication proximity to the monitoring device and the external security device and/or the monitoring device can be affixed to a retail product. In such embodiments, the external security device can be located at a store's exit and be used to detect an alarm event.
- As used herein, “communication proximity” refers to the distance in which direct communications can exist wirelessly between two devices. This distance can be dependent on a number of variables includes power output, frequency, signal reception factors (including physical and electrical interference variables), and/or any other variable. For example, if a monitoring device is in communication proximity of a node device, the monitoring device can “hear” the node device's ping signal(s) (e.g., receive the ping signal and determine the node identifier).
- In some embodiments, the monitoring device can comprise a battery and/or various other components. For example, the monitoring device can comprise a mounting device configured to affix the monitoring device to a retail article. The monitoring device can also comprise memory configured to store attribute information (e.g., bar code data, color data, price data, etc.) associated with the retail article. As another example, the monitoring device can include a display configured to display human-readable information and/or a light emitting component (which can be used to indicate battery power, an error message, communication functionality, etc.).
- In some embodiments, the monitoring device can be configured for position tracking of an article (such as a retail item, book, computer, casino chip, money, personal identification card, passport, etc.). The monitoring device's processor can be configured to receive a ping signal from a ping node; determine location information relating to the monitoring device based at least in part on receiving the ping signal; and report the location information to a network entity. The network entity can comprise one or more additional apparatuses, including a server and network management and/or monitoring system.
- In some embodiments, the monitoring device and/or network entity can determine a location zone of the monitoring device in response to the monitoring device receiving a ping signal from the ping node or other device functioning as a ping node (both of which are sometimes referred to herein as a “node device” or “node”). The monitoring device's processor can then retrieve (e.g., request and receive), from local or remote memory, a zone-based functionality profile that corresponds with the location zone. When the functionality profile is downloaded from remote memory (such as, e.g., the memory of a network entity), the processor can be configured to store the functionality profile in the monitoring device's internal memory.
- The functionality profile can be zone-based and correspond with one or more zones that represent an area of a physical space, such as a retail store or warehouse. The zones can also be relative to the position of one or more other devices, such as a node device, door, etc.
- The monitoring device can comprise an audible alarm that is activated by the processor in response to the zone-based functionality profile including an event signal activation instruction, such as an alarm activation instruction and/or any other instructions (such as, e.g., an unlocking instruction for the monitoring device's attachment mechanism, etc.). In some embodiments, an alarm may also be initiated at the network entity in response to determining an alarm event has occurred.
- The monitoring device's processor can be further configured to, in response to receiving the ping signal from the ping node, determine a location zone. Determining a location zone can include, for example, determining the ping node's identifier which is broadcast as or encoded within the ping signal. In some embodiments, the network entity can be configured to determine the applicable zone-based functionality profile for the monitoring device, in response to the monitoring device repeating the ping signal(s) the monitoring device received. The monitoring device's processor can then retrieve, from the network entity, the zone-based functionality profile that corresponds with the monitoring device's location zone.
- The monitoring device and the ping node can establish and execute a uni-directional communication protocol. The uni-directional communication protocol can allow, for example, the ping node to wirelessly broadcast data (as, e.g., a ping signal), which the monitoring device can receive. As mentioned elsewhere herein, the data can include, e.g., the ping node's identifier and/or other information. While the monitoring device may or may not broadcast a response to the ping node, the ping node can be configured to only send data to the monitoring device (e.g., lack the components necessary to receive data from the monitoring device). In some embodiments, the ping node can receive data from a network entity, even though the ping node lacks the ability to receive data from a monitoring device. In some embodiments, the monitoring device may be configured to respond to (e.g., confirm receipt for) all ping node signals it receives. In other embodiments, the uni-directional communication protocol lacks the monitoring device transmitting data intended for the ping node.
- The monitoring device can also establish and execute a bi-directional communication protocol with the ping node and/or the network entity. The bi-directional communication protocol can allow for two way communications, including sending and receiving of signals between each device participating in the communication protocol.
- The monitoring device can be further configured to receive a second ping signal from a second ping node. The second ping signal can be used by the monitoring device and/or network entity to determine second location information (such as identifying information of the second ping node) relating to the monitoring device. The uni-directional, bi-direction or any other communication protocol can be established between the monitoring device and the second ping node. The communication protocol between the monitoring device and the second ping node can be related to or independent from the communication protocol used between the monitoring device and the first ping node.
- A location zone can be determined by the monitoring device and/or the network entity based on the first location information and the second location information. The first and second location information can respectively comprise the first ping node's and the second ping node's identification data. The network entity and/or the monitoring device, knowing where those ping nodes are physically located, can then derive the approximate position of the monitoring device. In such embodiments, a more accurate location can be derived from, e.g., more ping node information. The location (relative to the ping node and/or absolute in a given space) can be used to access memory (remote or local to the monitoring device) and retrieve a zone-based functionality profile that can include instructions and other executable commands for the monitoring device and/or other device(s). For example, the monitoring device can comprise an audible alarm that is activated by the processor in response to receiving a type of event signal activation instruction (e.g., an alarm activation instruction) included in the zone-based functionality profile. As another example, the monitoring device can comprise a mounting device that is unlocked in response to the zone-based functionality profile including an unlock instruction, wherein the mounting device is configured to affix the monitoring device to a retail article. The monitoring device can also include an antenna that the processor uses to transmit and/or receive data associated with the location zone to the network entity, ping node device, and/or any other external device.
- The monitoring device's processor can be further configured to engage an internal timer; and subsequently receive an indication of a trigger event, wherein the indication results from the timer expiring. In some embodiments, rather than engage a timer within the processor, any other type of time keeping component can be implemented, including a clock, etc. In response to receiving the indication of the trigger event, the monitoring device can enter a wake mode and subsequent to reporting the location information to the network entity, reset the timer and enter a sleep mode. In some embodiments, a timer can be started in response to receiving a triggering event. A triggering event can cause the creation of a corresponding event signal, which can, among other things, cause the initiation of a timer.
- In some embodiments, the monitoring device and/or network entity can send a first signal for instructing the one or more ping nodes to power down to a minimum threshold and incrementally power up simultaneously or near simultaneously. The monitoring device can then monitor (e.g., listen) for subsequent ping signals from the ping nodes. Subsequent to determining that both the first ping node and the second ping node have powered down, the monitoring device can be configured to receive a location signal from either of the ping nodes. In response to receiving the location signal, the monitoring device can determine locally or utilize a network entity to determine its location and/or relate that location information to an article to which the monitoring device is coupled to. The location information, for example, can be associated with a first location corresponding with the location of a first ping node if the location signal was generated by the first ping node. Or, as another example, the location information can be associated with a second location corresponding with the location of the second ping node if the location signal was generated by the second ping node. After using one or more ping nodes to determine location information, the monitoring device can be configured to report the location information to a network entity.
- In other embodiments, the monitoring device and/or network entity can then send a first signal for instructing the one or more ping nodes to power up to a maximum threshold and then simultaneously or near simultaneously incrementally power down. The monitoring device can then monitor (e.g., listen) for subsequent ping signals from the ping nodes. Subsequent to determining that both the first ping node and the second ping node have powered up, the monitoring device can be configured to receive location signals. Subsequent to determining that both the first ping node and the second ping node have powered up, determining whether a final ping signal is received from the first ping node or the second ping node. In response to receiving the final ping signal, determining the location information relating to the article, wherein the location information is associated with a first location of the first ping node if the final ping signal was generated by the first ping node or the location information is associated with a second location of the second ping node if the final ping signal was generated by the second ping node. In other words, the monitoring device can determine its location based upon the last ping node it hears.
- Some example embodiments of the present invention are therefore provided that support locating a tag that may be affixed to a product within, for example, a retail environment. In accordance with various example embodiments, the monitoring system may be implemented that is configured to support the locating of tags. The monitoring system may be comprised of a plurality of ping, gateway and/or other nodes that provide ping and/or other types of signals that are detected by a tag. A tag that is able to receive a signal from a ping and other nodes can be defined as having a positional relationship with the node(s). As mentioned above and detailed below, where the signal strength is sufficiently strong, a tag may be configured to determine a closest ping node to the tag based on the ability to receive a signal from a ping node.
- In situations where a tag receives signals from a plurality of ping nodes (e.g., due to range overlap or signal reflections), a locating procedure may be undertaken to identify the ping node closest to the tag or within communication range with a tag. To implement the locating procedure, the ping nodes may be configured to, upon request, adjust the pings' respective signal powers to a common level (e.g., a minimum level or a maximum level) and incrementally modify the power of the signal to determine when a targeted tag begins receiving or communicating, or fails to receive or communicate, the signals being provided by the ping nodes. Based on which ping signal was first received or last lost, the tag may be configured to determine which ping node is closest to the tag. The tag may then be associated with the ping node such that the tag is indicated as being located near the ping node within the environment.
- Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
-
FIG. 1 a is a schematic block diagram of a monitoring system including a number of configurable monitoring devices according to example embodiments; -
FIG. 1 b is another schematic block diagram of a monitoring system including a number of configurable monitoring devices according to an example embodiment of the present invention; -
FIG. 1 c is another rendering of a monitoring system including a number of configurable monitoring devices according to example embodiments; -
FIG. 1 d illustrates a flow chart of an example tag according to example embodiments; -
FIG. 2 illustrates a block diagram of a monitoring terminal according to example embodiments; -
FIG. 3 illustrates a diagram of various configurable monitoring devices implemented in an example retail environment according to example embodiments; -
FIG. 4 illustrates an example configurable monitoring device with specialized hardware for performing some of the functionality within the role of a key according to example embodiments; -
FIG. 5 a is an illustration of an example retail environment having ping nodes and tags located within the environment according to example embodiments; -
FIG. 5 b illustrates a tag information window for displaying attribute information for a tag according to example embodiments; -
FIG. 6 is an illustration of a signaling and communications period for a ping node according to example embodiments; -
FIG. 7 is an illustration of a situation where a tag is within range of more than one ping node according to example embodiments; -
FIG. 8 is an illustration of a example procedure where the signal powers of the ping nodes have been dropped to a minimum level and incrementally increased to perform locating according to example embodiments; -
FIG. 9 is a flowchart of an example method for determining the location of a tag from the perspective of a monitoring terminal or a tag according to example embodiments; -
FIG. 10 is a flowchart of an example method for determining the location of a tag from the perspective of a ping node according to example embodiments; -
FIG. 11 illustrates an example of a flow diagram illustrating an example method for managing configurable monitoring devices according to example embodiments; -
FIG. 12 illustrates an example user interface window implemented by a monitoring terminal and depicting a representation of a monitoring system according to example embodiments; -
FIG. 13 illustrates an example user interface window implemented by a monitoring terminal and depicting a representation of a monitoring system in accordance with some embodiments; -
FIG. 14 illustrates an example of a flow diagram illustrating an example method for managing configurable monitoring devices according to example embodiments; -
FIG. 15 illustrates an example tag information window for displaying attribute information associated with a tag or node according to example embodiments; -
FIG. 16 illustrates a hub information window for displaying attribute information for a node according to example embodiments; and -
FIG. 17 illustrates a tag battery level window for displaying the battery level for a tag according to example embodiments. - Some embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Indeed, various embodiments of the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout.
- As defined herein a “computer-readable storage medium,” which refers to a physical storage medium (e.g., volatile or non-volatile memory device), can be differentiated from a “computer-readable transmission medium,” which refers to an electromagnetic signal. Additionally, as used herein, the term “circuitry” refers to not only hardware-only circuit implementations including analog and/or digital circuitry, but at least also to combinations of circuits with corresponding software and/or instructions stored on a computer-readable storage medium.
- As indicated above, example embodiments of the present invention may be configured to support various security, inventory, marketing, and other functionalities in, for example, a retail sales environment or other given space. To do so, configurable monitoring devices may be installed within the retail sales environment. A description of some example embodiments of configurable monitoring devices, and the monitoring systems that may support configurable monitoring devices, is provided in U.S. Provisional Patent Application 61/244,320 filed Sep. 21, 2009, entitled “A Configurable Monitoring Device”, the content of which is hereby incorporated by reference in its entirety. The configurable monitoring devices may be wireless communication devices that can be dynamically configured to assume one or transition among roles within the operation of a monitoring system. To facilitate the ability to dynamically change roles, the configurable monitoring devices may include a processor, memory, communications interface (e.g., radio transmitter/receiver, Radio Frequency ID (RFID) module, or the like). Based on a role that a configurable monitoring device is expected to assume or transition to, the configurable monitoring device may also include more specialized hardware components such as, an alarm, a sensor, a display, and the like.
- As indicated above, the configurable monitoring devices may assume a variety of roles within the monitoring system. For example, a configurable monitoring device may be configured as a security tag that is attached to an article via a mounting device. The security tag may be configured to alarm or transmit an alarm message, if the security tag determines that an alarm condition has been met. In another example, a configurable monitoring device may be configured to operate as a node within a monitoring system. As a node, the configurable monitoring device may support communications and message routing within the communications network defined by the system. In this regard, the node may be configured to determine routing paths within the network for the efficient delivery of messages. According to another example, a configurable monitoring device may be configured to operate as a gateway between the monitoring system and an external network such as a wired local area network (LAN) or the Internet. Further, a configurable monitoring device may be configured to operate as a security key for locking and unlocking a mounting device associated with a security tag. In this regard, the security key may be configured to activate or deactivate electronic security features of a security tag. For purposes of explanation, a configurable monitoring device configured to operate in node mode will be referred to as a “node”, a configurable monitoring device configured to operate in tag mode will be referred to as a “tag”, a configurable monitoring device configured to operate in gateway mode will be referred to as a “gateway”, and a configurable monitoring device configured to operate in key mode will be referred to as a “key”. U.S. Provisional Patent Application No. 61/248,269, filed Oct. 2, 2009, entitled “Key for Commissioning, Decommissioning and Unlocking Configurable Monitoring Devices,” discusses examples of key devices and was incorporated above by reference in its entirety.
- The description of the roles of the configurable monitoring devices described above, and further described below is not an exhaustive list of the roles that may implemented by the configurable monitoring devices. Additionally, while the various roles may be described separately, it is contemplated that the roles are not necessarily mutually exclusive (though they could be) and that a single configurable monitoring device may or may not be configured to simultaneously assume more than one of the roles.
-
FIG. 1 a illustrates anexample monitoring system 60 that includes a number of configurable monitoring devices in various roles. Tags 68 (e.g., tags 68 a-68 i) may be configurable monitoring devices affixed to a product for the purpose of supporting security, inventory, marketing, as well as other functionalities. Nodes 66 (e.g., nodes 66 a-66 c) may be configured to support network level activities such as communications routing, tag locating, and the like. -
Gateway node 64 may be configured as a gateway node to provide a network interface between themonitoring system 60 and theexternal network 30. A monitoringterminal 62 may be in communication with thegateway node 64, for example, via theexternal network 30 or via a direct connection to thegateway node 64, to facilitate management of the configurable monitoring devices by the monitoringterminal 62 and to further facilitate the aggregation and analysis of data received from the configurable monitoring devices. A gateway node may interface with a cellular network to gain access to other networks, such as the Internet. In some example embodiments, a gateway node may support USB and Ethernet connectivity for connection to USB or Ethernet networks. - The
gateway node 64 may also include or be associated with a network coordinator. The network coordinator may be configured to oversee and manage various network operations. For example, the network coordinator may implement the forming of the network, allocate network addresses to entities of the network, and maintain a binding table for the network. - Although the communications network of the monitoring system may be any type of network (e.g., mesh network, hybrid mesh network, star network, hybrid star network, any other type of network, or combination thereof), in some example embodiments, the network may be configured to perform aspects similar to a mesh network. In some cases, the
monitoring system 60 may be made up of a plurality of communication devices (e.g., such as a plurality of configurable monitoring devices) in communication with each other via device-to-device communication to form, for example, a mesh network. However, in other situations, the network may include a plurality of devices that transmit signals to and receive signals from a base site or access point, which could be, for example a base site or access point of a data network, such as a local area network (LAN), a metropolitan area network (MAN), and/or a wide area network (WAN), such as the Internet. -
FIG. 1 b depicts another example network configuration in accordance with some example embodiments, where the nodes 66 are connected in a star or cluster fashion to the gateway node.FIG. 1 c provides another illustration of an example monitoring system with a communications network. With respect to the network entities ofFIG. 1 c, the PAN coordinator (gateway with network management functionality), the powered routers (communications nodes), the gate alarm (gate node), the pings (pings nodes), the tags, and the manager's key may each include a configurable monitoring device configured for a particular role. - Other devices such as processing elements or devices (e.g., personal computers, server computers, displays, point of sale (POS) terminals and/or the like) may be coupled to a configurable monitoring device to access the
monitoring system 60. By directly or indirectly connecting the configurable monitoring devices to various network devices and/or to other configurable monitoring devices via themonitoring system 60, the configurable monitoring devices may be enabled to receive configuration modifications dynamically and perform various functions or tasks in connection with network devices or other configurable monitoring devices based on the current configuration of the configurable monitoring devices. - The configurable monitoring devices, and the
monitoring system 60 generally, may utilize any wireless communication technique for communicating information between the devices or to themonitoring terminal 62. For example, the configurable monitoring devices may be configured to support communications protocols built on the IEEE 802.15.4 standard, such as Zigbee or a proprietary wireless protocol. According to some example embodiments, the communications within themonitoring system 60 may be performed based on a Route Under MAC (Media Access Control) (RUM) protocol or a modified RUM protocol. Regardless of the protocol, communications within the monitoring system may be associated with a network identifier, such as a personal area network (PAN) identifier. In some example embodiments, configurable monitoring devices might not be permitted to communicate within the monitoring system without having a matching network identifier. In some example embodiments, the monitoring system may regularly or irregularly change the network identifier and transition to a new network identifier for security purposes. - Additionally, to support network communications within the monitoring system, a system-wide synchronized clock may be implemented. Synchronization of the clock may be maintained via a clock signal. Configurable monitoring devices may include real time clock circuitry to support the synchronized clock and to regulate the use of precise communications windows.
- The configurable monitoring devices may also support RFID communications, such as communications based on Generation II Ultra High Frequency (UHF) RFID standards. In example embodiments where a configurable monitoring device includes a radio (e.g., an IEEE 802.15.4 radio) and an RFID module, the configurable monitoring device may be configured to operate as an interface that allows RFID devices to access the
monitoring system 60. For example, an RFID reader or other RFID device, that does not include a configurable monitoring device, may communicate with a configurable monitoring device, such as a tag, and the configurable monitoring device may relay such communications to entities connected to the monitoring system. In the same manner, the tag may relay communications originating on the monitoring system to an RFID device that has interfaced with a tag. As such, the configurable monitoring devices may operate as gateway to the monitoring system for RFID communications. - The
monitoring system 60 may be configured to operate as a mesh network, hybrid mesh network, star network, hybrid star network, cluster tree network, any other type of network, or any combination thereof. In this regard, themonitoring system 60 may support message hopping and network self-healing. With respect to message hopping, the nodes 66 may be configured to receive communications from nearby or assigned tags 68. The nodes 66 may be configured to determine a system architecture and/or efficient pathways for communicating messages to the various entities within the network. In this regard, the nodes 66 may be configured to generate and maintain routing tables to facilitate the efficient communication of information within the network. - For example, in accordance with implemented marketing functionality, tag 68 h may be configured to communicate that the product that tag 68 h is affixed to has been moved or is being moved from its display location.
Tag 68 h may be configured to communicate this information totags tags tag 68 h's determination that the customer may have decided to purchase the product affixed to tag 68 h. Accordingly, tag 68 h may generate and transmit a message addressed totags node 66 c, andnode 66 c may be configured to determine how to route the message, given current network traffic, such that the message is efficiently received bytags node 66 c may determine that the message can first be transmitted directly to tag 68 g, sincetag 68 g is connected to or in direct communication with thenode 66 c. To transmit the message to tag 68 d,node 66 c may determine that the message should be forwarded tonode 66 b.Node 66 b may perform a similar analysis and determine that the message can be forward to tag 68 d, directly fromnode 66 b.Tag 68 h may also be configured to transmit the message to themonitoring terminal 62.Node 66 c may route the message accordingly, such that thegateway 64 may forward the message to themonitoring terminal 62. - As indicated above, the nodes 66 may be configured to perform communications routing within the
monitoring system 60. In this regard, nodes 66 may operate to extend the range of the monitoring system. However, according to some example embodiments, all configurable monitoring devices within themonitoring system 60 may be configured to perform routing functionality. As such, configurable monitoring devices configured to operate both as tags and as nodes may communicate directly with each other, if within range, without having to route the communications through another node. - Further, since the
monitoring system 60 may be configured to support self-healing. In this regard, in the event that a node 66 should fail and no longer be able to communicate, messages may be automatically routed via a path that does not involve the failed node. For example, in a given scenario, a tag may be connected (via, e.g., a wireless connection) to more than one node. In the event that one of the nodes fails, the tag may simply cause messages to be routed through another node to which the tag is connected. According to some example embodiments, such as in the event that another available node is not present, a tag may be triggered, directed, or otherwise configured to implement node functionality (e.g., stored in the memory of the tag and implemented by a processor of the tag). The tag may therefore become a node to support communications of other tags. - According to some example embodiments, configurable monitoring devices that are installed and configured with the intention that the devices be primarily utilized as nodes may be powered through a building's wired power system or be mains powered (in contrast to being only battery powered). Since nodes may be involved in the frequent transmission of communications, power utilization of a node may be relatively high. As such, since configurable monitoring devices configured to operate primarily as tags would likely be battery powered for mobility purposes, an example embodiment that implements node functionality within a tag may be a temporary solution to maintain network continuity while the failed node is repaired.
- Additionally, the
monitoring system 60 may be configured to compensate for interference and multi-path conditions that can arise in enclosed environments, such as retail stores, individually or collectively (such as, e.g., retail mall). To do so, themonitoring system 60 may be configured, for example by the monitoringterminal 62, to modify the signal power of select nodes and tags to minimize interference. Other examples signal power instructions and adjustments are discussed below. According to some example embodiments, directional antennas may also be used by configurable monitoring devices to minimize interference. - According to various example embodiments, the
monitoring system 60 may be configured to interface with any number of other types of networks and/or systems. For example, themonitoring system 60 may interface with EAS systems, RFID systems, closed circuit television systems, inventory systems, security systems, sales systems, shipping systems, point of sale terminals, advertising systems, marketing compliance systems, ordering systems, restocking systems, virtual deactivation systems, Lojack® systems, and the like. - While the
monitoring system 60 may be configured to operate in a distributed fashion, the monitoringterminal 62 may be configured to coordinate operations of themonitoring system 60, as well as, retrieve, aggregate, and analyze data provided by the configurable monitoring devices of the system. - Based on the foregoing, and in accordance with some example embodiments, the nodes may be configured to provide a wireless signal that may be received by tags that are within range. According to some example embodiments, the range of a node or the power level, used to generate the wireless signal provided by the node, may be set based on the size of the area that the node is responsible for. For example, if the node is associated with a small floor display, the signal power may be relatively low. On the other hand, if a node is responsible for a large shelf unit, the signal power may be set to a higher level to ensure coverage of the entire shelf unit.
- Tags may be configured to receive a signal that is provided by a node and respond to the node indicating that the tag is now associated with the node, for example, because the tag is located on the floor display associated with the node. A tag may be configured to periodically or pseudo-randomly power up (e.g., based on a wake-up timer or other trigger event), listen for a node signal (e.g., a ping node can be configured to broadcast a ping signal), perform a time synchronization based on the node's signal, and transmit a message to a network entity indicating which node the tag has received a signal from (based on, e.g., determining a node identifier embedded in the node's signal). Subsequently, a tag may perform a second clock synchronization with the node or other network entity and then power down into a sleep mode for another period of time or until another triggering event.
- From the signal sent by the node, the tag may receive and determine a unique identifier and/or other data associated with the node. The tag may store the identifier and/or other data in its local storage device(s). As such, the tag would know to which node the tag has been associated.
- The tag and the node can establish and execute a uni-directional communication protocol. The uni-direction communication protocol can allow, for example, the ping node to wirelessly broadcast data (as, e.g., a ping signal), which the tag can receive. As mentioned above, the data can include, e.g., the ping node's identifier and/or other data. While the tag may or may not broadcast a response to the ping node, the ping node can be configured to only send data to the tag (e.g., lack the components or functionality necessary to receive or respond to data from the tag). In some embodiments, the ping node can receive data from a network entity (via, e.g., BlueTooth or WiFi), even though the ping node lacks the ability to receive data from a tag or other monitoring device (via, e.g., another wireless protocol). In some embodiments, the tag may be configured to respond to (e.g., confirm receipt for) all ping node signals it receives, even if the node may not act on the tag's response. In other embodiments, the uni-directional communication protocol lacks the tag transmitting data intended for the ping node.
- The tag can also establish and execute a bi-directional communication protocol with the ping node and/or any other the network entity. The bi-directional communication protocol can allow for two way communications, including sending and receiving of signals between each device participating in the communication protocol. As such, the node may receive communication signals from the tag including a unique identifier of the tag, and the node may therefore know to which tag(s) the node is associated. The node may also be configured to report the node/tag associations back to a monitoring terminal, monitoring system coordinator, and/or other network entity. Via these and other types of defined tag/node relationships, various functionalities, as mentioned above and otherwise herein, may be implemented.
- Additionally, as further described herein, a tag may include a jiggle switch and/or other motion detection component, the actuation of which may indicate that a tag is being moved. Upon detecting actuation of the jiggle switch, the tag may determine a trigger event has occurred and, in response, may move from a sleep state into an awake state. Upon entering the awake state, the tag may perform one or more clock synchronizations with a node and determine the identifier of the node to which the tag is currently connected. In some embodiments, the tag may also transmit a message indicating the identifier of the node to which the tag is currently connected (possibly a new node since movement may have occurred). In the event that a tag does not detect a node, the tag may generate location information, representing the fact that the tag is out of range of any node, and access its functionality profile (which may be saved on the tag and/or on a network entity). In some embodiments, the functionality profile can include an alarm instruction, which causes the tag to alarm, should the tag determine it is out of range of any node. A tag that has detected a node may engage a movement wait timer to facilitate determining whether further movement of the tag is occurring. In the event that further movement is detected during the movement wait time, the tag may attempt to detect a node and again perform a time synchronization. If the movement wait time expires, the tag may determine a time until a next wake up into the awake state and an associated wake-up timer may be reset. Upon beginning the wake-up timer the tag may transfer into a sleep state.
FIG. 1 d illustrates a flow chart of the operation of an example tag consistent with that described above. -
FIG. 2 illustrates basic block diagram of amonitoring terminal 62 according to an exemplary embodiment. As shown inFIG. 2 , the monitoringterminal 62 may include various components that support both the basic operation of themonitoring terminal 62 and the relatively more sophisticated operation of themonitoring terminal 62 as a coordinator of a monitoring system. Some examples of these components are shown inFIG. 2 . However, it should be appreciated that some example embodiments may include either more or less than the example components illustrated inFIG. 2 . Thus, the example embodiment ofFIG. 2 is provided by way of example and not by way of limitation. - Reference will now be made to
FIG. 2 to describe an example structure and functional operation of themonitoring terminal 62 according to an exemplary embodiment. In this regard, as shown inFIG. 2 , the monitoringterminal 62 may include aprocessor 250 and acommunication interface 252. In some example embodiments, the monitoringterminal 62 may include auser interface 258. Theprocessor 250 may in turn communicate with, control or embody (e.g., via operation in accordance with corresponding instructions) amonitoring system manager 256. - In an exemplary embodiment, the
processor 250 may be configured to, for example, execute stored instructions (in a, e.g., functionality profile) and/or operate in accordance with programmed instructions to control the operation of themonitoring terminal 62. Theprocessor 250 may be embodied in a number of different ways. For example, theprocessor 250 may be embodied as one or more of various processing means or devices such as a coprocessor, a microprocessor, a controller, a digital signal processor (DSP), a processing element with or without an accompanying DSP, or various other processing devices including integrated circuits such as, for example, an ASIC (application specific integrated circuit), an FPGA (field programmable gate array), a microcontroller unit (MCU), a hardware accelerator, a special-purpose computer chip, or the like. In an exemplary embodiment, theprocessor 250 may be configured to execute instructions stored in a memory device (e.g.,memory device 254 ofFIG. 2 ) or otherwise accessible to theprocessor 250. The instructions may be permanent (e.g., firmware) or modifiable (e.g., software) instructions and be organized in any manner (such as one or more functionality profiles). Alternatively or additionally, theprocessor 250 may be configured to execute hard coded functionality. As such, whether configured by hardware or software methods, or by a combination thereof, theprocessor 250 may represent an entity (e.g., physically embodied in circuitry) capable of performing operations according to embodiments of the present invention while configured accordingly. Thus, for example, when theprocessor 250 is embodied as an ASIC, FPGA or the like, theprocessor 250 may be specifically configured hardware for conducting the operations described herein. Alternatively, as another example, when theprocessor 250 is embodied as an executor of software or firmware instructions, the instructions may specifically configure theprocessor 250 to perform the algorithms and/or operations described herein when the instructions are executed. Theprocessor 250 may include, among other things, a clock, an arithmetic logic unit (ALU) and logic gates configured to support operation of theprocessor 250. - The
memory device 254 may include, for example, one or more volatile and/or non-volatile memories. In other words, for example, thememory device 254 may be an electronic storage device (e.g., a computer-readable storage medium) comprising gates (e.g., logic gates) configured to store data (e.g., bits) that may be retrievable by a machine (e.g., a computing device including a processor such as processor 250). Thememory device 254 may be configured to store information, data, applications, instructions or the like for enabling themonitoring terminal 62 to carry out various functions in accordance with exemplary embodiments of the present invention. For example, thememory device 254 could be configured to buffer input data for processing by theprocessor 250. Additionally or alternatively, thememory device 254 could be configured to store instructions for execution by theprocessor 250. - The
user interface 258 may be in communication with theprocessor 250 to receive user input via theuser interface 258 and/or to present output to a user as, for example, audible, visual, mechanical or other output indications. Theuser interface 258 may include, for example, a keyboard, a mouse, a joystick, a display (e.g., a touch screen display), a microphone, a speaker, or other input/output mechanisms. Further, theprocessor 250 may comprise, or be in communication with, user interface circuitry configured to control at least some functions of one or more elements of the user interface. Theprocessor 250 and/or user interface circuitry may be configured to control one or more functions of one or more elements of the user interface through computer program instructions (e.g., software and/or firmware) stored on a memory accessible to the processor 250 (e.g., volatile memory, non-volatile memory, and/or the like). In some example embodiments, the user interface circuitry is configured to facilitate user control of at least some functions of themonitoring terminal 62 through the use of a display configured to respond to user inputs. Theprocessor 250 may also comprise, or be in communication with, display circuitry configured to display at least a portion of a user interface, the display and the display circuitry configured to facilitate user control of at least some functions of themonitoring terminal 258. - The
communication interface 252 may be any means such as a device or circuitry embodied in either hardware, software, or a combination of hardware and software that is configured to receive and/or transmit data from/to a network and/or any other device or module in communication with themonitoring terminal 62. According to some example embodiments where themonitoring terminal 62 is directly connected to the monitoring system, thecommunications interface 252 may include an appropriately configured configurable monitoring device. Further, thecommunication interface 252 may include, for example, an antenna (or multiple antennas) and supporting hardware and/or software for enabling communications with awireless communication network 30 or other devices (e.g., other configurable monitoring devices). In some environments, thecommunication interface 252 may alternatively or additionally support wired communication. As such, for example, thecommunication interface 252 may include a communication modem and/or other hardware/software for supporting communication via cable, digital subscriber line (DSL), universal serial bus (USB) or other mechanisms. - In an exemplary embodiment, the
communication interface 252 may support communication via one or more different communication protocols or methods. In some embodiments, thecommunication interface 252 may be configured to support relatively low power, low data rate communication. As such, for example, a low power and short range communication radio (e.g., radio transmitter/receiver) may be included in thecommunication interface 252. In some examples, the radio transmitter/receiver may include a transmitter and corresponding receiver configured to support radio frequency (RF) communication in accordance with an IEEE (Institute of Electrical and Electronics Engineers) communication standard such as IEEE 802.15. As such, for example, some embodiments may employ Bluetooth, Wibree, ultra-wideband (UWB), WirelessHART, MiWi or other communication standards employing relatively short range wireless communication in a network such as a wireless personal area network (WPAN). In some cases, IEEE 802.15.4 based communication techniques such as ZigBee or other low power, short range communication protocols such as a proprietary technique based on IEEE 802.15.4 may be employed. - In an exemplary embodiment, the
communication interface 252 may additionally or alternatively be configured to support communication via radio frequency identification (RFID) or other short range communication techniques. Accordingly, the monitoringterminal 62 may be configured to interface configurable monitoring devices, in addition to conventional RFID tags and modules. In another embodiment, the monitoringterminal 62 may be configured to interface a barcode scanner, or other data entry devices. - As mentioned above, monitoring
terminal 62 may be directly connected to the monitoring system via a configurable monitoring device configured as a gateway, or themonitoring terminal 62 may be connected to themonitoring system 60 via a gateway and anexternal network 30. Thenetwork 30 to which thecommunication interface 252 may connect may be a local network (e.g., a WPAN) that may in some cases further connect to or otherwise communicate with a remote network on either a periodic or continuous basis. Thenetwork 30 may include a collection of various different nodes, devices or functions that may be in communication with each other via corresponding wired and/or wireless interfaces. - As indicated above, the
processor 250 of themonitoring terminal 62 may be embodied as, include or otherwise control themonitoring system manager 256. Themonitoring system manager 256 may be any means such as a device or circuitry operating in accordance with firmware/software or otherwise embodied in hardware or a combination of hardware and firmware/software (e.g.,processor 250 operating under software control, theprocessor 250 embodied as an ASIC or FPGA specifically configured to perform the operations described herein, or a combination thereof) thereby configuring the device or circuitry to perform the corresponding functions of themonitoring system manager 256, as described herein. Thus, in examples in which software is employed, a device or circuitry (e.g., theprocessor 250 in one example) executing the software forms the structure associated with such means. - The
monitoring system manager 256 of the monitoring terminal may be configured to coordinate, manage, and configure the operation of configurable monitoring devices. In this regard, themonitoring system manager 256 may be configured to perform a number of activities with regard to a monitoring system as further described below and otherwise herein. While themonitoring system manager 256 may be configured to perform all of the functionality described with respect to themonitoring system manager 256 herein, it is also contemplated that themonitoring system manager 256 could be configured to perform any sub-set of the described functionality. - According to some example embodiments, the
monitoring system manager 256 may be configured to define, assign, and manage the role configuration of the configurable monitoring devices. To do so, themonitoring system manager 256 may generate configuration information that indicates the role or mode of operation for a target configurable monitoring device and transmits the configuration information to the configurable monitoring device for storage on the device. Configurable monitoring devices may each be assigned a unique identifier that may be used for communication message addressing. As such, configuration information may be generated by themonitoring system manager 256 and addressed to a target configurable monitoring device to configure the configurable monitoring device for a particular role. - The configuration information may include role policy information that indicates the functionality that the configurable monitoring device should perform within the device's assigned role, and attribute information, such as associated product attributes. Attribute information may be data that a configurable monitoring device may utilize within the role to perform functionality. For example, if a product that the configurable monitoring device is attached to is clothing, the attribute information may include a clothing classification (e.g., shirt, pants, tie, dress, etc.), a color or colors indicator, a size indicator, a price indicator, a lot indicator, and/or the like. Based on the attribute information, the functionality performed by a configurable monitoring device may be determined. For example, configurable monitoring devices configured with the same role policy information, may trigger different types of alarm responses based on the price of the product. According to some example embodiments, attribute information may be stored in a central location, rather than at the configurable monitoring device, and the configurable monitoring devices may access this information remotely via the network of the monitoring system as needed.
- According to some example embodiments, the configuration information may include executable code that is, possibly decompressed, and stored on the configurable monitoring device for subsequent execution by the configurable monitoring device. However, in some example embodiments, a configurable monitoring device may be manufactured with executable code in the form of configuration information stored within the memory of the device. Alternatively, a hardware device, such as a memory device or preconfigured processing device with pre-stored configuration information may be inserted into and/or electrically connected to the configurable monitoring device to provide configuration information and assign a role to the configurable monitoring device. The pre-stored configuration information may be directed to a number of possible roles that the configurable monitoring device could be configured to perform. In this regard, to configure the configurable monitoring device, the
monitoring system manager 256 may provide a message including a data indicator of which role the configurable monitoring device is to perform. The configurable monitoring device may receive the indicator and begin performing (e.g., transition into) the role described by the indicator by executing the appropriate portion of the pre-stored configuration information. - Once a configurable monitoring device is assigned a role via the configuration information, the device may begin operating within its respective role. Roles or configurations may be simple or complex based on, for example, the processing capabilities and the memory storage available to a configurable monitoring device. In this regard, a configurable monitoring device may be configured to perform minimal data processing, and a monitoring terminal may be configured to perform incrementally more processing of data. Alternatively, some configurable monitoring devices may include relatively higher processing power and larger memory storage to support increased data processing at the configurable monitoring device, rather than at the monitoring terminal.
- For example, in embodiments where a configurable monitoring device includes minimal storage memory, attribute information describing the article to which a configurable monitoring device is attached may be stored at the monitoring terminal. When a inquiry device (e.g., price scanner, inventory scanner) requests the attribute information from the tag, the tag may communicate the request to the monitoring terminal, and the monitoring terminal may provide the attribute information to the inquiry device, either though the monitoring device or through a connection external to the monitoring device.
- Alternatively, in embodiments where the configurable monitoring device includes a relatively large storage memory, attribute information describing the article to which a configurable monitoring device is affixed may be stored, e.g., local to the tag, within the storage memory of the tag. When an inquiry device (e.g., price scanner, inventory scanner) requests the attribute information from the tag, the tag may directly communicate, or initiate the communication of, the attribute information from the tag to the inquiry device.
- The following describes some of the roles that may be implemented by the configurable monitoring devices and the interactions that may involve the
monitoring terminal 62 and themonitoring system manager 256 while the configurable monitoring devices are operating within their roles. As described above, and generally herein, a configurable monitoring device may include a processor and a memory. The processor may be configured to support network communications. According to various example embodiments, the processor may be configured, for example, via instructions stored on the memory (e.g., instructions derived from configuration information), to support communications in accordance with a role defined by configuration information. Further, the processor of the configurable monitoring device may include input/output (I/O) ports (or pins). Via configuration information, the I/O ports may be configured to interface with any number of external devices such as, electronic security devices, merchandising displays, tags on equipment, employee identification cards, alarms, speakers, microphones, lights (e.g., light emitting diodes (LEDs)), buttons, keypads, monitors, displays (e.g., for changeable pricing labels), sensors (e.g., accelerometers, movement sensors, light sensors, temperature sensors), cameras, security gates, store audio systems, customer counters, lighting switches, employee communicators (e.g., headsets, handheld radios), door strike mats, jewelry case mats, Lojack® devices, global positioning system (GPS) devices, and the like. As such, the I/O ports may be configured to support one or more roles that the configurable monitoring device may be configured to perform. - Via the I/O ports of the processor, various functionalities may be triggered, based on the role and the configuration information of the configurable monitoring device. Following from the discussion above, triggering may be initiated either at the configurable monitoring device level or at the monitoring terminal level. For example, the I/O ports of a configurable monitoring device's processor may interface with a display for a price tag, when the configurable monitoring device is configured as a tag. Within the tag's configured role, for example, the price depicted on the display may be set to reduce at a given time. In some example embodiments, the time may monitored by the processor of the tag and when the given time is reached, the processor may direct the I/O ports and the connected display to depict a reduced price. Alternatively, an example that includes triggering at the monitoring terminal level may include the time being monitored by the monitoring terminal, and the monitoring terminal may communicate a message including a reduced price, or an indication to reduce the price, to the tag at the given time to trigger the tag to reduce the price accordingly. Further, the I/O ports may interface with a camera, and the configurable monitoring device may be configured to control the movement of the camera, detect events, and capture still camera pictures for forwarding to store personnel or the authorities, and the like.
- While the roles described herein may be considered from the perspective of an implementation in a retail sales environment, the scope of the invention should not be limited to such implementations. For ease of understanding,
FIG. 3 , which illustrates an example of a given space, namelyretail environment 100, is referred to in order to describe some of the roles that may be implemented by the configurable monitoring devices within an exemplary monitoring system. -
FIG. 3 illustrates a diagram of various configurable monitoring devices configured to define a monitoring system. In this regard,FIG. 3 depicts an exemplaryretail environment 100 including astock room 110 where excess inventory is maintained, anoffice space 120 from which monitoring activity may be coordinated or otherwise viewed (e.g., via a monitoring terminal 62),fitting rooms 130 in which articles of clothing may be tried on by potential buyers, aretail floor 140 on which various products may be displayed or otherwise made available for buyers to purchase andrestrooms 150.FIG. 3 also depicts a point of sale (POS) terminal 160 at which payment may be made for products and adoor 170 through which customers may enter and exit theretail floor 140. - Within a retail environment application, various different products may each be provided with a corresponding configurable monitoring device operating as a tag. Furthermore, several other configurable monitoring devices may be provided at various locations throughout the retail environment to operate, for example, as nodes. In this regard, the location of a node within the retail environment may be known (e.g., coordinates of the nodes may be known) to, for example, the monitoring
terminal 62 and themonitoring system manager 256 to facilitate implementation of a real-time location system (RTLS) for the tags via the nodes. Several configurable monitoring devices operating in a tag mode are illustrated inFIG. 3 as circles with the letter “T” therein. Some other configurable monitoring devices may be configured during commissioning to operate in a node mode. Examples of configurable monitoring devices operating in node mode are shown inFIG. 3 as circles with the letter “N” therein. An example of a configurable monitoring device operating in a gateway mode is shown inFIG. 3 as a circle with the letter “G” therein. The circles with the letter “C” may be configurable monitoring devices configured to operate with customer counting devices (e.g., strike pads, and the like). The circles with the letter “D” may be configurable monitoring devices configured to operate with door opening monitoring devices configured to determine and report a number of times customers open, for example a freezer door in grocery frozen food section. The circle with the letter “P” may be configurable monitoring devices configured to operate with a camera to capture digital photographs when an event, such as the alarming of a tag has occurred. The configurable monitoring device interfacing with the camera may be configured to control the movement of the camera and forward video or pictures. Still others (or a single configurable monitoring device) may be configured to operate as gates or in a hub or gateway mode. While configurable monitoring devices may be configured as tags, nodes, gateways, etc., each of these roles may be further refined, for example via configuration information, to specialize the functionality of a configurable monitoring device within a particular role (such as, e.g., a ping node within the broader node role). - Various techniques may be utilized to associate and dissociate a configurable monitoring device. For example, a specific network identifier (e.g., PAN ID) may be provided to the configurable monitoring device at manufacturing. Further, low transmission power association and dissociation may be implemented using close proximity signaling. Further, hardware, switches (e.g., DIP (dual in-line package) switches), jumpers, MAC address filtering, button actuated association/dissociation, separate communications link associating/dissociating, or a barcode scanners may be used for associated or dissociated.
- A configurable monitoring device configured to operate as a tag may perform functionalities supporting security functions, inventory functions, marketing functions, combinations thereof, and the like. In this regard, subsequent to configuring a configurable monitoring device as a tag, a commissioning or binding procedure may be performed. Prior to commissioning, a configurable monitoring device may be configured as a tag, but the device may not yet be associated with, or attached to, a product. Upon associating the tag with a product, the tag may be commissioned. The
monitoring terminal 62 and themonitoring system manager 256 may manage the commissioning and decommissioning of tags via wireless communications with the tags. For example, the procedure for commissioning and decommissioning a tag may include RFID scanning the tag, a barcode scanning the tag, and/or hardware (e.g., specialized microchip) attachment or connection. - To commission a tag, the
monitoring system manager 256 may provide a signal to the tag indicating that the tag is now active with respect to its configured role. In this regard, alarming, inventory, and marketing functionality may be downloaded and/or activated. For example, a functionality profile, including various electronic instructions, may be downloaded and/or activated. While commissioned, the tag may continue to receive instructions or other information useful for making determinations as to the functionality to be employed and the corresponding role/mode of operation to assume. - Decommissioning of the tag may include powering down the tag, clearing or resetting data (e.g., product-specific and/or functional data), and/or directing the tag to enter an idle or non-transmitting mode in order to conserve battery power until the tag is re-commissioned. The tag may be decommissioned by instructions and/or signals received from the monitoring
terminal 62 and themonitoring system manager 256. - Decommissioning may occur at a point of sale, such as
POS 160. A node associated with the point of sale (POS node) may be configured, via configuration information, to perform decommissioning functionality. In this regard, the POS node may be configured to decommission the tag when the product is entered into a sales transaction. Themonitoring system manager 256 may be configured to interface with a sales database or sale system to monitor transactions. Upon detecting a transaction, data about the product involved in the transaction may be acquired, and, based on the acquired data, a decommission signal may be transmitted to the affected tag. According to some example embodiments, direct access to a sales database or sales system may not be available due to concerns regarding the confidentiality of sales and customer information. In these situations, example embodiments of the present invention may implement a barcode scanning wedge as an interface to the transaction activities without accessing the sales database or sales system. - According to some example embodiments, a battery check may be performed by a tag during decommissioning. In this regard, the configurable monitoring device may include the hardware and software (e.g., processor configured by instructions) to provide for monitoring the battery charge level. If the battery charge level for a tag has fallen below a given threshold, the tag may alarm or otherwise indicate to the store personnel that the tag should be removed from service for recharging or battery replacement. Tags that have battery levels above the given threshold may be decommissioned and identified as being available for re-commissioning. According to some example embodiments, a tag having a battery level that has fallen below a given threshold may be prevented from being re-commissioned until the battery charge level is sufficiently improved. This would also desirably limit the need for a store clerk to retrieve low battery tags from the field or store environment.
- The barcode scanning wedge may be installed in-line between a barcode scanner and a point of sale checkout terminal for receiving data acquired by the barcode scanner. The wedge may be configured to intercept some or all data acquired by the barcode scanner and to provide the data to a monitoring system, for example, via a POS node, without otherwise interrupting the flow of data to the point of sale terminal.
- The wedge may be configured to facilitate the commissioning or decommissioning of a communications tag that is part of a monitoring system. For example, when a cashier scans a barcode of a product during a purchase transaction, data confirming the transaction may be uploaded to the monitoring system and the
monitoring system manager 256 via the wedge. Confidential consumer and sales information may not be uploaded to the retail security network in some embodiments. In response to receiving a sales confirmation, themonitoring system manager 256 may be configured to transmit a decommission signal to an associated tag attached to the purchased product to cause the tag to be decommissioned. Decommissioning may be associated with removal of the tag from the product and/or removal or modification of a record or information (e.g., inventory information) for the tag stored by themonitoring system manager 256, for example, in thememory device 254. - A configurable monitoring device may also be configured as a manager's key to be implemented within the monitoring system.
FIG. 4 a depicts an example block diagram of a key, such as manager's key. The key ofFIG. 4 a is depicted as using the Zigbee protocol, but any protocol may be used. In some applications, a mounting device that mechanically attaches the configurable monitoring device to a product may be unlockable by the implementation of a key. According to some exemplary embodiments, a tag having a mounting device may take the form of a pin tag (for protecting a clothing), a keeper or plastic enclosure (for protecting compact disks, software, cologne, and the like), a Spider Wrap™ or wire wrap device (for protecting larger boxed products), or the like. One such mounting device may be configured to attach to the shaft of a golf club or similar article such as the device disclosed in U.S. Pat. No. 7,266,979 herein incorporated by reference in its entirety. Other such mounting devices may be configured to attach to a bottle neck or a bottle cap such as the devices disclosed in U.S. Pat. Nos. 7,259,674 and 7,007,523, both herein incorporated by reference in their entirety. Still other mounting devices may be configured to attach through a product such as an article of clothing or a blister pack such as the hard-tag disclosed in U.S. Pat. No. 6,920,769 incorporated herein by reference in its entirety. Each of the aforementioned patents being commonly owned by the assignee of the present application. - As mentioned above, Alpha Security Products' Spider Wrap™, which is disclosed in U.S. Pat. No. 7,162,899 and herein incorporated by reference in its entirety, may also be configured to operate as a mounting device. Further, a cable lock, such as the Alpha Security Products' Cablelok™ device disclosed in U.S. Pat. No. 7,249,401 or a keeper, such as that disclosed in U.S. Pat. No. 6,832,498 may be a mounting device. Each of the aforementioned patents being commonly owned by the assignee of the present application and herein incorporated by reference in their entirety.
- The key may be embodied in many different ways. In this regard, in some situations, the key may be a specially formed device that mates mechanically with some portion of the mounting device in order to disable a locking mechanism of the mounting device. As an alternative, the key may be a magnetic device configured to interface with a locking mechanism of the mounting device to enable the mounting device to be unlocked to permit removal of the mounting device from the corresponding product to which the mounting device is affixed or otherwise attached. As yet another alternative, the key may actually include an electrical component for exchanging signals or information with the tag associated with the mounting device to enable unlocking of the mounting device. As such, for example, the key could be an embodiment of a configurable monitoring device that is provided with specific configuration information defining functionality for the configurable monitoring device to function as the key for unlocking the mounting devices of tags. In such implementations, the key (or the configuration information associated with the key) may include a software component or code that is unique to a particular individual (e.g., a specific manager or assistant manager).
- The key may also report unlocking activities and/or other information regarding other devices encountered or activities undertaken to
monitoring system manager 256, so that activity of the key (or persons possessing the key) may be monitored, logged, and/or tracked. The examples discussed below, in connection with locating a tag or network component, could be applied to the managers key as well. Additionally, authenticity of the code may be defined or verified so that, for example, if a particular manager's key is lost or a manager leaves, the corresponding code for the manager's key may be invalidated so that further unlocking operations with the manager's key may not be possible. With respect to the security of the key itself, the key may be configured to alarm and/or destroy necessary aspects of the key's functionality if the key is, for example, improperly removed from the retail environment. For example, the key may clear the memory of the key, rendering the key useless. - Utilization of the key for unlocking security devices may be limited by rules stored on the key or at a monitoring terminal. For example, rules for using the key may be defined with respect to the location of the key (e.g., inside/outside the store, inside/outside a department zone), the employee using the key (e.g., as indicated by a passcode or detection of a user's RFID tag), a time of day, a day of the week, a work schedule. Use of the key in violation of the rules may cause the key to alarm.
- In addition to, or as an alternative to unlocking mounting devices, the key may be useful for setting an alarm or turning an alarm on or off. In this regard, to utilize the key, a button on the key may be actuated which indicates that the key is preparing to or is performing a locking or unlocking function. An indication that the button has been pressed may be commutated to the tag that is to be interacted with or the monitoring terminal. Further, in consideration of the locating functionality described below, the key may be located and tracked, and zones of use (e.g., the key cannot be used in the stock room 110) and other rules may be defined and enforced with respect to the key.
- According to some example embodiments, a configurable monitoring device configured as a tag, whether commissioned or decommissioned, may provide a status signal (or heartbeat signal) to the monitoring system. The status signal may be a short transmission of a unique identifier associated with the tag. The status signal may also provide other types of indications, such as whether the battery is or is not yet drained and/or whether the tag is otherwise properly functioning. The status signal may also be used for real time locationing system (“RTLS”) purposes, some examples of which are further described below. The status signal may be received by the
monitoring system manager 256. Themonitoring system manager 256 and/or the tag may maintain a log of the most recent receipt of a status signal from a tag and/or node. Other types of logs, some of which are discussed below, can also be maintained for and/or by one or more of the configurable monitoring devices. If the tag fails to provide a status signal that is received by the monitoring manager and/or any other network entity within a threshold period of time, an alarm or error indication may be generated. - According to some example embodiments, nodes of the monitoring system may be configured to provide ping signals. The tags may be configured to receive a ping signal and communicate information in response to receipt of a ping signal. For example, battery status, alarm status, received signal strength, and the like may be provided in response to a ping signal.
- As alluded to above, within the role of a tag various functionalities may be implemented, such as advanced security functionalities. For example, complex alarming conditions may be defined for a tag based on data received from sensors on the tag, location information, movement information, and the like. For example, tags may be configured to operate as or with EAS tags, such that when the tag passes through an EAS gate, the EAS gate may detect the tag (or a connected EAS tag), and possibly sound an alarm. According to some example embodiments, the monitoring
terminal 62 may have received a communication regarding the alarm condition. - With regard to operation within EAS systems, configurable monitoring devices may be configured to operate as tags to be detected, or as gate nodes for detecting tags. In this regard, via configuration information provided to a configurable monitoring device, the configurable monitoring device may assume the role of a gate node, such as
gate nodes 180 located at thedoorway 170. The gate nodes may be configured to detect passing EAS tags, such as a conventional EAS tag or a configurable monitoring device configured to operate as an EAS tag, and sound an alarm (e.g., an alarm included on the tag, an alarm included with the gate node, a storewide alarm). A gate node may directly sound a local alarm, or the gate node may communicate with themonitoring system manager 256 to sound an alarm. - It is noteworthy that, due to the dynamic reconfiguration ability of configurable monitoring devices, any configurable monitoring device may be configured to operate as a gate node. As such, EAS gates may be implemented dynamically at many locations within a retail environment. For example, configurable monitoring devices that have been configured to operate as tags and are affixed to a product on a shelf within the retail environment may also be re-configured to operate as a gate node for the aisle where the products are located.
- In addition to performing EAS functionality, a monitoring system may be configured to perform additional advanced security functionality. Some advanced security features, as well as a number of other inventory, marketing, and other features may rely upon implementation of an RTLS within a monitoring system. To implement RTLS solutions, configurable monitoring devices may be configured as locating nodes.
- According to some example embodiments, the ping signals generated by the nodes may be used for locating a tag. In this regard, a tag may be configured to report to, for example, the monitoring terminal that the tag is currently within the range of a ping signal provided by a particular node. The nodes may be configured to randomly, based on an algorithm, modify the ping signal strength. When the signal strength is modified, some tags that were in range may no longer be in range, or some tags that were previously in range may now be within range of the ping signal. As tags come in and out of range, due to the changing signal strength, the signal strength at the time may be used to determine the distance that a tag is from a particular node. In some cases, if the distance is determined with respect to multiple nodes, a physical location of the tag can be determined.
- According to some example embodiments, standard operating power settings (describing standard fluctuations in power discussed below) may be utilized in a standard locating mode. However, in an active locate mode, when the location of a specific article is desired, an active locate power setting may be utilized.
- Additionally, or alternatively, a locating node may be configured to use multilateration, hyperbolic positioning, time difference of arrival (TDOA), trilateration, triangulation, received signal strength indication (RSSI), global positioning systems (GPS), any other locating mechanisms, or combination thereof to support identifying the location of a tag within a retail environment. According to some example embodiments, a locating node may operate in isolation to detect the presence, and possibly the strength of a signal to determine when a tag is nearby. Locating nodes may take signal measurements and forward the information to, for example, the
monitoring system manager 256 to analyze the signal and determine a location. According to some example embodiments, locating nodes may be placed at strategic locations within the retail environment to support accurate locating of tags. - Due to interference that can occur in enclosed environments, such as retail stores, a signal power optimization procedure may be performed by the monitoring system, for example, directed by the monitoring terminal, to minimize interference and determine optimum signal strength for ping signals. In this regard, the signal strength of the various nodes may be modified to determine settings where minimal interference and node signal overlap occurs.
-
FIG. 5 a illustrates an exampleretail environment 500, where a monitoring system has been installed and implemented, such as the monitoring system described in U.S. Provisional Patent Application 61/244,320, filed Sep. 21, 2009, the content of which was incorporated by reference in its entirety above, and U.S. Provisional Patent Application No. 61/246,393, filed Sep. 28, 2009, the content of which was also incorporated by reference in its entirety above. The monitoring system may include tags, ping nodes, communication routing nodes, and a network coordinator and gateway node. The tags and nodes of the monitoring system may be configurable monitoring devices, such as those described in U.S. Provisional Patent Application 61/244,320 filed Sep. 21, 2009, the content of which is hereby incorporated by reference in its entirety, and U.S. Provisional Patent Application No. 61/246,388, filed Sep. 28, 2009, the content of which is also incorporated by reference in its entirety. - The monitoring system may also include a monitoring terminal (not depicted in
FIG. 5 a) that provides a user interface to the monitoring system and provides control over the operations of the monitoring system. The monitoring terminal may be connected directly to the monitoring system as a peer, or the monitoring terminal may be connected to the monitoring system via another network, such as the Internet. In some example embodiments, the monitoring terminal may include a server that is configured to control the monitoring system on-site, where the monitoring system is installed. A user may interface with the monitoring system by establishing a connection between a remote device (e.g., a personal computer) and the server. The server may be configured to perform predefined operations, and log information received from the tags and nodes. The server may be connected to a gateway or coordinator node, and the server may communicate with tags and nodes via the gateway or coordinator node. - As depicted in
FIG. 5 a, theretail environment 500 houses a number of ping nodes (e.g.,ping nodes monitoring system manager 256. After saving and/or reporting the information, the tag can engage its timer and enter a sleep mode (as discussed above), and enter a sleep mode to conserve power while waiting for another triggering event (such as detection of movement or the timer expiring). - In some embodiments, the ping nodes are also configured to receive signals and communications from other entities connected to the monitoring system such as tags, fixed nodes, or the monitoring terminal. In particular, the ping nodes may listen, possibly periodically, to the fixed nodes. As a result, communications with the ping nodes may occur directly between a tag and a ping node, or tags and ping nodes may communicate via the fixed nodes. In this regard, a fixed node may be a node that support network communications and may be stationary relative to a given space, which may or may not be moving. For example, the given space could be the cabin of an elevator, airplane or cruise ship. The location of the fixed nodes may be known, and as such, the fixed nodes may be used as reference locations for identifying the locations of the ping nodes or tags as described in further detail below.
-
FIG. 5 b depicts another representation of theretail environment 100 which includes fixednodes - In this regard, the fixed
nodes - A signaling and
communications period 600 for a ping node, depicted inFIG. 6 , may include afirst portion 610 dedicated to transmitting repeated ping signals 620, and asecond portion 630 dedicated to support network communications. A ping node may be configured to repeat the signaling andcommunications period 600 indefinitely, or until an instruction is received by the ping node that causes the ping node to change its operation. - Tags, such as
tags - In accordance with various example embodiments, ping nodes may be placed within the given space, such as a retail environment, in a manner that provides sufficient ping signal coverage to the environment. In this regard, a ping signal may have an associated signal strength, and the strength of the signal may determine the range of the ping signal. The strength of a ping signal may fade as the distance between the ping node and the measurement point is increased. The range of a ping node may be defined by a distance from the ping node where the signal strength is at a range threshold. Signals below the range threshold may still be received by tags, but the tags may be configured to ignore signals having signal strengths below the range threshold. The range threshold may define a circle (or sphere) with the ping node at the center of the circle.
- Since locating a tag may involve determining which ping node the tag should be associated with, according to some example embodiments, it may be beneficial to minimize the range overlap between ping nodes. In this regard, the ping nodes may be set to have as large of a range as possible, while also minimizing overlap. However, in some example embodiments, ping nodes may be associated with a given space comprising or consisting of at least a portion of a particular display shelving unit or rack. The ping node may be configured to define a range that merely encompasses the display, shelving unit, or rack, so as not to associate tags with the ping node that are not placed on the display, shelving node, or rack. As such, pings nodes may be configured to ensure coverage of some or all areas of the sales floor, or configured for a specific purpose to provide coverage of, for example, a particular display.
- According to some example embodiments, a ping node signal strength optimization procedure may be undertaken by the monitoring system, possibly controlled by the monitoring terminal. In this regard, the signal strengths of the various ping nodes may be modified to determine optimal settings considering factors such as coverage, desired range for a particular ping, interference, range overlap, reflections, and the like. Based on criteria such as these, an optimal settings for the ping normal operating signal power levels may be determined.
-
FIG. 5 a shows theretail environment 500 with the placement of a number of ping nodes and their associated ranges.Ping node 510 has been set to provide a ping signal strength such that the range threshold is forping node 510 is reached at arange 511.Ping node 520, having arange 521 may be a ping node that covers a larger area of the retail environment, such as a departmental area (e.g., the shoe department).Ping nodes respective ranges Ping nodes respective ranges - In some embodiments, it is noteworthy that, as depicted in
FIG. 5 a, to provide coverage to all or substantially all of the retail environment, the coverage areas of the ping nodes may overlap. In these overlapping regions, a tag may receive a sufficiently strong ping signal from more than one ping node. As such, a locating procedure may be employed (when necessary) to determine which ping node is closer to the tag. - In addition to the issues that can arise as a result of overlapping ping node coverage, ping signal reflections may also create issues. In this regard, since many retail environments are enclosed areas, signal reflections within the environments may create situations where ping signals are received by nodes as reflected signals. As a result, a tag may not be located within an overlap area as defined by the range of the ping nodes, but the tag may still receive signals from multiple ping nodes due to reflections. Further, the receipt of reflected signals may occur dynamically, and not in a predicable pattern. For example, in a retail embodiment, the movement of customers, store personnel, and other objects can cause dynamically changing signal reflection issues. Non-uniform architecture of the shopping floor may also contribute to reflection issues. According to various example embodiments, some locating procedures provided herein overcome the issues that arise from ping range overlap, as well as, the issues that can arise from signal reflections.
- With reference to
FIG. 5 a,tag 590 is located within range ofping node 570. In an example scenario,tag 590 receives a ping signal from only theping node 570. As such, when thetag 590 enters the seek_closest mode, the tag may detect and receive the ping signal associated withping node 570 and associate the location oftag 590 withping node 570. Thetag 590 may be configured to store the identifier ofping node 570, as provided in the ping signal, and report the association of thetag 590 with theping node 570 to the monitoring terminal via the monitoring system. - In another example scenario,
tag 591 is located in an overlap region betweenping node 510 andping node 580.Tag 591 receives ping signals, having sufficient signal strength, from bothping node tag 591 has received ping signals from more than one ping node, a locating procedure may be undertaken to determine which ping node is closer to the tag. -
FIG. 7 illustrates theping nodes tag 591 in isolation from the rest of theretail environment 500 ofFIG. 5 a, for illustration purposes. In accordance with various example embodiments, thetag 591, having transitioned into a seek_closest state may report to the monitoring terminal that thetag 591 is currently receiving ping signals from more than one ping node. Thetag 591 may be configured to report the identities of the ping nodes to the monitoring terminal. In response, the monitoring terminal may generate a signal power modification instruction, and transmit the signal power modification instruction to the identifiedping nodes affected tag 591 may be configured to generate the signal power modification instruction and transmit the signal power modification instruction to the identifiedping nodes - In response to receiving the signal power modification instruction, the
ping nodes - Referring now to
FIG. 8 ,ping node 510 may reduce the power output, thereby reducing the ping signal to range 511 a. Similarly,ping node 580 may also reduce its power output to the same value asping node 510, and its ping signal will have the same range asping node 510, as shown byrange 581 a. It is noteworthy thatping nodes - Upon reducing the signal strength based on a minimum threshold power level, the ping nodes may be configured to begin a process of incrementally increasing the signal strength of the ping signals. The ping nodes may be configured to perform periodic step increases in the signal strength, thereby causing a period step increase in signal range. For example, the power level can increase such that the corresponding signal range increase some distance (e.g., 2 inches, 2 feet, or any other acceptable distance) every set amount of time (e.g., 0.2 seconds, 2 seconds, 20 seconds, or any other acceptable amount of time). The ping nodes may include clocks that are synchronized with each other and/or the broader monitoring system, and the ping nodes may use the synchronized clocks to trigger the incremental changes to the signal strength at regular intervals. Having lost the ping signals from the
ping nodes tag 591 may be configured to detect or listen for the first ping signal that is received after the signal power modification instruction is issued, or after thetag 591 reports the reception of multiple ping signals to the monitoring terminal. - Referring to
FIG. 8 , after a first interval, theping nodes ping nodes ranges ping nodes ping nodes ranges - At
range 511 c, thetag 591 may receive the ping signal fromping node 510, but not fromping node 580. As a result, thetag 591 may be configured to determine that thetag 591 is closer to pingnode 510. The tag may store the identifier ofping node 510, and report the tag's association to pingnode 510 to the monitoring terminal and/or other network entity. - Upon determining that the
tag 591 is closer to pingnode 510, the process of incrementing the power may cease. For example, in some embodiments, the power incrementing may cease in response to an end power modification instruction issued by thetag 591, the monitoring terminal and/or other network entity, and received by theping nodes ping nodes - As an alternative to decreasing the signal strength to an equal level, followed by subsequent increases in signal strength, a similar example procedure may be undertaken where the signal strength is first increased to a maximum threshold level. Subsequent to increasing the ping signal strength to the maximum level, the signal strength of the involved ping nodes may be reduced periodically by incremental amounts until the node receives a signal from only one ping node. The last ping node that the tag receives a signal from may be identified as the closest ping node to the tag.
- As another alternative, according to some example embodiments, rather than initially reducing the ping signal strength to a minimum threshold level or raising the ping signal strength to a maximum threshold level, the ping nodes involved in the locate procedure may reduce/raise the signal strength to the current lowest/highest signal strength of the ping nodes involved in the locate procedure. Based on whether the tag receives a signal from a single ping after modifying the signal strengths in this manner, the tag may be configured to determine whether the further procedure of incrementally increasing/decreasing the signal strength of the ping nodes is required. In this manner, according to various example embodiments, the procedure for locating the closest ping node may be expedited.
- According to various example embodiments, in addition to determining which pings nodes that a tag is receiving ping signal from, a tag may be configured to measure the signal strength of the ping signals. In some example embodiments, information about signal strength and distances may be acquire from the data included in a communication in consideration of the modulation that was used to transmit the data, and analysis of the data may reveal information about signal strength and distance information. According to various example embodiments, the tag may consider the signal strength of ping signals that the tag is receiving when determining which ping node is closer. For example, signal strengths may fluctuate for a number of reasons (e.g., movement of customers or products within a retail environment). As such, the tag may be configured to determine the closest ping node by monitoring the signal strengths over a period of time to, for example, determine an absolute maximum signal strength or determine an average signal strength, and identify the closest ping node based on these values. Further, according to some example embodiments, received signal strength indication (RSSI) techniques may be used to assist in identifying a closest ping node.
- Additionally, in some embodiments an averaging scheme may be utilized in an attempt to normalize or remove incorrect closest ping node determinations. In this regard, a tag may keep a running log and average of signal strength values detected from a particular ping node or a closest ping node. And if signals or communications are received that are determined to be outside of a threshold range from the running average, those deviations in signal strength may be disregarded as being a result of a reflection or other unexplained occurrence. If a given number of signals or communications (e.g., 10) are received that are outside the threshold, a change in the placement of ping nodes may have occurred, and the generation of a new running average may be triggered. Changes in this regard, may be the result of movement of the tag, movement of the ping nodes, or the introduction or removal of a ping node to or from the environment. For example, the log and running average can include the last 10, 100, 1000, or any other suitable number of signals or communication values. In some embodiments, the number of suitable signal or communication values can be time dependent (e.g., a running average can be made from each signal or communication received over the past hour, 10 hours, day, two days, week, or any other suitable period of time).
-
FIG. 9 illustrates an example method of the present invention that may be implemented by a tag or a monitoring terminal. The example method begins at 900, where an indication that a tag is receiving ping signals from multiple ping nodes may be received. A tag may receive this indication internal to, for example, the processor of the tag, or the monitoring terminal may receive this indication. At 910, the identification of each of the ping nodes that the tag is receiving ping signals from may be determined. Further, at 920, a signal power modification instruction may be generated. The signal power modification instruction may be addressed to the ping nodes identified at 910. - At 930, the signal power modification instruction may be transmitted to each of the identified ping nodes. The identified ping nodes may subsequently perform the operations of a power modification procedure at 940, for example, as indicated in
FIG. 10 . Upon determining the closest ping node, an indication of the identified ping node that is closest to the tag may be received at 950. The tag may then be associated with the closest node for location purposes. -
FIG. 10 illustrates an example method of the present invention that may be implemented by a ping node. The example method begins at 1000, where a signal power modification instruction may be received. At 1010, the signal strength may be lowered to a minimum threshold level (or raised to a maximum threshold level). At 1020, the signal strength of the ping signal may be periodically increased (or decreased) by an incremental amount. Subsequent to performing one or more signal strength modifications, the ping node may return the signal strength to a normal operating level at 1030. -
FIGS. 11 and 12 illustrate the modification of normal operating levels for ping nodes. It is noteworthy that the ping nodes inFIGS. 11 and 12 are stationary, but the normal operating levels of the ping nodes have changed. In this regard, a monitoring system, via a tag, fixed node, or other ping nodes. As described above, the monitoring system may perform an optimization procedure to determine the normal operating levels of the ping nodes. In this regard, the normal operating levels may be optimized based on identified signal reflection issues, area coverage, and the like. According to some example embodiments, the normal operating levels of the various ping nodes may be modified to achieve particular goals with respect to, for example, locating a particular tag or group of tags. By dynamically changing the normal operating levels of the ping nodes, different gradients of coverage density may be generated within a given space or portion thereof. -
FIG. 11 depicts a number of ping nodes on the left side of the space that may be associated with aisles of a department store, which are positioned in a uniform manner with associated ping nodes on the shelving or the like. The right side of the environment may be representative of a non-uniform floor space where a number of displays are located close together. Tags located in the right side may be more likely to interact with multiple ping nodes configured as shown inFIG. 11 . - In response to, for example a detected theft event, an inventory sweep, regular modification of normal operating levels, or the like, the normal operating levels of the ping nodes may be modified resulting in a different gradient of coverage density within the environment. For example, as shown in
FIG. 12 , the normal operating levels of the ping nodes can be modified from those depicted inFIG. 11 . In this regard, the coverage is increased on the right side of the space, resulting in increased overlap in some ping node coverage. On the other hand, the left side of the environment, coverage has been decreased such that there is little or no interaction between the respective ping signals. As a result, the right portion of the space, which included substantial overlap in coverage inFIG. 11 , now has little or no overlap in coverage. - To implement the modifications to the normal operating levels of the ping nodes, a triggering event may occur. A triggering event may be, as described above, a detected theft event, an inventory sweep, regular modification of normal operating levels, or the like. In response to the triggering event, the ping nodes may be communicated a normal operating level modification message. In response to receiving the message, the ping nodes may adjust the normal operating level accordingly.
-
FIGS. 9 and 10 illustrate flowcharts of example systems, methods, and/or computer program products according to example embodiments of the invention. It will be understood that each operation of the flowcharts, and/or combinations of operations in the flowcharts, can be implemented by various means. Means for implementing the operations of the flowcharts, combinations of the operations in the flowchart, or other functionality of example embodiments of the present invention described herein may include hardware, and/or a computer program product including a computer-readable storage medium (as opposed to a computer-readable transmission medium which describes a propagating signal) having one or more computer program code instructions, program instructions, or executable computer-readable program code instructions stored therein. In this regard, program code instructions may be stored on a memory device of an example apparatus (e.g., a tag, a monitoring terminal, a ping node, etc.) and executed by a processor of the apparatus. As will be appreciated, any such program code instructions may be loaded onto a computer or other programmable apparatus from a computer-readable storage medium to produce a particular machine, such that the particular machine becomes a means for implementing the functions specified in the flowcharts' operations. These program code instructions may also be stored in a computer-readable storage medium that can direct a computer, a processor, or other programmable apparatus to function in a particular manner to thereby generate a particular machine or particular article of manufacture. The instructions stored in the computer-readable storage medium may produce an article of manufacture, where the article of manufacture becomes a means for implementing the functions specified in the flowcharts' operation(s). The program code instructions may be retrieved from a computer-readable storage medium and loaded into a computer, processor, or other programmable apparatus to configure the computer, processor, or other programmable apparatus to execute operations to be performed on or by the computer, processor, or other programmable apparatus. Retrieval, loading, and execution of the program code instructions may be performed sequentially such that one instruction is retrieved, loaded, and executed at a time. In some example embodiments, retrieval, loading and/or execution may be performed in parallel such that multiple instructions are retrieved, loaded, and/or executed together or simultaneously. Execution of the program code instructions may produce a computer-implemented process such that the instructions executed by the computer, processor, or other programmable apparatus provide operations for implementing the functions specified in the flowcharts' operations. - Accordingly, the execution of instructions associated with the operations of the flowcharts by a processor, or storage of instructions associated with the blocks or operations of the flowcharts in a computer-readable storage medium, support combinations of operations for performing the specified functions. It will also be understood that one or more operations of the flowcharts, and combinations of blocks or operations in the flowcharts, may be implemented by special purpose hardware-based computer systems and/or processors which perform the specified functions (e.g., field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), or combinations of special purpose hardware and program code instructions.
- To support real-time locating of tags (and the products to which the tag is affixed), tags may be configured to provide locating signals (e.g., status signals) that may be received, for example, by configurable monitoring devices configured as locating nodes. Indications of the locating signals may be provided to the
monitoring system manager 256 for analysis to determine the location of the tags within the retail environment. Upon determining the location of a tag, themonitoring system manager 256 may be configured to output the location of the tag on a map displayed via theuser interface 258 as shown for example inFIG. 13 . - Returning to the discussion of
FIG. 3 , in addition to simply outputting the location of the tag to theuser interface 258, themonitoring system manager 256 may be configured to consider the location information of a tag with respect to defined rules, alarm conditions, and alarm responses. In this regard, zones of interest within a retail environment may be defined, and when themonitoring system manager 256 determines that a tag has entered a zone of interest security functionality, such as an alarm response, may be implemented. For example, store personnel may wish to define an alarm condition when products enter therestroom area 150 ofFIG. 3 . As such, a zone of interest may be defined for therestroom area 150. Accordingly, when themonitoring system manager 256 determines that a tag has entered the restroom area, an alarm signal or message may be generated, and an alarm response may be implemented sounding an alarm. The alarm signal or message may be sent to the tag, and an alarm on the tag may be activated. Additionally or alternatively, a notification may be provided to store personnel, via for example, a mobile communications terminal and/or a remote alarm may be activated. Further, zones of interest may be defined with respect a variety of areas within the retail environment (e.g., the stock room, point of sale, fitting room, etc.). Additionally, zone-based functionality profiles can be used by the tags. Like the more generic functionality profiles discussed above, zone-based functionality profiles can be stored and accessed locally within the tag and/or at a network entity, such asmonitoring system manager 256. The zone-based functionality profile can include instructions and other commands that are specific to a particular location zone of the given space. - For example, a location zone of interest may also be associated with additional parameters, such as a time interval or duration, which may be included in the tag's zone-based functionality profile for the location zone. A customer, for example, may be permitted to bring an article with a tag into the
fitting room 130, but only for a threshold duration of time. Store personnel may, for example, wish to set a thirty minute duration for the fitting room. Accordingly, themonitoring system manager 256 may be configured to define a duration of time, such as thirty minutes, for a zone of interest. Themonitoring system manager 256 may be configured to implement a timer based on the threshold duration. The timer may continue to run while the tag is located within the zone of interest and, when the time reaches the threshold, an event signal can be generated. The event signal, for example, may include an alarm instruction and be based on the zone-based functionality profile. The alarm instruction can be executed, causing an alarm signal or alarm message (e.g., an automatically generated e-mail to a user device, etc.) to be generated and transmitted by and/or to themonitoring system manager 256 and/or tag. In some embodiments, the event signal can include other types of instructions and/or other data may not include or initiate an alarm signal. For example, the event signal can comprise data that indicates the tag's, includes tag location information, causes the tag's or other device's light(s) to illuminate, cause another network device (such as a closed circuit video camera) to flag data as relevant, and/or any other type of data that can cause any other type of desired response. For example, the event signal can cause themonitoring system manager 256 to determine that the tag has moved out of the zone of interest (such as a fitting room) and, in response, themonitoring system manager 256 and/or the tag may be configured to reset the timer. In this manner, the monitoring system can implement a delay before alarming; thereby giving the customer time to try on an article of clothing before determining that a suspicious event may have occurred or be occurring. - Locating a tag may also allow for tracking the movement of a tag and the associated product through the store. Tracking the movement of the product may provide inventory, security, and marketing functionality. With respect to security functionality, it has been determined that many experienced shoplifters move about a store in a particular manner. Based on the location information determined for a tag, the movement of a product may be tracked by the
monitoring system manager 256 and a movement profile may be generated and compared to suspicious activity movement profiles. If a match is identified, a notification may be provided to a manager, security guard, or the like via a mobile communications terminal to investigate the situation. Further, according to some example embodiments, themonitoring system manager 256 may have configured other tags, or may signal (e.g., send alarm instructions to) other tags on nearby devices to alarm when a match is identified to, for example, assist in locating the shoplifter. Adjacent tags could then provide an alarming pattern that “follows” a would-be shoplifter around or through the retail environment. - Additionally, the
monitoring system manager 256 and/or other network entity may be configured to interface, via a network connection or the like, withcustomer information terminals 195 to support security functionality.Customer information terminals 195 may be computing devices including a display and audio output capabilities (e.g., speaker, speaker driver, etc.). A customer information terminal may be located at strategic security locations such as exits and entrances. Themonitoring system manager 256 may be configured to interface with thecustomer information terminals 195, via for example a network connection, to provide output to customers and would-be shoplifters. For example, a customer information terminal and a movable video camera may be located at the exit of a retail environment. The moveable video camera may be controlled by themonitoring system manager 256. When themonitoring system manager 256 determines that a tag has moved into a zone of interest defined near the exit, the movable camera may move to capture the image of the individual carrying the tag (and the associated product). The video captured by the camera may be displayed on the customer information terminal to indicate to the shoplifter that they are being recorded and thereby have a deterrent effect. In addition, in some embodiments, the store's background music system may be quieted or muted and/or other noise overcoming strategies may be implemented, in response to themonitoring system 256 determining that a tag has moved into a zone of interest and/or entered an alarm state. - In a similar application involving customer information terminals, tags entering a store may be considered. For example, if the
monitoring system manager 256 determines that a tag has entered the store through the front entrance, themonitoring system manager 256 may be configured to cause the customer information terminal to either visually and/or audibly direct the customer to the customer service desk for product returns. - In addition to configurable monitoring devices being configured as EAS gate nodes, configurable monitoring devices may also be configured to operate as gate nodes via the locating functionality described above or based on a determination that a tag is within range of a gate node's ping signal. In some example embodiments, a gate node may detect the proximity of a tag by receiving communications from the tag in response to a ping signal provided by the gate node. To avoid situations where a gate node detects the proximity of a tag that is properly within the retail environment, and is not located so close to the exit so as to indicate that the attached article is being stolen, guard nodes may be implemented. The guard nodes may be located near an exit and may be configured to prevent tags within the store from improperly associating themselves to the gate nodes and causing erroneous alarming.
- A gate node may be connected to mains power, and may include a battery to support operation when mains power is lost. The gate node may transmit regular ping signals, which include the gate node's unique identifier, and listen for responses from tags that are within range. If a tag detects that the strongest ping signal that the tag is receiving is from a gate node, the tag may transmit a message including the tag's unique identifier to the gate node and the tag may enter a first alarm mode. In this regard, a tag may maintain a list of identifiers for gate nodes to determine when a signal is being detected from a gate node.
- In the first alarm mode, the tag may be configured to emit an audible chirp every second (or other predetermined time period), providing a deterrent indication to an individual holding the article to which the tag is affixed. While in the first alarm mode, the tag may continue to listen for ping signals from other nodes, and if a ping signal from a non-gate node becomes the strongest ping signal detected by the tag, the tag may transfer from the first alarm mode to a normal mode (e.g., since the tag has apparently moved away from the gate node and the exit). However, if the strongest received ping signal continues to be the signal from the gate node, and the received signal strength passes a predefined gate node signal strength threshold, the tag may transfer into a second alarm mode. In the second alarm mode, the tag may be configured to alarm continuously. Again, the tag may continue to listen for ping signals from other nodes, and if a ping signal from a non-gate node becomes the strongest ping signal detected by the tag, the tag may transfer from the second alarm mode to the first alarm mode or a normal mode (e.g., since the tag has apparently moved away from the gate node and the exit).
- As mentioned above, tag tracking may also provide marketing benefits. Movement of tags associated with particular products may logged by the
monitoring system manager 256 over a period time, and themonitoring system manager 256 may be configured identify customer trends by aggregating the data. Using the trends, product layout within a store may be modified to increase sales. The customer trends may reveal purchasing patterns, customer traffic patterns, in-store dead-spots, and the like, which may not have otherwise been identified. Further, information regarding the effects of moving product display racks and associated products within the store may be determined based on the movement of customers and the sales of the associated products. - With respect to additional marketing functionality, since the location of a product can be determined, the monitoring system and the
monitoring system manager 256 may be configured to make suggestions to customers for purchasing other products. For example, movement of a tag associated with a dress shirt may be detected, and the movement may be tracked to a sales area for neck ties. Themonitoring system manager 256 may be configured to consult a database to suggest a neck tie that matches the shirt, based on attribute information associated with the tag affixed to and associated with the shirt. To implement the suggestion procedure, themonitoring system manager 256 may interface with acustomer information terminal 195 located near the neck tie retail area. - Example marketing compliance applications and functionality may also be implemented by the monitoring system. In this regard, some retail stores may have requirements for how the store should be set (i.e., where particular products should be located within the store). A floor plan or set design may be followed for setting the store. To ensure that a store complies with a given set design, the location of tags may be queried. Tags associated with particular products may be checked against a stored, electronic set design to ensure that the products are located in the correct locations within the store. For example, the location of the winter sweaters within the store may be queried, to determine if the winter sweaters have been located on a table at the entrance of the store in accordance with a set design. The results of the query may be compared to the set design to determine whether the store complies in this regard.
- Another example marketing application may be automatic price modification. In this regard, a tag may be configured to change the price of a product (or suggest the change of a price for the product) based on various factors. A tag may be configured to implement a timer and determine, for example, a “time on the sales floor” value. If the time on the sales floor value reaches a threshold level, the price for the article that the tag is associated with may be modified. To support this functionality, according to some example embodiments, when the tag is commissioned or is placed on the sales floor, a time and date threshold for the article may be defined. For example, a thirty day threshold may be set. When thirty days has passed, as determined by the tag or the monitoring terminal, the tag may be configured to, or the monitoring terminal may direct the tag to, modify or suggest modification of the price of the article. Additionally, or alternatively, the tag may alarm when the threshold is reached indicating to sales personnel that the tag should be moved to the clearance rack. The price may also be modified based on the sales of related products. For example, if sales of a particular product have been increasing, the price could be raised.
- Another example marketing application may involve a tag being associated with, or assigned to, a specific customer (customer tag). In this regard, the customer tag may be permanently assigned to a customer (e.g., the customer leaves the retail store with the tag), or the tag may be temporarily assigned to a customer upon visiting the retail store (e.g., the customer returns the tag upon leaving the store). The tag and/or the monitoring system may be configured to store profile information about the customer in association with the tag. In this regard, the customer's profile information may be stored on the tag or at the monitoring terminal. In some example embodiments, the tag may be configured to wirelessly interface with a cell phone to retrieve profile information. The profile information may include the customer's name, age, gender, home address, phone numbers, credit card numbers, credit information, purchasing preferences, and the like.
- The profile information may also include information indicative of a customer loyalty level. In this regard, based on the customer loyalty level, various loyalty program features may or may not be available to the customer. For example, tags associated with a customer having a particular customer loyalty level may be configured to allow a customer to use the self check out lane at a retail store, open a display case without the assistance of store personnel, open a security device that protects a product, purchase a product using pre-stored credit card information, de-commission security tags associated with a purchased product, and the like.
- The customer tag may also be configured to provide for tracking and positioning the customer in the store. Further, the customer tag may be configured to receive, for example via the monitoring system, a product list (e.g., a grocery list), and the customer tag may assist the customer in locating the products on the list. The product list may be provided to the monitoring system via, for example, the monitoring system's internet connection. In this regards, the product list may have been created remotely from, e.g., the user's home computer running a web application, cellular phone, and/or any other remote device. For example, the monitoring system can provide real-time inventory data associated with a particular store and the remote device can enable the user to reserve one or more particular products for pick-up and/or purchase at the store.
- According to various example embodiments, a tag, such as a tag configured for security functionality, marketing functionality, inventory functionality, or as a key (e.g., a manager's key) may be configured to provide for assisting an individual with locating another tag and the associated product. In this regard, a locator tag, in the possession of an individual attempting to locate a target tag, may be configured to provide a user with an indication of the where the target tag is located or how far the target tag is away from the locator tag. The locating tag and/or the target tag may be configured to provide audible and/or visual feedback to the user to indicate the location of the target tag. For example, the locating tag and/or the target tag may be configured to output audible beeps or clicks (similar to the sound of a Geiger counter), the frequency of which may increase as the locating tag moves closer to the target tag. The output may be based on locating that is performed via the ping nodes described above, or via signal strength detection directly between the locating tag and the target tag.
- As mentioned above, tag location assistance functionality, such as the Geiger counter-type functionality described above may be implemented in a number of applications. In another example, a locator tag, such as a tag configured as a manager's key, may be used to locate tags that have reached a threshold battery charge level. A tag with a low battery level, where the tag includes battery monitoring circuitry (e.g., via a processor) may be configured to alarm to indicate the low battery condition. Additionally, a tag with low battery level may be configured to provide a wireless signal indicating the low battery condition. The wireless signal may be detected by the locator tag and the locator tag may be configured to provide an indication of the location of the low battery level to a user of the locator tag. According to some example embodiments, tags near a low battery level tag may be configured to relay the low battery level indication via a wireless signal to neighboring tags, and the neighboring tags may report the low battery power condition to provide for locating the low battery level tag, even after the low battery level tag can no longer communicate.
- With respect to inventory applications, the
monitoring system manager 256 may be configured to track inventory generally, as well as track the location of inventory via tags. Themonitoring system manager 256 may be configured to track inventory by monitoring and logging status signals provided by the tags, in addition to commissioning and decommissioning activities. - The
monitoring system manager 256 may also assist in locating particular inventory to, for example, assist in a sale. Themonitoring system manager 256 may be configured to receive requests for a particular product (e.g., brown slacks, waist size 32, in-seam length 30) and communicate with tags that meet the criteria of the request to cause the tags to alarm. An alarm in this regard, may be a subtle, soft audio alarm that would assist a sales person and a customer in locating the desired product. - Another example inventory application may involve the monitoring system's interaction with totes. A tote may be a shipping container, such as a plastic shipping container, that can hold smaller, and often higher value, products, such as pharmaceuticals, makeup, batteries, film, jewelry, and the like. Totes may be loaded at a warehouse, or another store, and shipped to a destination store. A tote may include a mechanical locking mechanism that requires, for example, a magnetic key or mechanical interaction with a key, to open the tote and access the products inside the tote. In some example embodiments, a tote may also include a configurable monitoring device configured as a tote tag.
- A tote tag may be used for locating the tote, similar to the manners described above. A tote tag may also be configured to detect the presence of tags, and associated products within the tote. In this manner, a tote tag may operate similar to a node, with respect to the tags stored within the tote. In some embodiments, the tote tag may maintain an inventory of the products within the tote by virtue of communication with each respective tagged product in the tote and the extraction and/or storage of product related information associated with each respective tag. As the tote moves from the warehouse to a destination store, the inventory information may be verified at both locations to ensure that the contents of the tote have not been tampered with or stolen.
- The tote tag may also interface with a key, such as a manager's key. In this regard, the key may be enabled to deactivate security functionality of the tote tag, such as alarming. The tote tag may be configured to alarm if an attempt is made to open the tote without the key or with an unapproved key. The tote tag may also alarm if communication is lost with the tag of one or more of the tagged products within the tote. A key may be configured to interface with the tote tag, either directly or through the monitoring system, to deactivate, or activate, the tote tag's alarming functionality. The monitoring system, or the tote tag may be configured to manage access to the contents of the tote by, for example, maintaining a list identifying the particular keys or the types of keys (e.g., high level manager's key) that have been enabled to open the tote. In the event that an unapproved key is used, or is attempted to be used, for opening a tote, the tote tag may alarm.
- Based on the forgoing,
FIG. 14 illustrates an example method for managing configurable monitoring devices in accordance with various example embodiments of the present invention that may be implemented by themonitoring system manager 256. At 1400, configuration information for a configurable monitoring device may be generated that defines a role for the target configurable monitoring device. Specific parameters such as rules, alarming conditions, alarming responses, attribute information, and the like may be defined and included in the configuration information. At 1410, the configuration information may be provided to a target configurable monitoring device via, for example, a wireless network connection. The target configurable monitoring device may receive and store the configuration information and subsequently operate within the role defined by the configuration information. If the configuration information defines the role of a node or a gateway, role-based communications may be received from, and transmitted to, the node or gateway during the operation of the configurable monitoring device as a node or gateway. - If the configuration information defines the role of a tag, a commission signal may subsequently be provided to commission the tag at 1430. Subsequently, role-based communications may be received from, and transmitted to, the tag at 1440 during the operation of the configurable monitoring device as a tag. The tag may later be provided a decommission signal to decommission the
tag 1450. Once decommissioned, the tag may await re-commissioning at 1430 by providing another commission signal. - FIGS. 13 and 15-17 illustrate example windows for displaying aspects of a user interface that may be implemented on a monitoring terminal.
FIG. 13 illustrates anexample window 1300 displaying a rendered representation of a monitoring system. Thetag map 1310 illustrates an example sales floor for a retail environment. Thetag map 1310 includes location-based representations of nodes (referred to as “hubs”) that are positioned at various locations throughout the sales floor. The nodes are uniquely identified by a label (e.g., “Hub 14”) followed by an associated tag count in parentheses, indicating the number of nearby tags (or tags within range of the signals (e.g., ping signals) being provided by the nodes. When the monitoring terminal determines, based on communications from the tags or the nodes, that a tag has moved, such that the tag is disassociated with a first node and newly associated with a second node, the tag count may be decremented at first node and incremented at the second node. Thetag map 1310 also depicts POS nodes (e.g., “Pos2”, “Pos 3”, etc.). Near the entry area a gate node, “Gate1”, is depicted which is configured to protect the entry/exit area. Thetag map 1310 also includes a gateway node, “Root0” configured to interface with an external network, to which the monitoring terminal may be connected. - The
example window 1300 also includes atag tree 1320. Thetag tree 1320 includes a listing of the nodes that are members of the monitoring system. A node that has tags within range, such as Hub16, may be expanded to display entries for each tag that is currently within range of, or otherwise associated with the node. As tags move form node to node, thetag tree 1320 may be updated to show the current associations between the tags and the nodes. Thetag tree 1320 also includes astatus legend 1321 for describing the status of the tags or nodes. In this regard, the monitoring terminal may be configured to highlight, for example, an alarming tag red, an unresponsive tag purple, and a low battery tag yellow, or some other color/highlighting scheme may be employed. - The
example window 1300 also includes anevent log 1330. The information depicted in the event log may be linked to the currently selected item in thetag tree 1320. As such, event information for the selected tag may be displayed. A time stamp may be associated with each event. Example events may include tag movement between node events, alarm events, failed communications events, tamper events, low battery events, etc. -
FIG. 15 illustrates an exampletag information window 1500 for attribute information associated with a tag or node. The exampletag information window 1500 depicts attribute information for a tag. Animage 1510 of an article to which the associated tag is affixed may be provided in the exampletag information window 1500. Further, additional attribute information may be provided in thetabular area 1520, such as the tag address, the current battery level, the currently associated hub, a description of the affixed article, a stock-keeping unit (SKU) value, the time/date of the last report from the tag, the time/date of the last transition between nodes for the tag, the time/date of the last commission of the tag, the time/date of the last decommission of the tag, and the like. -
FIG. 16 illustrates an examplehub information window 1600. Thehub information window 1600 may include atabular area 1610 that includes information about the hub (or node). Example hub attribute information may include the hub address, the hub label or description, the battery level for the hub, the current number of associated tags, the date/time that the hub last reported, for example, to the monitoring terminal, and the like. -
FIG. 17 illustrates an examplebattery level window 1700 for a tag. The battery level window may include a graphical representation of the past and current battery level on a line graph. The graph may be provided with respect to voltage on the y-axis, and time on the x-axis. Athreshold battery level 1730 may also be included on the graph, which may indicate the battery level that would place the tag in a low battery status. - Many of applications and functionality described herein utilize wireless communications between the monitoring
terminal 62 and the configurable monitoring devices. In addition to, or in lieu of, communicating with individual tags via this air interface, thecommunications interface 252 of themonitoring terminal 62 may communicate with a separate bridge device to forward and receive information and data to and from configurable monitoring devices. The bridge device may operate unilaterally or in conjunction with themonitoring terminal 62 to manage configurable monitoring devices. The bridge device, which may be a hand-held scanner-type device, can be configured to operate in one of two communication modes to interface with tags affixed to retail products for security, inventory, and other purposes. In a first communication mode, the bridge device is configured to communicate with tags that are configured for RFID type communications. For example, the tags and the bridge device may be configured to communicate in accordance with the Generation II Ultra High Frequency (UHF) RFID standards. In a second communication mode, the bridge device is configured to communicate with tags using a protocol built on the IEEE 802.15.4 standard, such as ZigBee or a proprietary protocol built on IEEE 802.15.4. To support the dual modes of communication, the bridge device may include a transmitter/receiver and an antenna configured to support IEEE 802.15.4, as well as, a modulator/demodulator, and possibly a separate antenna, to support RFID communications. According to some example embodiments, the bridge device may include a configurable monitoring device configured to operate a bridge device. Via seamless transition between the two communications modes, a single, possibly hand-held, bridge device can operate as a tag reader, and may be used to communicate with disparate types of tags. Communications with the tags may be performed for a variety of reasons, such as for counting inventory, price checking, tag firmware upgrades, tag encoding, and the like. - The flexible nature of the configurable monitoring device and the monitoring system of embodiments of the present invention may enable dynamic configuration of configurable monitoring devices within a network to introduce robust capabilities for providing services and functionality and, for providing updates to existing capabilities with updated configuration information. Embodiments of the present invention may be implemented by various means, such as hardware, firmware, processor, circuitry and/or other device associated with execution of software including one or more computer program instructions. For example, one or more of the procedures or activities described above may be embodied by computer program instructions. In this regard, the computer program instructions which embody the procedures or activities described above may be stored by a memory device of an apparatus employing an embodiment of the present invention and executed by a processor in the apparatus. As will be appreciated, any such computer program instructions may be loaded onto a computer or other programmable apparatus (e.g., hardware) to produce a machine, such that the resulting computer or other programmable apparatus embody means for implementing the functions specified in the corresponding procedure or activity. These computer program instructions may also be stored in a computer-readable storage memory (as opposed to a computer-readable transmission medium such as a carrier wave or electromagnetic signal) that may direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture the execution of which implements the function specified in the corresponding procedure or activity. The computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the corresponding procedure or activity described above.
- Also, the terms “substantially,” “about,” “approximately” or the like as used herein are intended to reflect variances in a value or relationship that may be due to various factors such as the effects of environmental conditions, common error tolerances, or the like. It should further be understood that although some values or other relationships may be expressed herein without a modifier, these values or other relationships may also be exact or may include a degree of variation due to various factors such as the effects of environmental conditions, common error tolerances, or the like.
- Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the inventions are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of this disclosure. Moreover, although the foregoing descriptions and the associated drawings describe exemplary embodiments in the context of certain exemplary combinations of elements and/or functions, it should be appreciated that different combinations of elements and/or functions may be provided by alternative embodiments without departing from the scope of this disclosure. In this regard, for example, different combinations of elements and/or functions than those explicitly described above are also contemplated as may be set forth in some of this disclosure. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Claims (27)
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/636,564 US20110068906A1 (en) | 2009-09-21 | 2009-12-11 | Systems, methods, and apparatuses for managing configurable monitoring devices |
MX2012003457A MX2012003457A (en) | 2009-09-21 | 2010-09-21 | Retail product tracking system, method, and apparatus. |
CN201080051263.5A CN102741893B (en) | 2009-09-21 | 2010-09-21 | Systems, methods, and apparatuses for managing configurable monitoring devices |
AU2010295352A AU2010295352B2 (en) | 2009-09-21 | 2010-09-21 | Retail product tracking system, method, and apparatus |
PCT/US2010/049653 WO2011035302A1 (en) | 2009-09-21 | 2010-09-21 | Retail product tracking system, method, and apparatus |
EP10763513A EP2481035A1 (en) | 2009-09-21 | 2010-09-21 | Retail product tracking system, method, and apparatus |
PCT/US2010/049672 WO2011035309A2 (en) | 2009-09-21 | 2010-09-21 | Systems, methods, and apparatuses for managing configurable monitoring devices |
US12/887,228 US8452868B2 (en) | 2009-09-21 | 2010-09-21 | Retail product tracking system, method, and apparatus |
US13/901,926 US20160239794A9 (en) | 2009-09-21 | 2013-05-24 | Retail product tracking system, method, and apparatus |
Applications Claiming Priority (11)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US24432009P | 2009-09-21 | 2009-09-21 | |
US24639309P | 2009-09-28 | 2009-09-28 | |
US24638809P | 2009-09-28 | 2009-09-28 | |
US24826909P | 2009-10-02 | 2009-10-02 | |
US24823909P | 2009-10-02 | 2009-10-02 | |
US24822309P | 2009-10-02 | 2009-10-02 | |
US24824209P | 2009-10-02 | 2009-10-02 | |
US24822809P | 2009-10-02 | 2009-10-02 | |
US24823309P | 2009-10-02 | 2009-10-02 | |
US24819609P | 2009-10-02 | 2009-10-02 | |
US12/636,564 US20110068906A1 (en) | 2009-09-21 | 2009-12-11 | Systems, methods, and apparatuses for managing configurable monitoring devices |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/628,863 Continuation-In-Part US8508367B2 (en) | 2009-09-21 | 2009-12-01 | Configurable monitoring device |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/887,228 Continuation-In-Part US8452868B2 (en) | 2009-09-21 | 2010-09-21 | Retail product tracking system, method, and apparatus |
Publications (1)
Publication Number | Publication Date |
---|---|
US20110068906A1 true US20110068906A1 (en) | 2011-03-24 |
Family
ID=43756143
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/628,863 Expired - Fee Related US8508367B2 (en) | 2009-09-21 | 2009-12-01 | Configurable monitoring device |
US12/636,564 Abandoned US20110068906A1 (en) | 2009-09-21 | 2009-12-11 | Systems, methods, and apparatuses for managing configurable monitoring devices |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/628,863 Expired - Fee Related US8508367B2 (en) | 2009-09-21 | 2009-12-01 | Configurable monitoring device |
Country Status (3)
Country | Link |
---|---|
US (2) | US8508367B2 (en) |
CN (1) | CN102741893B (en) |
WO (2) | WO2011035303A1 (en) |
Cited By (81)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100231388A1 (en) * | 2009-03-12 | 2010-09-16 | Checkpoint Systems, Inc. | Disposable cable lock and detachable alarm module |
US20110068921A1 (en) * | 2009-09-21 | 2011-03-24 | Checkpoint Systems, Inc. | configurable monitoring device |
NL2007029C2 (en) * | 2011-02-24 | 2012-08-27 | Cross Point B V | SYSTEM WITH ARTICLE-MONITORING DEVICE, ARTICLE-MONITORING DEVICE AND METHOD FOR VISUALIZING SET-UP INFORMATION. |
US20120236768A1 (en) * | 2011-03-18 | 2012-09-20 | Honeywell International Inc. | Adapter device for coupling an industrial field instrument to an industrial wireless network and related system and method |
US20120323636A1 (en) * | 2011-06-16 | 2012-12-20 | Luis Albisu | Methods, Devices, and Computer Program Products for Associating a Tag With a Recorded Event |
US20130067018A1 (en) * | 2011-09-13 | 2013-03-14 | Patrick A. Reynolds | Methods and computer program products for monitoring the contents of network traffic in a network device |
US20130120119A1 (en) * | 2011-11-16 | 2013-05-16 | Symbol Technologies, Inc. | Adapting radio frequency identification reqader power levels |
US20130297976A1 (en) * | 2012-05-04 | 2013-11-07 | Paraccel, Inc. | Network Fault Detection and Reconfiguration |
US8640509B2 (en) | 2010-04-30 | 2014-02-04 | Checkpoint Systems, Inc. | Security assembly for attachment to an object |
US20140075020A1 (en) * | 2012-09-10 | 2014-03-13 | Masato Takahashi | Server device, information processing method, and computer program product |
US20140081786A1 (en) * | 2011-05-27 | 2014-03-20 | Nec Infrontia Corporation | Pos system, bar code scanner, and method for controlling pos system |
WO2014074816A1 (en) * | 2012-11-09 | 2014-05-15 | Hirsch Kenneth A | System for item and location information distribution |
US20140132412A1 (en) * | 2012-09-07 | 2014-05-15 | Juan José DECO | Wi-fi tracker system for persons and objects |
US20140162690A1 (en) * | 2010-09-22 | 2014-06-12 | General Electric Company | System and method for determining the location of wireless sensors |
CN103996259A (en) * | 2014-06-04 | 2014-08-20 | 广西科技大学鹿山学院 | Multi-point-control pneumatic door/window anti-theft alarm triggering device |
US8818417B2 (en) | 2011-10-13 | 2014-08-26 | Honeywell International Inc. | Method for wireless device location using automatic location update via a provisioning device and related apparatus and system |
US8878673B2 (en) | 2011-05-19 | 2014-11-04 | Invue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
US8890694B2 (en) | 2012-09-13 | 2014-11-18 | W G Security Products | Anti-theft hang tag |
CN104269022A (en) * | 2014-10-11 | 2015-01-07 | 郑州捷利工业设备有限公司 | Wireless voice distress calling device |
EP2866177A1 (en) * | 2013-10-28 | 2015-04-29 | Samsung Electro-Mechanics Co., Ltd. | Method of grouping electronic tags and method of managing group IDs |
US20150161423A1 (en) * | 2005-09-30 | 2015-06-11 | Zebra Enterprise Solutions Corp. | Wide-area dynamic rfid system using uwb |
US20150206118A1 (en) * | 2014-01-23 | 2015-07-23 | Pomo Search Ltd | System and method for point of sale transaction logging |
US20160019515A1 (en) * | 2014-07-16 | 2016-01-21 | Sony Corporation | Mesh network applied to fixed establishment with movable items therein |
US9298954B1 (en) * | 2010-02-03 | 2016-03-29 | Synapse Wireless, Inc. | Tag security systems and methods for articles of merchandise |
US20160171861A1 (en) * | 2014-12-15 | 2016-06-16 | Autodesk, Inc. | Smart tools and workspaces for do-it-yourself tasks |
US9405285B2 (en) | 2011-03-18 | 2016-08-02 | Honeywell International Inc. | Interface for local configuration and monitoring of an industrial field device with support for provisioning onto an industrial wireless network and related system and method |
US9437088B2 (en) | 2013-09-29 | 2016-09-06 | Invue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
US9443406B2 (en) * | 2014-12-18 | 2016-09-13 | Checkpoint Systems, Inc. | Dual mode security tags |
EP3070978A1 (en) * | 2015-03-18 | 2016-09-21 | SK Planet Co., Ltd. | Apparatus and method for providing payment service based on beacon in beacon service system |
WO2016177939A1 (en) * | 2015-05-04 | 2016-11-10 | Noccela Oy | A system, method and apparatuses for electronic article surveillance |
US9507976B2 (en) | 2011-08-22 | 2016-11-29 | Metrologic Instruments, Inc. | Encoded information reading terminal with item locate functionality |
US9516461B2 (en) | 2014-07-16 | 2016-12-06 | Sony Corporation | Mesh network applied to arena events |
US9567776B2 (en) | 2013-06-11 | 2017-02-14 | Invue Security Products Inc. | Anti-theft device for portable electronic device |
CN106463028A (en) * | 2014-04-16 | 2017-02-22 | 因戴姆解决方案有限责任公司 | Fitting room management and occupancy monitoring system |
CN106463035A (en) * | 2014-04-23 | 2017-02-22 | 乔凡尼·萨尔沃 | Methods, devices, kits and systems for modulating activation of self-alarming tags |
GB2548972A (en) * | 2016-02-19 | 2017-10-04 | Wal Mart Stores Inc | A multi-capability apparatus supporting background RFID tag-reading and corresponding methods |
US9826368B2 (en) | 2014-07-16 | 2017-11-21 | Sony Corporation | Vehicle ad hoc network (VANET) |
US9900748B2 (en) | 2014-07-16 | 2018-02-20 | Sony Corporation | Consumer electronics (CE) device and related method for providing stadium services |
GB2553017A (en) * | 2016-05-18 | 2018-02-21 | Symbol Technologies Llc | Arrangement for, and method of, reading RFID product tags with improved performance by reading RFID tags of interest in a venue |
US9906897B2 (en) | 2014-07-16 | 2018-02-27 | Sony Corporation | Applying mesh network to pet carriers |
GB2554134A (en) * | 2016-07-07 | 2018-03-28 | Symbol Technologies Llc | System for and method of deterring theft of items from a venue |
GB2561257A (en) * | 2017-04-07 | 2018-10-10 | Sita Inf Networking Computing Usa Inc | Article tracking system and method |
US20180332548A1 (en) * | 2017-05-09 | 2018-11-15 | U.S.A. as represented by the Administrator of NASA | System and Method to Synchronize Clocks Across a Distributed Network of Nodes |
US20190006037A1 (en) * | 2017-06-28 | 2019-01-03 | Perceptimed, Inc. | Inventory Assurance |
AU2013305512B2 (en) * | 2012-08-24 | 2019-01-17 | Perceptimed, Inc. | Package locating system |
US10223881B2 (en) | 2015-02-18 | 2019-03-05 | Invue Security Products Inc. | System and method for calibrating a wireless security range |
CN109801122A (en) * | 2017-11-16 | 2019-05-24 | 松下电器(美国)知识产权公司 | Trade managing system, exchange management method and program |
US10441867B2 (en) * | 2013-06-04 | 2019-10-15 | Isolynx, Llc | Systems and methods for tracking tag management |
US10482739B2 (en) | 2015-06-25 | 2019-11-19 | Invue Security Products Inc. | Wireless merchandise security system |
US10535425B2 (en) | 2017-06-28 | 2020-01-14 | Perceptimed, Inc. | Inventory management |
US10740503B1 (en) * | 2019-01-17 | 2020-08-11 | Middle Chart, LLC | Spatial self-verifying array of nodes |
US10760991B2 (en) | 2017-02-22 | 2020-09-01 | Middle Chart, LLC | Hierarchical actions based upon monitored building conditions |
US10762251B2 (en) | 2017-02-22 | 2020-09-01 | Middle Chart, LLC | System for conducting a service call with orienteering |
US10776529B2 (en) | 2017-02-22 | 2020-09-15 | Middle Chart, LLC | Method and apparatus for enhanced automated wireless orienteering |
US10824774B2 (en) * | 2019-01-17 | 2020-11-03 | Middle Chart, LLC | Methods and apparatus for healthcare facility optimization |
US10831945B2 (en) | 2017-02-22 | 2020-11-10 | Middle Chart, LLC | Apparatus for operation of connected infrastructure |
US10872179B2 (en) | 2017-02-22 | 2020-12-22 | Middle Chart, LLC | Method and apparatus for automated site augmentation |
US10877127B2 (en) * | 2018-09-24 | 2020-12-29 | Science Applications International Corporation | System and method for dismounted assured position, navigation and timing (DAPNT) |
US10902160B2 (en) | 2017-02-22 | 2021-01-26 | Middle Chart, LLC | Cold storage environmental control and product tracking |
RU2744229C1 (en) * | 2020-06-04 | 2021-03-03 | Андрей Александрович Красовский | Wireless ultra frequency detector of signals and commands of uhf rfid readers and method for detecting signals and commands of uhf rfid readers |
CN112492526A (en) * | 2014-05-28 | 2021-03-12 | 联邦快递服务公司 | Enabling node delivery notifications using elements of a wireless node network |
US10949579B2 (en) | 2017-02-22 | 2021-03-16 | Middle Chart, LLC | Method and apparatus for enhanced position and orientation determination |
US10984146B2 (en) | 2017-02-22 | 2021-04-20 | Middle Chart, LLC | Tracking safety conditions of an area |
US11054335B2 (en) | 2017-02-22 | 2021-07-06 | Middle Chart, LLC | Method and apparatus for augmented virtual models and orienteering |
US11120172B2 (en) | 2017-02-22 | 2021-09-14 | Middle Chart, LLC | Apparatus for determining an item of equipment in a direction of interest |
EP3913590A1 (en) * | 2020-05-20 | 2021-11-24 | 3SI Security Systems Inc. | Security tracking device with zone-based alert suppression |
US11188686B2 (en) | 2017-02-22 | 2021-11-30 | Middle Chart, LLC | Method and apparatus for holographic display based upon position and direction |
US11194938B2 (en) | 2020-01-28 | 2021-12-07 | Middle Chart, LLC | Methods and apparatus for persistent location based digital content |
US11348421B2 (en) * | 2018-12-14 | 2022-05-31 | Invue Security Products Inc. | Wireless tracking system for merchandise security |
US11436389B2 (en) | 2017-02-22 | 2022-09-06 | Middle Chart, LLC | Artificial intelligence based exchange of geospatial related digital content |
US11468209B2 (en) | 2017-02-22 | 2022-10-11 | Middle Chart, LLC | Method and apparatus for display of digital content associated with a location in a wireless communications area |
US11475177B2 (en) | 2017-02-22 | 2022-10-18 | Middle Chart, LLC | Method and apparatus for improved position and orientation based information display |
US11481527B2 (en) | 2017-02-22 | 2022-10-25 | Middle Chart, LLC | Apparatus for displaying information about an item of equipment in a direction of interest |
US11507714B2 (en) | 2020-01-28 | 2022-11-22 | Middle Chart, LLC | Methods and apparatus for secure persistent location based digital content |
WO2022256689A1 (en) * | 2021-06-04 | 2022-12-08 | Invue Security Products Inc. | Wireless beacon tracking system for merchandise security |
US11625510B2 (en) | 2017-02-22 | 2023-04-11 | Middle Chart, LLC | Method and apparatus for presentation of digital content |
US11640486B2 (en) | 2021-03-01 | 2023-05-02 | Middle Chart, LLC | Architectural drawing based exchange of geospatial related digital content |
WO2023111035A1 (en) * | 2021-12-14 | 2023-06-22 | Zliide Technologies Aps | A system for securing and tracking consumer goods |
US11688258B2 (en) * | 2019-08-30 | 2023-06-27 | Sensormatic Electronics, LLC | Radio frequency identification (RFID) tag location verification using short range communication |
US11900022B2 (en) | 2017-02-22 | 2024-02-13 | Middle Chart, LLC | Apparatus for determining a position relative to a reference transceiver |
US11900021B2 (en) | 2017-02-22 | 2024-02-13 | Middle Chart, LLC | Provision of digital content via a wearable eye covering |
Families Citing this family (145)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6686838B1 (en) * | 2000-09-06 | 2004-02-03 | Xanboo Inc. | Systems and methods for the automatic registration of devices |
US6658091B1 (en) | 2002-02-01 | 2003-12-02 | @Security Broadband Corp. | LIfestyle multimedia security system |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US20090077623A1 (en) | 2005-03-16 | 2009-03-19 | Marc Baum | Security Network Integrating Security System and Network Devices |
US10142392B2 (en) | 2007-01-24 | 2018-11-27 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US7711796B2 (en) | 2006-06-12 | 2010-05-04 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US10062273B2 (en) | 2010-09-28 | 2018-08-28 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US8635350B2 (en) | 2006-06-12 | 2014-01-21 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US10200504B2 (en) | 2007-06-12 | 2019-02-05 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11368429B2 (en) | 2004-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US9531593B2 (en) | 2007-06-12 | 2016-12-27 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US20170118037A1 (en) | 2008-08-11 | 2017-04-27 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US10444964B2 (en) | 2007-06-12 | 2019-10-15 | Icontrol Networks, Inc. | Control system user interface |
US10339791B2 (en) | 2007-06-12 | 2019-07-02 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US10348575B2 (en) | 2013-06-27 | 2019-07-09 | Icontrol Networks, Inc. | Control system user interface |
US11489812B2 (en) | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10375253B2 (en) | 2008-08-25 | 2019-08-06 | Icontrol Networks, Inc. | Security system with networked touchscreen and gateway |
US9141276B2 (en) | 2005-03-16 | 2015-09-22 | Icontrol Networks, Inc. | Integrated interface for mobile device |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US8963713B2 (en) | 2005-03-16 | 2015-02-24 | Icontrol Networks, Inc. | Integrated security network with security alarm signaling system |
US20050216302A1 (en) | 2004-03-16 | 2005-09-29 | Icontrol Networks, Inc. | Business method for premises management |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US9729342B2 (en) | 2010-12-20 | 2017-08-08 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US10156959B2 (en) | 2005-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US11159484B2 (en) | 2004-03-16 | 2021-10-26 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US20110128378A1 (en) | 2005-03-16 | 2011-06-02 | Reza Raji | Modular Electronic Display Platform |
US9306809B2 (en) | 2007-06-12 | 2016-04-05 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US20120324566A1 (en) | 2005-03-16 | 2012-12-20 | Marc Baum | Takeover Processes In Security Network Integrated With Premise Security System |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US20170180198A1 (en) | 2008-08-11 | 2017-06-22 | Marc Baum | Forming a security network including integrated security system components |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US7633385B2 (en) | 2007-02-28 | 2009-12-15 | Ucontrol, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US8451986B2 (en) | 2007-04-23 | 2013-05-28 | Icontrol Networks, Inc. | Method and system for automatically providing alternate network access for telecommunications |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
FR2925736B1 (en) * | 2007-12-21 | 2010-09-24 | Eads Secure Networks | METHOD FOR PRODUCING PROOF OF PRESENCE OR OPERATION OF AN ENTITY IN AN IDENTIFIED AREA DURING A PERIOD EXCEEDING A THRESHOLD, AND MONITORING SYSTEM |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US20170070563A1 (en) * | 2008-08-11 | 2017-03-09 | Ken Sundermeyer | Data model for home automation |
US20170185278A1 (en) | 2008-08-11 | 2017-06-29 | Icontrol Networks, Inc. | Automation system user interface |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US10530839B2 (en) | 2008-08-11 | 2020-01-07 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US8638211B2 (en) | 2009-04-30 | 2014-01-28 | Icontrol Networks, Inc. | Configurable controller and interface for home SMA, phone and multimedia |
US9765551B2 (en) * | 2009-06-15 | 2017-09-19 | Universal Surveillance Corporation | Article surveillance tag |
US8315617B2 (en) | 2009-10-31 | 2012-11-20 | Btpatent Llc | Controlling mobile device functions |
US8145199B2 (en) | 2009-10-31 | 2012-03-27 | BT Patent LLC | Controlling mobile device functions |
US8451109B1 (en) * | 2010-01-07 | 2013-05-28 | F3M3 Companies, Inc. | System and method for improving vehicle operator awareness |
TR201808160T4 (en) * | 2010-01-19 | 2018-07-23 | Bluechain Pty Ltd | Method, device and system for securing payment data for transmission over open communication networks. |
JP5168596B2 (en) * | 2010-01-29 | 2013-03-21 | 横河電機株式会社 | Control network system |
US10206570B2 (en) * | 2010-02-28 | 2019-02-19 | Covidien Lp | Adaptive wireless body networks |
US20110213217A1 (en) * | 2010-02-28 | 2011-09-01 | Nellcor Puritan Bennett Llc | Energy optimized sensing techniques |
AU2011250886A1 (en) | 2010-05-10 | 2013-01-10 | Icontrol Networks, Inc | Control system user interface |
DE102010029671B4 (en) * | 2010-06-02 | 2012-03-01 | Cargoguard Gmbh | Backup module for position monitoring of objects |
US8836467B1 (en) | 2010-09-28 | 2014-09-16 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US9147337B2 (en) | 2010-12-17 | 2015-09-29 | Icontrol Networks, Inc. | Method and system for logging security event data |
US20120262292A1 (en) * | 2011-04-14 | 2012-10-18 | Martin Moser | Portable device inventory tracking |
US8941495B2 (en) * | 2011-06-10 | 2015-01-27 | Checkpoint Systems, Inc. | Wireless shelf pusher activity detection system and associated methods |
US8976541B2 (en) * | 2011-08-31 | 2015-03-10 | Potens Ip Holdings Llc | Electrical power and data distribution apparatus |
US9041527B2 (en) | 2012-04-20 | 2015-05-26 | Numerex Corp. | System and method for using alarm system zones for remote objects |
US9037922B1 (en) * | 2012-05-01 | 2015-05-19 | Amazon Technololgies, Inc. | Monitoring and analysis of operating states in a computing environment |
US9423870B2 (en) | 2012-05-08 | 2016-08-23 | Google Inc. | Input determination method |
US9324220B2 (en) * | 2012-08-21 | 2016-04-26 | Southern Imperial, Inc. | Theft detection device and method for controlling same |
US10270709B2 (en) | 2015-06-26 | 2019-04-23 | Microsoft Technology Licensing, Llc | Allocating acceleration component functionality for supporting services |
US20140249887A1 (en) * | 2013-03-01 | 2014-09-04 | Rapidblue Solutions Oy | System for monitoring customers within retail premises |
EP2973208A2 (en) * | 2013-03-15 | 2016-01-20 | Assa Abloy Ab | Tamper credential |
US20140313040A1 (en) * | 2013-04-23 | 2014-10-23 | John Richard Wright, SR. | Tactile and Visual Smoke Detector System |
US10582374B2 (en) * | 2014-01-02 | 2020-03-03 | Connovate Technology Private Ltd | Wirelessly triggering smart devices |
US9792792B2 (en) * | 2014-02-14 | 2017-10-17 | B&G Plastics, Inc. | Security tag for wire handle |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
KR20160014242A (en) * | 2014-07-29 | 2016-02-11 | 삼성전자주식회사 | Method and device for mapping location of sensor and event operation with monitoring device |
US20170277888A1 (en) * | 2014-08-25 | 2017-09-28 | ACCO Brands Corporation | Security device for an electronic apparatus |
BR112017013997B1 (en) * | 2014-12-29 | 2022-06-28 | Invue Security Products Inc | MERCHANDISE SECURITY SYSTEM AND METHOD FOR PROTECTING AN THEFT-SUSCEPTIBLE MERCHANDISE |
US10009667B2 (en) | 2014-12-31 | 2018-06-26 | Walmart Apollo, Llc | System and method for monitoring gas emission of perishable products |
US10521614B2 (en) | 2015-03-03 | 2019-12-31 | GBT Technologies, Inc. | Electronic circuits for secure communications and associated systems and methods |
US20160275767A1 (en) * | 2015-03-16 | 2016-09-22 | Menonthemoon Pty Ltd. | Intelligent beacon and system including same |
US9723448B2 (en) * | 2015-04-01 | 2017-08-01 | AthenTek Incorporated | Tracking device, battery charger, and tracking method thereof |
US20160308952A1 (en) * | 2015-04-17 | 2016-10-20 | Sennco Solutions, Inc. | Apparatus, system and method for wirelessly collecting data corresponding to a security device |
US10511478B2 (en) * | 2015-04-17 | 2019-12-17 | Microsoft Technology Licensing, Llc | Changing between different roles at acceleration components |
US9792154B2 (en) | 2015-04-17 | 2017-10-17 | Microsoft Technology Licensing, Llc | Data processing system having a hardware acceleration plane and a software plane |
US10296392B2 (en) | 2015-04-17 | 2019-05-21 | Microsoft Technology Licensing, Llc | Implementing a multi-component service using plural hardware acceleration components |
US10198294B2 (en) | 2015-04-17 | 2019-02-05 | Microsoft Licensing Technology, LLC | Handling tenant requests in a system that uses hardware acceleration components |
CN107750356B (en) * | 2015-05-08 | 2020-02-14 | 西安姆贝拉有限公司 | Method and apparatus for automated software development of a set of controller-based devices |
US10216555B2 (en) | 2015-06-26 | 2019-02-26 | Microsoft Technology Licensing, Llc | Partially reconfiguring acceleration components |
US10496968B2 (en) * | 2015-09-25 | 2019-12-03 | Everi Payments Inc. | Financial terminal that automatically reconfigures into different financial processing terminal types |
CN105160375B (en) * | 2015-10-15 | 2019-02-12 | 丹阳伦图电子技术有限公司 | A kind of wireless articles loss prevention system based on ESL |
US20170168082A1 (en) * | 2015-12-15 | 2017-06-15 | Checkpoint Systems, Inc. | Apparatus and method for motion vector threshold determination |
US10021522B2 (en) * | 2016-01-06 | 2018-07-10 | Gopher Protocol Inc. | Tracking devices, systems and methods using patch packages with embedded electronic circuits |
US10466111B2 (en) * | 2016-05-05 | 2019-11-05 | Walmart Apollo, Llc | Systems and methods for monitoring temperature or movement of merchandise |
US20180040219A1 (en) * | 2016-08-04 | 2018-02-08 | Tyco Fire & Security Gmbh | Tag detection using waveform radiating devices |
US10140834B2 (en) * | 2016-08-08 | 2018-11-27 | Blackberry Limited | Mobile transceiver having asset-based alarm profile and a method of operation |
US20190183259A1 (en) | 2016-08-31 | 2019-06-20 | Invue Security Products Inc. | Modular shelf sweep detector |
US10222449B2 (en) * | 2016-12-14 | 2019-03-05 | Nxp B.V. | System and method for determining location of object using RFID tag |
EP3596593A4 (en) | 2017-03-14 | 2021-01-27 | Ciambella Ltd. | Method and apparatus for automatically generating and incorporating code in development environments |
CN116629743A (en) | 2017-05-23 | 2023-08-22 | 沃尔玛阿波罗有限责任公司 | Automated inspection system |
US11080976B2 (en) * | 2017-06-15 | 2021-08-03 | Ncr Corporation | Real time bypass detection in scanner |
US10117052B1 (en) * | 2017-08-16 | 2018-10-30 | Tile, Inc. | Tracking device operation in behavior-classified zone |
US10490039B2 (en) | 2017-12-21 | 2019-11-26 | At&T Intellectual Property I, L.P. | Sensors for detecting and monitoring user interaction with a device or product and systems for analyzing sensor data |
US10621815B2 (en) | 2018-02-02 | 2020-04-14 | Aristocrat Technologies Australia Pty Limited | Electronic gaming machine and methods for displaying supplemental information |
US11448632B2 (en) | 2018-03-19 | 2022-09-20 | Walmart Apollo, Llc | System and method for the determination of produce shelf life |
US10885753B2 (en) | 2018-03-21 | 2021-01-05 | Fasteners For Retail, Inc. | Anti-theft device with remote alarm feature |
US11393082B2 (en) | 2018-07-26 | 2022-07-19 | Walmart Apollo, Llc | System and method for produce detection and classification |
CN109242563A (en) * | 2018-09-03 | 2019-01-18 | 索信科技(北京)有限公司 | A kind of intelligent information monitoring application method and system |
US11539609B2 (en) * | 2018-09-11 | 2022-12-27 | Trilliant Networks, Inc. | Method and apparatus for reporting power down events in a network node without a backup energy storage device |
US11715059B2 (en) | 2018-10-12 | 2023-08-01 | Walmart Apollo, Llc | Systems and methods for condition compliance |
WO2020106332A1 (en) | 2018-11-20 | 2020-05-28 | Walmart Apollo, Llc | Systems and methods for assessing products |
CN110009845B (en) * | 2018-11-27 | 2021-03-09 | 杭州朗泽安防技术有限公司 | Warning system for commodity safety |
WO2021026127A1 (en) * | 2019-08-05 | 2021-02-11 | Xlink Enterprises, Inc. | Merchandise security tag |
US11589303B2 (en) * | 2019-10-10 | 2023-02-21 | Qualcomm Incorporated | Power-saving mode indication |
US11087601B1 (en) | 2020-04-02 | 2021-08-10 | Fasteners For Retail, Inc | Anti-theft device with cable attachment |
USD956607S1 (en) | 2020-04-16 | 2022-07-05 | Fasteners For Retail, Inc. | Security tag holder |
US20210334925A1 (en) * | 2020-04-23 | 2021-10-28 | Sennco Solutions, Inc. | Network detection-based monitoring of electronic merchandise |
CN114821930A (en) * | 2022-04-18 | 2022-07-29 | 深圳市东峰盛科技有限公司 | Alarm method and device applied to target area, electronic equipment and storage medium |
Citations (103)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4021807A (en) * | 1975-04-02 | 1977-05-03 | Texas Instruments Incorporated | Beacon tracking system |
US4141006A (en) * | 1976-07-14 | 1979-02-20 | Braxton Kenneth J | Security system for centralized monitoring and selective reporting of remote alarm conditions |
US4141078A (en) * | 1975-10-14 | 1979-02-20 | Innovated Systems, Inc. | Library circulation control system |
US4196418A (en) * | 1976-11-01 | 1980-04-01 | N.V. Nederlandsche Apparatenfabriek Nedap | Detection plate for an identification system |
US4327353A (en) * | 1978-03-06 | 1982-04-27 | George W. Beard | Security system |
US4572976A (en) * | 1982-12-10 | 1986-02-25 | N.V. Nederlandsche Apparatenfabriek Nedap | Transponder for electromagnetic detection system with non-linear circuit |
US4580041A (en) * | 1983-12-09 | 1986-04-01 | Walton Charles A | Electronic proximity identification system with simplified low power identifier |
US4656463A (en) * | 1983-04-21 | 1987-04-07 | Intelli-Tech Corporation | LIMIS systems, devices and methods |
US4667185A (en) * | 1985-12-06 | 1987-05-19 | Minnesota Mining And Manufacturing Company | Wireless synchronization system for electronic article surveillance system |
US4742341A (en) * | 1985-06-14 | 1988-05-03 | N.V. Nederlandsche Apparatenfabriek Nedap | Electromagnetic detection system, as well as a responder for such a system |
US4746830A (en) * | 1986-03-14 | 1988-05-24 | Holland William R | Electronic surveillance and identification |
US4814751A (en) * | 1987-02-27 | 1989-03-21 | Wildlife Materials, Inc. | Patient tracking system |
US4827395A (en) * | 1983-04-21 | 1989-05-02 | Intelli-Tech Corporation | Manufacturing monitoring and control systems |
US4907845A (en) * | 1988-09-16 | 1990-03-13 | Salomon Sa | Bed patient monitoring system |
US4918432A (en) * | 1988-09-27 | 1990-04-17 | B. I. Incorporated | House arrest monitoring system |
US4924210A (en) * | 1987-03-17 | 1990-05-08 | Omron Tateisi Electronics Company | Method of controlling communication in an ID system |
US4926161A (en) * | 1989-10-23 | 1990-05-15 | Cupp Ted W | Method of monitoring golf carts on a golf course |
US5006830A (en) * | 1989-10-16 | 1991-04-09 | Rebecca Merritt | Method and device for deterring the unauthorized removal of a newborn from a defined area |
US5008660A (en) * | 1988-03-04 | 1991-04-16 | N.V. Nederlandsche Apparatenfabriek Nedap | Electromagnetic detection system |
US5014206A (en) * | 1988-08-22 | 1991-05-07 | Facilitech International Incorporated | Tracking system |
US5019815A (en) * | 1979-10-12 | 1991-05-28 | Lemelson Jerome H | Radio frequency controlled interrogator-responder system with passive code generator |
US5019813A (en) * | 1987-04-13 | 1991-05-28 | N.V. Nederlandsche Apparatenfabriek Nedap | System for the contactless exchange of data |
US5099227A (en) * | 1989-07-18 | 1992-03-24 | Indala Corporation | Proximity detecting apparatus |
US5099226A (en) * | 1991-01-18 | 1992-03-24 | Interamerican Industrial Company | Intelligent security system |
US5103222A (en) * | 1987-07-03 | 1992-04-07 | N.V. Nederlandsche Apparatenfabriek Nedap | Electronic identification system |
US5105190A (en) * | 1986-04-22 | 1992-04-14 | N.V. Nederlandsche Apparatenfabriek Nedap | Electromagnetic identification system |
US5151684A (en) * | 1991-04-12 | 1992-09-29 | Johnsen Edward L | Electronic inventory label and security apparatus |
US5181786A (en) * | 1989-11-15 | 1993-01-26 | N.V. Nederlandsche Apparatenfabriek Nedap | Method and apparatus for producing admission tickets |
US5214410A (en) * | 1989-07-10 | 1993-05-25 | Csir | Location of objects |
US5214409A (en) * | 1991-12-03 | 1993-05-25 | Avid Corporation | Multi-memory electronic identification tag |
US5288980A (en) * | 1992-06-25 | 1994-02-22 | Kingsley Library Equipment Company | Library check out/check in system |
US5317309A (en) * | 1990-11-06 | 1994-05-31 | Westinghouse Electric Corp. | Dual mode electronic identification system |
US5396224A (en) * | 1991-11-22 | 1995-03-07 | Hewlett-Packard Company | Telemetered patient location system and method |
US5596313A (en) * | 1995-05-16 | 1997-01-21 | Personal Security & Safety Systems, Inc. | Dual power security location system |
US5608380A (en) * | 1994-05-18 | 1997-03-04 | N.V. Nederlandsche Apparatenfabriek Nedap | Deactivation and coding system for a contactless antitheft or identification label |
US5709942A (en) * | 1991-05-20 | 1998-01-20 | Alliedsignal Inc. | Product and process improvement of coated polymeric monofilament |
US5874896A (en) * | 1996-08-26 | 1999-02-23 | Palomar Technologies Corporation | Electronic anti-shoplifting system employing an RFID tag |
US5881846A (en) * | 1997-04-17 | 1999-03-16 | Carttronics Llc | Security device for shopping carts and the like |
US6061914A (en) * | 1997-07-23 | 2000-05-16 | Speed France | Cutting line with improved degradability for brush cutters and edge trimmers |
US6181248B1 (en) * | 1995-11-29 | 2001-01-30 | N.V. Nederlandsche Apparatenfabriek Nedap | Deactivatable article security label with data carrier function |
US6380894B1 (en) * | 1999-08-30 | 2002-04-30 | Wherenet Corporation | Multi-lateration system with automatic calibration and error removal |
US6512478B1 (en) * | 1999-12-22 | 2003-01-28 | Rockwell Technologies, Llc | Location position system for relay assisted tracking |
US6703934B1 (en) * | 2000-04-11 | 2004-03-09 | Koninklijke Philips Electronics N.V. | Method for dynamic pricing of goods and services |
US6837427B2 (en) * | 2001-11-21 | 2005-01-04 | Goliath Solutions, Llc. | Advertising compliance monitoring system |
US6861954B2 (en) * | 2001-03-30 | 2005-03-01 | Bruce H. Levin | Tracking medical products with integrated circuits |
US20050110636A1 (en) * | 2001-10-12 | 2005-05-26 | Touraj Ghaffari | Real time total asset visibility system |
US20050202818A1 (en) * | 2004-03-15 | 2005-09-15 | Nec Corporation | System, communication device, and base station for wireless communications, and control method thereof |
US20050212663A1 (en) * | 2004-03-23 | 2005-09-29 | Michihiro Matsumoto | Equipment installation-place setting system, equipment control apparatus, electrical equipment, equipment installation-place setting method and computer-readable record medium storing equipment installation-place setting program |
US6984807B2 (en) * | 2002-07-12 | 2006-01-10 | Harley-Davidson Motor Company Group, Inc. | Heated motorcycle handgrips |
US20060022815A1 (en) * | 2004-07-30 | 2006-02-02 | Fischer Jeffrey H | Interference monitoring in an RFID system |
US20060033662A1 (en) * | 2004-07-27 | 2006-02-16 | Ubisense Limited | Location system |
US7007523B2 (en) * | 2003-02-24 | 2006-03-07 | Alpha Security Products, Inc. | Bottle security device |
US20060049250A1 (en) * | 2004-09-09 | 2006-03-09 | Sullivan Michael S | RFID system performance monitoring |
US20060049946A1 (en) * | 2004-09-09 | 2006-03-09 | Sullivan Michael S | RFID tag sensitivity |
US20060059367A1 (en) * | 2004-03-29 | 2006-03-16 | Yarvis Mark D | Radio frequency identification tag lock and key |
US7020501B1 (en) * | 2001-11-30 | 2006-03-28 | Bbnt Solutions Llc | Energy efficient forwarding in ad-hoc wireless networks |
US20060081020A1 (en) * | 2004-10-20 | 2006-04-20 | Yu-Ling Hsiao | Anti-theft apparatus and anti-theft subject for rental or the like |
US20060092016A1 (en) * | 2004-10-20 | 2006-05-04 | Modes Jerold R | Systems, methods and devices for area-based localization |
US7046149B1 (en) * | 1999-10-08 | 2006-05-16 | N.V. Nederlandsche Apparatenfabriek Nedap | Real-time system for monitoring theft protection |
US20060109125A1 (en) * | 2004-11-08 | 2006-05-25 | Goliath Solutions Llc. | System for RF detection and location determination of merchandising materials in retail environments |
US20060214773A1 (en) * | 2005-02-10 | 2006-09-28 | Psc Scanning, Inc. | RFID tag singulation |
US7162899B2 (en) * | 2004-12-28 | 2007-01-16 | Alpha Security Products, Inc. | Cable wrap security device |
US20070018787A1 (en) * | 2005-07-22 | 2007-01-25 | Neology, Inc. | Systems and methods for secure locking mechanisms |
US20070024448A1 (en) * | 2002-04-08 | 2007-02-01 | Universal Surveillance Corporation | Article surveillance tag having a vial |
US20070050261A1 (en) * | 2005-08-31 | 2007-03-01 | Tao Lin | Tracking assets between organizations in a consortium of organizations |
US7194880B2 (en) * | 2002-10-11 | 2007-03-27 | Pietro Necchi | Anti-theft case for miscellaneous items, particularly for videocassettes, DVD, compact disks, cassettes tapes and the like |
US20070096873A1 (en) * | 2005-10-28 | 2007-05-03 | Ramin Sadr | Rfid receiver |
US20070096876A1 (en) * | 2005-10-20 | 2007-05-03 | Raj Bridgelall | Adaptive RFID devices |
US20070106518A1 (en) * | 2003-05-14 | 2007-05-10 | Wildman Timothy D | Combined locating, tracking and communications system |
US20070120669A1 (en) * | 2005-11-29 | 2007-05-31 | Alpha Security Products, Inc. | Security device with perimeter alarm |
US20070178911A1 (en) * | 2004-06-09 | 2007-08-02 | Koninklijke Philips Electronics, N.V. | Automatic generation of signal strength map for location determination of mobile devices |
US20080012710A1 (en) * | 2006-07-11 | 2008-01-17 | Ramin Sadr | Rfid beam forming system |
US7327262B2 (en) * | 2005-10-12 | 2008-02-05 | Mantic Point Solutions Limited | System and method for electronic article surveillance |
US20080030422A1 (en) * | 2006-07-11 | 2008-02-07 | John Gevargiz | Rfid antenna system |
US20080039023A1 (en) * | 2004-06-02 | 2008-02-14 | Ubisense Limited | Tag Frequency Control |
US7336183B2 (en) * | 2004-04-30 | 2008-02-26 | Kimberly-Clark Worldwide, Inc. | Decommissioning an electronic data tag |
US7336180B2 (en) * | 2002-04-08 | 2008-02-26 | Sayegh Adel O | Article surveillance tag having a metal clip |
US7342495B2 (en) * | 2004-06-02 | 2008-03-11 | Sayegh Adel O | Integrated theft deterrent device |
US7374096B2 (en) * | 2001-11-21 | 2008-05-20 | Goliath Solutions, Llc | Advertising compliance monitoring system |
US20080122610A1 (en) * | 2000-01-24 | 2008-05-29 | Nextreme L.L.C. | RF-enabled pallet |
US7474209B2 (en) * | 2005-01-14 | 2009-01-06 | Checkpoint Systems, Inc. | Cable alarm security device |
US20090022078A1 (en) * | 2007-05-02 | 2009-01-22 | Patterson Wade C | Systems and methods for controlling sleep states of network nodes |
US20090051536A1 (en) * | 2007-08-22 | 2009-02-26 | International Business Machines Corporation | Decommissioning bin for automatic decommissioning of electronic tags |
US7504952B2 (en) * | 2005-12-28 | 2009-03-17 | Sandlinks Ltd. | Wide band RFID system with tag on flexible label |
US20090079633A1 (en) * | 2006-04-20 | 2009-03-26 | Ubisense Limited | Calibration of a location system |
US20090080455A1 (en) * | 2007-09-24 | 2009-03-26 | Ewing David B | Systems and methods for reducing data collisions in wireless network communications |
US20090079573A1 (en) * | 2007-08-31 | 2009-03-26 | Bing Jiang | Large scale folded dipole antenna for near-field rfid applications |
US7511604B2 (en) * | 2002-05-16 | 2009-03-31 | Sandlinks Systems Ltd. | Method and system for distance determination of RF tags |
US7510123B2 (en) * | 2004-11-18 | 2009-03-31 | Goliath Solutions, Llc | RF contact signal detector |
US20090091451A1 (en) * | 2007-10-08 | 2009-04-09 | Christopher Richard Jones | Systems and methods for secure supply chain management and inventory control |
US20090103671A1 (en) * | 2004-05-13 | 2009-04-23 | Sandlinks Systems Ltd. | Low Power Fast Impulse Radio Synchronization |
US20090167502A1 (en) * | 2007-12-31 | 2009-07-02 | 3M Innovative Properties Company | Device for verifying a location and functionality of a radio-frequency identification (RFID) tag on an item |
US7624918B2 (en) * | 2005-02-04 | 2009-12-01 | Philip Morris Usa Inc. | Wireless identification based display |
US7649490B2 (en) * | 2006-12-19 | 2010-01-19 | Samsung Electronics Co., Ltd. | Method, and apparatus for measuring distance using radio frequency signal |
US7652576B1 (en) * | 2006-08-24 | 2010-01-26 | Onasset Intelligence, Inc. | Method and apparatus for locating and/or otherwise monitoring an ID tagged asset's condition |
US7657740B2 (en) * | 2004-12-28 | 2010-02-02 | International Business Machines Corporation | Verifying the ownership of an owner's authority in terms of product and service |
US20100065362A1 (en) * | 2008-09-16 | 2010-03-18 | Honda Motor Co., Ltd. | Canister-holding structure for supporting a cylindrical canister in a vehicle, combined canister and canister-holding structure, and motorcycle incorporating same |
US20100097223A1 (en) * | 2008-10-14 | 2010-04-22 | James Robert Kruest | Product security system |
US20100102929A1 (en) * | 2006-11-09 | 2010-04-29 | Philippe Haumann | Protection, security and displacement tracking luminous badge system |
US7733836B2 (en) * | 2005-12-09 | 2010-06-08 | Honeywell International Inc. | Method and apparatus for location estimation |
US7743980B2 (en) * | 2003-11-12 | 2010-06-29 | De Sylva Robert Francis | System and method for facilitating monetary transactions |
US20110068921A1 (en) * | 2009-09-21 | 2011-03-24 | Checkpoint Systems, Inc. | configurable monitoring device |
US20110072132A1 (en) * | 2009-09-21 | 2011-03-24 | Checkpoint Systems, Inc. | Retail Product Tracking System, Method, and Apparatus |
Family Cites Families (167)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NO126975B (en) | 1967-03-30 | 1973-04-16 | John Welsh | |
US3961323A (en) | 1971-02-22 | 1976-06-01 | American Multi-Lert Corporation | Cargo monitor apparatus and method |
US3752960A (en) | 1971-12-27 | 1973-08-14 | C Walton | Electronic identification & recognition system |
US3816708A (en) | 1973-05-25 | 1974-06-11 | Proximity Devices | Electronic recognition and identification system |
US3984807A (en) | 1973-11-05 | 1976-10-05 | Products Of Information Systems | Vehicle location system |
DE2417228A1 (en) | 1974-04-09 | 1975-11-06 | Heller Geb | PROCEDURE FOR SUCTIONING SMALL DRILLS FROM THE DRILLING SITE OF A DRILL AND DRILL, DRILL AND ADAPTER FOR CARRYING OUT THE PROCEDURE |
US4209787A (en) | 1975-04-16 | 1980-06-24 | Gould Inc. | Method for monitoring the location of monitored objects |
NL7708012A (en) | 1977-07-19 | 1979-01-23 | Nedap Nv | DETECTION SYSTEM. |
US4223830A (en) | 1978-08-18 | 1980-09-23 | Walton Charles A | Identification system |
US4225953A (en) | 1978-09-29 | 1980-09-30 | Simon William F | Personnel locator |
US4242663A (en) | 1979-02-01 | 1980-12-30 | Lockheed Electronics Corporation | Electronic identification system |
US4366481A (en) | 1980-03-26 | 1982-12-28 | Micro Magnetic Industries, Inc. | Vending machine acquisition system |
US4336531A (en) | 1980-11-03 | 1982-06-22 | Kincaid Robert A | Shoplifting alarm system and method |
US4462022A (en) | 1981-11-12 | 1984-07-24 | A. R. F. Products, Inc. | Security system with radio frequency coupled remote sensors |
NL8200138A (en) | 1982-01-14 | 1983-08-01 | Nedap Nv | DETECTION SYSTEM. |
US4700179A (en) | 1982-04-12 | 1987-10-13 | Ici Americas Inc. | Crossed beam high frequency anti-theft system |
NL8202951A (en) | 1982-07-21 | 1984-02-16 | Nedap Nv | ABSORPTION DETECTION SYSTEM. |
US4453636A (en) | 1983-05-03 | 1984-06-12 | Meadows Bernard A | Safe container |
US4531117A (en) | 1983-07-05 | 1985-07-23 | Minnesota Mining And Manufacturing Company | Variable frequency RF electronic surveillance system |
US4862160A (en) | 1983-12-29 | 1989-08-29 | Revlon, Inc. | Item identification tag for rapid inventory data acquisition system |
US4688026A (en) | 1984-05-15 | 1987-08-18 | Scribner James R | Method of collecting and using data associated with tagged objects |
US4792018A (en) | 1984-07-09 | 1988-12-20 | Checkrobot Inc. | System for security processing of retailed articles |
US4630035A (en) | 1985-01-04 | 1986-12-16 | Motorola, Inc. | Alarm system having alarm transmitter indentification codes and acoustic ranging |
US4866661A (en) | 1986-03-26 | 1989-09-12 | Prins Maurits L De | Computer controlled rental and sale system and method for a supermarket and the like |
DE3687527T2 (en) | 1986-04-14 | 1993-05-13 | Avicom International Inc | PROCESS MONITORING AND SECURITY CONTROL SYSTEM. |
US4857893A (en) | 1986-07-18 | 1989-08-15 | Bi Inc. | Single chip transponder device |
NL8602033A (en) | 1986-08-08 | 1988-03-01 | Nedap Nv | PRECISION FOCUS ON RECOGNITION SYSTEM. |
NL8700369A (en) | 1987-02-16 | 1988-09-16 | Nedap Nv | METHOD FOR PLACING AN ELECTRONIC RESPONDER IN A METAL ENVIRONMENT |
NL8700388A (en) | 1987-02-17 | 1988-09-16 | Nedap Nv | FLEXIBLE IDENTIFICATION LABEL. |
AU586356B2 (en) | 1987-06-03 | 1989-07-06 | Magry Systems Co., Ltd. | Shoplifting preventing device |
US4837568A (en) | 1987-07-08 | 1989-06-06 | Snaper Alvin A | Remote access personnel identification and tracking system |
NL8702426A (en) | 1987-10-12 | 1989-05-01 | Nedap Nv | METHOD AND APPARATUS FOR IDENTIFYING METAL PALLETS AND CONTAINERS. |
US4951029A (en) | 1988-02-16 | 1990-08-21 | Interactive Technologies, Inc. | Micro-programmable security system |
US4870391A (en) | 1988-04-05 | 1989-09-26 | Knogo Corporation | Multiple frequency theft detection system |
US5059951A (en) | 1988-11-14 | 1991-10-22 | Checkpoint Systems, Inc. | Method and apparatus for integrated data capture and electronic article surveillance |
US4881061A (en) | 1988-12-05 | 1989-11-14 | Minnesota Mining And Manufacturing Company | Article removal control system |
NL8803170A (en) | 1988-12-27 | 1990-07-16 | Nedap Nv | IDENTIFICATION SYSTEM. |
JPH0780386B2 (en) | 1989-01-25 | 1995-08-30 | 東海金属株式会社 | Resonant tag and manufacturing method thereof |
NL8900461A (en) | 1989-02-24 | 1990-09-17 | Nedap Nv | WAFER WITH MOUNTING BRACKET. |
NL8900658A (en) | 1989-03-17 | 1990-10-16 | Nedap Nv | HIGH-FREQUENT SHOPPING THEFT DETECTION SYSTEM ACCORDING TO THE TRANSMISSION PRINCIPLE. |
US5031098A (en) | 1989-04-28 | 1991-07-09 | Norand Corporation | Transaction control system including portable data terminal and mobile customer service station |
NL8901659A (en) | 1989-06-30 | 1991-01-16 | Nedap Nv | MULTIPASS SYSTEM. |
US4961533A (en) | 1989-09-27 | 1990-10-09 | Viac Inc. | Inventory control system |
JP2964514B2 (en) * | 1990-01-19 | 1999-10-18 | ソニー株式会社 | Sound signal reproduction device |
NL9000186A (en) | 1990-01-25 | 1991-08-16 | Nedap Nv | DEACTIVATOR. |
DE4003410A1 (en) | 1990-02-05 | 1991-08-08 | Anatoli Stobbe | PORTABLE FIELD PROGRAMMABLE DETECTOR TAG |
US5153842A (en) | 1990-02-05 | 1992-10-06 | Pitney Bowes Inc. | Integrated circuit package label and/or manifest system |
DE4010327C1 (en) | 1990-03-30 | 1991-12-19 | Helmut 5330 Koenigswinter De Braehler | |
NL9001033A (en) | 1990-05-01 | 1991-12-02 | Nedap Nv | SHOP THEFT DETECTION SYSTEM WITH PARTIALLY PROTECTED ANTENNAS. |
US5119104A (en) | 1990-05-04 | 1992-06-02 | Heller Alan C | Location system adapted for use in multipath environments |
NL9002120A (en) | 1990-09-28 | 1992-04-16 | Nedap Nv | PULSE DEACTIVATOR. |
NL9002683A (en) | 1990-12-06 | 1992-07-01 | Nedap Nv | RETRO-REFLECTIVE MICROWAVE TRANSPONDER. |
US5365516A (en) | 1991-08-16 | 1994-11-15 | Pinpoint Communications, Inc. | Communication system and method for determining the location of a transponder unit |
NL9200835A (en) | 1992-05-11 | 1993-12-01 | Nedap Nv | FLEXIBLE COIL CONSTRUCTION IN IDENTIFICATION CARD. |
NL9201072A (en) | 1992-06-18 | 1994-01-17 | Nedap Nv | INTEGRATED MICROWAVE / INDUCTIVE TRANSPONDER. |
US5346210A (en) | 1992-08-28 | 1994-09-13 | Teem Systems, Inc. | Object locator system |
US5311185A (en) | 1992-08-31 | 1994-05-10 | Hochstein Peter A | Supervised personnel monitoring system |
DE4321650C1 (en) | 1993-06-30 | 1994-10-20 | Stihl Maschf Andreas | Mowing filament for a free-cutting appliance |
US5486768A (en) * | 1994-05-31 | 1996-01-23 | Southwest Research Institute | Surface resistivity meter for determining surface degradation of high resistivity materials |
US5671362A (en) | 1995-04-04 | 1997-09-23 | Cowe; Alan B. | Materials monitoring systems, materials management systems and related methods |
JPH08279083A (en) | 1995-04-07 | 1996-10-22 | Alps Electric Co Ltd | Robbery monitor device with alarm |
CN1233327A (en) | 1996-10-17 | 1999-10-27 | 准确定位公司 | Article tracking system |
IT1298682B1 (en) | 1997-02-14 | 2000-01-12 | Pietro Necchi | ANTI-THEFT CASE WITH SMALL SPACE, IN PARTICULAR FOR COMPACT DISK, MUSIC CASSETTE, VIDEO CASSETTE AND SIMILAR |
FR2760596B1 (en) | 1997-03-14 | 1999-04-02 | Speed France | COMPOSITE CUTTING WIRE FOR TRIMMERS AND TRIMMERS |
US6125972A (en) | 1997-04-17 | 2000-10-03 | Carttronics Llc | Security apparatus and method for shopping carts and the like |
PL190461B1 (en) | 1998-01-29 | 2005-12-30 | Necchi Srl | Theft preventing display case in particular for displaying compact discs, video cassettes, magnetic sound recording tape cassettes and the like |
US5942978A (en) | 1998-04-24 | 1999-08-24 | Sensormatic Electronics Corporation | Wireless transmitter key for EAS tag detacher unit |
US5955951A (en) | 1998-04-24 | 1999-09-21 | Sensormatic Electronics Corporation | Combined article surveillance and product identification system |
WO2000016564A1 (en) | 1998-09-11 | 2000-03-23 | Key-Trak, Inc. | Object control and tracking system with zonal transition detection |
US6486768B1 (en) | 1998-09-16 | 2002-11-26 | Carttronics, Llc | Cart return loyalty credit system |
JP4349534B2 (en) | 1999-02-16 | 2009-10-21 | 株式会社明治ゴム化成 | Plastic container with lid |
US6356809B1 (en) | 1999-06-11 | 2002-03-12 | Cbi Systems Corporation | Electro-statically shielded processing module |
AU6217100A (en) | 1999-07-15 | 2001-02-05 | Pinpoint Corporation | Method and apparatus for mobile tag reading |
US6486769B1 (en) | 1999-12-22 | 2002-11-26 | Intermec Ip Corp. | Method and system for automatic adjustment and diagnosis of radio frequency identification systems using programmable checktags |
AU2001273664A1 (en) | 2000-06-30 | 2002-01-14 | Alpha Security Products, Inc. | Security storage container |
US7062823B2 (en) | 2000-10-26 | 2006-06-20 | Alpha Security Products, Inc. | Theft deterrent device |
US6762691B2 (en) | 2001-01-10 | 2004-07-13 | International Business Machines Corporation | Method and system for automatically locating equipment stored in a rack |
US7242306B2 (en) | 2001-05-08 | 2007-07-10 | Hill-Rom Services, Inc. | Article locating and tracking apparatus and method |
US20020174695A1 (en) | 2001-05-25 | 2002-11-28 | David K. Huehner | Theft deterrent tag |
WO2002103645A2 (en) | 2001-06-14 | 2002-12-27 | Rf Code, Inc. | Wireless identification system and protocol |
US6951305B2 (en) | 2001-11-21 | 2005-10-04 | Goliath Solutions, Llc. | Advertising compliance monitoring system |
EP1316814A1 (en) | 2001-11-30 | 2003-06-04 | Cross Point RFAPP B.V. i.o. | Tracing of transponder-tagged objects |
US7023356B2 (en) | 2001-11-26 | 2006-04-04 | Aero-Vision Technologies, Inc. | System and method for monitoring individuals and objects associated with wireless identification tags |
AU2003209188B2 (en) | 2002-01-09 | 2009-01-22 | Tyco Fire & Security Gmbh | Intelligent Station Using Multiple RF Antennae and Inventory Control System and Method Incorporating Same |
US8321302B2 (en) | 2002-01-23 | 2012-11-27 | Sensormatic Electronics, LLC | Inventory management system |
US6701588B2 (en) | 2002-02-07 | 2004-03-09 | Sony Ericsson Mobile Communications Ab | Pin lock |
US6755055B2 (en) | 2002-02-26 | 2004-06-29 | Alpha Security Products, Inc. | Theft deterrent device |
US7061367B2 (en) | 2002-04-30 | 2006-06-13 | General Electric Company | Managing access to physical assets |
WO2005022292A2 (en) * | 2003-05-06 | 2005-03-10 | Argo-Tech Corporation | Tracking system and associated method |
GB0219374D0 (en) | 2002-08-20 | 2002-09-25 | Dubois Ltd | Security container |
US20040104814A1 (en) * | 2002-11-14 | 2004-06-03 | Christensen Henrik Thorning | Method and apparatus for vehicle coupling |
BR0317442A (en) * | 2002-12-17 | 2005-11-16 | Ube Industries | Multilayer structure with excellent fuel barrier performance |
GB0301790D0 (en) | 2003-01-25 | 2003-02-26 | Ubiquitous Systems Ltd | System for detecting intruders in a populated space |
US7021807B2 (en) * | 2003-02-25 | 2006-04-04 | Tong Fatt Chew | Signal lamp incorporating spatially separated clustered light emitting devices |
NL1023843C2 (en) | 2003-07-07 | 2005-01-10 | Nedap Nv | Assembly of an activity meter and a mounting tape for attaching the activity meter to the neck or leg of an animal. |
US7834816B2 (en) | 2003-07-25 | 2010-11-16 | Sensormatic Electronics Llc | Apparatus for and method of using a diversity antenna |
WO2005010798A2 (en) | 2003-07-29 | 2005-02-03 | Dan Raphaeli | Method and corresponding system for hand-held rf tag locator |
US7148805B2 (en) | 2003-08-08 | 2006-12-12 | Sensormatic Electronics Corporation | Hard security tag and detaching device |
DE602004019239D1 (en) | 2003-08-13 | 2009-03-12 | Sandlinks Systems Ltd | ANALOG SIGNAL SAMPLER FOR PROVIDING A DIGITAL REPRESENTATION THEREOF |
FR2862999B1 (en) | 2003-12-02 | 2009-03-06 | Fors France | ANTI-THEFT DEVICE COMPRISING TWO SLIDING BODIES ONE TOGETHER THE OTHER TO HIDE AN ARTICLE |
US7471199B2 (en) | 2004-01-09 | 2008-12-30 | Intermec Ip Corp. | Mobile key using read/write RFID tag |
WO2005071790A2 (en) | 2004-01-16 | 2005-08-04 | Meadwestvaco Corporation | Systems for and methods of assigning priority to reader antennae |
WO2005106748A2 (en) | 2004-04-22 | 2005-11-10 | Sensitech Inc. | Pedigree and integrity evaluation of packages |
US7098794B2 (en) | 2004-04-30 | 2006-08-29 | Kimberly-Clark Worldwide, Inc. | Deactivating a data tag for user privacy or tamper-evident packaging |
US7225903B2 (en) | 2004-04-30 | 2007-06-05 | Carttronics, Llc | Shopping cart tilt and tip prevention device |
JP4123195B2 (en) | 2004-06-22 | 2008-07-23 | オムロン株式会社 | Tag communication device, tag communication device control method, tag communication control program, and tag communication management system |
US7266979B2 (en) | 2004-07-30 | 2007-09-11 | Alpha Security Products, Inc. | Theft deterrent device |
US7109867B2 (en) | 2004-09-09 | 2006-09-19 | Avery Dennison Corporation | RFID tags with EAS deactivation ability |
WO2006030422A2 (en) | 2004-09-13 | 2006-03-23 | Sandlinks Systems Ltd. | Communication and distance measurement in an addressed wide band rfid system |
CN100564180C (en) | 2004-09-22 | 2009-12-02 | 配尔特·莱克齐 | Antitheft and the safety gear that is used for bottle |
US7614556B2 (en) | 2004-11-05 | 2009-11-10 | Goliath Solutions, Llc | Distributed RFID antenna array utilizing circular polarized helical antennas |
US7148804B2 (en) | 2004-11-08 | 2006-12-12 | Checkpoint Systems, Inc. | System and method for detecting EAS/RFID tags using step listen |
US7535337B2 (en) * | 2004-11-18 | 2009-05-19 | Goliath Solutions, Llc | Systems and methods for monitoring open stock merchandising |
AU2005307767A1 (en) | 2004-11-19 | 2006-05-26 | Goliath Solutions L.L.C. | Low stock alert system |
AU2005309628A1 (en) | 2004-11-24 | 2006-06-01 | Sensormatic Electronics, LLC | System and method for integrating point of sale and electronic article surveillance data |
US7259674B2 (en) | 2004-12-22 | 2007-08-21 | Alpha Security Products, Inc. | Bottle security device |
US20060174667A1 (en) | 2005-02-07 | 2006-08-10 | Garner Glen W | Security device and system for use therewith |
US7304574B2 (en) | 2005-02-10 | 2007-12-04 | Sensormatic Electronics Corporation | Alarm investigation using RFID |
CN102946625A (en) | 2005-03-03 | 2013-02-27 | 传感电子有限责任公司 | Apparatus for and method of using an intelligent network and RFID signal router |
US7755485B2 (en) | 2005-03-08 | 2010-07-13 | Inpoint Systems, Inc. | System and method for electronic article surveillance |
US20070074936A1 (en) * | 2005-04-26 | 2007-04-05 | Means Jay S | Braking shell for shopping cart security device |
US7604178B2 (en) | 2005-05-11 | 2009-10-20 | Intelleflex Corporation | Smart tag activation |
RU2418933C2 (en) | 2005-05-23 | 2011-05-20 | Сенсормэтик Электроникс, Ллк | Protective device with engaging element |
US20060290519A1 (en) | 2005-06-22 | 2006-12-28 | Boate Alan R | Two-way wireless monitoring system and method |
WO2007017871A2 (en) | 2005-08-08 | 2007-02-15 | Sandlinks Systems Ltd. | Rfid-uwb system connected to wlan infrastructure |
US7394376B1 (en) | 2005-10-19 | 2008-07-01 | Sayegh Adel O | Theft deterrent tag |
US8552835B2 (en) | 2005-10-28 | 2013-10-08 | Mojix, Inc. | RFID system with low complexity implementation and pallet coding error correction |
US20070290924A1 (en) | 2005-12-14 | 2007-12-20 | Innerwireless, Inc. | Wireless resource monitoring system and method |
US7443298B2 (en) | 2006-02-15 | 2008-10-28 | International Business Machines Corporation | Dynamic boundary mapping using position-determination systems |
US20070205896A1 (en) | 2006-03-02 | 2007-09-06 | Axcess International Inc. | System and Method for Determining Location, Directionality, and Velocity of RFID Tags |
US7446658B2 (en) | 2006-03-09 | 2008-11-04 | Avago Technologies General Ip (Singapore) Pte. Ltd. | Identification (ID) system and method of operation thereof |
US20070285241A1 (en) | 2006-03-20 | 2007-12-13 | Axcess International Inc. | Multi-Tag Tracking Systems and Methods |
US20070222596A1 (en) * | 2006-03-21 | 2007-09-27 | Chep Usa | Radio Frequency Identification System and Tag |
US7423516B2 (en) | 2006-05-04 | 2008-09-09 | Goliath Solutions, Llc | Systems and methods for approximating the location of an RFID tag |
SE529117C2 (en) | 2006-06-02 | 2007-05-02 | Optosolutions Sweden Ab | Lock, comprises first part with magnetic locking member designed to move into path of actuator in a second part to block movement of this latter part opposite to the locking direction |
US9087226B2 (en) | 2006-06-09 | 2015-07-21 | Intelleflex Corporation | System, method and computer program product for calibrating interrogator signal strength and/or tag response range setting |
US20080085727A1 (en) | 2006-06-14 | 2008-04-10 | Kratz Tyler M | System and method for determining mobile device position information |
US7583195B2 (en) | 2006-08-22 | 2009-09-01 | Checkpoint Systems, Inc. | Security tag adapter for containers |
US7310070B1 (en) | 2006-08-23 | 2007-12-18 | Goliath Solutions, Llc | Radio frequency identification shelf antenna with a distributed pattern for localized tag detection |
US8477013B2 (en) | 2006-08-31 | 2013-07-02 | Sanjay Sarma | Method and system for performing mobile RFID asset detection and tracking |
US7952464B2 (en) * | 2006-10-05 | 2011-05-31 | Intermec Ip Corp. | Configurable RFID tag with protocol and band selection |
US8044806B2 (en) | 2006-10-19 | 2011-10-25 | Sayegh Adel O | Security tag with engaging element |
US7717326B2 (en) | 2006-11-15 | 2010-05-18 | International Business Machines Corporation | Method and system for protecting data |
US7760095B2 (en) | 2006-12-15 | 2010-07-20 | Symbol Technologies, Inc. | Context-driven RFID tag and system content |
US7420461B2 (en) | 2006-12-28 | 2008-09-02 | Carttronics, Llc | Caster-lock with dual receivers |
US7808390B2 (en) | 2007-01-05 | 2010-10-05 | Adel Sayegh | Security tag having a swiveling engagement |
US20080174404A1 (en) | 2007-01-23 | 2008-07-24 | Microsoft Corporation | Dynamic updates in rfid manager |
US7859410B2 (en) | 2007-01-24 | 2010-12-28 | United Security Applications Id, Inc. | Universal tracking assembly |
US8395482B2 (en) | 2007-03-23 | 2013-03-12 | Mojix, Inc. | RFID systems using distributed exciter network |
WO2008118989A1 (en) | 2007-03-26 | 2008-10-02 | Wavetrack Systems, Inc. | System and method for wireless security theft prevention |
WO2008132269A1 (en) | 2007-04-26 | 2008-11-06 | Nokia Corporation | Short range communication |
US7953216B2 (en) | 2007-05-04 | 2011-05-31 | 3V Technologies Incorporated | Systems and methods for RFID-based access management of electronic devices |
US20080279307A1 (en) | 2007-05-07 | 2008-11-13 | Decawave Limited | Very High Data Rate Communications System |
US7782207B2 (en) | 2007-06-12 | 2010-08-24 | Checkpoint Systems, Inc. | Comprehensive theft security system |
US8026814B1 (en) * | 2007-07-25 | 2011-09-27 | Pinpoint Technologies Inc. | Wireless mesh network for an asset tracking system |
US7956746B2 (en) | 2007-10-19 | 2011-06-07 | Awarepoint Corporation | Wireless tracking system and method with tag removal detection |
CA2706759A1 (en) * | 2007-11-26 | 2009-06-04 | Lawrence J. Karr | Anti-tamper cargo container locator system |
US7800490B2 (en) | 2008-01-09 | 2010-09-21 | Sensormatic Electronics, LLC | Electronic article surveillance system neural network minimizing false alarms and failures to deactivate |
US8422398B2 (en) | 2008-01-23 | 2013-04-16 | Zebra Enterprise Solutions Corp. | Media access control (MAC) for an active RFID system |
US7973661B2 (en) | 2008-03-06 | 2011-07-05 | Sensomatic Electronics, LLC | Detacher system and method having an RFID antenna for a combination EAS and RFID tag |
FR2932590B1 (en) | 2008-06-17 | 2010-05-21 | Mpe Technology | MULTI-FUNCTIONAL AND CONTACTLESS ELECTRONIC LABEL FOR GOODS |
US7954712B2 (en) | 2008-09-12 | 2011-06-07 | Transparent Visibility Holdings, LLC | Product, asset, and device tracking, identification, and pricing system |
CA2745691A1 (en) | 2008-12-03 | 2010-06-10 | Checkpoint Systems, Inc. | Locking device for tote bin |
US20100141445A1 (en) | 2008-12-08 | 2010-06-10 | Savi Networks Inc. | Multi-Mode Commissioning/Decommissioning of Tags for Managing Assets |
US8258953B2 (en) | 2009-02-12 | 2012-09-04 | Symbol Technologies, Inc. | Displaying radio frequency identification (RFID) read range of an RFID reader based on feedback from fixed RFID beacon tags |
US20100201520A1 (en) | 2009-02-12 | 2010-08-12 | Symbol Technologies, Inc. | System for determining item location based on feedback from fixed radio frequency identification (rfid) readers and/or fixed rfid beacon tags |
EP2483877B1 (en) | 2009-09-28 | 2015-10-21 | Checkpoint Systems, Inc. | System, method, and apparatus for triggering an alarm |
-
2009
- 2009-12-01 US US12/628,863 patent/US8508367B2/en not_active Expired - Fee Related
- 2009-12-11 US US12/636,564 patent/US20110068906A1/en not_active Abandoned
-
2010
- 2010-09-21 CN CN201080051263.5A patent/CN102741893B/en not_active Expired - Fee Related
- 2010-09-21 WO PCT/US2010/049656 patent/WO2011035303A1/en active Application Filing
- 2010-09-21 WO PCT/US2010/049672 patent/WO2011035309A2/en active Application Filing
Patent Citations (109)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4021807A (en) * | 1975-04-02 | 1977-05-03 | Texas Instruments Incorporated | Beacon tracking system |
US4141078A (en) * | 1975-10-14 | 1979-02-20 | Innovated Systems, Inc. | Library circulation control system |
US4141006A (en) * | 1976-07-14 | 1979-02-20 | Braxton Kenneth J | Security system for centralized monitoring and selective reporting of remote alarm conditions |
US4196418A (en) * | 1976-11-01 | 1980-04-01 | N.V. Nederlandsche Apparatenfabriek Nedap | Detection plate for an identification system |
US4327353A (en) * | 1978-03-06 | 1982-04-27 | George W. Beard | Security system |
US5019815A (en) * | 1979-10-12 | 1991-05-28 | Lemelson Jerome H | Radio frequency controlled interrogator-responder system with passive code generator |
US4572976A (en) * | 1982-12-10 | 1986-02-25 | N.V. Nederlandsche Apparatenfabriek Nedap | Transponder for electromagnetic detection system with non-linear circuit |
US4827395A (en) * | 1983-04-21 | 1989-05-02 | Intelli-Tech Corporation | Manufacturing monitoring and control systems |
US4656463A (en) * | 1983-04-21 | 1987-04-07 | Intelli-Tech Corporation | LIMIS systems, devices and methods |
US4580041A (en) * | 1983-12-09 | 1986-04-01 | Walton Charles A | Electronic proximity identification system with simplified low power identifier |
US4742341A (en) * | 1985-06-14 | 1988-05-03 | N.V. Nederlandsche Apparatenfabriek Nedap | Electromagnetic detection system, as well as a responder for such a system |
US4667185A (en) * | 1985-12-06 | 1987-05-19 | Minnesota Mining And Manufacturing Company | Wireless synchronization system for electronic article surveillance system |
US4746830A (en) * | 1986-03-14 | 1988-05-24 | Holland William R | Electronic surveillance and identification |
US5105190A (en) * | 1986-04-22 | 1992-04-14 | N.V. Nederlandsche Apparatenfabriek Nedap | Electromagnetic identification system |
US4814751A (en) * | 1987-02-27 | 1989-03-21 | Wildlife Materials, Inc. | Patient tracking system |
US4924210A (en) * | 1987-03-17 | 1990-05-08 | Omron Tateisi Electronics Company | Method of controlling communication in an ID system |
US5019813A (en) * | 1987-04-13 | 1991-05-28 | N.V. Nederlandsche Apparatenfabriek Nedap | System for the contactless exchange of data |
US5103222A (en) * | 1987-07-03 | 1992-04-07 | N.V. Nederlandsche Apparatenfabriek Nedap | Electronic identification system |
US5008660A (en) * | 1988-03-04 | 1991-04-16 | N.V. Nederlandsche Apparatenfabriek Nedap | Electromagnetic detection system |
US5014206A (en) * | 1988-08-22 | 1991-05-07 | Facilitech International Incorporated | Tracking system |
US4907845A (en) * | 1988-09-16 | 1990-03-13 | Salomon Sa | Bed patient monitoring system |
US4918432A (en) * | 1988-09-27 | 1990-04-17 | B. I. Incorporated | House arrest monitoring system |
US5214410A (en) * | 1989-07-10 | 1993-05-25 | Csir | Location of objects |
US5099227A (en) * | 1989-07-18 | 1992-03-24 | Indala Corporation | Proximity detecting apparatus |
US5006830A (en) * | 1989-10-16 | 1991-04-09 | Rebecca Merritt | Method and device for deterring the unauthorized removal of a newborn from a defined area |
US4926161A (en) * | 1989-10-23 | 1990-05-15 | Cupp Ted W | Method of monitoring golf carts on a golf course |
US5181786A (en) * | 1989-11-15 | 1993-01-26 | N.V. Nederlandsche Apparatenfabriek Nedap | Method and apparatus for producing admission tickets |
US5317309A (en) * | 1990-11-06 | 1994-05-31 | Westinghouse Electric Corp. | Dual mode electronic identification system |
US5099226A (en) * | 1991-01-18 | 1992-03-24 | Interamerican Industrial Company | Intelligent security system |
US5151684A (en) * | 1991-04-12 | 1992-09-29 | Johnsen Edward L | Electronic inventory label and security apparatus |
US5709942A (en) * | 1991-05-20 | 1998-01-20 | Alliedsignal Inc. | Product and process improvement of coated polymeric monofilament |
US5396224A (en) * | 1991-11-22 | 1995-03-07 | Hewlett-Packard Company | Telemetered patient location system and method |
US5214409A (en) * | 1991-12-03 | 1993-05-25 | Avid Corporation | Multi-memory electronic identification tag |
US5288980A (en) * | 1992-06-25 | 1994-02-22 | Kingsley Library Equipment Company | Library check out/check in system |
US5608380A (en) * | 1994-05-18 | 1997-03-04 | N.V. Nederlandsche Apparatenfabriek Nedap | Deactivation and coding system for a contactless antitheft or identification label |
US5596313A (en) * | 1995-05-16 | 1997-01-21 | Personal Security & Safety Systems, Inc. | Dual power security location system |
US6181248B1 (en) * | 1995-11-29 | 2001-01-30 | N.V. Nederlandsche Apparatenfabriek Nedap | Deactivatable article security label with data carrier function |
US5874896A (en) * | 1996-08-26 | 1999-02-23 | Palomar Technologies Corporation | Electronic anti-shoplifting system employing an RFID tag |
US5881846A (en) * | 1997-04-17 | 1999-03-16 | Carttronics Llc | Security device for shopping carts and the like |
US6061914A (en) * | 1997-07-23 | 2000-05-16 | Speed France | Cutting line with improved degradability for brush cutters and edge trimmers |
US6380894B1 (en) * | 1999-08-30 | 2002-04-30 | Wherenet Corporation | Multi-lateration system with automatic calibration and error removal |
US7046149B1 (en) * | 1999-10-08 | 2006-05-16 | N.V. Nederlandsche Apparatenfabriek Nedap | Real-time system for monitoring theft protection |
US6512478B1 (en) * | 1999-12-22 | 2003-01-28 | Rockwell Technologies, Llc | Location position system for relay assisted tracking |
US20080122610A1 (en) * | 2000-01-24 | 2008-05-29 | Nextreme L.L.C. | RF-enabled pallet |
US6703934B1 (en) * | 2000-04-11 | 2004-03-09 | Koninklijke Philips Electronics N.V. | Method for dynamic pricing of goods and services |
US6861954B2 (en) * | 2001-03-30 | 2005-03-01 | Bruce H. Levin | Tracking medical products with integrated circuits |
US20050110636A1 (en) * | 2001-10-12 | 2005-05-26 | Touraj Ghaffari | Real time total asset visibility system |
US6837427B2 (en) * | 2001-11-21 | 2005-01-04 | Goliath Solutions, Llc. | Advertising compliance monitoring system |
US7021535B2 (en) * | 2001-11-21 | 2006-04-04 | Goliath Solutions, Llc | Advertising compliance monitoring system |
US7374096B2 (en) * | 2001-11-21 | 2008-05-20 | Goliath Solutions, Llc | Advertising compliance monitoring system |
US7020501B1 (en) * | 2001-11-30 | 2006-03-28 | Bbnt Solutions Llc | Energy efficient forwarding in ad-hoc wireless networks |
US20070024448A1 (en) * | 2002-04-08 | 2007-02-01 | Universal Surveillance Corporation | Article surveillance tag having a vial |
US7336180B2 (en) * | 2002-04-08 | 2008-02-26 | Sayegh Adel O | Article surveillance tag having a metal clip |
US7511604B2 (en) * | 2002-05-16 | 2009-03-31 | Sandlinks Systems Ltd. | Method and system for distance determination of RF tags |
US6984807B2 (en) * | 2002-07-12 | 2006-01-10 | Harley-Davidson Motor Company Group, Inc. | Heated motorcycle handgrips |
US7194880B2 (en) * | 2002-10-11 | 2007-03-27 | Pietro Necchi | Anti-theft case for miscellaneous items, particularly for videocassettes, DVD, compact disks, cassettes tapes and the like |
US7007523B2 (en) * | 2003-02-24 | 2006-03-07 | Alpha Security Products, Inc. | Bottle security device |
US20070106518A1 (en) * | 2003-05-14 | 2007-05-10 | Wildman Timothy D | Combined locating, tracking and communications system |
US7743980B2 (en) * | 2003-11-12 | 2010-06-29 | De Sylva Robert Francis | System and method for facilitating monetary transactions |
US20050202818A1 (en) * | 2004-03-15 | 2005-09-15 | Nec Corporation | System, communication device, and base station for wireless communications, and control method thereof |
US20050212663A1 (en) * | 2004-03-23 | 2005-09-29 | Michihiro Matsumoto | Equipment installation-place setting system, equipment control apparatus, electrical equipment, equipment installation-place setting method and computer-readable record medium storing equipment installation-place setting program |
US20060059367A1 (en) * | 2004-03-29 | 2006-03-16 | Yarvis Mark D | Radio frequency identification tag lock and key |
US7336183B2 (en) * | 2004-04-30 | 2008-02-26 | Kimberly-Clark Worldwide, Inc. | Decommissioning an electronic data tag |
US20090103671A1 (en) * | 2004-05-13 | 2009-04-23 | Sandlinks Systems Ltd. | Low Power Fast Impulse Radio Synchronization |
US7342495B2 (en) * | 2004-06-02 | 2008-03-11 | Sayegh Adel O | Integrated theft deterrent device |
US20080039023A1 (en) * | 2004-06-02 | 2008-02-14 | Ubisense Limited | Tag Frequency Control |
US20070178911A1 (en) * | 2004-06-09 | 2007-08-02 | Koninklijke Philips Electronics, N.V. | Automatic generation of signal strength map for location determination of mobile devices |
US20060033662A1 (en) * | 2004-07-27 | 2006-02-16 | Ubisense Limited | Location system |
US20060022815A1 (en) * | 2004-07-30 | 2006-02-02 | Fischer Jeffrey H | Interference monitoring in an RFID system |
US20060049250A1 (en) * | 2004-09-09 | 2006-03-09 | Sullivan Michael S | RFID system performance monitoring |
US20080106416A1 (en) * | 2004-09-09 | 2008-05-08 | Sullivan Michael S | RFID tag sensitivity |
US7378967B2 (en) * | 2004-09-09 | 2008-05-27 | The Gillette Company | RFID tag sensitivity |
US20060049946A1 (en) * | 2004-09-09 | 2006-03-09 | Sullivan Michael S | RFID tag sensitivity |
US7161489B2 (en) * | 2004-09-09 | 2007-01-09 | The Gillette Company | RFID system performance monitoring |
US20060081020A1 (en) * | 2004-10-20 | 2006-04-20 | Yu-Ling Hsiao | Anti-theft apparatus and anti-theft subject for rental or the like |
US20060092016A1 (en) * | 2004-10-20 | 2006-05-04 | Modes Jerold R | Systems, methods and devices for area-based localization |
US20060109125A1 (en) * | 2004-11-08 | 2006-05-25 | Goliath Solutions Llc. | System for RF detection and location determination of merchandising materials in retail environments |
US7510123B2 (en) * | 2004-11-18 | 2009-03-31 | Goliath Solutions, Llc | RF contact signal detector |
US7162899B2 (en) * | 2004-12-28 | 2007-01-16 | Alpha Security Products, Inc. | Cable wrap security device |
US7657740B2 (en) * | 2004-12-28 | 2010-02-02 | International Business Machines Corporation | Verifying the ownership of an owner's authority in terms of product and service |
US7474209B2 (en) * | 2005-01-14 | 2009-01-06 | Checkpoint Systems, Inc. | Cable alarm security device |
US7624918B2 (en) * | 2005-02-04 | 2009-12-01 | Philip Morris Usa Inc. | Wireless identification based display |
US20060214773A1 (en) * | 2005-02-10 | 2006-09-28 | Psc Scanning, Inc. | RFID tag singulation |
US20070018787A1 (en) * | 2005-07-22 | 2007-01-25 | Neology, Inc. | Systems and methods for secure locking mechanisms |
US20070050261A1 (en) * | 2005-08-31 | 2007-03-01 | Tao Lin | Tracking assets between organizations in a consortium of organizations |
US7327262B2 (en) * | 2005-10-12 | 2008-02-05 | Mantic Point Solutions Limited | System and method for electronic article surveillance |
US20070096876A1 (en) * | 2005-10-20 | 2007-05-03 | Raj Bridgelall | Adaptive RFID devices |
US20070096873A1 (en) * | 2005-10-28 | 2007-05-03 | Ramin Sadr | Rfid receiver |
US20070120669A1 (en) * | 2005-11-29 | 2007-05-31 | Alpha Security Products, Inc. | Security device with perimeter alarm |
US7733836B2 (en) * | 2005-12-09 | 2010-06-08 | Honeywell International Inc. | Method and apparatus for location estimation |
US7504952B2 (en) * | 2005-12-28 | 2009-03-17 | Sandlinks Ltd. | Wide band RFID system with tag on flexible label |
US20090079633A1 (en) * | 2006-04-20 | 2009-03-26 | Ubisense Limited | Calibration of a location system |
US20080012710A1 (en) * | 2006-07-11 | 2008-01-17 | Ramin Sadr | Rfid beam forming system |
US20080030422A1 (en) * | 2006-07-11 | 2008-02-07 | John Gevargiz | Rfid antenna system |
US7652576B1 (en) * | 2006-08-24 | 2010-01-26 | Onasset Intelligence, Inc. | Method and apparatus for locating and/or otherwise monitoring an ID tagged asset's condition |
US20100102929A1 (en) * | 2006-11-09 | 2010-04-29 | Philippe Haumann | Protection, security and displacement tracking luminous badge system |
US7649490B2 (en) * | 2006-12-19 | 2010-01-19 | Samsung Electronics Co., Ltd. | Method, and apparatus for measuring distance using radio frequency signal |
US20090022078A1 (en) * | 2007-05-02 | 2009-01-22 | Patterson Wade C | Systems and methods for controlling sleep states of network nodes |
US20090051536A1 (en) * | 2007-08-22 | 2009-02-26 | International Business Machines Corporation | Decommissioning bin for automatic decommissioning of electronic tags |
US20090079573A1 (en) * | 2007-08-31 | 2009-03-26 | Bing Jiang | Large scale folded dipole antenna for near-field rfid applications |
US20090080455A1 (en) * | 2007-09-24 | 2009-03-26 | Ewing David B | Systems and methods for reducing data collisions in wireless network communications |
US20090080423A1 (en) * | 2007-09-24 | 2009-03-26 | Ewing David B | Systems and methods for adaptively adjusting codec rates for communication networks |
US20090098898A1 (en) * | 2007-09-24 | 2009-04-16 | Patterson Wade C | Systems and methods for communicating panic messages in wireless communication networks |
US20090091451A1 (en) * | 2007-10-08 | 2009-04-09 | Christopher Richard Jones | Systems and methods for secure supply chain management and inventory control |
US20090167502A1 (en) * | 2007-12-31 | 2009-07-02 | 3M Innovative Properties Company | Device for verifying a location and functionality of a radio-frequency identification (RFID) tag on an item |
US20100065362A1 (en) * | 2008-09-16 | 2010-03-18 | Honda Motor Co., Ltd. | Canister-holding structure for supporting a cylindrical canister in a vehicle, combined canister and canister-holding structure, and motorcycle incorporating same |
US20100097223A1 (en) * | 2008-10-14 | 2010-04-22 | James Robert Kruest | Product security system |
US20110068921A1 (en) * | 2009-09-21 | 2011-03-24 | Checkpoint Systems, Inc. | configurable monitoring device |
US20110072132A1 (en) * | 2009-09-21 | 2011-03-24 | Checkpoint Systems, Inc. | Retail Product Tracking System, Method, and Apparatus |
Cited By (155)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150161423A1 (en) * | 2005-09-30 | 2015-06-11 | Zebra Enterprise Solutions Corp. | Wide-area dynamic rfid system using uwb |
US20100231388A1 (en) * | 2009-03-12 | 2010-09-16 | Checkpoint Systems, Inc. | Disposable cable lock and detachable alarm module |
US9169670B2 (en) | 2009-03-12 | 2015-10-27 | Checkpoint Systems, Inc. | Disposable cable lock and detachable alarm module |
US20110068921A1 (en) * | 2009-09-21 | 2011-03-24 | Checkpoint Systems, Inc. | configurable monitoring device |
US8508367B2 (en) | 2009-09-21 | 2013-08-13 | Checkpoint Systems, Inc. | Configurable monitoring device |
US9298954B1 (en) * | 2010-02-03 | 2016-03-29 | Synapse Wireless, Inc. | Tag security systems and methods for articles of merchandise |
US8640509B2 (en) | 2010-04-30 | 2014-02-04 | Checkpoint Systems, Inc. | Security assembly for attachment to an object |
US20140162690A1 (en) * | 2010-09-22 | 2014-06-12 | General Electric Company | System and method for determining the location of wireless sensors |
US9215556B2 (en) * | 2010-09-22 | 2015-12-15 | General Electric Company | System and method for determining the location of wireless sensors |
WO2012115517A1 (en) * | 2011-02-24 | 2012-08-30 | Cross Point B.V. | System with article surveillance device, article surveillance device and method for displaying configuration information |
NL2007029C2 (en) * | 2011-02-24 | 2012-08-27 | Cross Point B V | SYSTEM WITH ARTICLE-MONITORING DEVICE, ARTICLE-MONITORING DEVICE AND METHOD FOR VISUALIZING SET-UP INFORMATION. |
US9065813B2 (en) * | 2011-03-18 | 2015-06-23 | Honeywell International Inc. | Adapter device for coupling an industrial field instrument to an industrial wireless network and related system and method |
US20120236768A1 (en) * | 2011-03-18 | 2012-09-20 | Honeywell International Inc. | Adapter device for coupling an industrial field instrument to an industrial wireless network and related system and method |
US9405285B2 (en) | 2011-03-18 | 2016-08-02 | Honeywell International Inc. | Interface for local configuration and monitoring of an industrial field device with support for provisioning onto an industrial wireless network and related system and method |
US10015826B2 (en) | 2011-03-18 | 2018-07-03 | Honeywell International Inc. | Adapter device for coupling an industrial field instrument to an industrial wireless network |
US11568721B2 (en) | 2011-05-19 | 2023-01-31 | Invue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
US9728054B2 (en) | 2011-05-19 | 2017-08-08 | Invue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
US10475307B2 (en) | 2011-05-19 | 2019-11-12 | Invue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
US10002505B1 (en) | 2011-05-19 | 2018-06-19 | Invue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
US9552708B2 (en) | 2011-05-19 | 2017-01-24 | Invue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
US8878673B2 (en) | 2011-05-19 | 2014-11-04 | Invue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
US9928703B2 (en) | 2011-05-19 | 2018-03-27 | Invue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
US20140081786A1 (en) * | 2011-05-27 | 2014-03-20 | Nec Infrontia Corporation | Pos system, bar code scanner, and method for controlling pos system |
US9874645B2 (en) * | 2011-05-27 | 2018-01-23 | Nec Platforms, Ltd. | POS system, bar code scanner, and method for controlling POS system |
US20150019446A1 (en) * | 2011-06-16 | 2015-01-15 | At&T Intellectual Property L, L.P. | Methods, Systems, and Computer-Readable Storage Devices Facilitating Analysis of Recorded Events |
US8849686B2 (en) * | 2011-06-16 | 2014-09-30 | At&T Intellectual Property I, L.P. | Methods, devices, and computer program products for associating a tag with a recorded event |
US10592935B2 (en) * | 2011-06-16 | 2020-03-17 | At&T Intellectual Property I, L.P. | Methods, systems, and computer-readable storage devices facilitating analysis of recorded events |
US20120323636A1 (en) * | 2011-06-16 | 2012-12-20 | Luis Albisu | Methods, Devices, and Computer Program Products for Associating a Tag With a Recorded Event |
US10049238B2 (en) | 2011-08-22 | 2018-08-14 | Metrologic Instruments, Inc. | Encoded information reading terminal with item locate functionality |
US9507976B2 (en) | 2011-08-22 | 2016-11-29 | Metrologic Instruments, Inc. | Encoded information reading terminal with item locate functionality |
US8645532B2 (en) * | 2011-09-13 | 2014-02-04 | BlueStripe Software, Inc. | Methods and computer program products for monitoring the contents of network traffic in a network device |
US20130067018A1 (en) * | 2011-09-13 | 2013-03-14 | Patrick A. Reynolds | Methods and computer program products for monitoring the contents of network traffic in a network device |
US8818417B2 (en) | 2011-10-13 | 2014-08-26 | Honeywell International Inc. | Method for wireless device location using automatic location update via a provisioning device and related apparatus and system |
US20130120119A1 (en) * | 2011-11-16 | 2013-05-16 | Symbol Technologies, Inc. | Adapting radio frequency identification reqader power levels |
US20130297976A1 (en) * | 2012-05-04 | 2013-11-07 | Paraccel, Inc. | Network Fault Detection and Reconfiguration |
US9239749B2 (en) * | 2012-05-04 | 2016-01-19 | Paraccel Llc | Network fault detection and reconfiguration |
US10552578B2 (en) * | 2012-08-24 | 2020-02-04 | Perceptimed, Inc. | Package locating system |
AU2013305512B2 (en) * | 2012-08-24 | 2019-01-17 | Perceptimed, Inc. | Package locating system |
US20140132412A1 (en) * | 2012-09-07 | 2014-05-15 | Juan José DECO | Wi-fi tracker system for persons and objects |
US20140075020A1 (en) * | 2012-09-10 | 2014-03-13 | Masato Takahashi | Server device, information processing method, and computer program product |
US8890694B2 (en) | 2012-09-13 | 2014-11-18 | W G Security Products | Anti-theft hang tag |
WO2014074816A1 (en) * | 2012-11-09 | 2014-05-15 | Hirsch Kenneth A | System for item and location information distribution |
US20190366188A1 (en) * | 2013-06-04 | 2019-12-05 | Isolynx, Llc | Self-configurable tracking tags and methods of use |
US10953304B2 (en) * | 2013-06-04 | 2021-03-23 | Isolynx, Llc | Self-configurable tracking tags and methods of use |
US10441867B2 (en) * | 2013-06-04 | 2019-10-15 | Isolynx, Llc | Systems and methods for tracking tag management |
US11753852B2 (en) | 2013-06-11 | 2023-09-12 | Invue Security Products Inc. | Anti-theft device for portable electronic device |
US10738508B2 (en) | 2013-06-11 | 2020-08-11 | Invue Security Products Inc. | Anti-theft device for portable electronic device |
US10227796B2 (en) | 2013-06-11 | 2019-03-12 | Invue Security Products Inc. | Anti-theft device for portable electronic device |
US9970217B2 (en) | 2013-06-11 | 2018-05-15 | Invue Security Products Inc. | Anti-theft device for portable electronic device |
US11293202B2 (en) | 2013-06-11 | 2022-04-05 | Invue Security Products Inc. | Anti-theft device for portable electronic device |
US9567776B2 (en) | 2013-06-11 | 2017-02-14 | Invue Security Products Inc. | Anti-theft device for portable electronic device |
US9437088B2 (en) | 2013-09-29 | 2016-09-06 | Invue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
US10482734B2 (en) | 2013-09-29 | 2019-11-19 | Invue Security Products Inc. | Systems and methods for protecting retail display merchandise from theft |
EP2866177A1 (en) * | 2013-10-28 | 2015-04-29 | Samsung Electro-Mechanics Co., Ltd. | Method of grouping electronic tags and method of managing group IDs |
US20150206118A1 (en) * | 2014-01-23 | 2015-07-23 | Pomo Search Ltd | System and method for point of sale transaction logging |
US11093922B2 (en) | 2014-01-23 | 2021-08-17 | Google Llc | System and method for point of sale transaction logging |
US11663572B2 (en) | 2014-01-23 | 2023-05-30 | Google Llc | System and method for point of sale transaction logging |
US10169751B2 (en) | 2014-01-23 | 2019-01-01 | Pomo Search Ltd | System and method for point of sale transaction logging |
US9881289B2 (en) * | 2014-01-23 | 2018-01-30 | Pomo Search Ltd. | System and method for point of sale transaction logging |
CN106463028A (en) * | 2014-04-16 | 2017-02-22 | 因戴姆解决方案有限责任公司 | Fitting room management and occupancy monitoring system |
CN106463035A (en) * | 2014-04-23 | 2017-02-22 | 乔凡尼·萨尔沃 | Methods, devices, kits and systems for modulating activation of self-alarming tags |
CN112492526A (en) * | 2014-05-28 | 2021-03-12 | 联邦快递服务公司 | Enabling node delivery notifications using elements of a wireless node network |
CN103996259A (en) * | 2014-06-04 | 2014-08-20 | 广西科技大学鹿山学院 | Multi-point-control pneumatic door/window anti-theft alarm triggering device |
US9826368B2 (en) | 2014-07-16 | 2017-11-21 | Sony Corporation | Vehicle ad hoc network (VANET) |
US10127601B2 (en) * | 2014-07-16 | 2018-11-13 | Sony Corporation | Mesh network applied to fixed establishment with movable items therein |
RU2626348C2 (en) * | 2014-07-16 | 2017-07-26 | Сони Корпорейшн | Application of multi-compatible network on stationary enterprise with mobile positions |
US20160019515A1 (en) * | 2014-07-16 | 2016-01-21 | Sony Corporation | Mesh network applied to fixed establishment with movable items therein |
US9516461B2 (en) | 2014-07-16 | 2016-12-06 | Sony Corporation | Mesh network applied to arena events |
US9906897B2 (en) | 2014-07-16 | 2018-02-27 | Sony Corporation | Applying mesh network to pet carriers |
US9900748B2 (en) | 2014-07-16 | 2018-02-20 | Sony Corporation | Consumer electronics (CE) device and related method for providing stadium services |
CN104269022A (en) * | 2014-10-11 | 2015-01-07 | 郑州捷利工业设备有限公司 | Wireless voice distress calling device |
US10777005B2 (en) * | 2014-12-15 | 2020-09-15 | Autodesk, Inc. | Smart tools and workspaces for do-it-yourself tasks |
US20160171861A1 (en) * | 2014-12-15 | 2016-06-16 | Autodesk, Inc. | Smart tools and workspaces for do-it-yourself tasks |
US9443406B2 (en) * | 2014-12-18 | 2016-09-13 | Checkpoint Systems, Inc. | Dual mode security tags |
US11749076B2 (en) | 2015-02-18 | 2023-09-05 | In Vue Security Products Inc. | System and method for calibrating a wireless security range |
US10223881B2 (en) | 2015-02-18 | 2019-03-05 | Invue Security Products Inc. | System and method for calibrating a wireless security range |
CN105989465A (en) * | 2015-03-18 | 2016-10-05 | Sk普兰尼特有限公司 | Apparatus and method for providing payment service based on beacon in beacon service system |
US9922316B2 (en) | 2015-03-18 | 2018-03-20 | Sk Planet Co., Ltd. | Apparatus and method for providing payment service based on beacon in beacon service system |
EP3070978A1 (en) * | 2015-03-18 | 2016-09-21 | SK Planet Co., Ltd. | Apparatus and method for providing payment service based on beacon in beacon service system |
WO2016177939A1 (en) * | 2015-05-04 | 2016-11-10 | Noccela Oy | A system, method and apparatuses for electronic article surveillance |
US11403928B2 (en) | 2015-05-04 | 2022-08-02 | Noccela Oy | System, method and apparatuses for electronic article surveillance |
US11113940B2 (en) | 2015-06-25 | 2021-09-07 | Invue Security Products Inc. | Wireless merchandise security system |
US10482739B2 (en) | 2015-06-25 | 2019-11-19 | Invue Security Products Inc. | Wireless merchandise security system |
GB2548972B (en) * | 2016-02-19 | 2019-07-24 | Walmart Apollo Llc | A multi-capability apparatus supporting background RFID tag-reading and corresponding methods |
GB2548972A (en) * | 2016-02-19 | 2017-10-04 | Wal Mart Stores Inc | A multi-capability apparatus supporting background RFID tag-reading and corresponding methods |
US9977937B2 (en) | 2016-02-19 | 2018-05-22 | Walmart Apollo, Llc | Multi-capability apparatus supporting background RFID tag-reading and corresponding methods |
GB2553017B (en) * | 2016-05-18 | 2022-02-16 | Symbol Technologies Llc | Arrangement for, and method of, reading RFID product tags with improved performance by reading RFID tags of interest in a venue |
GB2553017A (en) * | 2016-05-18 | 2018-02-21 | Symbol Technologies Llc | Arrangement for, and method of, reading RFID product tags with improved performance by reading RFID tags of interest in a venue |
GB2554134B (en) * | 2016-07-07 | 2020-04-29 | Symbol Technologies Llc | System for and method of deterring theft of items from a venue |
GB2554134A (en) * | 2016-07-07 | 2018-03-28 | Symbol Technologies Llc | System for and method of deterring theft of items from a venue |
US10438470B2 (en) | 2016-07-07 | 2019-10-08 | Symbol Technologies, Llc | System for and method of deterring theft of items from a venue |
US10949579B2 (en) | 2017-02-22 | 2021-03-16 | Middle Chart, LLC | Method and apparatus for enhanced position and orientation determination |
US10760991B2 (en) | 2017-02-22 | 2020-09-01 | Middle Chart, LLC | Hierarchical actions based upon monitored building conditions |
US10866157B2 (en) | 2017-02-22 | 2020-12-15 | Middle Chart, LLC | Monitoring a condition within a structure |
US10872179B2 (en) | 2017-02-22 | 2020-12-22 | Middle Chart, LLC | Method and apparatus for automated site augmentation |
US11893317B2 (en) | 2017-02-22 | 2024-02-06 | Middle Chart, LLC | Method and apparatus for associating digital content with wireless transmission nodes in a wireless communication area |
US10902160B2 (en) | 2017-02-22 | 2021-01-26 | Middle Chart, LLC | Cold storage environmental control and product tracking |
US11900022B2 (en) | 2017-02-22 | 2024-02-13 | Middle Chart, LLC | Apparatus for determining a position relative to a reference transceiver |
US10776529B2 (en) | 2017-02-22 | 2020-09-15 | Middle Chart, LLC | Method and apparatus for enhanced automated wireless orienteering |
US11475177B2 (en) | 2017-02-22 | 2022-10-18 | Middle Chart, LLC | Method and apparatus for improved position and orientation based information display |
US11468209B2 (en) | 2017-02-22 | 2022-10-11 | Middle Chart, LLC | Method and apparatus for display of digital content associated with a location in a wireless communications area |
US11436389B2 (en) | 2017-02-22 | 2022-09-06 | Middle Chart, LLC | Artificial intelligence based exchange of geospatial related digital content |
US10984148B2 (en) | 2017-02-22 | 2021-04-20 | Middle Chart, LLC | Methods for generating a user interface based upon orientation of a smart device |
US10984146B2 (en) | 2017-02-22 | 2021-04-20 | Middle Chart, LLC | Tracking safety conditions of an area |
US10983026B2 (en) | 2017-02-22 | 2021-04-20 | Middle Chart, LLC | Methods of updating data in a virtual model of a structure |
US10762251B2 (en) | 2017-02-22 | 2020-09-01 | Middle Chart, LLC | System for conducting a service call with orienteering |
US11054335B2 (en) | 2017-02-22 | 2021-07-06 | Middle Chart, LLC | Method and apparatus for augmented virtual models and orienteering |
US11080439B2 (en) | 2017-02-22 | 2021-08-03 | Middle Chart, LLC | Method and apparatus for interacting with a tag in a cold storage area |
US10831945B2 (en) | 2017-02-22 | 2020-11-10 | Middle Chart, LLC | Apparatus for operation of connected infrastructure |
US11625510B2 (en) | 2017-02-22 | 2023-04-11 | Middle Chart, LLC | Method and apparatus for presentation of digital content |
US11100260B2 (en) | 2017-02-22 | 2021-08-24 | Middle Chart, LLC | Method and apparatus for interacting with a tag in a wireless communication area |
US11106837B2 (en) | 2017-02-22 | 2021-08-31 | Middle Chart, LLC | Method and apparatus for enhanced position and orientation based information display |
US11429761B2 (en) | 2017-02-22 | 2022-08-30 | Middle Chart, LLC | Method and apparatus for interacting with a node in a storage area |
US11120172B2 (en) | 2017-02-22 | 2021-09-14 | Middle Chart, LLC | Apparatus for determining an item of equipment in a direction of interest |
US11610033B2 (en) | 2017-02-22 | 2023-03-21 | Middle Chart, LLC | Method and apparatus for augmented reality display of digital content associated with a location |
US11188686B2 (en) | 2017-02-22 | 2021-11-30 | Middle Chart, LLC | Method and apparatus for holographic display based upon position and direction |
US11481527B2 (en) | 2017-02-22 | 2022-10-25 | Middle Chart, LLC | Apparatus for displaying information about an item of equipment in a direction of interest |
US11900021B2 (en) | 2017-02-22 | 2024-02-13 | Middle Chart, LLC | Provision of digital content via a wearable eye covering |
US11514207B2 (en) | 2017-02-22 | 2022-11-29 | Middle Chart, LLC | Tracking safety conditions of an area |
US11900023B2 (en) | 2017-02-22 | 2024-02-13 | Middle Chart, LLC | Agent supportable device for pointing towards an item of interest |
US10360785B2 (en) | 2017-04-07 | 2019-07-23 | Sita Information Networking Computing Usa, Inc. | Article tracking system and method |
US11189155B2 (en) | 2017-04-07 | 2021-11-30 | Sita Information Networking Computing Usa, Inc. | Article tracking system and method |
GB2561257A (en) * | 2017-04-07 | 2018-10-10 | Sita Inf Networking Computing Usa Inc | Article tracking system and method |
US10736062B2 (en) * | 2017-05-09 | 2020-08-04 | United States Of America As Represented By The Administrator Of Nasa | System and method to synchronize clocks across a distributed network of nodes |
US20180332548A1 (en) * | 2017-05-09 | 2018-11-15 | U.S.A. as represented by the Administrator of NASA | System and Method to Synchronize Clocks Across a Distributed Network of Nodes |
US10535425B2 (en) | 2017-06-28 | 2020-01-14 | Perceptimed, Inc. | Inventory management |
US20190006037A1 (en) * | 2017-06-28 | 2019-01-03 | Perceptimed, Inc. | Inventory Assurance |
US11532021B2 (en) | 2017-11-16 | 2022-12-20 | Panasonic Intellectual Property Corporation Of America | Transaction management system, transaction management method, and program |
CN109801122A (en) * | 2017-11-16 | 2019-05-24 | 松下电器(美国)知识产权公司 | Trade managing system, exchange management method and program |
US11280874B2 (en) | 2018-09-24 | 2022-03-22 | Science Applications International Corporation | System and method for dismounted assured position, navigation and timing (DAPNT) |
US10877127B2 (en) * | 2018-09-24 | 2020-12-29 | Science Applications International Corporation | System and method for dismounted assured position, navigation and timing (DAPNT) |
US11756394B2 (en) * | 2018-12-14 | 2023-09-12 | Invue Security Products Inc. | Wireless tracking system for merchandise security |
US11348421B2 (en) * | 2018-12-14 | 2022-05-31 | Invue Security Products Inc. | Wireless tracking system for merchandise security |
US20220292940A1 (en) * | 2018-12-14 | 2022-09-15 | Invue Security Products Inc. | Wireless tracking system for merchandise security |
US11636236B2 (en) | 2019-01-17 | 2023-04-25 | Middle Chart, LLC | Methods and apparatus for procedure tracking |
US10824774B2 (en) * | 2019-01-17 | 2020-11-03 | Middle Chart, LLC | Methods and apparatus for healthcare facility optimization |
US11593536B2 (en) | 2019-01-17 | 2023-02-28 | Middle Chart, LLC | Methods and apparatus for communicating geolocated data |
US11861269B2 (en) | 2019-01-17 | 2024-01-02 | Middle Chart, LLC | Methods of determining location with self-verifying array of nodes |
US10740503B1 (en) * | 2019-01-17 | 2020-08-11 | Middle Chart, LLC | Spatial self-verifying array of nodes |
US11100261B2 (en) | 2019-01-17 | 2021-08-24 | Middle Chart, LLC | Method of wireless geolocated information communication in self-verifying arrays |
US11436388B2 (en) * | 2019-01-17 | 2022-09-06 | Middle Chart, LLC | Methods and apparatus for procedure tracking |
US10943034B2 (en) | 2019-01-17 | 2021-03-09 | Middle Chart, LLC | Method of wireless determination of a position of a node |
US11042672B2 (en) * | 2019-01-17 | 2021-06-22 | Middle Chart, LLC | Methods and apparatus for healthcare procedure tracking |
US11361122B2 (en) | 2019-01-17 | 2022-06-14 | Middle Chart, LLC | Methods of communicating geolocated data based upon a self-verifying array of nodes |
US11688258B2 (en) * | 2019-08-30 | 2023-06-27 | Sensormatic Electronics, LLC | Radio frequency identification (RFID) tag location verification using short range communication |
US20230298448A1 (en) * | 2019-08-30 | 2023-09-21 | Sensormatic Electronics, LLC | Radio frequency identification (rfid) tag location verification using short range communication |
US11194938B2 (en) | 2020-01-28 | 2021-12-07 | Middle Chart, LLC | Methods and apparatus for persistent location based digital content |
US11507714B2 (en) | 2020-01-28 | 2022-11-22 | Middle Chart, LLC | Methods and apparatus for secure persistent location based digital content |
EP3913590A1 (en) * | 2020-05-20 | 2021-11-24 | 3SI Security Systems Inc. | Security tracking device with zone-based alert suppression |
US11620889B2 (en) | 2020-05-20 | 2023-04-04 | 3Si Security Systems, Inc. | Security tracking device with zone-based alert suppression |
RU2744229C1 (en) * | 2020-06-04 | 2021-03-03 | Андрей Александрович Красовский | Wireless ultra frequency detector of signals and commands of uhf rfid readers and method for detecting signals and commands of uhf rfid readers |
US11809787B2 (en) | 2021-03-01 | 2023-11-07 | Middle Chart, LLC | Architectural drawing aspect based exchange of geospatial related digital content |
US11640486B2 (en) | 2021-03-01 | 2023-05-02 | Middle Chart, LLC | Architectural drawing based exchange of geospatial related digital content |
WO2022256689A1 (en) * | 2021-06-04 | 2022-12-08 | Invue Security Products Inc. | Wireless beacon tracking system for merchandise security |
WO2023111035A1 (en) * | 2021-12-14 | 2023-06-22 | Zliide Technologies Aps | A system for securing and tracking consumer goods |
Also Published As
Publication number | Publication date |
---|---|
WO2011035303A1 (en) | 2011-03-24 |
US8508367B2 (en) | 2013-08-13 |
WO2011035309A3 (en) | 2011-11-24 |
CN102741893B (en) | 2014-07-23 |
WO2011035309A2 (en) | 2011-03-24 |
CN102741893A (en) | 2012-10-17 |
US20110068921A1 (en) | 2011-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20110068906A1 (en) | Systems, methods, and apparatuses for managing configurable monitoring devices | |
US9449202B2 (en) | Localizing tagged assets in a configurable monitoring device system | |
US8452868B2 (en) | Retail product tracking system, method, and apparatus | |
US20160239794A9 (en) | Retail product tracking system, method, and apparatus | |
US11756394B2 (en) | Wireless tracking system for merchandise security | |
WO2011035256A2 (en) | Beamforming and localizing in a configurable monitoring device system | |
US8344884B2 (en) | System, method, and apparatus for triggering an alarm | |
US9298954B1 (en) | Tag security systems and methods for articles of merchandise | |
US20110084840A1 (en) | Key Device for Monitoring Systems | |
US20130002879A1 (en) | Systems and methods for tracking a commodity | |
US10997381B2 (en) | Systems and methods for using radio frequency identification as an adaptive alarm threshold | |
JP2014099857A (en) | Locator beacon and radar application for mobile device | |
US10621841B2 (en) | System and method for tag management and theft detection | |
US11514768B2 (en) | Systems and methods for increasing alarm confidence in EAS detection systems | |
US10817833B2 (en) | System and method for managing inventory based on RFID technology | |
US20210241593A1 (en) | System and method for increased exit interrogation of rfid tags |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CHECKPOINT SYSTEMS, INC., NEW JERSEY Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHAFER, GARY MARK;MERCIER, MICHAEL;SIGNING DATES FROM 20100428 TO 20100429;REEL/FRAME:024347/0141 |
|
AS | Assignment |
Owner name: WELLS FARGO BANK, NORTH CAROLINA Free format text: SECURITY AGREEMENT;ASSIGNOR:CHECKPOINT SYSTEMS, INC.;REEL/FRAME:028714/0552 Effective date: 20120731 |
|
AS | Assignment |
Owner name: BANK OF AMERICA, N.A., PENNSYLVANIA Free format text: SECURITY AGREEMENT;ASSIGNOR:CHECKPOINT SYSTEMS, INC.;REEL/FRAME:031805/0001 Effective date: 20131211 |
|
AS | Assignment |
Owner name: CHECKPOINT SYSTEMS, INC., NEW JERSEY Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:031825/0545 Effective date: 20131209 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |