US20110068906A1 - Systems, methods, and apparatuses for managing configurable monitoring devices - Google Patents

Systems, methods, and apparatuses for managing configurable monitoring devices Download PDF

Info

Publication number
US20110068906A1
US20110068906A1 US12/636,564 US63656409A US2011068906A1 US 20110068906 A1 US20110068906 A1 US 20110068906A1 US 63656409 A US63656409 A US 63656409A US 2011068906 A1 US2011068906 A1 US 2011068906A1
Authority
US
United States
Prior art keywords
ping
signal
node
tag
location
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/636,564
Inventor
Gary Mark Shafer
Michael Mercier
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Checkpoint Systems Inc
Original Assignee
Checkpoint Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Checkpoint Systems Inc filed Critical Checkpoint Systems Inc
Priority to US12/636,564 priority Critical patent/US20110068906A1/en
Assigned to CHECKPOINT SYSTEMS, INC. reassignment CHECKPOINT SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SHAFER, GARY MARK, MERCIER, MICHAEL
Priority to US12/887,228 priority patent/US8452868B2/en
Priority to AU2010295352A priority patent/AU2010295352B2/en
Priority to PCT/US2010/049653 priority patent/WO2011035302A1/en
Priority to EP10763513A priority patent/EP2481035A1/en
Priority to PCT/US2010/049672 priority patent/WO2011035309A2/en
Priority to CN201080051263.5A priority patent/CN102741893B/en
Priority to MX2012003457A priority patent/MX2012003457A/en
Publication of US20110068906A1 publication Critical patent/US20110068906A1/en
Assigned to WELLS FARGO BANK reassignment WELLS FARGO BANK SECURITY AGREEMENT Assignors: CHECKPOINT SYSTEMS, INC.
Priority to US13/901,926 priority patent/US20160239794A9/en
Assigned to BANK OF AMERICA, N.A. reassignment BANK OF AMERICA, N.A. SECURITY AGREEMENT Assignors: CHECKPOINT SYSTEMS, INC.
Assigned to CHECKPOINT SYSTEMS, INC. reassignment CHECKPOINT SYSTEMS, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: WELLS FARGO BANK, NATIONAL ASSOCIATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10366Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
    • G06K7/10475Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications arrangements to facilitate interaction with further interrogation devices, e.g. such that at least two interrogation devices may function and cooperate in a network of such devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2462Asset location systems combined with EAS

Definitions

  • Embodiments of the present invention relate generally to network and network management technology and, more particularly, relate to the management of networks that include dynamically configurable monitoring devices for use in connection with monitoring, tracking, and locating activities associated with one or more articles such as retail products.
  • EAS electronic article surveillance
  • conventional systems are often limited to the narrow scope of providing security functionality.
  • an EAS gate located at an exit of a retail business establishment may be configured to alarm when an article with an EAS tag passes through the gate.
  • many conventional systems provide nothing more to the users of the systems, such as store owners, store managers, and the like.
  • store owners are considering the purchase and installation of a conventional security system in a retail establishment, the limited functionality offered by the systems can detrimentally affect the cost-benefit analysis of installing and maintaining the system.
  • identifying the location of products within a retail store has often relied on product placement.
  • approaches to finding products are often based on placing similar types of products near each other in the store, thereby allowing the products' relative placement to assist both customers and store personnel in finding a desired product.
  • Another approach has been to use large signs above the aisles of products, which identify which types of products should be in each aisle.
  • using a sign and/or simply organizing a store with areas for similar products has proven insufficient under many circumstances. As a result, customers and store personnel are demanding more accuracy with respect to locating products within retail and other environments.
  • Some example embodiments of the present invention are therefore provided that support security system functionality, as well as, additional functionalities that would be beneficial to store owners, store managers, and customers.
  • some example embodiments support inventory and marketing functionality, as well as, advanced security functionality.
  • a system for managing and locating configurable monitoring devices and/or the products they are attached to.
  • a configurable monitoring device may be a microprocessor-based wireless communication device that can assume configurable roles or modes of operation within the system.
  • a mode of operation may be implemented based on configuration information stored on the configurable monitoring device.
  • the configuration information may be pre-loaded on the configurable monitoring device, or configurable monitoring devices may receive the configuration information via a wireless connection from a remote device.
  • the system may include any number of configurable monitoring devices configured to operate, for example, as a network, such as a mesh network, hybrid mesh network, star network, hybrid star network, or the like.
  • the network may include a gateway node that supports a monitoring terminal (sometimes referred to herein as a coordinator).
  • the gateway node may operate as an interface between the configurable monitoring device network and the monitoring terminal, for example, via an external network.
  • the monitoring terminal may be configured to interact with the configurable monitoring devices and the configurable monitoring device network to implement a variety of functionalities.
  • one or more of the monitoring devices can include a processor, which can be configured to receive an indication of a triggering event. In response to receiving the indication of the triggering event the processor can be configured to cause the monitoring device to transition into a triggered role.
  • the triggered role being one of a tag role or a node role, among others.
  • the tag role includes configuring the processor to determine location information relating to the monitoring device.
  • the tag role can include, instead of or in addition to locally determining location information, configuring the processor to repeat, or relay, any received data to a network entity, which can then help determine the location of the monitoring device.
  • the location information can be relatively complex or simple (e.g., an identifier number of one or more other nodes the monitoring device “hears”).
  • the monitoring device's node role can include configuring the processor to transmit a ping signal.
  • a ping signal can comprise a relatively small amount of data (e.g., only the node identifier information) or a relatively larger amount data (such as at least the amount and type of data common to “beacon” signals used in wireless communications, some of which may be 802.11.4 compliant).
  • the node role can also comprise configuring the processor to forward a tag communication to a network entity.
  • the monitoring device can be configured to receive data that includes instructions to transition the monitoring device.
  • the instructions can be included in the indication of the triggering event and/or be sent by a network entity.
  • the monitoring device's processor can be further configured to receive a second indication of a second triggering event and, in response, transition from the triggered role to a second triggered role.
  • the monitoring device can transition from a tag role, to a node role, back to a tag role.
  • the indication of the triggering event can be a wireless signal that is broadcast wirelessly and received by one or more monitoring devices' antennas.
  • the indication of the triggering event can include a monitoring device identifier or other information that causes only one of the monitoring devices to execute its transition into the triggered role.
  • a directional antenna (which may allow only one monitoring device or a subset of the monitoring devices to receive the indication), any other means, and/or a combination thereof can be used to target one or more monitoring devices for transitioning.
  • the indication of the triggering event can be, for example, an output of a sensor.
  • the sensor can be integrated inside the housing of the monitoring device, making the sensor an internal component of the monitoring device.
  • Some examples of internal components include a motion detector (e.g., jiggle switch, accelerometer, etc.), a tamper detection component (which can be separate from or part of a mounting device used to affix the monitoring device to an article), or any other internal component that could be integrated into the monitoring device, some additional examples of which are discussed herein.
  • the sensor can be configured to detect the triggering event and output the indication of the triggering event.
  • the triggering event could be movement and, in response to the sensor determining that the monitoring device is moving, the sensor can output the indication to the monitoring device's processor (and/or any other component or device).
  • the senor can be external to the monitoring device, such as, e.g., in an external device.
  • the sensor can produce an output that is then relayed wirelessly or by any other means to the monitoring device.
  • the external device can be another device functioning as a node device.
  • Other examples of external devices that can send the monitoring device the indication of a triggering event include, e.g., an RFID device (such as those that are handheld or mounted in a counter or other piece of furniture), a network entity, an EAS gate, or any other device that can be configured to emit and/or generate an indication of a triggering event and/or an alarm event.
  • the monitoring device can also include an audio device configured to emit audio signals.
  • the audio device may only be operable when the monitoring device is in the tag role.
  • the monitoring device's processor can be further configured to receive an alarm indication of an alarm event while in the tag role and send a signal to the audio device, causing the audio device to emit the audio signal.
  • An alarm event can be similar to or a type of triggering event and an alarm indication can be similar to or a type of an indication of the triggering event.
  • the alarm event can be an event, such as determining someone is trying to steal the article to which the monitoring device is attached (based on, e.g., suspicious movement profile).
  • the alarm indication can be any type of indication, including a wireless or other type of signal that corresponds with an alarm event and/or can convey, to the monitoring device and/or network entity, that an alarm event occurred.
  • the monitoring device's processor and/or the network entity can receive the alarm indication from an external security device, such as an EAS gate and/or internal component that is configured to generate an output in response to being in communication proximity with an EAS gate.
  • an external security device such as an EAS gate and/or internal component that is configured to generate an output in response to being in communication proximity with an EAS gate.
  • a node can be placed near a store's exit and the monitoring device can be configured to interpret hearing that node's ping signal as an alarm indication (with the alarm event being that monitoring device being too close to the store's exit).
  • the external security device can be a second monitoring device.
  • the external security device can be in communication proximity to the monitoring device and the external security device and/or the monitoring device can be affixed to a retail product.
  • the external security device can be located at a store's exit and be used to detect an alarm event.
  • “communication proximity” refers to the distance in which direct communications can exist wirelessly between two devices. This distance can be dependent on a number of variables includes power output, frequency, signal reception factors (including physical and electrical interference variables), and/or any other variable. For example, if a monitoring device is in communication proximity of a node device, the monitoring device can “hear” the node device's ping signal(s) (e.g., receive the ping signal and determine the node identifier).
  • the monitoring device can comprise a battery and/or various other components.
  • the monitoring device can comprise a mounting device configured to affix the monitoring device to a retail article.
  • the monitoring device can also comprise memory configured to store attribute information (e.g., bar code data, color data, price data, etc.) associated with the retail article.
  • the monitoring device can include a display configured to display human-readable information and/or a light emitting component (which can be used to indicate battery power, an error message, communication functionality, etc.).
  • the monitoring device can be configured for position tracking of an article (such as a retail item, book, computer, casino chip, money, personal identification card, passport, etc.).
  • the monitoring device's processor can be configured to receive a ping signal from a ping node; determine location information relating to the monitoring device based at least in part on receiving the ping signal; and report the location information to a network entity.
  • the network entity can comprise one or more additional apparatuses, including a server and network management and/or monitoring system.
  • the monitoring device and/or network entity can determine a location zone of the monitoring device in response to the monitoring device receiving a ping signal from the ping node or other device functioning as a ping node (both of which are sometimes referred to herein as a “node device” or “node”).
  • the monitoring device's processor can then retrieve (e.g., request and receive), from local or remote memory, a zone-based functionality profile that corresponds with the location zone.
  • the functionality profile is downloaded from remote memory (such as, e.g., the memory of a network entity)
  • the processor can be configured to store the functionality profile in the monitoring device's internal memory.
  • the functionality profile can be zone-based and correspond with one or more zones that represent an area of a physical space, such as a retail store or warehouse.
  • the zones can also be relative to the position of one or more other devices, such as a node device, door, etc.
  • the monitoring device can comprise an audible alarm that is activated by the processor in response to the zone-based functionality profile including an event signal activation instruction, such as an alarm activation instruction and/or any other instructions (such as, e.g., an unlocking instruction for the monitoring device's attachment mechanism, etc.).
  • an alarm may also be initiated at the network entity in response to determining an alarm event has occurred.
  • the monitoring device's processor can be further configured to, in response to receiving the ping signal from the ping node, determine a location zone. Determining a location zone can include, for example, determining the ping node's identifier which is broadcast as or encoded within the ping signal.
  • the network entity can be configured to determine the applicable zone-based functionality profile for the monitoring device, in response to the monitoring device repeating the ping signal(s) the monitoring device received. The monitoring device's processor can then retrieve, from the network entity, the zone-based functionality profile that corresponds with the monitoring device's location zone.
  • the monitoring device and the ping node can establish and execute a uni-directional communication protocol.
  • the uni-directional communication protocol can allow, for example, the ping node to wirelessly broadcast data (as, e.g., a ping signal), which the monitoring device can receive.
  • the data can include, e.g., the ping node's identifier and/or other information.
  • the ping node can be configured to only send data to the monitoring device (e.g., lack the components necessary to receive data from the monitoring device).
  • the ping node can receive data from a network entity, even though the ping node lacks the ability to receive data from a monitoring device.
  • the monitoring device may be configured to respond to (e.g., confirm receipt for) all ping node signals it receives.
  • the uni-directional communication protocol lacks the monitoring device transmitting data intended for the ping node.
  • the monitoring device can also establish and execute a bi-directional communication protocol with the ping node and/or the network entity.
  • the bi-directional communication protocol can allow for two way communications, including sending and receiving of signals between each device participating in the communication protocol.
  • the monitoring device can be further configured to receive a second ping signal from a second ping node.
  • the second ping signal can be used by the monitoring device and/or network entity to determine second location information (such as identifying information of the second ping node) relating to the monitoring device.
  • the uni-directional, bi-direction or any other communication protocol can be established between the monitoring device and the second ping node.
  • the communication protocol between the monitoring device and the second ping node can be related to or independent from the communication protocol used between the monitoring device and the first ping node.
  • a location zone can be determined by the monitoring device and/or the network entity based on the first location information and the second location information.
  • the first and second location information can respectively comprise the first ping node's and the second ping node's identification data.
  • the network entity and/or the monitoring device knowing where those ping nodes are physically located, can then derive the approximate position of the monitoring device. In such embodiments, a more accurate location can be derived from, e.g., more ping node information.
  • the location (relative to the ping node and/or absolute in a given space) can be used to access memory (remote or local to the monitoring device) and retrieve a zone-based functionality profile that can include instructions and other executable commands for the monitoring device and/or other device(s).
  • the monitoring device can comprise an audible alarm that is activated by the processor in response to receiving a type of event signal activation instruction (e.g., an alarm activation instruction) included in the zone-based functionality profile.
  • the monitoring device can comprise a mounting device that is unlocked in response to the zone-based functionality profile including an unlock instruction, wherein the mounting device is configured to affix the monitoring device to a retail article.
  • the monitoring device can also include an antenna that the processor uses to transmit and/or receive data associated with the location zone to the network entity, ping node device, and/or any other external device.
  • the monitoring device's processor can be further configured to engage an internal timer; and subsequently receive an indication of a trigger event, wherein the indication results from the timer expiring.
  • any other type of time keeping component can be implemented, including a clock, etc.
  • the monitoring device can enter a wake mode and subsequent to reporting the location information to the network entity, reset the timer and enter a sleep mode.
  • a timer can be started in response to receiving a triggering event.
  • a triggering event can cause the creation of a corresponding event signal, which can, among other things, cause the initiation of a timer.
  • the monitoring device and/or network entity can send a first signal for instructing the one or more ping nodes to power down to a minimum threshold and incrementally power up simultaneously or near simultaneously.
  • the monitoring device can then monitor (e.g., listen) for subsequent ping signals from the ping nodes.
  • the monitoring device can be configured to receive a location signal from either of the ping nodes.
  • the monitoring device can determine locally or utilize a network entity to determine its location and/or relate that location information to an article to which the monitoring device is coupled to.
  • the location information can be associated with a first location corresponding with the location of a first ping node if the location signal was generated by the first ping node. Or, as another example, the location information can be associated with a second location corresponding with the location of the second ping node if the location signal was generated by the second ping node.
  • the monitoring device can be configured to report the location information to a network entity.
  • the monitoring device and/or network entity can then send a first signal for instructing the one or more ping nodes to power up to a maximum threshold and then simultaneously or near simultaneously incrementally power down.
  • the monitoring device can then monitor (e.g., listen) for subsequent ping signals from the ping nodes. Subsequent to determining that both the first ping node and the second ping node have powered up, the monitoring device can be configured to receive location signals. Subsequent to determining that both the first ping node and the second ping node have powered up, determining whether a final ping signal is received from the first ping node or the second ping node.
  • the monitoring device In response to receiving the final ping signal, determining the location information relating to the article, wherein the location information is associated with a first location of the first ping node if the final ping signal was generated by the first ping node or the location information is associated with a second location of the second ping node if the final ping signal was generated by the second ping node.
  • the monitoring device can determine its location based upon the last ping node it hears.
  • the monitoring system may be implemented that is configured to support the locating of tags.
  • the monitoring system may be comprised of a plurality of ping, gateway and/or other nodes that provide ping and/or other types of signals that are detected by a tag.
  • a tag that is able to receive a signal from a ping and other nodes can be defined as having a positional relationship with the node(s).
  • a tag may be configured to determine a closest ping node to the tag based on the ability to receive a signal from a ping node.
  • a locating procedure may be undertaken to identify the ping node closest to the tag or within communication range with a tag.
  • the ping nodes may be configured to, upon request, adjust the pings' respective signal powers to a common level (e.g., a minimum level or a maximum level) and incrementally modify the power of the signal to determine when a targeted tag begins receiving or communicating, or fails to receive or communicate, the signals being provided by the ping nodes.
  • a common level e.g., a minimum level or a maximum level
  • the tag may be configured to determine which ping node is closest to the tag. The tag may then be associated with the ping node such that the tag is indicated as being located near the ping node within the environment.
  • FIG. 1 a is a schematic block diagram of a monitoring system including a number of configurable monitoring devices according to example embodiments;
  • FIG. 1 b is another schematic block diagram of a monitoring system including a number of configurable monitoring devices according to an example embodiment of the present invention
  • FIG. 1 c is another rendering of a monitoring system including a number of configurable monitoring devices according to example embodiments
  • FIG. 1 d illustrates a flow chart of an example tag according to example embodiments
  • FIG. 2 illustrates a block diagram of a monitoring terminal according to example embodiments
  • FIG. 3 illustrates a diagram of various configurable monitoring devices implemented in an example retail environment according to example embodiments
  • FIG. 4 illustrates an example configurable monitoring device with specialized hardware for performing some of the functionality within the role of a key according to example embodiments
  • FIG. 5 a is an illustration of an example retail environment having ping nodes and tags located within the environment according to example embodiments;
  • FIG. 5 b illustrates a tag information window for displaying attribute information for a tag according to example embodiments
  • FIG. 6 is an illustration of a signaling and communications period for a ping node according to example embodiments
  • FIG. 7 is an illustration of a situation where a tag is within range of more than one ping node according to example embodiments
  • FIG. 8 is an illustration of a example procedure where the signal powers of the ping nodes have been dropped to a minimum level and incrementally increased to perform locating according to example embodiments;
  • FIG. 9 is a flowchart of an example method for determining the location of a tag from the perspective of a monitoring terminal or a tag according to example embodiments;
  • FIG. 10 is a flowchart of an example method for determining the location of a tag from the perspective of a ping node according to example embodiments
  • FIG. 11 illustrates an example of a flow diagram illustrating an example method for managing configurable monitoring devices according to example embodiments
  • FIG. 12 illustrates an example user interface window implemented by a monitoring terminal and depicting a representation of a monitoring system according to example embodiments
  • FIG. 13 illustrates an example user interface window implemented by a monitoring terminal and depicting a representation of a monitoring system in accordance with some embodiments
  • FIG. 14 illustrates an example of a flow diagram illustrating an example method for managing configurable monitoring devices according to example embodiments
  • FIG. 15 illustrates an example tag information window for displaying attribute information associated with a tag or node according to example embodiments
  • FIG. 16 illustrates a hub information window for displaying attribute information for a node according to example embodiments.
  • FIG. 17 illustrates a tag battery level window for displaying the battery level for a tag according to example embodiments.
  • the term “circuitry” refers to not only hardware-only circuit implementations including analog and/or digital circuitry, but at least also to combinations of circuits with corresponding software and/or instructions stored on a computer-readable storage medium.
  • example embodiments of the present invention may be configured to support various security, inventory, marketing, and other functionalities in, for example, a retail sales environment or other given space.
  • configurable monitoring devices may be installed within the retail sales environment.
  • a description of some example embodiments of configurable monitoring devices, and the monitoring systems that may support configurable monitoring devices, is provided in U.S. Provisional Patent Application 61/244,320 filed Sep. 21, 2009, entitled “A Configurable Monitoring Device”, the content of which is hereby incorporated by reference in its entirety.
  • the configurable monitoring devices may be wireless communication devices that can be dynamically configured to assume one or transition among roles within the operation of a monitoring system.
  • the configurable monitoring devices may include a processor, memory, communications interface (e.g., radio transmitter/receiver, Radio Frequency ID (RFID) module, or the like). Based on a role that a configurable monitoring device is expected to assume or transition to, the configurable monitoring device may also include more specialized hardware components such as, an alarm, a sensor, a display, and the like.
  • RFID Radio Frequency ID
  • a configurable monitoring device may be configured as a security tag that is attached to an article via a mounting device.
  • the security tag may be configured to alarm or transmit an alarm message, if the security tag determines that an alarm condition has been met.
  • a configurable monitoring device may be configured to operate as a node within a monitoring system.
  • the configurable monitoring device may support communications and message routing within the communications network defined by the system.
  • the node may be configured to determine routing paths within the network for the efficient delivery of messages.
  • a configurable monitoring device may be configured to operate as a gateway between the monitoring system and an external network such as a wired local area network (LAN) or the Internet. Further, a configurable monitoring device may be configured to operate as a security key for locking and unlocking a mounting device associated with a security tag. In this regard, the security key may be configured to activate or deactivate electronic security features of a security tag.
  • LAN local area network
  • the security key may be configured to activate or deactivate electronic security features of a security tag.
  • a configurable monitoring device configured to operate in node mode will be referred to as a “node”
  • a configurable monitoring device configured to operate in tag mode will be referred to as a “tag”
  • a configurable monitoring device configured to operate in gateway mode will be referred to as a “gateway”
  • a configurable monitoring device configured to operate in key mode will be referred to as a “key”.
  • U.S. Provisional Patent Application No. 61/248,269, filed Oct. 2, 2009, entitled “Key for Commissioning, Decommissioning and Unlocking Configurable Monitoring Devices,” discusses examples of key devices and was incorporated above by reference in its entirety.
  • FIG. 1 a illustrates an example monitoring system 60 that includes a number of configurable monitoring devices in various roles.
  • Tags 68 e.g., tags 68 a - 68 i
  • Nodes 66 e.g., nodes 66 a - 66 c
  • network level activities such as communications routing, tag locating, and the like.
  • Gateway node 64 may be configured as a gateway node to provide a network interface between the monitoring system 60 and the external network 30 .
  • a monitoring terminal 62 may be in communication with the gateway node 64 , for example, via the external network 30 or via a direct connection to the gateway node 64 , to facilitate management of the configurable monitoring devices by the monitoring terminal 62 and to further facilitate the aggregation and analysis of data received from the configurable monitoring devices.
  • a gateway node may interface with a cellular network to gain access to other networks, such as the Internet.
  • a gateway node may support USB and Ethernet connectivity for connection to USB or Ethernet networks.
  • the gateway node 64 may also include or be associated with a network coordinator.
  • the network coordinator may be configured to oversee and manage various network operations. For example, the network coordinator may implement the forming of the network, allocate network addresses to entities of the network, and maintain a binding table for the network.
  • the communications network of the monitoring system may be any type of network (e.g., mesh network, hybrid mesh network, star network, hybrid star network, any other type of network, or combination thereof), in some example embodiments, the network may be configured to perform aspects similar to a mesh network.
  • the monitoring system 60 may be made up of a plurality of communication devices (e.g., such as a plurality of configurable monitoring devices) in communication with each other via device-to-device communication to form, for example, a mesh network.
  • the network may include a plurality of devices that transmit signals to and receive signals from a base site or access point, which could be, for example a base site or access point of a data network, such as a local area network (LAN), a metropolitan area network (MAN), and/or a wide area network (WAN), such as the Internet.
  • a base site or access point of a data network, such as a local area network (LAN), a metropolitan area network (MAN), and/or a wide area network (WAN), such as the Internet.
  • LAN local area network
  • MAN metropolitan area network
  • WAN wide area network
  • FIG. 1 b depicts another example network configuration in accordance with some example embodiments, where the nodes 66 are connected in a star or cluster fashion to the gateway node.
  • FIG. 1 c provides another illustration of an example monitoring system with a communications network.
  • the PAN coordinator gateway with network management functionality
  • the powered routers communications nodes
  • the gate alarm gate node
  • the pings pings nodes
  • the tags and the manager's key
  • the PAN coordinator gateway with network management functionality
  • the powered routers communications nodes
  • the gate alarm gate node
  • pings pings nodes
  • tags and the manager's key
  • the manager's key may each include a configurable monitoring device configured for a particular role.
  • processing elements or devices may be coupled to a configurable monitoring device to access the monitoring system 60 .
  • POS point of sale terminals and/or the like
  • Other devices such as processing elements or devices (e.g., personal computers, server computers, displays, point of sale (POS) terminals and/or the like) may be coupled to a configurable monitoring device to access the monitoring system 60 .
  • the configurable monitoring devices may be enabled to receive configuration modifications dynamically and perform various functions or tasks in connection with network devices or other configurable monitoring devices based on the current configuration of the configurable monitoring devices.
  • the configurable monitoring devices, and the monitoring system 60 may utilize any wireless communication technique for communicating information between the devices or to the monitoring terminal 62 .
  • the configurable monitoring devices may be configured to support communications protocols built on the IEEE 802.15.4 standard, such as Zigbee or a proprietary wireless protocol.
  • the communications within the monitoring system 60 may be performed based on a Route Under MAC (Media Access Control) (RUM) protocol or a modified RUM protocol.
  • REM Route Under MAC
  • RUM Remote MultiMedia Access Control
  • communications within the monitoring system may be associated with a network identifier, such as a personal area network (PAN) identifier.
  • PAN personal area network
  • configurable monitoring devices might not be permitted to communicate within the monitoring system without having a matching network identifier.
  • the monitoring system may regularly or irregularly change the network identifier and transition to a new network identifier for security purposes.
  • a system-wide synchronized clock may be implemented. Synchronization of the clock may be maintained via a clock signal.
  • Configurable monitoring devices may include real time clock circuitry to support the synchronized clock and to regulate the use of precise communications windows.
  • the configurable monitoring devices may also support RFID communications, such as communications based on Generation II Ultra High Frequency (UHF) RFID standards.
  • a configurable monitoring device includes a radio (e.g., an IEEE 802.15.4 radio) and an RFID module
  • the configurable monitoring device may be configured to operate as an interface that allows RFID devices to access the monitoring system 60 .
  • an RFID reader or other RFID device that does not include a configurable monitoring device, may communicate with a configurable monitoring device, such as a tag, and the configurable monitoring device may relay such communications to entities connected to the monitoring system.
  • the tag may relay communications originating on the monitoring system to an RFID device that has interfaced with a tag.
  • the configurable monitoring devices may operate as gateway to the monitoring system for RFID communications.
  • the monitoring system 60 may be configured to operate as a mesh network, hybrid mesh network, star network, hybrid star network, cluster tree network, any other type of network, or any combination thereof.
  • the monitoring system 60 may support message hopping and network self-healing.
  • the nodes 66 may be configured to receive communications from nearby or assigned tags 68 .
  • the nodes 66 may be configured to determine a system architecture and/or efficient pathways for communicating messages to the various entities within the network.
  • the nodes 66 may be configured to generate and maintain routing tables to facilitate the efficient communication of information within the network.
  • tag 68 h may be configured to communicate that the product that tag 68 h is affixed to has been moved or is being moved from its display location.
  • Tag 68 h may be configured to communicate this information to tags 68 g and 68 d , because the products affixed to tags 68 g and 68 d are related products that a customer may be interested in purchasing, given tag 68 h 's determination that the customer may have decided to purchase the product affixed to tag 68 h .
  • tag 68 h may generate and transmit a message addressed to tags 68 g and 68 d .
  • the message may be received by node 66 c , and node 66 c may be configured to determine how to route the message, given current network traffic, such that the message is efficiently received by tags 68 g and 68 d . For example, using generated routing tables, node 66 c may determine that the message can first be transmitted directly to tag 68 g , since tag 68 g is connected to or in direct communication with the node 66 c . To transmit the message to tag 68 d , node 66 c may determine that the message should be forwarded to node 66 b . Node 66 b may perform a similar analysis and determine that the message can be forward to tag 68 d , directly from node 66 b . Tag 68 h may also be configured to transmit the message to the monitoring terminal 62 . Node 66 c may route the message accordingly, such that the gateway 64 may forward the message to the monitoring terminal 62 .
  • the nodes 66 may be configured to perform communications routing within the monitoring system 60 .
  • nodes 66 may operate to extend the range of the monitoring system.
  • all configurable monitoring devices within the monitoring system 60 may be configured to perform routing functionality.
  • configurable monitoring devices configured to operate both as tags and as nodes may communicate directly with each other, if within range, without having to route the communications through another node.
  • the monitoring system 60 may be configured to support self-healing.
  • messages may be automatically routed via a path that does not involve the failed node.
  • a tag may be connected (via, e.g., a wireless connection) to more than one node.
  • the tag may simply cause messages to be routed through another node to which the tag is connected.
  • a tag may be triggered, directed, or otherwise configured to implement node functionality (e.g., stored in the memory of the tag and implemented by a processor of the tag). The tag may therefore become a node to support communications of other tags.
  • configurable monitoring devices that are installed and configured with the intention that the devices be primarily utilized as nodes may be powered through a building's wired power system or be mains powered (in contrast to being only battery powered). Since nodes may be involved in the frequent transmission of communications, power utilization of a node may be relatively high. As such, since configurable monitoring devices configured to operate primarily as tags would likely be battery powered for mobility purposes, an example embodiment that implements node functionality within a tag may be a temporary solution to maintain network continuity while the failed node is repaired.
  • the monitoring system 60 may be configured to compensate for interference and multi-path conditions that can arise in enclosed environments, such as retail stores, individually or collectively (such as, e.g., retail mall). To do so, the monitoring system 60 may be configured, for example by the monitoring terminal 62 , to modify the signal power of select nodes and tags to minimize interference. Other examples signal power instructions and adjustments are discussed below. According to some example embodiments, directional antennas may also be used by configurable monitoring devices to minimize interference.
  • the monitoring system 60 may be configured to interface with any number of other types of networks and/or systems.
  • the monitoring system 60 may interface with EAS systems, RFID systems, closed circuit television systems, inventory systems, security systems, sales systems, shipping systems, point of sale terminals, advertising systems, marketing compliance systems, ordering systems, restocking systems, virtual deactivation systems, Lojack® systems, and the like.
  • the monitoring terminal 62 may be configured to coordinate operations of the monitoring system 60 , as well as, retrieve, aggregate, and analyze data provided by the configurable monitoring devices of the system.
  • the nodes may be configured to provide a wireless signal that may be received by tags that are within range.
  • the range of a node or the power level, used to generate the wireless signal provided by the node may be set based on the size of the area that the node is responsible for. For example, if the node is associated with a small floor display, the signal power may be relatively low. On the other hand, if a node is responsible for a large shelf unit, the signal power may be set to a higher level to ensure coverage of the entire shelf unit.
  • Tags may be configured to receive a signal that is provided by a node and respond to the node indicating that the tag is now associated with the node, for example, because the tag is located on the floor display associated with the node.
  • a tag may be configured to periodically or pseudo-randomly power up (e.g., based on a wake-up timer or other trigger event), listen for a node signal (e.g., a ping node can be configured to broadcast a ping signal), perform a time synchronization based on the node's signal, and transmit a message to a network entity indicating which node the tag has received a signal from (based on, e.g., determining a node identifier embedded in the node's signal). Subsequently, a tag may perform a second clock synchronization with the node or other network entity and then power down into a sleep mode for another period of time or until another triggering event.
  • the tag may receive and determine a unique identifier and/or other data associated with the node.
  • the tag may store the identifier and/or other data in its local storage device(s). As such, the tag would know to which node the tag has been associated.
  • the tag and the node can establish and execute a uni-directional communication protocol.
  • the uni-direction communication protocol can allow, for example, the ping node to wirelessly broadcast data (as, e.g., a ping signal), which the tag can receive.
  • the data can include, e.g., the ping node's identifier and/or other data.
  • the ping node can be configured to only send data to the tag (e.g., lack the components or functionality necessary to receive or respond to data from the tag).
  • the ping node can receive data from a network entity (via, e.g., BlueTooth or WiFi), even though the ping node lacks the ability to receive data from a tag or other monitoring device (via, e.g., another wireless protocol).
  • the tag may be configured to respond to (e.g., confirm receipt for) all ping node signals it receives, even if the node may not act on the tag's response.
  • the uni-directional communication protocol lacks the tag transmitting data intended for the ping node.
  • the tag can also establish and execute a bi-directional communication protocol with the ping node and/or any other the network entity.
  • the bi-directional communication protocol can allow for two way communications, including sending and receiving of signals between each device participating in the communication protocol.
  • the node may receive communication signals from the tag including a unique identifier of the tag, and the node may therefore know to which tag(s) the node is associated.
  • the node may also be configured to report the node/tag associations back to a monitoring terminal, monitoring system coordinator, and/or other network entity. Via these and other types of defined tag/node relationships, various functionalities, as mentioned above and otherwise herein, may be implemented.
  • a tag may include a jiggle switch and/or other motion detection component, the actuation of which may indicate that a tag is being moved.
  • the tag may determine a trigger event has occurred and, in response, may move from a sleep state into an awake state.
  • the tag may perform one or more clock synchronizations with a node and determine the identifier of the node to which the tag is currently connected.
  • the tag may also transmit a message indicating the identifier of the node to which the tag is currently connected (possibly a new node since movement may have occurred).
  • the tag may generate location information, representing the fact that the tag is out of range of any node, and access its functionality profile (which may be saved on the tag and/or on a network entity).
  • the functionality profile can include an alarm instruction, which causes the tag to alarm, should the tag determine it is out of range of any node.
  • a tag that has detected a node may engage a movement wait timer to facilitate determining whether further movement of the tag is occurring. In the event that further movement is detected during the movement wait time, the tag may attempt to detect a node and again perform a time synchronization.
  • FIG. 1 d illustrates a flow chart of the operation of an example tag consistent with that described above.
  • FIG. 2 illustrates basic block diagram of a monitoring terminal 62 according to an exemplary embodiment.
  • the monitoring terminal 62 may include various components that support both the basic operation of the monitoring terminal 62 and the relatively more sophisticated operation of the monitoring terminal 62 as a coordinator of a monitoring system. Some examples of these components are shown in FIG. 2 . However, it should be appreciated that some example embodiments may include either more or less than the example components illustrated in FIG. 2 . Thus, the example embodiment of FIG. 2 is provided by way of example and not by way of limitation.
  • the monitoring terminal 62 may include a processor 250 and a communication interface 252 .
  • the monitoring terminal 62 may include a user interface 258 .
  • the processor 250 may in turn communicate with, control or embody (e.g., via operation in accordance with corresponding instructions) a monitoring system manager 256 .
  • the processor 250 may be configured to, for example, execute stored instructions (in a, e.g., functionality profile) and/or operate in accordance with programmed instructions to control the operation of the monitoring terminal 62 .
  • the processor 250 may be embodied in a number of different ways.
  • the processor 250 may be embodied as one or more of various processing means or devices such as a coprocessor, a microprocessor, a controller, a digital signal processor (DSP), a processing element with or without an accompanying DSP, or various other processing devices including integrated circuits such as, for example, an ASIC (application specific integrated circuit), an FPGA (field programmable gate array), a microcontroller unit (MCU), a hardware accelerator, a special-purpose computer chip, or the like.
  • the processor 250 may be configured to execute instructions stored in a memory device (e.g., memory device 254 of FIG. 2 ) or otherwise accessible to the processor 250 .
  • the instructions may be permanent (e.g., firmware) or modifiable (e.g., software) instructions and be organized in any manner (such as one or more functionality profiles).
  • the processor 250 may be configured to execute hard coded functionality.
  • the processor 250 may represent an entity (e.g., physically embodied in circuitry) capable of performing operations according to embodiments of the present invention while configured accordingly.
  • the processor 250 may be specifically configured hardware for conducting the operations described herein.
  • the instructions may specifically configure the processor 250 to perform the algorithms and/or operations described herein when the instructions are executed.
  • the processor 250 may include, among other things, a clock, an arithmetic logic unit (ALU) and logic gates configured to support operation of the processor 250 .
  • ALU arithmetic logic unit
  • the memory device 254 may include, for example, one or more volatile and/or non-volatile memories.
  • the memory device 254 may be an electronic storage device (e.g., a computer-readable storage medium) comprising gates (e.g., logic gates) configured to store data (e.g., bits) that may be retrievable by a machine (e.g., a computing device including a processor such as processor 250 ).
  • the memory device 254 may be configured to store information, data, applications, instructions or the like for enabling the monitoring terminal 62 to carry out various functions in accordance with exemplary embodiments of the present invention.
  • the memory device 254 could be configured to buffer input data for processing by the processor 250 .
  • the memory device 254 could be configured to store instructions for execution by the processor 250 .
  • the user interface 258 may be in communication with the processor 250 to receive user input via the user interface 258 and/or to present output to a user as, for example, audible, visual, mechanical or other output indications.
  • the user interface 258 may include, for example, a keyboard, a mouse, a joystick, a display (e.g., a touch screen display), a microphone, a speaker, or other input/output mechanisms.
  • the processor 250 may comprise, or be in communication with, user interface circuitry configured to control at least some functions of one or more elements of the user interface.
  • the processor 250 and/or user interface circuitry may be configured to control one or more functions of one or more elements of the user interface through computer program instructions (e.g., software and/or firmware) stored on a memory accessible to the processor 250 (e.g., volatile memory, non-volatile memory, and/or the like).
  • the user interface circuitry is configured to facilitate user control of at least some functions of the monitoring terminal 62 through the use of a display configured to respond to user inputs.
  • the processor 250 may also comprise, or be in communication with, display circuitry configured to display at least a portion of a user interface, the display and the display circuitry configured to facilitate user control of at least some functions of the monitoring terminal 258 .
  • the communication interface 252 may be any means such as a device or circuitry embodied in either hardware, software, or a combination of hardware and software that is configured to receive and/or transmit data from/to a network and/or any other device or module in communication with the monitoring terminal 62 .
  • the communications interface 252 may include an appropriately configured configurable monitoring device.
  • the communication interface 252 may include, for example, an antenna (or multiple antennas) and supporting hardware and/or software for enabling communications with a wireless communication network 30 or other devices (e.g., other configurable monitoring devices).
  • the communication interface 252 may alternatively or additionally support wired communication.
  • the communication interface 252 may include a communication modem and/or other hardware/software for supporting communication via cable, digital subscriber line (DSL), universal serial bus (USB) or other mechanisms.
  • the communication interface 252 may support communication via one or more different communication protocols or methods.
  • the communication interface 252 may be configured to support relatively low power, low data rate communication.
  • a low power and short range communication radio e.g., radio transmitter/receiver
  • the radio transmitter/receiver may include a transmitter and corresponding receiver configured to support radio frequency (RF) communication in accordance with an IEEE (Institute of Electrical and Electronics Engineers) communication standard such as IEEE 802.15.
  • RF radio frequency
  • some embodiments may employ Bluetooth, Wibree, ultra-wideband (UWB), WirelessHART, MiWi or other communication standards employing relatively short range wireless communication in a network such as a wireless personal area network (WPAN).
  • IEEE 802.15.4 based communication techniques such as ZigBee or other low power, short range communication protocols such as a proprietary technique based on IEEE 802.15.4 may be employed.
  • the communication interface 252 may additionally or alternatively be configured to support communication via radio frequency identification (RFID) or other short range communication techniques.
  • RFID radio frequency identification
  • the monitoring terminal 62 may be configured to interface configurable monitoring devices, in addition to conventional RFID tags and modules.
  • the monitoring terminal 62 may be configured to interface a barcode scanner, or other data entry devices.
  • monitoring terminal 62 may be directly connected to the monitoring system via a configurable monitoring device configured as a gateway, or the monitoring terminal 62 may be connected to the monitoring system 60 via a gateway and an external network 30 .
  • the network 30 to which the communication interface 252 may connect may be a local network (e.g., a WPAN) that may in some cases further connect to or otherwise communicate with a remote network on either a periodic or continuous basis.
  • the network 30 may include a collection of various different nodes, devices or functions that may be in communication with each other via corresponding wired and/or wireless interfaces.
  • the processor 250 of the monitoring terminal 62 may be embodied as, include or otherwise control the monitoring system manager 256 .
  • the monitoring system manager 256 may be any means such as a device or circuitry operating in accordance with firmware/software or otherwise embodied in hardware or a combination of hardware and firmware/software (e.g., processor 250 operating under software control, the processor 250 embodied as an ASIC or FPGA specifically configured to perform the operations described herein, or a combination thereof) thereby configuring the device or circuitry to perform the corresponding functions of the monitoring system manager 256 , as described herein.
  • a device or circuitry e.g., the processor 250 in one example
  • executing the software forms the structure associated with such means.
  • the monitoring system manager 256 of the monitoring terminal may be configured to coordinate, manage, and configure the operation of configurable monitoring devices.
  • the monitoring system manager 256 may be configured to perform a number of activities with regard to a monitoring system as further described below and otherwise herein. While the monitoring system manager 256 may be configured to perform all of the functionality described with respect to the monitoring system manager 256 herein, it is also contemplated that the monitoring system manager 256 could be configured to perform any sub-set of the described functionality.
  • the monitoring system manager 256 may be configured to define, assign, and manage the role configuration of the configurable monitoring devices. To do so, the monitoring system manager 256 may generate configuration information that indicates the role or mode of operation for a target configurable monitoring device and transmits the configuration information to the configurable monitoring device for storage on the device. Configurable monitoring devices may each be assigned a unique identifier that may be used for communication message addressing. As such, configuration information may be generated by the monitoring system manager 256 and addressed to a target configurable monitoring device to configure the configurable monitoring device for a particular role.
  • the configuration information may include role policy information that indicates the functionality that the configurable monitoring device should perform within the device's assigned role, and attribute information, such as associated product attributes.
  • Attribute information may be data that a configurable monitoring device may utilize within the role to perform functionality. For example, if a product that the configurable monitoring device is attached to is clothing, the attribute information may include a clothing classification (e.g., shirt, pants, tie, dress, etc.), a color or colors indicator, a size indicator, a price indicator, a lot indicator, and/or the like.
  • the functionality performed by a configurable monitoring device may be determined. For example, configurable monitoring devices configured with the same role policy information, may trigger different types of alarm responses based on the price of the product.
  • attribute information may be stored in a central location, rather than at the configurable monitoring device, and the configurable monitoring devices may access this information remotely via the network of the monitoring system as needed.
  • the configuration information may include executable code that is, possibly decompressed, and stored on the configurable monitoring device for subsequent execution by the configurable monitoring device.
  • a configurable monitoring device may be manufactured with executable code in the form of configuration information stored within the memory of the device.
  • a hardware device such as a memory device or preconfigured processing device with pre-stored configuration information may be inserted into and/or electrically connected to the configurable monitoring device to provide configuration information and assign a role to the configurable monitoring device.
  • the pre-stored configuration information may be directed to a number of possible roles that the configurable monitoring device could be configured to perform.
  • the monitoring system manager 256 may provide a message including a data indicator of which role the configurable monitoring device is to perform.
  • the configurable monitoring device may receive the indicator and begin performing (e.g., transition into) the role described by the indicator by executing the appropriate portion of the pre-stored configuration information.
  • a configurable monitoring device Once a configurable monitoring device is assigned a role via the configuration information, the device may begin operating within its respective role.
  • Roles or configurations may be simple or complex based on, for example, the processing capabilities and the memory storage available to a configurable monitoring device.
  • a configurable monitoring device may be configured to perform minimal data processing, and a monitoring terminal may be configured to perform incrementally more processing of data.
  • some configurable monitoring devices may include relatively higher processing power and larger memory storage to support increased data processing at the configurable monitoring device, rather than at the monitoring terminal.
  • attribute information describing the article to which a configurable monitoring device is attached may be stored at the monitoring terminal.
  • a inquiry device e.g., price scanner, inventory scanner
  • the tag may communicate the request to the monitoring terminal, and the monitoring terminal may provide the attribute information to the inquiry device, either though the monitoring device or through a connection external to the monitoring device.
  • attribute information describing the article to which a configurable monitoring device is affixed may be stored, e.g., local to the tag, within the storage memory of the tag.
  • an inquiry device e.g., price scanner, inventory scanner
  • the tag may directly communicate, or initiate the communication of, the attribute information from the tag to the inquiry device.
  • a configurable monitoring device may include a processor and a memory.
  • the processor may be configured to support network communications.
  • the processor may be configured, for example, via instructions stored on the memory (e.g., instructions derived from configuration information), to support communications in accordance with a role defined by configuration information.
  • the processor of the configurable monitoring device may include input/output (I/O) ports (or pins).
  • the I/O ports may be configured to interface with any number of external devices such as, electronic security devices, merchandising displays, tags on equipment, employee identification cards, alarms, speakers, microphones, lights (e.g., light emitting diodes (LEDs)), buttons, keypads, monitors, displays (e.g., for changeable pricing labels), sensors (e.g., accelerometers, movement sensors, light sensors, temperature sensors), cameras, security gates, store audio systems, customer counters, lighting switches, employee communicators (e.g., headsets, handheld radios), door strike mats, jewelry case mats, Lojack® devices, global positioning system (GPS) devices, and the like.
  • the I/O ports may be configured to support one or more roles that the configurable monitoring device may be configured to perform.
  • the I/O ports of a configurable monitoring device may interface with a display for a price tag, when the configurable monitoring device is configured as a tag.
  • the price depicted on the display may be set to reduce at a given time.
  • the time may monitored by the processor of the tag and when the given time is reached, the processor may direct the I/O ports and the connected display to depict a reduced price.
  • an example that includes triggering at the monitoring terminal level may include the time being monitored by the monitoring terminal, and the monitoring terminal may communicate a message including a reduced price, or an indication to reduce the price, to the tag at the given time to trigger the tag to reduce the price accordingly.
  • the I/O ports may interface with a camera, and the configurable monitoring device may be configured to control the movement of the camera, detect events, and capture still camera pictures for forwarding to store personnel or the authorities, and the like.
  • FIG. 3 which illustrates an example of a given space, namely retail environment 100 , is referred to in order to describe some of the roles that may be implemented by the configurable monitoring devices within an exemplary monitoring system.
  • FIG. 3 illustrates a diagram of various configurable monitoring devices configured to define a monitoring system.
  • FIG. 3 depicts an exemplary retail environment 100 including a stock room 110 where excess inventory is maintained, an office space 120 from which monitoring activity may be coordinated or otherwise viewed (e.g., via a monitoring terminal 62 ), fitting rooms 130 in which articles of clothing may be tried on by potential buyers, a retail floor 140 on which various products may be displayed or otherwise made available for buyers to purchase and restrooms 150 .
  • FIG. 3 also depicts a point of sale (POS) terminal 160 at which payment may be made for products and a door 170 through which customers may enter and exit the retail floor 140 .
  • POS point of sale
  • various different products may each be provided with a corresponding configurable monitoring device operating as a tag.
  • several other configurable monitoring devices may be provided at various locations throughout the retail environment to operate, for example, as nodes.
  • the location of a node within the retail environment may be known (e.g., coordinates of the nodes may be known) to, for example, the monitoring terminal 62 and the monitoring system manager 256 to facilitate implementation of a real-time location system (RTLS) for the tags via the nodes.
  • RTLS real-time location system
  • FIG. 3 Several configurable monitoring devices operating in a tag mode are illustrated in FIG. 3 as circles with the letter “T” therein. Some other configurable monitoring devices may be configured during commissioning to operate in a node mode.
  • FIG. 3 Examples of configurable monitoring devices operating in node mode are shown in FIG. 3 as circles with the letter “N” therein.
  • An example of a configurable monitoring device operating in a gateway mode is shown in FIG. 3 as a circle with the letter “G” therein.
  • the circles with the letter “C” may be configurable monitoring devices configured to operate with customer counting devices (e.g., strike pads, and the like).
  • the circles with the letter “D” may be configurable monitoring devices configured to operate with door opening monitoring devices configured to determine and report a number of times customers open, for example a freezer door in grocery frozen food section.
  • the circle with the letter “P” may be configurable monitoring devices configured to operate with a camera to capture digital photographs when an event, such as the alarming of a tag has occurred.
  • the configurable monitoring device interfacing with the camera may be configured to control the movement of the camera and forward video or pictures. Still others (or a single configurable monitoring device) may be configured to operate as gates or in a hub or gateway mode. While configurable monitoring devices may be configured as tags, nodes, gateways, etc., each of these roles may be further refined, for example via configuration information, to specialize the functionality of a configurable monitoring device within a particular role (such as, e.g., a ping node within the broader node role).
  • a specific network identifier e.g., PAN ID
  • PAN ID e.g., PAN ID
  • low transmission power association and dissociation may be implemented using close proximity signaling.
  • switches e.g., DIP (dual in-line package) switches
  • jumpers e.g., DIP (dual in-line package) switches
  • MAC address filtering e.g., MAC address filtering
  • button actuated association/dissociation e.g., button actuated association/dissociation
  • separate communications link associating/dissociating e.g., a barcode scanners
  • a configurable monitoring device configured to operate as a tag may perform functionalities supporting security functions, inventory functions, marketing functions, combinations thereof, and the like.
  • a commissioning or binding procedure may be performed prior to commissioning.
  • a configurable monitoring device may be configured as a tag, but the device may not yet be associated with, or attached to, a product.
  • the tag may be commissioned.
  • the monitoring terminal 62 and the monitoring system manager 256 may manage the commissioning and decommissioning of tags via wireless communications with the tags.
  • the procedure for commissioning and decommissioning a tag may include RFID scanning the tag, a barcode scanning the tag, and/or hardware (e.g., specialized microchip) attachment or connection.
  • the monitoring system manager 256 may provide a signal to the tag indicating that the tag is now active with respect to its configured role.
  • alarming, inventory, and marketing functionality may be downloaded and/or activated.
  • a functionality profile including various electronic instructions, may be downloaded and/or activated. While commissioned, the tag may continue to receive instructions or other information useful for making determinations as to the functionality to be employed and the corresponding role/mode of operation to assume.
  • Decommissioning of the tag may include powering down the tag, clearing or resetting data (e.g., product-specific and/or functional data), and/or directing the tag to enter an idle or non-transmitting mode in order to conserve battery power until the tag is re-commissioned.
  • the tag may be decommissioned by instructions and/or signals received from the monitoring terminal 62 and the monitoring system manager 256 .
  • Decommissioning may occur at a point of sale, such as POS 160 .
  • a node associated with the point of sale (POS node) may be configured, via configuration information, to perform decommissioning functionality.
  • the POS node may be configured to decommission the tag when the product is entered into a sales transaction.
  • the monitoring system manager 256 may be configured to interface with a sales database or sale system to monitor transactions. Upon detecting a transaction, data about the product involved in the transaction may be acquired, and, based on the acquired data, a decommission signal may be transmitted to the affected tag.
  • direct access to a sales database or sales system may not be available due to concerns regarding the confidentiality of sales and customer information. In these situations, example embodiments of the present invention may implement a barcode scanning wedge as an interface to the transaction activities without accessing the sales database or sales system.
  • a battery check may be performed by a tag during decommissioning.
  • the configurable monitoring device may include the hardware and software (e.g., processor configured by instructions) to provide for monitoring the battery charge level. If the battery charge level for a tag has fallen below a given threshold, the tag may alarm or otherwise indicate to the store personnel that the tag should be removed from service for recharging or battery replacement. Tags that have battery levels above the given threshold may be decommissioned and identified as being available for re-commissioning. According to some example embodiments, a tag having a battery level that has fallen below a given threshold may be prevented from being re-commissioned until the battery charge level is sufficiently improved. This would also desirably limit the need for a store clerk to retrieve low battery tags from the field or store environment.
  • the barcode scanning wedge may be installed in-line between a barcode scanner and a point of sale checkout terminal for receiving data acquired by the barcode scanner.
  • the wedge may be configured to intercept some or all data acquired by the barcode scanner and to provide the data to a monitoring system, for example, via a POS node, without otherwise interrupting the flow of data to the point of sale terminal.
  • the wedge may be configured to facilitate the commissioning or decommissioning of a communications tag that is part of a monitoring system. For example, when a cashier scans a barcode of a product during a purchase transaction, data confirming the transaction may be uploaded to the monitoring system and the monitoring system manager 256 via the wedge. Confidential consumer and sales information may not be uploaded to the retail security network in some embodiments.
  • the monitoring system manager 256 may be configured to transmit a decommission signal to an associated tag attached to the purchased product to cause the tag to be decommissioned. Decommissioning may be associated with removal of the tag from the product and/or removal or modification of a record or information (e.g., inventory information) for the tag stored by the monitoring system manager 256 , for example, in the memory device 254 .
  • a configurable monitoring device may also be configured as a manager's key to be implemented within the monitoring system.
  • FIG. 4 a depicts an example block diagram of a key, such as manager's key.
  • the key of FIG. 4 a is depicted as using the Zigbee protocol, but any protocol may be used.
  • a mounting device that mechanically attaches the configurable monitoring device to a product may be unlockable by the implementation of a key.
  • a tag having a mounting device may take the form of a pin tag (for protecting a clothing), a keeper or plastic enclosure (for protecting compact disks, software, cologne, and the like), a Spider WrapTM or wire wrap device (for protecting larger boxed products), or the like.
  • One such mounting device may be configured to attach to the shaft of a golf club or similar article such as the device disclosed in U.S. Pat. No. 7,266,979 herein incorporated by reference in its entirety.
  • Other such mounting devices may be configured to attach to a bottle neck or a bottle cap such as the devices disclosed in U.S. Pat. Nos. 7,259,674 and 7,007,523, both herein incorporated by reference in their entirety.
  • Still other mounting devices may be configured to attach through a product such as an article of clothing or a blister pack such as the hard-tag disclosed in U.S. Pat. No. 6,920,769 incorporated herein by reference in its entirety.
  • Alpha Security Products' Spider WrapTM which is disclosed in U.S. Pat. No. 7,162,899 and herein incorporated by reference in its entirety, may also be configured to operate as a mounting device.
  • a cable lock such as the Alpha Security Products' CablelokTM device disclosed in U.S. Pat. No. 7,249,401 or a keeper, such as that disclosed in U.S. Pat. No. 6,832,498 may be a mounting device.
  • the key may be embodied in many different ways.
  • the key may be a specially formed device that mates mechanically with some portion of the mounting device in order to disable a locking mechanism of the mounting device.
  • the key may be a magnetic device configured to interface with a locking mechanism of the mounting device to enable the mounting device to be unlocked to permit removal of the mounting device from the corresponding product to which the mounting device is affixed or otherwise attached.
  • the key may actually include an electrical component for exchanging signals or information with the tag associated with the mounting device to enable unlocking of the mounting device.
  • the key could be an embodiment of a configurable monitoring device that is provided with specific configuration information defining functionality for the configurable monitoring device to function as the key for unlocking the mounting devices of tags.
  • the key (or the configuration information associated with the key) may include a software component or code that is unique to a particular individual (e.g., a specific manager or assistant manager).
  • the key may also report unlocking activities and/or other information regarding other devices encountered or activities undertaken to monitoring system manager 256 , so that activity of the key (or persons possessing the key) may be monitored, logged, and/or tracked.
  • activity of the key or persons possessing the key
  • authenticity of the code may be defined or verified so that, for example, if a particular manager's key is lost or a manager leaves, the corresponding code for the manager's key may be invalidated so that further unlocking operations with the manager's key may not be possible.
  • the key may be configured to alarm and/or destroy necessary aspects of the key's functionality if the key is, for example, improperly removed from the retail environment. For example, the key may clear the memory of the key, rendering the key useless.
  • Utilization of the key for unlocking security devices may be limited by rules stored on the key or at a monitoring terminal.
  • rules for using the key may be defined with respect to the location of the key (e.g., inside/outside the store, inside/outside a department zone), the employee using the key (e.g., as indicated by a passcode or detection of a user's RFID tag), a time of day, a day of the week, a work schedule. Use of the key in violation of the rules may cause the key to alarm.
  • the key may be useful for setting an alarm or turning an alarm on or off.
  • a button on the key may be actuated which indicates that the key is preparing to or is performing a locking or unlocking function.
  • An indication that the button has been pressed may be commutated to the tag that is to be interacted with or the monitoring terminal.
  • the key may be located and tracked, and zones of use (e.g., the key cannot be used in the stock room 110 ) and other rules may be defined and enforced with respect to the key.
  • a configurable monitoring device configured as a tag, whether commissioned or decommissioned, may provide a status signal (or heartbeat signal) to the monitoring system.
  • the status signal may be a short transmission of a unique identifier associated with the tag.
  • the status signal may also provide other types of indications, such as whether the battery is or is not yet drained and/or whether the tag is otherwise properly functioning.
  • the status signal may also be used for real time locationing system (“RTLS”) purposes, some examples of which are further described below.
  • the status signal may be received by the monitoring system manager 256 .
  • the monitoring system manager 256 and/or the tag may maintain a log of the most recent receipt of a status signal from a tag and/or node.
  • nodes of the monitoring system may be configured to provide ping signals.
  • the tags may be configured to receive a ping signal and communicate information in response to receipt of a ping signal. For example, battery status, alarm status, received signal strength, and the like may be provided in response to a ping signal.
  • tags may be configured to operate as or with EAS tags, such that when the tag passes through an EAS gate, the EAS gate may detect the tag (or a connected EAS tag), and possibly sound an alarm.
  • the monitoring terminal 62 may have received a communication regarding the alarm condition.
  • configurable monitoring devices may be configured to operate as tags to be detected, or as gate nodes for detecting tags.
  • the configurable monitoring device may assume the role of a gate node, such as gate nodes 180 located at the doorway 170 .
  • the gate nodes may be configured to detect passing EAS tags, such as a conventional EAS tag or a configurable monitoring device configured to operate as an EAS tag, and sound an alarm (e.g., an alarm included on the tag, an alarm included with the gate node, a storewide alarm).
  • a gate node may directly sound a local alarm, or the gate node may communicate with the monitoring system manager 256 to sound an alarm.
  • any configurable monitoring device may be configured to operate as a gate node.
  • EAS gates may be implemented dynamically at many locations within a retail environment.
  • configurable monitoring devices that have been configured to operate as tags and are affixed to a product on a shelf within the retail environment may also be re-configured to operate as a gate node for the aisle where the products are located.
  • a monitoring system may be configured to perform additional advanced security functionality. Some advanced security features, as well as a number of other inventory, marketing, and other features may rely upon implementation of an RTLS within a monitoring system.
  • configurable monitoring devices may be configured as locating nodes.
  • the ping signals generated by the nodes may be used for locating a tag.
  • a tag may be configured to report to, for example, the monitoring terminal that the tag is currently within the range of a ping signal provided by a particular node.
  • the nodes may be configured to randomly, based on an algorithm, modify the ping signal strength. When the signal strength is modified, some tags that were in range may no longer be in range, or some tags that were previously in range may now be within range of the ping signal. As tags come in and out of range, due to the changing signal strength, the signal strength at the time may be used to determine the distance that a tag is from a particular node. In some cases, if the distance is determined with respect to multiple nodes, a physical location of the tag can be determined.
  • standard operating power settings (describing standard fluctuations in power discussed below) may be utilized in a standard locating mode.
  • an active locate power setting may be utilized in an active locate mode.
  • a locating node may be configured to use multilateration, hyperbolic positioning, time difference of arrival (TDOA), trilateration, triangulation, received signal strength indication (RSSI), global positioning systems (GPS), any other locating mechanisms, or combination thereof to support identifying the location of a tag within a retail environment.
  • a locating node may operate in isolation to detect the presence, and possibly the strength of a signal to determine when a tag is nearby. Locating nodes may take signal measurements and forward the information to, for example, the monitoring system manager 256 to analyze the signal and determine a location.
  • locating nodes may be placed at strategic locations within the retail environment to support accurate locating of tags.
  • a signal power optimization procedure may be performed by the monitoring system, for example, directed by the monitoring terminal, to minimize interference and determine optimum signal strength for ping signals.
  • the signal strength of the various nodes may be modified to determine settings where minimal interference and node signal overlap occurs.
  • FIG. 5 a illustrates an example retail environment 500 , where a monitoring system has been installed and implemented, such as the monitoring system described in U.S. Provisional Patent Application 61/244,320, filed Sep. 21, 2009, the content of which was incorporated by reference in its entirety above, and U.S. Provisional Patent Application No. 61/246,393, filed Sep. 28, 2009, the content of which was also incorporated by reference in its entirety above.
  • the monitoring system may include tags, ping nodes, communication routing nodes, and a network coordinator and gateway node.
  • the tags and nodes of the monitoring system may be configurable monitoring devices, such as those described in U.S. Provisional Patent Application 61/244,320 filed Sep. 21, 2009, the content of which is hereby incorporated by reference in its entirety, and U.S. Provisional Patent Application No. 61/246,388, filed Sep. 28, 2009, the content of which is also incorporated by reference in its entirety.
  • the monitoring system may also include a monitoring terminal (not depicted in FIG. 5 a ) that provides a user interface to the monitoring system and provides control over the operations of the monitoring system.
  • the monitoring terminal may be connected directly to the monitoring system as a peer, or the monitoring terminal may be connected to the monitoring system via another network, such as the Internet.
  • the monitoring terminal may include a server that is configured to control the monitoring system on-site, where the monitoring system is installed.
  • a user may interface with the monitoring system by establishing a connection between a remote device (e.g., a personal computer) and the server.
  • the server may be configured to perform predefined operations, and log information received from the tags and nodes.
  • the server may be connected to a gateway or coordinator node, and the server may communicate with tags and nodes via the gateway or coordinator node.
  • the retail environment 500 houses a number of ping nodes (e.g., ping nodes 510 , 520 , 530 , 540 , 550 , 560 , and 570 ) and tags (e.g., tags 590 and 591 ).
  • the ping nodes may be configured to provide ping signals at regular (or irregular) intervals.
  • the ping signals may include information regarding the ping node that has transmitted the signal.
  • a ping signal may provide a unique identifier of the ping node that is providing the signal.
  • the ping signal may also include timing or time code information.
  • the ping signal is considered location information.
  • the corresponding ping signals when a tag's location can be determined based upon it's position relative to one or more stationary ping nodes, the corresponding ping signals, which have a unique identifier that identifies the broadcasting ping node, can be considered to include location information.
  • the tag may log the location and other information it extracts from the ping signal and/or report (i.e., send, upload, etc.) some or all of the information to a network entity, such as monitoring system manager 256 . After saving and/or reporting the information, the tag can engage its timer and enter a sleep mode (as discussed above), and enter a sleep mode to conserve power while waiting for another triggering event (such as detection of movement or the timer expiring).
  • the ping nodes are also configured to receive signals and communications from other entities connected to the monitoring system such as tags, fixed nodes, or the monitoring terminal.
  • the ping nodes may listen, possibly periodically, to the fixed nodes.
  • communications with the ping nodes may occur directly between a tag and a ping node, or tags and ping nodes may communicate via the fixed nodes.
  • a fixed node may be a node that support network communications and may be stationary relative to a given space, which may or may not be moving.
  • the given space could be the cabin of an elevator, airplane or cruise ship.
  • the location of the fixed nodes may be known, and as such, the fixed nodes may be used as reference locations for identifying the locations of the ping nodes or tags as described in further detail below.
  • FIG. 5 b depicts another representation of the retail environment 100 which includes fixed nodes 515 , 525 , and 535 .
  • the fixed nodes may be a node that support network communications and may be stationary. In some example embodiments, the fixed nodes may be mains powered.
  • the fixed nodes may be configured to support communications between tags and the monitoring system, or nodes and the monitoring system.
  • the fixed nodes may also be configured to support locationing within a monitoring system with respect to the ping nodes.
  • the fixed nodes 515 , 525 , and 535 may be configured to listen for ping signals or other communications from the ping nodes and determine the position of the ping nodes. While ping node may be relatively stationary, according to some example embodiments, ping nodes may be positioned on movable shelving or displays. As such, when ping nodes are moved or when new ping nodes are introduced to the environment, the monitoring system may need to determine the location of the ping nodes. With the assistance of the fixed nodes, the locations of the ping nodes may be determined using various techniques including but not limited to received signal strength indication (RSSI) techniques, angle of arrival techniques, time of arrival and time difference of arrival techniques, and the like. Since the locations of the fixed nodes are known, the locations of the fixed nodes may be used as reference points for determining the locations of the fixed nodes.
  • RSSI received signal strength indication
  • a signaling and communications period 600 for a ping node may include a first portion 610 dedicated to transmitting repeated ping signals 620 , and a second portion 630 dedicated to support network communications.
  • a ping node may be configured to repeat the signaling and communications period 600 indefinitely, or until an instruction is received by the ping node that causes the ping node to change its operation.
  • Tags such as tags 590 and 591 , may be configured to determine and store the identifier of the closest ping node.
  • the tags may also be configured to report the identity of the closest ping node to the monitoring terminal.
  • a tag may enter a “seek closest ping node” state (i.e., seek_closest state), where the tag is configured to identify the ping node that is closest to the tag.
  • seek_closest state When a tag receives only one ping signal, the tag may determine that the ping node providing the only received ping signal is the closest ping node.
  • a locating procedure according to various example embodiments of the present invention may be triggered.
  • ping nodes may be placed within the given space, such as a retail environment, in a manner that provides sufficient ping signal coverage to the environment.
  • a ping signal may have an associated signal strength, and the strength of the signal may determine the range of the ping signal.
  • the strength of a ping signal may fade as the distance between the ping node and the measurement point is increased.
  • the range of a ping node may be defined by a distance from the ping node where the signal strength is at a range threshold. Signals below the range threshold may still be received by tags, but the tags may be configured to ignore signals having signal strengths below the range threshold.
  • the range threshold may define a circle (or sphere) with the ping node at the center of the circle.
  • ping nodes may be set to have as large of a range as possible, while also minimizing overlap.
  • ping nodes may be associated with a given space comprising or consisting of at least a portion of a particular display shelving unit or rack.
  • the ping node may be configured to define a range that merely encompasses the display, shelving unit, or rack, so as not to associate tags with the ping node that are not placed on the display, shelving node, or rack.
  • pings nodes may be configured to ensure coverage of some or all areas of the sales floor, or configured for a specific purpose to provide coverage of, for example, a particular display.
  • a ping node signal strength optimization procedure may be undertaken by the monitoring system, possibly controlled by the monitoring terminal.
  • the signal strengths of the various ping nodes may be modified to determine optimal settings considering factors such as coverage, desired range for a particular ping, interference, range overlap, reflections, and the like. Based on criteria such as these, an optimal settings for the ping normal operating signal power levels may be determined.
  • FIG. 5 a shows the retail environment 500 with the placement of a number of ping nodes and their associated ranges.
  • Ping node 510 has been set to provide a ping signal strength such that the range threshold is for ping node 510 is reached at a range 511 .
  • Ping node 520 having a range 521 may be a ping node that covers a larger area of the retail environment, such as a departmental area (e.g., the shoe department).
  • Ping nodes 570 and 580 having respective ranges 571 and 581 , may also provide coverage to respective departmental areas.
  • Ping nodes 530 , 540 , 550 , and 560 may provide coverage to small floor display, where it may be important to be able to determine precisely which floor display a particular tagged product is located on.
  • the coverage areas of the ping nodes may overlap.
  • a tag may receive a sufficiently strong ping signal from more than one ping node.
  • a locating procedure may be employed (when necessary) to determine which ping node is closer to the tag.
  • ping signal reflections may also create issues.
  • signal reflections within the environments may create situations where ping signals are received by nodes as reflected signals.
  • a tag may not be located within an overlap area as defined by the range of the ping nodes, but the tag may still receive signals from multiple ping nodes due to reflections.
  • the receipt of reflected signals may occur dynamically, and not in a predicable pattern.
  • the movement of customers, store personnel, and other objects can cause dynamically changing signal reflection issues.
  • Non-uniform architecture of the shopping floor may also contribute to reflection issues.
  • some locating procedures provided herein overcome the issues that arise from ping range overlap, as well as, the issues that can arise from signal reflections.
  • tag 590 is located within range of ping node 570 .
  • tag 590 receives a ping signal from only the ping node 570 .
  • the tag may detect and receive the ping signal associated with ping node 570 and associate the location of tag 590 with ping node 570 .
  • the tag 590 may be configured to store the identifier of ping node 570 , as provided in the ping signal, and report the association of the tag 590 with the ping node 570 to the monitoring terminal via the monitoring system.
  • tag 591 is located in an overlap region between ping node 510 and ping node 580 .
  • Tag 591 receives ping signals, having sufficient signal strength, from both ping node 510 and 580 . Since tag 591 has received ping signals from more than one ping node, a locating procedure may be undertaken to determine which ping node is closer to the tag.
  • FIG. 7 illustrates the ping nodes 510 and 580 , and the tag 591 in isolation from the rest of the retail environment 500 of FIG. 5 a , for illustration purposes.
  • the tag 591 having transitioned into a seek_closest state may report to the monitoring terminal that the tag 591 is currently receiving ping signals from more than one ping node.
  • the tag 591 may be configured to report the identities of the ping nodes to the monitoring terminal.
  • the monitoring terminal may generate a signal power modification instruction, and transmit the signal power modification instruction to the identified ping nodes 510 and 580 .
  • the affected tag 591 may be configured to generate the signal power modification instruction and transmit the signal power modification instruction to the identified ping nodes 510 and 580 .
  • the ping nodes 510 and 580 may be configured to reduce the power output, used to generate of their respective ping signals, to a minimum threshold level.
  • the minimum threshold level need not be the absolute minimum value, but can be a relative value that is preprogrammed into at least two nodes configured to implement this type of locationing.
  • the minimum threshold level could be 20 mW, 10 W, and/or any other given value.
  • ping node 510 may reduce the power output, thereby reducing the ping signal to range 511 a .
  • ping node 580 may also reduce its power output to the same value as ping node 510 , and its ping signal will have the same range as ping node 510 , as shown by range 581 a .
  • ping nodes 510 and 580 initially (i.e., before the nodes received the signal power modification instructions) transmitted ping signals at different signal strengths resulting in different starting ranges, possibly for coverage reasons.
  • the ping nodes in response to receiving the signal power modification instruction, are configured to modify their respective signal strengths to an equal or substantially equal power level, or so their ranges are equal or substantially equal.
  • the ping nodes may be configured to begin a process of incrementally increasing the signal strength of the ping signals.
  • the ping nodes may be configured to perform periodic step increases in the signal strength, thereby causing a period step increase in signal range.
  • the power level can increase such that the corresponding signal range increase some distance (e.g., 2 inches, 2 feet, or any other acceptable distance) every set amount of time (e.g., 0.2 seconds, 2 seconds, 20 seconds, or any other acceptable amount of time).
  • the ping nodes may include clocks that are synchronized with each other and/or the broader monitoring system, and the ping nodes may use the synchronized clocks to trigger the incremental changes to the signal strength at regular intervals. Having lost the ping signals from the ping nodes 510 and 580 , due to the reduction of signal strength, the tag 591 may be configured to detect or listen for the first ping signal that is received after the signal power modification instruction is issued, or after the tag 591 reports the reception of multiple ping signals to the monitoring terminal.
  • the ping nodes 510 and 580 may increase their respective ping signal strength by an equal or substantially equal amount.
  • the ping nodes 510 and 580 may be configured to increase the signal strength to achieve the ranges 511 b and 581 b , respectively.
  • the ping nodes 510 and 580 may again increase their respective ping signal strength by an equal or substantially equal amount.
  • the ping nodes 510 and 580 may be configured to increase the signal strength to achieve the ranges 511 c and 581 c , respectively.
  • the tag 591 may receive the ping signal from ping node 510 , but not from ping node 580 . As a result, the tag 591 may be configured to determine that the tag 591 is closer to ping node 510 . The tag may store the identifier of ping node 510 , and report the tag's association to ping node 510 to the monitoring terminal and/or other network entity.
  • the process of incrementing the power may cease.
  • the power incrementing may cease in response to an end power modification instruction issued by the tag 591 , the monitoring terminal and/or other network entity, and received by the ping nodes 510 and 580 .
  • the ping nodes 510 and 580 may be configured to return to their respective original or normal operating ranges 511 and 581 , respectively.
  • a similar example procedure may be undertaken where the signal strength is first increased to a maximum threshold level. Subsequent to increasing the ping signal strength to the maximum level, the signal strength of the involved ping nodes may be reduced periodically by incremental amounts until the node receives a signal from only one ping node. The last ping node that the tag receives a signal from may be identified as the closest ping node to the tag.
  • the ping nodes involved in the locate procedure may reduce/raise the signal strength to the current lowest/highest signal strength of the ping nodes involved in the locate procedure. Based on whether the tag receives a signal from a single ping after modifying the signal strengths in this manner, the tag may be configured to determine whether the further procedure of incrementally increasing/decreasing the signal strength of the ping nodes is required. In this manner, according to various example embodiments, the procedure for locating the closest ping node may be expedited.
  • a tag in addition to determining which pings nodes that a tag is receiving ping signal from, a tag may be configured to measure the signal strength of the ping signals.
  • information about signal strength and distances may be acquire from the data included in a communication in consideration of the modulation that was used to transmit the data, and analysis of the data may reveal information about signal strength and distance information.
  • the tag may consider the signal strength of ping signals that the tag is receiving when determining which ping node is closer. For example, signal strengths may fluctuate for a number of reasons (e.g., movement of customers or products within a retail environment).
  • the tag may be configured to determine the closest ping node by monitoring the signal strengths over a period of time to, for example, determine an absolute maximum signal strength or determine an average signal strength, and identify the closest ping node based on these values.
  • received signal strength indication (RSSI) techniques may be used to assist in identifying a closest ping node.
  • an averaging scheme may be utilized in an attempt to normalize or remove incorrect closest ping node determinations.
  • a tag may keep a running log and average of signal strength values detected from a particular ping node or a closest ping node. And if signals or communications are received that are determined to be outside of a threshold range from the running average, those deviations in signal strength may be disregarded as being a result of a reflection or other unexplained occurrence. If a given number of signals or communications (e.g., 10) are received that are outside the threshold, a change in the placement of ping nodes may have occurred, and the generation of a new running average may be triggered.
  • the log and running average can include the last 10, 100, 1000, or any other suitable number of signals or communication values.
  • the number of suitable signal or communication values can be time dependent (e.g., a running average can be made from each signal or communication received over the past hour, 10 hours, day, two days, week, or any other suitable period of time).
  • FIG. 9 illustrates an example method of the present invention that may be implemented by a tag or a monitoring terminal.
  • the example method begins at 900 , where an indication that a tag is receiving ping signals from multiple ping nodes may be received.
  • a tag may receive this indication internal to, for example, the processor of the tag, or the monitoring terminal may receive this indication.
  • the identification of each of the ping nodes that the tag is receiving ping signals from may be determined.
  • a signal power modification instruction may be generated. The signal power modification instruction may be addressed to the ping nodes identified at 910 .
  • the signal power modification instruction may be transmitted to each of the identified ping nodes.
  • the identified ping nodes may subsequently perform the operations of a power modification procedure at 940 , for example, as indicated in FIG. 10 .
  • an indication of the identified ping node that is closest to the tag may be received at 950 .
  • the tag may then be associated with the closest node for location purposes.
  • FIG. 10 illustrates an example method of the present invention that may be implemented by a ping node.
  • the example method begins at 1000 , where a signal power modification instruction may be received.
  • the signal strength may be lowered to a minimum threshold level (or raised to a maximum threshold level).
  • the signal strength of the ping signal may be periodically increased (or decreased) by an incremental amount.
  • the ping node may return the signal strength to a normal operating level at 1030 .
  • FIGS. 11 and 12 illustrate the modification of normal operating levels for ping nodes. It is noteworthy that the ping nodes in FIGS. 11 and 12 are stationary, but the normal operating levels of the ping nodes have changed.
  • a monitoring system via a tag, fixed node, or other ping nodes. As described above, the monitoring system may perform an optimization procedure to determine the normal operating levels of the ping nodes. In this regard, the normal operating levels may be optimized based on identified signal reflection issues, area coverage, and the like. According to some example embodiments, the normal operating levels of the various ping nodes may be modified to achieve particular goals with respect to, for example, locating a particular tag or group of tags. By dynamically changing the normal operating levels of the ping nodes, different gradients of coverage density may be generated within a given space or portion thereof.
  • FIG. 11 depicts a number of ping nodes on the left side of the space that may be associated with aisles of a department store, which are positioned in a uniform manner with associated ping nodes on the shelving or the like.
  • the right side of the environment may be representative of a non-uniform floor space where a number of displays are located close together. Tags located in the right side may be more likely to interact with multiple ping nodes configured as shown in FIG. 11 .
  • the normal operating levels of the ping nodes may be modified resulting in a different gradient of coverage density within the environment.
  • the normal operating levels of the ping nodes can be modified from those depicted in FIG. 11 .
  • the coverage is increased on the right side of the space, resulting in increased overlap in some ping node coverage.
  • the left side of the environment coverage has been decreased such that there is little or no interaction between the respective ping signals.
  • the right portion of the space, which included substantial overlap in coverage in FIG. 11 now has little or no overlap in coverage.
  • a triggering event may occur.
  • a triggering event may be, as described above, a detected theft event, an inventory sweep, regular modification of normal operating levels, or the like.
  • the ping nodes may be communicated a normal operating level modification message.
  • the ping nodes may adjust the normal operating level accordingly.
  • FIGS. 9 and 10 illustrate flowcharts of example systems, methods, and/or computer program products according to example embodiments of the invention. It will be understood that each operation of the flowcharts, and/or combinations of operations in the flowcharts, can be implemented by various means. Means for implementing the operations of the flowcharts, combinations of the operations in the flowchart, or other functionality of example embodiments of the present invention described herein may include hardware, and/or a computer program product including a computer-readable storage medium (as opposed to a computer-readable transmission medium which describes a propagating signal) having one or more computer program code instructions, program instructions, or executable computer-readable program code instructions stored therein.
  • a computer-readable storage medium as opposed to a computer-readable transmission medium which describes a propagating signal
  • program code instructions may be stored on a memory device of an example apparatus (e.g., a tag, a monitoring terminal, a ping node, etc.) and executed by a processor of the apparatus.
  • any such program code instructions may be loaded onto a computer or other programmable apparatus from a computer-readable storage medium to produce a particular machine, such that the particular machine becomes a means for implementing the functions specified in the flowcharts' operations.
  • These program code instructions may also be stored in a computer-readable storage medium that can direct a computer, a processor, or other programmable apparatus to function in a particular manner to thereby generate a particular machine or particular article of manufacture.
  • the instructions stored in the computer-readable storage medium may produce an article of manufacture, where the article of manufacture becomes a means for implementing the functions specified in the flowcharts' operation(s).
  • the program code instructions may be retrieved from a computer-readable storage medium and loaded into a computer, processor, or other programmable apparatus to configure the computer, processor, or other programmable apparatus to execute operations to be performed on or by the computer, processor, or other programmable apparatus.
  • Retrieval, loading, and execution of the program code instructions may be performed sequentially such that one instruction is retrieved, loaded, and executed at a time.
  • retrieval, loading and/or execution may be performed in parallel such that multiple instructions are retrieved, loaded, and/or executed together or simultaneously.
  • Execution of the program code instructions may produce a computer-implemented process such that the instructions executed by the computer, processor, or other programmable apparatus provide operations for implementing the functions specified in the flowcharts' operations.
  • the execution of instructions associated with the operations of the flowcharts by a processor, or storage of instructions associated with the blocks or operations of the flowcharts in a computer-readable storage medium support combinations of operations for performing the specified functions.
  • one or more operations of the flowcharts, and combinations of blocks or operations in the flowcharts may be implemented by special purpose hardware-based computer systems and/or processors which perform the specified functions (e.g., field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), or combinations of special purpose hardware and program code instructions.
  • FPGAs field programmable gate arrays
  • ASICs application specific integrated circuits
  • tags may be configured to provide locating signals (e.g., status signals) that may be received, for example, by configurable monitoring devices configured as locating nodes. Indications of the locating signals may be provided to the monitoring system manager 256 for analysis to determine the location of the tags within the retail environment. Upon determining the location of a tag, the monitoring system manager 256 may be configured to output the location of the tag on a map displayed via the user interface 258 as shown for example in FIG. 13 .
  • locating signals e.g., status signals
  • Indications of the locating signals may be provided to the monitoring system manager 256 for analysis to determine the location of the tags within the retail environment.
  • the monitoring system manager 256 may be configured to output the location of the tag on a map displayed via the user interface 258 as shown for example in FIG. 13 .
  • the monitoring system manager 256 may be configured to consider the location information of a tag with respect to defined rules, alarm conditions, and alarm responses.
  • zones of interest within a retail environment may be defined, and when the monitoring system manager 256 determines that a tag has entered a zone of interest security functionality, such as an alarm response, may be implemented.
  • store personnel may wish to define an alarm condition when products enter the restroom area 150 of FIG. 3 .
  • a zone of interest may be defined for the restroom area 150 .
  • an alarm signal or message may be generated, and an alarm response may be implemented sounding an alarm.
  • the alarm signal or message may be sent to the tag, and an alarm on the tag may be activated.
  • a notification may be provided to store personnel, via for example, a mobile communications terminal and/or a remote alarm may be activated.
  • zones of interest may be defined with respect a variety of areas within the retail environment (e.g., the stock room, point of sale, fitting room, etc.). Additionally, zone-based functionality profiles can be used by the tags.
  • zone-based functionality profiles can be stored and accessed locally within the tag and/or at a network entity, such as monitoring system manager 256 .
  • the zone-based functionality profile can include instructions and other commands that are specific to a particular location zone of the given space.
  • a location zone of interest may also be associated with additional parameters, such as a time interval or duration, which may be included in the tag's zone-based functionality profile for the location zone.
  • a customer for example, may be permitted to bring an article with a tag into the fitting room 130 , but only for a threshold duration of time.
  • Store personnel may, for example, wish to set a thirty minute duration for the fitting room.
  • the monitoring system manager 256 may be configured to define a duration of time, such as thirty minutes, for a zone of interest.
  • the monitoring system manager 256 may be configured to implement a timer based on the threshold duration. The timer may continue to run while the tag is located within the zone of interest and, when the time reaches the threshold, an event signal can be generated.
  • the event signal may include an alarm instruction and be based on the zone-based functionality profile.
  • the alarm instruction can be executed, causing an alarm signal or alarm message (e.g., an automatically generated e-mail to a user device, etc.) to be generated and transmitted by and/or to the monitoring system manager 256 and/or tag.
  • the event signal can include other types of instructions and/or other data may not include or initiate an alarm signal.
  • the event signal can comprise data that indicates the tag's, includes tag location information, causes the tag's or other device's light(s) to illuminate, cause another network device (such as a closed circuit video camera) to flag data as relevant, and/or any other type of data that can cause any other type of desired response.
  • the event signal can cause the monitoring system manager 256 to determine that the tag has moved out of the zone of interest (such as a fitting room) and, in response, the monitoring system manager 256 and/or the tag may be configured to reset the timer. In this manner, the monitoring system can implement a delay before alarming; thereby giving the customer time to try on an article of clothing before determining that a suspicious event may have occurred or be occurring.
  • the zone of interest such as a fitting room
  • Locating a tag may also allow for tracking the movement of a tag and the associated product through the store. Tracking the movement of the product may provide inventory, security, and marketing functionality. With respect to security functionality, it has been determined that many experienced shoplifters move about a store in a particular manner. Based on the location information determined for a tag, the movement of a product may be tracked by the monitoring system manager 256 and a movement profile may be generated and compared to suspicious activity movement profiles. If a match is identified, a notification may be provided to a manager, security guard, or the like via a mobile communications terminal to investigate the situation.
  • the monitoring system manager 256 may have configured other tags, or may signal (e.g., send alarm instructions to) other tags on nearby devices to alarm when a match is identified to, for example, assist in locating the shoplifter. Adjacent tags could then provide an alarming pattern that “follows” a would-be shoplifter around or through the retail environment.
  • the monitoring system manager 256 and/or other network entity may be configured to interface, via a network connection or the like, with customer information terminals 195 to support security functionality.
  • Customer information terminals 195 may be computing devices including a display and audio output capabilities (e.g., speaker, speaker driver, etc.).
  • a customer information terminal may be located at strategic security locations such as exits and entrances.
  • the monitoring system manager 256 may be configured to interface with the customer information terminals 195 , via for example a network connection, to provide output to customers and would-be shoplifters.
  • a customer information terminal and a movable video camera may be located at the exit of a retail environment. The moveable video camera may be controlled by the monitoring system manager 256 .
  • the movable camera may move to capture the image of the individual carrying the tag (and the associated product).
  • the video captured by the camera may be displayed on the customer information terminal to indicate to the shoplifter that they are being recorded and thereby have a deterrent effect.
  • the store's background music system may be quieted or muted and/or other noise overcoming strategies may be implemented, in response to the monitoring system 256 determining that a tag has moved into a zone of interest and/or entered an alarm state.
  • tags entering a store may be considered.
  • the monitoring system manager 256 may be configured to cause the customer information terminal to either visually and/or audibly direct the customer to the customer service desk for product returns.
  • configurable monitoring devices may also be configured to operate as gate nodes via the locating functionality described above or based on a determination that a tag is within range of a gate node's ping signal.
  • a gate node may detect the proximity of a tag by receiving communications from the tag in response to a ping signal provided by the gate node.
  • guard nodes may be implemented. The guard nodes may be located near an exit and may be configured to prevent tags within the store from improperly associating themselves to the gate nodes and causing erroneous alarming.
  • a gate node may be connected to mains power, and may include a battery to support operation when mains power is lost.
  • the gate node may transmit regular ping signals, which include the gate node's unique identifier, and listen for responses from tags that are within range. If a tag detects that the strongest ping signal that the tag is receiving is from a gate node, the tag may transmit a message including the tag's unique identifier to the gate node and the tag may enter a first alarm mode.
  • a tag may maintain a list of identifiers for gate nodes to determine when a signal is being detected from a gate node.
  • the tag may be configured to emit an audible chirp every second (or other predetermined time period), providing a deterrent indication to an individual holding the article to which the tag is affixed. While in the first alarm mode, the tag may continue to listen for ping signals from other nodes, and if a ping signal from a non-gate node becomes the strongest ping signal detected by the tag, the tag may transfer from the first alarm mode to a normal mode (e.g., since the tag has apparently moved away from the gate node and the exit). However, if the strongest received ping signal continues to be the signal from the gate node, and the received signal strength passes a predefined gate node signal strength threshold, the tag may transfer into a second alarm mode.
  • the tag may be configured to alarm continuously. Again, the tag may continue to listen for ping signals from other nodes, and if a ping signal from a non-gate node becomes the strongest ping signal detected by the tag, the tag may transfer from the second alarm mode to the first alarm mode or a normal mode (e.g., since the tag has apparently moved away from the gate node and the exit).
  • tag tracking may also provide marketing benefits. Movement of tags associated with particular products may logged by the monitoring system manager 256 over a period time, and the monitoring system manager 256 may be configured identify customer trends by aggregating the data. Using the trends, product layout within a store may be modified to increase sales. The customer trends may reveal purchasing patterns, customer traffic patterns, in-store dead-spots, and the like, which may not have otherwise been identified. Further, information regarding the effects of moving product display racks and associated products within the store may be determined based on the movement of customers and the sales of the associated products.
  • the monitoring system and the monitoring system manager 256 may be configured to make suggestions to customers for purchasing other products. For example, movement of a tag associated with a dress shirt may be detected, and the movement may be tracked to a sales area for neck ties.
  • the monitoring system manager 256 may be configured to consult a database to suggest a neck tie that matches the shirt, based on attribute information associated with the tag affixed to and associated with the shirt. To implement the suggestion procedure, the monitoring system manager 256 may interface with a customer information terminal 195 located near the neck tie retail area.
  • Example marketing compliance applications and functionality may also be implemented by the monitoring system.
  • some retail stores may have requirements for how the store should be set (i.e., where particular products should be located within the store).
  • a floor plan or set design may be followed for setting the store.
  • the location of tags may be queried.
  • Tags associated with particular products may be checked against a stored, electronic set design to ensure that the products are located in the correct locations within the store. For example, the location of the winter sweaters within the store may be queried, to determine if the winter sweaters have been located on a table at the entrance of the store in accordance with a set design.
  • the results of the query may be compared to the set design to determine whether the store complies in this regard.
  • a tag may be configured to change the price of a product (or suggest the change of a price for the product) based on various factors.
  • a tag may be configured to implement a timer and determine, for example, a “time on the sales floor” value. If the time on the sales floor value reaches a threshold level, the price for the article that the tag is associated with may be modified.
  • a time and date threshold for the article may be defined. For example, a thirty day threshold may be set.
  • the tag When thirty days has passed, as determined by the tag or the monitoring terminal, the tag may be configured to, or the monitoring terminal may direct the tag to, modify or suggest modification of the price of the article. Additionally, or alternatively, the tag may alarm when the threshold is reached indicating to sales personnel that the tag should be moved to the clearance rack.
  • the price may also be modified based on the sales of related products. For example, if sales of a particular product have been increasing, the price could be raised.
  • Another example marketing application may involve a tag being associated with, or assigned to, a specific customer (customer tag).
  • the customer tag may be permanently assigned to a customer (e.g., the customer leaves the retail store with the tag), or the tag may be temporarily assigned to a customer upon visiting the retail store (e.g., the customer returns the tag upon leaving the store).
  • the tag and/or the monitoring system may be configured to store profile information about the customer in association with the tag.
  • the customer's profile information may be stored on the tag or at the monitoring terminal.
  • the tag may be configured to wirelessly interface with a cell phone to retrieve profile information.
  • the profile information may include the customer's name, age, gender, home address, phone numbers, credit card numbers, credit information, purchasing preferences, and the like.
  • the profile information may also include information indicative of a customer loyalty level.
  • various loyalty program features may or may not be available to the customer.
  • tags associated with a customer having a particular customer loyalty level may be configured to allow a customer to use the self check out lane at a retail store, open a display case without the assistance of store personnel, open a security device that protects a product, purchase a product using pre-stored credit card information, de-commission security tags associated with a purchased product, and the like.
  • the customer tag may also be configured to provide for tracking and positioning the customer in the store. Further, the customer tag may be configured to receive, for example via the monitoring system, a product list (e.g., a grocery list), and the customer tag may assist the customer in locating the products on the list.
  • the product list may be provided to the monitoring system via, for example, the monitoring system's internet connection.
  • the product list may have been created remotely from, e.g., the user's home computer running a web application, cellular phone, and/or any other remote device.
  • the monitoring system can provide real-time inventory data associated with a particular store and the remote device can enable the user to reserve one or more particular products for pick-up and/or purchase at the store.
  • a tag such as a tag configured for security functionality, marketing functionality, inventory functionality, or as a key (e.g., a manager's key) may be configured to provide for assisting an individual with locating another tag and the associated product.
  • a locator tag in the possession of an individual attempting to locate a target tag, may be configured to provide a user with an indication of the where the target tag is located or how far the target tag is away from the locator tag.
  • the locating tag and/or the target tag may be configured to provide audible and/or visual feedback to the user to indicate the location of the target tag.
  • the locating tag and/or the target tag may be configured to output audible beeps or clicks (similar to the sound of a Geiger counter), the frequency of which may increase as the locating tag moves closer to the target tag.
  • the output may be based on locating that is performed via the ping nodes described above, or via signal strength detection directly between the locating tag and the target tag.
  • a locator tag such as a tag configured as a manager's key, may be used to locate tags that have reached a threshold battery charge level.
  • a tag with a low battery level where the tag includes battery monitoring circuitry (e.g., via a processor) may be configured to alarm to indicate the low battery condition.
  • a tag with low battery level may be configured to provide a wireless signal indicating the low battery condition. The wireless signal may be detected by the locator tag and the locator tag may be configured to provide an indication of the location of the low battery level to a user of the locator tag.
  • tags near a low battery level tag may be configured to relay the low battery level indication via a wireless signal to neighboring tags, and the neighboring tags may report the low battery power condition to provide for locating the low battery level tag, even after the low battery level tag can no longer communicate.
  • the monitoring system manager 256 may be configured to track inventory generally, as well as track the location of inventory via tags.
  • the monitoring system manager 256 may be configured to track inventory by monitoring and logging status signals provided by the tags, in addition to commissioning and decommissioning activities.
  • the monitoring system manager 256 may also assist in locating particular inventory to, for example, assist in a sale.
  • the monitoring system manager 256 may be configured to receive requests for a particular product (e.g., brown slacks, waist size 32, in-seam length 30 ) and communicate with tags that meet the criteria of the request to cause the tags to alarm.
  • An alarm in this regard may be a subtle, soft audio alarm that would assist a sales person and a customer in locating the desired product.
  • a tote may be a shipping container, such as a plastic shipping container, that can hold smaller, and often higher value, products, such as pharmaceuticals, makeup, batteries, film, jewelry, and the like. Totes may be loaded at a warehouse, or another store, and shipped to a destination store.
  • a tote may include a mechanical locking mechanism that requires, for example, a magnetic key or mechanical interaction with a key, to open the tote and access the products inside the tote.
  • a tote may also include a configurable monitoring device configured as a tote tag.
  • a tote tag may be used for locating the tote, similar to the manners described above.
  • a tote tag may also be configured to detect the presence of tags, and associated products within the tote. In this manner, a tote tag may operate similar to a node, with respect to the tags stored within the tote.
  • the tote tag may maintain an inventory of the products within the tote by virtue of communication with each respective tagged product in the tote and the extraction and/or storage of product related information associated with each respective tag. As the tote moves from the warehouse to a destination store, the inventory information may be verified at both locations to ensure that the contents of the tote have not been tampered with or stolen.
  • the tote tag may also interface with a key, such as a manager's key.
  • the key may be enabled to deactivate security functionality of the tote tag, such as alarming.
  • the tote tag may be configured to alarm if an attempt is made to open the tote without the key or with an unapproved key.
  • the tote tag may also alarm if communication is lost with the tag of one or more of the tagged products within the tote.
  • a key may be configured to interface with the tote tag, either directly or through the monitoring system, to deactivate, or activate, the tote tag's alarming functionality.
  • the monitoring system, or the tote tag may be configured to manage access to the contents of the tote by, for example, maintaining a list identifying the particular keys or the types of keys (e.g., high level manager's key) that have been enabled to open the tote.
  • the tote tag may alarm.
  • FIG. 14 illustrates an example method for managing configurable monitoring devices in accordance with various example embodiments of the present invention that may be implemented by the monitoring system manager 256 .
  • configuration information for a configurable monitoring device may be generated that defines a role for the target configurable monitoring device. Specific parameters such as rules, alarming conditions, alarming responses, attribute information, and the like may be defined and included in the configuration information.
  • the configuration information may be provided to a target configurable monitoring device via, for example, a wireless network connection.
  • the target configurable monitoring device may receive and store the configuration information and subsequently operate within the role defined by the configuration information. If the configuration information defines the role of a node or a gateway, role-based communications may be received from, and transmitted to, the node or gateway during the operation of the configurable monitoring device as a node or gateway.
  • a commission signal may subsequently be provided to commission the tag at 1430 .
  • role-based communications may be received from, and transmitted to, the tag at 1440 during the operation of the configurable monitoring device as a tag.
  • the tag may later be provided a decommission signal to decommission the tag 1450 .
  • the tag may await re-commissioning at 1430 by providing another commission signal.
  • FIGS. 13 and 15 - 17 illustrate example windows for displaying aspects of a user interface that may be implemented on a monitoring terminal.
  • FIG. 13 illustrates an example window 1300 displaying a rendered representation of a monitoring system.
  • the tag map 1310 illustrates an example sales floor for a retail environment.
  • the tag map 1310 includes location-based representations of nodes (referred to as “hubs”) that are positioned at various locations throughout the sales floor.
  • the nodes are uniquely identified by a label (e.g., “Hub 14 ”) followed by an associated tag count in parentheses, indicating the number of nearby tags (or tags within range of the signals (e.g., ping signals) being provided by the nodes.
  • the tag map 1310 also depicts POS nodes (e.g., “Pos 2 ”, “Pos 3 ”, etc.). Near the entry area a gate node, “Gate 1 ”, is depicted which is configured to protect the entry/exit area.
  • the tag map 1310 also includes a gateway node, “Root 0 ” configured to interface with an external network, to which the monitoring terminal may be connected.
  • the example window 1300 also includes a tag tree 1320 .
  • the tag tree 1320 includes a listing of the nodes that are members of the monitoring system.
  • a node that has tags within range, such as Hub 16 may be expanded to display entries for each tag that is currently within range of, or otherwise associated with the node.
  • the tag tree 1320 may be updated to show the current associations between the tags and the nodes.
  • the tag tree 1320 also includes a status legend 1321 for describing the status of the tags or nodes.
  • the monitoring terminal may be configured to highlight, for example, an alarming tag red, an unresponsive tag purple, and a low battery tag yellow, or some other color/highlighting scheme may be employed.
  • the example window 1300 also includes an event log 1330 .
  • the information depicted in the event log may be linked to the currently selected item in the tag tree 1320 .
  • event information for the selected tag may be displayed.
  • a time stamp may be associated with each event.
  • Example events may include tag movement between node events, alarm events, failed communications events, tamper events, low battery events, etc.
  • FIG. 15 illustrates an example tag information window 1500 for attribute information associated with a tag or node.
  • the example tag information window 1500 depicts attribute information for a tag.
  • An image 1510 of an article to which the associated tag is affixed may be provided in the example tag information window 1500 .
  • additional attribute information may be provided in the tabular area 1520 , such as the tag address, the current battery level, the currently associated hub, a description of the affixed article, a stock-keeping unit (SKU) value, the time/date of the last report from the tag, the time/date of the last transition between nodes for the tag, the time/date of the last commission of the tag, the time/date of the last decommission of the tag, and the like.
  • SKU stock-keeping unit
  • FIG. 16 illustrates an example hub information window 1600 .
  • the hub information window 1600 may include a tabular area 1610 that includes information about the hub (or node).
  • Example hub attribute information may include the hub address, the hub label or description, the battery level for the hub, the current number of associated tags, the date/time that the hub last reported, for example, to the monitoring terminal, and the like.
  • FIG. 17 illustrates an example battery level window 1700 for a tag.
  • the battery level window may include a graphical representation of the past and current battery level on a line graph.
  • the graph may be provided with respect to voltage on the y-axis, and time on the x-axis.
  • a threshold battery level 1730 may also be included on the graph, which may indicate the battery level that would place the tag in a low battery status.
  • the communications interface 252 of the monitoring terminal 62 may communicate with a separate bridge device to forward and receive information and data to and from configurable monitoring devices.
  • the bridge device may operate unilaterally or in conjunction with the monitoring terminal 62 to manage configurable monitoring devices.
  • the bridge device which may be a hand-held scanner-type device, can be configured to operate in one of two communication modes to interface with tags affixed to retail products for security, inventory, and other purposes. In a first communication mode, the bridge device is configured to communicate with tags that are configured for RFID type communications.
  • the tags and the bridge device may be configured to communicate in accordance with the Generation II Ultra High Frequency (UHF) RFID standards.
  • the bridge device is configured to communicate with tags using a protocol built on the IEEE 802.15.4 standard, such as ZigBee or a proprietary protocol built on IEEE 802.15.4.
  • the bridge device may include a transmitter/receiver and an antenna configured to support IEEE 802.15.4, as well as, a modulator/demodulator, and possibly a separate antenna, to support RFID communications.
  • the bridge device may include a configurable monitoring device configured to operate a bridge device.
  • a single, possibly hand-held, bridge device can operate as a tag reader, and may be used to communicate with disparate types of tags. Communications with the tags may be performed for a variety of reasons, such as for counting inventory, price checking, tag firmware upgrades, tag encoding, and the like.
  • the flexible nature of the configurable monitoring device and the monitoring system of embodiments of the present invention may enable dynamic configuration of configurable monitoring devices within a network to introduce robust capabilities for providing services and functionality and, for providing updates to existing capabilities with updated configuration information.
  • Embodiments of the present invention may be implemented by various means, such as hardware, firmware, processor, circuitry and/or other device associated with execution of software including one or more computer program instructions.
  • one or more of the procedures or activities described above may be embodied by computer program instructions.
  • the computer program instructions which embody the procedures or activities described above may be stored by a memory device of an apparatus employing an embodiment of the present invention and executed by a processor in the apparatus.
  • any such computer program instructions may be loaded onto a computer or other programmable apparatus (e.g., hardware) to produce a machine, such that the resulting computer or other programmable apparatus embody means for implementing the functions specified in the corresponding procedure or activity.
  • These computer program instructions may also be stored in a computer-readable storage memory (as opposed to a computer-readable transmission medium such as a carrier wave or electromagnetic signal) that may direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture the execution of which implements the function specified in the corresponding procedure or activity.
  • the computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the corresponding procedure or activity described above.
  • the terms “substantially,” “about,” “approximately” or the like as used herein are intended to reflect variances in a value or relationship that may be due to various factors such as the effects of environmental conditions, common error tolerances, or the like. It should further be understood that although some values or other relationships may be expressed herein without a modifier, these values or other relationships may also be exact or may include a degree of variation due to various factors such as the effects of environmental conditions, common error tolerances, or the like.

Abstract

Provided are embodiments of configurable monitoring devices, methods, systems, computer readable storage media and other means for locating devices. In some examples, the devices are attached to a retail or other type of article. The devices can be dynamically configurable and communicate wirelessly with other network entities.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This patent application claims priority from U.S. Provisional Patent Application No. 61/244,320, filed Sep. 21, 2009, entitled “A Configurable Monitoring Device;” U.S. Provisional Patent Application No. 61/246,393, filed Sep. 28, 2009, entitled “Systems, Methods and Apparatuses for Managing Configurable Monitoring Devices;” U.S. Provisional Patent Application No. 61/246,388, filed Sep. 28, 2009, entitled “A Configurable Monitoring Device;” U.S. Provisional Patent Application No. 61/248,223, filed Oct. 2, 2009, entitled “Employment of a Configurable Monitoring Device as an Inventory Management Tool;” U.S. Provisional Patent Application No. 61/248,228, filed Oct. 2, 2009, entitled “Employment of a Configurable Monitoring Device as a Marketing Tool;” U.S. Provisional Patent Application No. 61/248,242, filed Oct. 2, 2009, entitled “Configurable Monitoring Device Having Bridge Functionality;” U.S. Provisional Patent Application No. 61/248,233, filed Oct. 2, 2009, entitled “Employment of a Configurable Monitoring Device as a Personal Identifier for Facilitating Transactions;” U.S. Provisional Patent Application No. 61/248,239, filed Oct. 2, 2009, entitled “Employment of a Configurable Monitoring Device as a Security Tool;” U.S. Provisional Patent Application No. 61/248,269, filed Oct. 2, 2009, entitled “Key for Commissioning, Decommissioning and Unlocking Configurable Monitoring Devices;” and U.S. Provisional Patent Application No. 61/248,196, filed Oct. 2, 2009, entitled “Systems, Methods and Apparatuses for Locating Configurable Monitoring Devices,” which are each hereby incorporated herein by reference in its entirety.
  • TECHNOLOGICAL FIELD
  • Embodiments of the present invention relate generally to network and network management technology and, more particularly, relate to the management of networks that include dynamically configurable monitoring devices for use in connection with monitoring, tracking, and locating activities associated with one or more articles such as retail products.
  • BACKGROUND
  • Conventional retail security systems, such as electronic article surveillance (EAS) systems, operate effectively to prevent shoplifting and the like. However, conventional systems are often limited to the narrow scope of providing security functionality. For example, an EAS gate located at an exit of a retail business establishment may be configured to alarm when an article with an EAS tag passes through the gate. Other than performing this important alarming functionality, many conventional systems provide nothing more to the users of the systems, such as store owners, store managers, and the like. Additionally, when store owners are considering the purchase and installation of a conventional security system in a retail establishment, the limited functionality offered by the systems can detrimentally affect the cost-benefit analysis of installing and maintaining the system.
  • Additionally, identifying the location of products within a retail store has often relied on product placement. In other words, approaches to finding products are often based on placing similar types of products near each other in the store, thereby allowing the products' relative placement to assist both customers and store personnel in finding a desired product. Another approach has been to use large signs above the aisles of products, which identify which types of products should be in each aisle. However, using a sign and/or simply organizing a store with areas for similar products has proven insufficient under many circumstances. As a result, customers and store personnel are demanding more accuracy with respect to locating products within retail and other environments.
  • BRIEF SUMMARY OF EXEMPLARY EMBODIMENTS
  • Some example embodiments of the present invention are therefore provided that support security system functionality, as well as, additional functionalities that would be beneficial to store owners, store managers, and customers. For example, some example embodiments support inventory and marketing functionality, as well as, advanced security functionality.
  • According to some example embodiments, a system is provided for managing and locating configurable monitoring devices and/or the products they are attached to. A configurable monitoring device may be a microprocessor-based wireless communication device that can assume configurable roles or modes of operation within the system. A mode of operation may be implemented based on configuration information stored on the configurable monitoring device. The configuration information may be pre-loaded on the configurable monitoring device, or configurable monitoring devices may receive the configuration information via a wireless connection from a remote device.
  • The system, referred to as a monitoring system, may include any number of configurable monitoring devices configured to operate, for example, as a network, such as a mesh network, hybrid mesh network, star network, hybrid star network, or the like. The network may include a gateway node that supports a monitoring terminal (sometimes referred to herein as a coordinator). The gateway node may operate as an interface between the configurable monitoring device network and the monitoring terminal, for example, via an external network. The monitoring terminal may be configured to interact with the configurable monitoring devices and the configurable monitoring device network to implement a variety of functionalities.
  • Within the network, one or more of the monitoring devices can include a processor, which can be configured to receive an indication of a triggering event. In response to receiving the indication of the triggering event the processor can be configured to cause the monitoring device to transition into a triggered role. The triggered role being one of a tag role or a node role, among others. In some embodiments, the tag role includes configuring the processor to determine location information relating to the monitoring device. In other embodiments, the tag role can include, instead of or in addition to locally determining location information, configuring the processor to repeat, or relay, any received data to a network entity, which can then help determine the location of the monitoring device. The location information can be relatively complex or simple (e.g., an identifier number of one or more other nodes the monitoring device “hears”).
  • The monitoring device's node role can include configuring the processor to transmit a ping signal. A ping signal can comprise a relatively small amount of data (e.g., only the node identifier information) or a relatively larger amount data (such as at least the amount and type of data common to “beacon” signals used in wireless communications, some of which may be 802.11.4 compliant). The node role can also comprise configuring the processor to forward a tag communication to a network entity.
  • Among other things, the monitoring device can be configured to receive data that includes instructions to transition the monitoring device. The instructions can be included in the indication of the triggering event and/or be sent by a network entity.
  • In some embodiments, the monitoring device's processor can be further configured to receive a second indication of a second triggering event and, in response, transition from the triggered role to a second triggered role. For example, the monitoring device can transition from a tag role, to a node role, back to a tag role. In some embodiments, the indication of the triggering event can be a wireless signal that is broadcast wirelessly and received by one or more monitoring devices' antennas. Despite a plurality of monitoring devices receiving the indication, the indication of the triggering event can include a monitoring device identifier or other information that causes only one of the monitoring devices to execute its transition into the triggered role. As another example, a directional antenna (which may allow only one monitoring device or a subset of the monitoring devices to receive the indication), any other means, and/or a combination thereof can be used to target one or more monitoring devices for transitioning.
  • The indication of the triggering event can be, for example, an output of a sensor. The sensor can be integrated inside the housing of the monitoring device, making the sensor an internal component of the monitoring device. Some examples of internal components include a motion detector (e.g., jiggle switch, accelerometer, etc.), a tamper detection component (which can be separate from or part of a mounting device used to affix the monitoring device to an article), or any other internal component that could be integrated into the monitoring device, some additional examples of which are discussed herein.
  • The sensor can be configured to detect the triggering event and output the indication of the triggering event. For example, the triggering event could be movement and, in response to the sensor determining that the monitoring device is moving, the sensor can output the indication to the monitoring device's processor (and/or any other component or device).
  • In some embodiments, the sensor can be external to the monitoring device, such as, e.g., in an external device. The sensor can produce an output that is then relayed wirelessly or by any other means to the monitoring device. For example, the external device can be another device functioning as a node device. Other examples of external devices that can send the monitoring device the indication of a triggering event include, e.g., an RFID device (such as those that are handheld or mounted in a counter or other piece of furniture), a network entity, an EAS gate, or any other device that can be configured to emit and/or generate an indication of a triggering event and/or an alarm event.
  • The monitoring device can also include an audio device configured to emit audio signals. In some embodiments, the audio device may only be operable when the monitoring device is in the tag role. The monitoring device's processor can be further configured to receive an alarm indication of an alarm event while in the tag role and send a signal to the audio device, causing the audio device to emit the audio signal. An alarm event can be similar to or a type of triggering event and an alarm indication can be similar to or a type of an indication of the triggering event. For example, the alarm event can be an event, such as determining someone is trying to steal the article to which the monitoring device is attached (based on, e.g., suspicious movement profile). The alarm indication, for example, can be any type of indication, including a wireless or other type of signal that corresponds with an alarm event and/or can convey, to the monitoring device and/or network entity, that an alarm event occurred. For example, the monitoring device's processor and/or the network entity can receive the alarm indication from an external security device, such as an EAS gate and/or internal component that is configured to generate an output in response to being in communication proximity with an EAS gate. As another example, a node can be placed near a store's exit and the monitoring device can be configured to interpret hearing that node's ping signal as an alarm indication (with the alarm event being that monitoring device being too close to the store's exit).
  • In some embodiments, the external security device can be a second monitoring device. The external security device can be in communication proximity to the monitoring device and the external security device and/or the monitoring device can be affixed to a retail product. In such embodiments, the external security device can be located at a store's exit and be used to detect an alarm event.
  • As used herein, “communication proximity” refers to the distance in which direct communications can exist wirelessly between two devices. This distance can be dependent on a number of variables includes power output, frequency, signal reception factors (including physical and electrical interference variables), and/or any other variable. For example, if a monitoring device is in communication proximity of a node device, the monitoring device can “hear” the node device's ping signal(s) (e.g., receive the ping signal and determine the node identifier).
  • In some embodiments, the monitoring device can comprise a battery and/or various other components. For example, the monitoring device can comprise a mounting device configured to affix the monitoring device to a retail article. The monitoring device can also comprise memory configured to store attribute information (e.g., bar code data, color data, price data, etc.) associated with the retail article. As another example, the monitoring device can include a display configured to display human-readable information and/or a light emitting component (which can be used to indicate battery power, an error message, communication functionality, etc.).
  • In some embodiments, the monitoring device can be configured for position tracking of an article (such as a retail item, book, computer, casino chip, money, personal identification card, passport, etc.). The monitoring device's processor can be configured to receive a ping signal from a ping node; determine location information relating to the monitoring device based at least in part on receiving the ping signal; and report the location information to a network entity. The network entity can comprise one or more additional apparatuses, including a server and network management and/or monitoring system.
  • In some embodiments, the monitoring device and/or network entity can determine a location zone of the monitoring device in response to the monitoring device receiving a ping signal from the ping node or other device functioning as a ping node (both of which are sometimes referred to herein as a “node device” or “node”). The monitoring device's processor can then retrieve (e.g., request and receive), from local or remote memory, a zone-based functionality profile that corresponds with the location zone. When the functionality profile is downloaded from remote memory (such as, e.g., the memory of a network entity), the processor can be configured to store the functionality profile in the monitoring device's internal memory.
  • The functionality profile can be zone-based and correspond with one or more zones that represent an area of a physical space, such as a retail store or warehouse. The zones can also be relative to the position of one or more other devices, such as a node device, door, etc.
  • The monitoring device can comprise an audible alarm that is activated by the processor in response to the zone-based functionality profile including an event signal activation instruction, such as an alarm activation instruction and/or any other instructions (such as, e.g., an unlocking instruction for the monitoring device's attachment mechanism, etc.). In some embodiments, an alarm may also be initiated at the network entity in response to determining an alarm event has occurred.
  • The monitoring device's processor can be further configured to, in response to receiving the ping signal from the ping node, determine a location zone. Determining a location zone can include, for example, determining the ping node's identifier which is broadcast as or encoded within the ping signal. In some embodiments, the network entity can be configured to determine the applicable zone-based functionality profile for the monitoring device, in response to the monitoring device repeating the ping signal(s) the monitoring device received. The monitoring device's processor can then retrieve, from the network entity, the zone-based functionality profile that corresponds with the monitoring device's location zone.
  • The monitoring device and the ping node can establish and execute a uni-directional communication protocol. The uni-directional communication protocol can allow, for example, the ping node to wirelessly broadcast data (as, e.g., a ping signal), which the monitoring device can receive. As mentioned elsewhere herein, the data can include, e.g., the ping node's identifier and/or other information. While the monitoring device may or may not broadcast a response to the ping node, the ping node can be configured to only send data to the monitoring device (e.g., lack the components necessary to receive data from the monitoring device). In some embodiments, the ping node can receive data from a network entity, even though the ping node lacks the ability to receive data from a monitoring device. In some embodiments, the monitoring device may be configured to respond to (e.g., confirm receipt for) all ping node signals it receives. In other embodiments, the uni-directional communication protocol lacks the monitoring device transmitting data intended for the ping node.
  • The monitoring device can also establish and execute a bi-directional communication protocol with the ping node and/or the network entity. The bi-directional communication protocol can allow for two way communications, including sending and receiving of signals between each device participating in the communication protocol.
  • The monitoring device can be further configured to receive a second ping signal from a second ping node. The second ping signal can be used by the monitoring device and/or network entity to determine second location information (such as identifying information of the second ping node) relating to the monitoring device. The uni-directional, bi-direction or any other communication protocol can be established between the monitoring device and the second ping node. The communication protocol between the monitoring device and the second ping node can be related to or independent from the communication protocol used between the monitoring device and the first ping node.
  • A location zone can be determined by the monitoring device and/or the network entity based on the first location information and the second location information. The first and second location information can respectively comprise the first ping node's and the second ping node's identification data. The network entity and/or the monitoring device, knowing where those ping nodes are physically located, can then derive the approximate position of the monitoring device. In such embodiments, a more accurate location can be derived from, e.g., more ping node information. The location (relative to the ping node and/or absolute in a given space) can be used to access memory (remote or local to the monitoring device) and retrieve a zone-based functionality profile that can include instructions and other executable commands for the monitoring device and/or other device(s). For example, the monitoring device can comprise an audible alarm that is activated by the processor in response to receiving a type of event signal activation instruction (e.g., an alarm activation instruction) included in the zone-based functionality profile. As another example, the monitoring device can comprise a mounting device that is unlocked in response to the zone-based functionality profile including an unlock instruction, wherein the mounting device is configured to affix the monitoring device to a retail article. The monitoring device can also include an antenna that the processor uses to transmit and/or receive data associated with the location zone to the network entity, ping node device, and/or any other external device.
  • The monitoring device's processor can be further configured to engage an internal timer; and subsequently receive an indication of a trigger event, wherein the indication results from the timer expiring. In some embodiments, rather than engage a timer within the processor, any other type of time keeping component can be implemented, including a clock, etc. In response to receiving the indication of the trigger event, the monitoring device can enter a wake mode and subsequent to reporting the location information to the network entity, reset the timer and enter a sleep mode. In some embodiments, a timer can be started in response to receiving a triggering event. A triggering event can cause the creation of a corresponding event signal, which can, among other things, cause the initiation of a timer.
  • In some embodiments, the monitoring device and/or network entity can send a first signal for instructing the one or more ping nodes to power down to a minimum threshold and incrementally power up simultaneously or near simultaneously. The monitoring device can then monitor (e.g., listen) for subsequent ping signals from the ping nodes. Subsequent to determining that both the first ping node and the second ping node have powered down, the monitoring device can be configured to receive a location signal from either of the ping nodes. In response to receiving the location signal, the monitoring device can determine locally or utilize a network entity to determine its location and/or relate that location information to an article to which the monitoring device is coupled to. The location information, for example, can be associated with a first location corresponding with the location of a first ping node if the location signal was generated by the first ping node. Or, as another example, the location information can be associated with a second location corresponding with the location of the second ping node if the location signal was generated by the second ping node. After using one or more ping nodes to determine location information, the monitoring device can be configured to report the location information to a network entity.
  • In other embodiments, the monitoring device and/or network entity can then send a first signal for instructing the one or more ping nodes to power up to a maximum threshold and then simultaneously or near simultaneously incrementally power down. The monitoring device can then monitor (e.g., listen) for subsequent ping signals from the ping nodes. Subsequent to determining that both the first ping node and the second ping node have powered up, the monitoring device can be configured to receive location signals. Subsequent to determining that both the first ping node and the second ping node have powered up, determining whether a final ping signal is received from the first ping node or the second ping node. In response to receiving the final ping signal, determining the location information relating to the article, wherein the location information is associated with a first location of the first ping node if the final ping signal was generated by the first ping node or the location information is associated with a second location of the second ping node if the final ping signal was generated by the second ping node. In other words, the monitoring device can determine its location based upon the last ping node it hears.
  • Some example embodiments of the present invention are therefore provided that support locating a tag that may be affixed to a product within, for example, a retail environment. In accordance with various example embodiments, the monitoring system may be implemented that is configured to support the locating of tags. The monitoring system may be comprised of a plurality of ping, gateway and/or other nodes that provide ping and/or other types of signals that are detected by a tag. A tag that is able to receive a signal from a ping and other nodes can be defined as having a positional relationship with the node(s). As mentioned above and detailed below, where the signal strength is sufficiently strong, a tag may be configured to determine a closest ping node to the tag based on the ability to receive a signal from a ping node.
  • In situations where a tag receives signals from a plurality of ping nodes (e.g., due to range overlap or signal reflections), a locating procedure may be undertaken to identify the ping node closest to the tag or within communication range with a tag. To implement the locating procedure, the ping nodes may be configured to, upon request, adjust the pings' respective signal powers to a common level (e.g., a minimum level or a maximum level) and incrementally modify the power of the signal to determine when a targeted tag begins receiving or communicating, or fails to receive or communicate, the signals being provided by the ping nodes. Based on which ping signal was first received or last lost, the tag may be configured to determine which ping node is closest to the tag. The tag may then be associated with the ping node such that the tag is indicated as being located near the ping node within the environment.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING(S)
  • Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
  • FIG. 1 a is a schematic block diagram of a monitoring system including a number of configurable monitoring devices according to example embodiments;
  • FIG. 1 b is another schematic block diagram of a monitoring system including a number of configurable monitoring devices according to an example embodiment of the present invention;
  • FIG. 1 c is another rendering of a monitoring system including a number of configurable monitoring devices according to example embodiments;
  • FIG. 1 d illustrates a flow chart of an example tag according to example embodiments;
  • FIG. 2 illustrates a block diagram of a monitoring terminal according to example embodiments;
  • FIG. 3 illustrates a diagram of various configurable monitoring devices implemented in an example retail environment according to example embodiments;
  • FIG. 4 illustrates an example configurable monitoring device with specialized hardware for performing some of the functionality within the role of a key according to example embodiments;
  • FIG. 5 a is an illustration of an example retail environment having ping nodes and tags located within the environment according to example embodiments;
  • FIG. 5 b illustrates a tag information window for displaying attribute information for a tag according to example embodiments;
  • FIG. 6 is an illustration of a signaling and communications period for a ping node according to example embodiments;
  • FIG. 7 is an illustration of a situation where a tag is within range of more than one ping node according to example embodiments;
  • FIG. 8 is an illustration of a example procedure where the signal powers of the ping nodes have been dropped to a minimum level and incrementally increased to perform locating according to example embodiments;
  • FIG. 9 is a flowchart of an example method for determining the location of a tag from the perspective of a monitoring terminal or a tag according to example embodiments;
  • FIG. 10 is a flowchart of an example method for determining the location of a tag from the perspective of a ping node according to example embodiments;
  • FIG. 11 illustrates an example of a flow diagram illustrating an example method for managing configurable monitoring devices according to example embodiments;
  • FIG. 12 illustrates an example user interface window implemented by a monitoring terminal and depicting a representation of a monitoring system according to example embodiments;
  • FIG. 13 illustrates an example user interface window implemented by a monitoring terminal and depicting a representation of a monitoring system in accordance with some embodiments;
  • FIG. 14 illustrates an example of a flow diagram illustrating an example method for managing configurable monitoring devices according to example embodiments;
  • FIG. 15 illustrates an example tag information window for displaying attribute information associated with a tag or node according to example embodiments;
  • FIG. 16 illustrates a hub information window for displaying attribute information for a node according to example embodiments; and
  • FIG. 17 illustrates a tag battery level window for displaying the battery level for a tag according to example embodiments.
  • DETAILED DESCRIPTION
  • Some embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Indeed, various embodiments of the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout.
  • As defined herein a “computer-readable storage medium,” which refers to a physical storage medium (e.g., volatile or non-volatile memory device), can be differentiated from a “computer-readable transmission medium,” which refers to an electromagnetic signal. Additionally, as used herein, the term “circuitry” refers to not only hardware-only circuit implementations including analog and/or digital circuitry, but at least also to combinations of circuits with corresponding software and/or instructions stored on a computer-readable storage medium.
  • As indicated above, example embodiments of the present invention may be configured to support various security, inventory, marketing, and other functionalities in, for example, a retail sales environment or other given space. To do so, configurable monitoring devices may be installed within the retail sales environment. A description of some example embodiments of configurable monitoring devices, and the monitoring systems that may support configurable monitoring devices, is provided in U.S. Provisional Patent Application 61/244,320 filed Sep. 21, 2009, entitled “A Configurable Monitoring Device”, the content of which is hereby incorporated by reference in its entirety. The configurable monitoring devices may be wireless communication devices that can be dynamically configured to assume one or transition among roles within the operation of a monitoring system. To facilitate the ability to dynamically change roles, the configurable monitoring devices may include a processor, memory, communications interface (e.g., radio transmitter/receiver, Radio Frequency ID (RFID) module, or the like). Based on a role that a configurable monitoring device is expected to assume or transition to, the configurable monitoring device may also include more specialized hardware components such as, an alarm, a sensor, a display, and the like.
  • As indicated above, the configurable monitoring devices may assume a variety of roles within the monitoring system. For example, a configurable monitoring device may be configured as a security tag that is attached to an article via a mounting device. The security tag may be configured to alarm or transmit an alarm message, if the security tag determines that an alarm condition has been met. In another example, a configurable monitoring device may be configured to operate as a node within a monitoring system. As a node, the configurable monitoring device may support communications and message routing within the communications network defined by the system. In this regard, the node may be configured to determine routing paths within the network for the efficient delivery of messages. According to another example, a configurable monitoring device may be configured to operate as a gateway between the monitoring system and an external network such as a wired local area network (LAN) or the Internet. Further, a configurable monitoring device may be configured to operate as a security key for locking and unlocking a mounting device associated with a security tag. In this regard, the security key may be configured to activate or deactivate electronic security features of a security tag. For purposes of explanation, a configurable monitoring device configured to operate in node mode will be referred to as a “node”, a configurable monitoring device configured to operate in tag mode will be referred to as a “tag”, a configurable monitoring device configured to operate in gateway mode will be referred to as a “gateway”, and a configurable monitoring device configured to operate in key mode will be referred to as a “key”. U.S. Provisional Patent Application No. 61/248,269, filed Oct. 2, 2009, entitled “Key for Commissioning, Decommissioning and Unlocking Configurable Monitoring Devices,” discusses examples of key devices and was incorporated above by reference in its entirety.
  • The description of the roles of the configurable monitoring devices described above, and further described below is not an exhaustive list of the roles that may implemented by the configurable monitoring devices. Additionally, while the various roles may be described separately, it is contemplated that the roles are not necessarily mutually exclusive (though they could be) and that a single configurable monitoring device may or may not be configured to simultaneously assume more than one of the roles.
  • FIG. 1 a illustrates an example monitoring system 60 that includes a number of configurable monitoring devices in various roles. Tags 68 (e.g., tags 68 a-68 i) may be configurable monitoring devices affixed to a product for the purpose of supporting security, inventory, marketing, as well as other functionalities. Nodes 66 (e.g., nodes 66 a-66 c) may be configured to support network level activities such as communications routing, tag locating, and the like.
  • Gateway node 64 may be configured as a gateway node to provide a network interface between the monitoring system 60 and the external network 30. A monitoring terminal 62 may be in communication with the gateway node 64, for example, via the external network 30 or via a direct connection to the gateway node 64, to facilitate management of the configurable monitoring devices by the monitoring terminal 62 and to further facilitate the aggregation and analysis of data received from the configurable monitoring devices. A gateway node may interface with a cellular network to gain access to other networks, such as the Internet. In some example embodiments, a gateway node may support USB and Ethernet connectivity for connection to USB or Ethernet networks.
  • The gateway node 64 may also include or be associated with a network coordinator. The network coordinator may be configured to oversee and manage various network operations. For example, the network coordinator may implement the forming of the network, allocate network addresses to entities of the network, and maintain a binding table for the network.
  • Although the communications network of the monitoring system may be any type of network (e.g., mesh network, hybrid mesh network, star network, hybrid star network, any other type of network, or combination thereof), in some example embodiments, the network may be configured to perform aspects similar to a mesh network. In some cases, the monitoring system 60 may be made up of a plurality of communication devices (e.g., such as a plurality of configurable monitoring devices) in communication with each other via device-to-device communication to form, for example, a mesh network. However, in other situations, the network may include a plurality of devices that transmit signals to and receive signals from a base site or access point, which could be, for example a base site or access point of a data network, such as a local area network (LAN), a metropolitan area network (MAN), and/or a wide area network (WAN), such as the Internet.
  • FIG. 1 b depicts another example network configuration in accordance with some example embodiments, where the nodes 66 are connected in a star or cluster fashion to the gateway node. FIG. 1 c provides another illustration of an example monitoring system with a communications network. With respect to the network entities of FIG. 1 c, the PAN coordinator (gateway with network management functionality), the powered routers (communications nodes), the gate alarm (gate node), the pings (pings nodes), the tags, and the manager's key may each include a configurable monitoring device configured for a particular role.
  • Other devices such as processing elements or devices (e.g., personal computers, server computers, displays, point of sale (POS) terminals and/or the like) may be coupled to a configurable monitoring device to access the monitoring system 60. By directly or indirectly connecting the configurable monitoring devices to various network devices and/or to other configurable monitoring devices via the monitoring system 60, the configurable monitoring devices may be enabled to receive configuration modifications dynamically and perform various functions or tasks in connection with network devices or other configurable monitoring devices based on the current configuration of the configurable monitoring devices.
  • The configurable monitoring devices, and the monitoring system 60 generally, may utilize any wireless communication technique for communicating information between the devices or to the monitoring terminal 62. For example, the configurable monitoring devices may be configured to support communications protocols built on the IEEE 802.15.4 standard, such as Zigbee or a proprietary wireless protocol. According to some example embodiments, the communications within the monitoring system 60 may be performed based on a Route Under MAC (Media Access Control) (RUM) protocol or a modified RUM protocol. Regardless of the protocol, communications within the monitoring system may be associated with a network identifier, such as a personal area network (PAN) identifier. In some example embodiments, configurable monitoring devices might not be permitted to communicate within the monitoring system without having a matching network identifier. In some example embodiments, the monitoring system may regularly or irregularly change the network identifier and transition to a new network identifier for security purposes.
  • Additionally, to support network communications within the monitoring system, a system-wide synchronized clock may be implemented. Synchronization of the clock may be maintained via a clock signal. Configurable monitoring devices may include real time clock circuitry to support the synchronized clock and to regulate the use of precise communications windows.
  • The configurable monitoring devices may also support RFID communications, such as communications based on Generation II Ultra High Frequency (UHF) RFID standards. In example embodiments where a configurable monitoring device includes a radio (e.g., an IEEE 802.15.4 radio) and an RFID module, the configurable monitoring device may be configured to operate as an interface that allows RFID devices to access the monitoring system 60. For example, an RFID reader or other RFID device, that does not include a configurable monitoring device, may communicate with a configurable monitoring device, such as a tag, and the configurable monitoring device may relay such communications to entities connected to the monitoring system. In the same manner, the tag may relay communications originating on the monitoring system to an RFID device that has interfaced with a tag. As such, the configurable monitoring devices may operate as gateway to the monitoring system for RFID communications.
  • The monitoring system 60 may be configured to operate as a mesh network, hybrid mesh network, star network, hybrid star network, cluster tree network, any other type of network, or any combination thereof. In this regard, the monitoring system 60 may support message hopping and network self-healing. With respect to message hopping, the nodes 66 may be configured to receive communications from nearby or assigned tags 68. The nodes 66 may be configured to determine a system architecture and/or efficient pathways for communicating messages to the various entities within the network. In this regard, the nodes 66 may be configured to generate and maintain routing tables to facilitate the efficient communication of information within the network.
  • For example, in accordance with implemented marketing functionality, tag 68 h may be configured to communicate that the product that tag 68 h is affixed to has been moved or is being moved from its display location. Tag 68 h may be configured to communicate this information to tags 68 g and 68 d, because the products affixed to tags 68 g and 68 d are related products that a customer may be interested in purchasing, given tag 68 h's determination that the customer may have decided to purchase the product affixed to tag 68 h. Accordingly, tag 68 h may generate and transmit a message addressed to tags 68 g and 68 d. The message may be received by node 66 c, and node 66 c may be configured to determine how to route the message, given current network traffic, such that the message is efficiently received by tags 68 g and 68 d. For example, using generated routing tables, node 66 c may determine that the message can first be transmitted directly to tag 68 g, since tag 68 g is connected to or in direct communication with the node 66 c. To transmit the message to tag 68 d, node 66 c may determine that the message should be forwarded to node 66 b. Node 66 b may perform a similar analysis and determine that the message can be forward to tag 68 d, directly from node 66 b. Tag 68 h may also be configured to transmit the message to the monitoring terminal 62. Node 66 c may route the message accordingly, such that the gateway 64 may forward the message to the monitoring terminal 62.
  • As indicated above, the nodes 66 may be configured to perform communications routing within the monitoring system 60. In this regard, nodes 66 may operate to extend the range of the monitoring system. However, according to some example embodiments, all configurable monitoring devices within the monitoring system 60 may be configured to perform routing functionality. As such, configurable monitoring devices configured to operate both as tags and as nodes may communicate directly with each other, if within range, without having to route the communications through another node.
  • Further, since the monitoring system 60 may be configured to support self-healing. In this regard, in the event that a node 66 should fail and no longer be able to communicate, messages may be automatically routed via a path that does not involve the failed node. For example, in a given scenario, a tag may be connected (via, e.g., a wireless connection) to more than one node. In the event that one of the nodes fails, the tag may simply cause messages to be routed through another node to which the tag is connected. According to some example embodiments, such as in the event that another available node is not present, a tag may be triggered, directed, or otherwise configured to implement node functionality (e.g., stored in the memory of the tag and implemented by a processor of the tag). The tag may therefore become a node to support communications of other tags.
  • According to some example embodiments, configurable monitoring devices that are installed and configured with the intention that the devices be primarily utilized as nodes may be powered through a building's wired power system or be mains powered (in contrast to being only battery powered). Since nodes may be involved in the frequent transmission of communications, power utilization of a node may be relatively high. As such, since configurable monitoring devices configured to operate primarily as tags would likely be battery powered for mobility purposes, an example embodiment that implements node functionality within a tag may be a temporary solution to maintain network continuity while the failed node is repaired.
  • Additionally, the monitoring system 60 may be configured to compensate for interference and multi-path conditions that can arise in enclosed environments, such as retail stores, individually or collectively (such as, e.g., retail mall). To do so, the monitoring system 60 may be configured, for example by the monitoring terminal 62, to modify the signal power of select nodes and tags to minimize interference. Other examples signal power instructions and adjustments are discussed below. According to some example embodiments, directional antennas may also be used by configurable monitoring devices to minimize interference.
  • According to various example embodiments, the monitoring system 60 may be configured to interface with any number of other types of networks and/or systems. For example, the monitoring system 60 may interface with EAS systems, RFID systems, closed circuit television systems, inventory systems, security systems, sales systems, shipping systems, point of sale terminals, advertising systems, marketing compliance systems, ordering systems, restocking systems, virtual deactivation systems, Lojack® systems, and the like.
  • While the monitoring system 60 may be configured to operate in a distributed fashion, the monitoring terminal 62 may be configured to coordinate operations of the monitoring system 60, as well as, retrieve, aggregate, and analyze data provided by the configurable monitoring devices of the system.
  • Based on the foregoing, and in accordance with some example embodiments, the nodes may be configured to provide a wireless signal that may be received by tags that are within range. According to some example embodiments, the range of a node or the power level, used to generate the wireless signal provided by the node, may be set based on the size of the area that the node is responsible for. For example, if the node is associated with a small floor display, the signal power may be relatively low. On the other hand, if a node is responsible for a large shelf unit, the signal power may be set to a higher level to ensure coverage of the entire shelf unit.
  • Tags may be configured to receive a signal that is provided by a node and respond to the node indicating that the tag is now associated with the node, for example, because the tag is located on the floor display associated with the node. A tag may be configured to periodically or pseudo-randomly power up (e.g., based on a wake-up timer or other trigger event), listen for a node signal (e.g., a ping node can be configured to broadcast a ping signal), perform a time synchronization based on the node's signal, and transmit a message to a network entity indicating which node the tag has received a signal from (based on, e.g., determining a node identifier embedded in the node's signal). Subsequently, a tag may perform a second clock synchronization with the node or other network entity and then power down into a sleep mode for another period of time or until another triggering event.
  • From the signal sent by the node, the tag may receive and determine a unique identifier and/or other data associated with the node. The tag may store the identifier and/or other data in its local storage device(s). As such, the tag would know to which node the tag has been associated.
  • The tag and the node can establish and execute a uni-directional communication protocol. The uni-direction communication protocol can allow, for example, the ping node to wirelessly broadcast data (as, e.g., a ping signal), which the tag can receive. As mentioned above, the data can include, e.g., the ping node's identifier and/or other data. While the tag may or may not broadcast a response to the ping node, the ping node can be configured to only send data to the tag (e.g., lack the components or functionality necessary to receive or respond to data from the tag). In some embodiments, the ping node can receive data from a network entity (via, e.g., BlueTooth or WiFi), even though the ping node lacks the ability to receive data from a tag or other monitoring device (via, e.g., another wireless protocol). In some embodiments, the tag may be configured to respond to (e.g., confirm receipt for) all ping node signals it receives, even if the node may not act on the tag's response. In other embodiments, the uni-directional communication protocol lacks the tag transmitting data intended for the ping node.
  • The tag can also establish and execute a bi-directional communication protocol with the ping node and/or any other the network entity. The bi-directional communication protocol can allow for two way communications, including sending and receiving of signals between each device participating in the communication protocol. As such, the node may receive communication signals from the tag including a unique identifier of the tag, and the node may therefore know to which tag(s) the node is associated. The node may also be configured to report the node/tag associations back to a monitoring terminal, monitoring system coordinator, and/or other network entity. Via these and other types of defined tag/node relationships, various functionalities, as mentioned above and otherwise herein, may be implemented.
  • Additionally, as further described herein, a tag may include a jiggle switch and/or other motion detection component, the actuation of which may indicate that a tag is being moved. Upon detecting actuation of the jiggle switch, the tag may determine a trigger event has occurred and, in response, may move from a sleep state into an awake state. Upon entering the awake state, the tag may perform one or more clock synchronizations with a node and determine the identifier of the node to which the tag is currently connected. In some embodiments, the tag may also transmit a message indicating the identifier of the node to which the tag is currently connected (possibly a new node since movement may have occurred). In the event that a tag does not detect a node, the tag may generate location information, representing the fact that the tag is out of range of any node, and access its functionality profile (which may be saved on the tag and/or on a network entity). In some embodiments, the functionality profile can include an alarm instruction, which causes the tag to alarm, should the tag determine it is out of range of any node. A tag that has detected a node may engage a movement wait timer to facilitate determining whether further movement of the tag is occurring. In the event that further movement is detected during the movement wait time, the tag may attempt to detect a node and again perform a time synchronization. If the movement wait time expires, the tag may determine a time until a next wake up into the awake state and an associated wake-up timer may be reset. Upon beginning the wake-up timer the tag may transfer into a sleep state. FIG. 1 d illustrates a flow chart of the operation of an example tag consistent with that described above.
  • FIG. 2 illustrates basic block diagram of a monitoring terminal 62 according to an exemplary embodiment. As shown in FIG. 2, the monitoring terminal 62 may include various components that support both the basic operation of the monitoring terminal 62 and the relatively more sophisticated operation of the monitoring terminal 62 as a coordinator of a monitoring system. Some examples of these components are shown in FIG. 2. However, it should be appreciated that some example embodiments may include either more or less than the example components illustrated in FIG. 2. Thus, the example embodiment of FIG. 2 is provided by way of example and not by way of limitation.
  • Reference will now be made to FIG. 2 to describe an example structure and functional operation of the monitoring terminal 62 according to an exemplary embodiment. In this regard, as shown in FIG. 2, the monitoring terminal 62 may include a processor 250 and a communication interface 252. In some example embodiments, the monitoring terminal 62 may include a user interface 258. The processor 250 may in turn communicate with, control or embody (e.g., via operation in accordance with corresponding instructions) a monitoring system manager 256.
  • In an exemplary embodiment, the processor 250 may be configured to, for example, execute stored instructions (in a, e.g., functionality profile) and/or operate in accordance with programmed instructions to control the operation of the monitoring terminal 62. The processor 250 may be embodied in a number of different ways. For example, the processor 250 may be embodied as one or more of various processing means or devices such as a coprocessor, a microprocessor, a controller, a digital signal processor (DSP), a processing element with or without an accompanying DSP, or various other processing devices including integrated circuits such as, for example, an ASIC (application specific integrated circuit), an FPGA (field programmable gate array), a microcontroller unit (MCU), a hardware accelerator, a special-purpose computer chip, or the like. In an exemplary embodiment, the processor 250 may be configured to execute instructions stored in a memory device (e.g., memory device 254 of FIG. 2) or otherwise accessible to the processor 250. The instructions may be permanent (e.g., firmware) or modifiable (e.g., software) instructions and be organized in any manner (such as one or more functionality profiles). Alternatively or additionally, the processor 250 may be configured to execute hard coded functionality. As such, whether configured by hardware or software methods, or by a combination thereof, the processor 250 may represent an entity (e.g., physically embodied in circuitry) capable of performing operations according to embodiments of the present invention while configured accordingly. Thus, for example, when the processor 250 is embodied as an ASIC, FPGA or the like, the processor 250 may be specifically configured hardware for conducting the operations described herein. Alternatively, as another example, when the processor 250 is embodied as an executor of software or firmware instructions, the instructions may specifically configure the processor 250 to perform the algorithms and/or operations described herein when the instructions are executed. The processor 250 may include, among other things, a clock, an arithmetic logic unit (ALU) and logic gates configured to support operation of the processor 250.
  • The memory device 254 may include, for example, one or more volatile and/or non-volatile memories. In other words, for example, the memory device 254 may be an electronic storage device (e.g., a computer-readable storage medium) comprising gates (e.g., logic gates) configured to store data (e.g., bits) that may be retrievable by a machine (e.g., a computing device including a processor such as processor 250). The memory device 254 may be configured to store information, data, applications, instructions or the like for enabling the monitoring terminal 62 to carry out various functions in accordance with exemplary embodiments of the present invention. For example, the memory device 254 could be configured to buffer input data for processing by the processor 250. Additionally or alternatively, the memory device 254 could be configured to store instructions for execution by the processor 250.
  • The user interface 258 may be in communication with the processor 250 to receive user input via the user interface 258 and/or to present output to a user as, for example, audible, visual, mechanical or other output indications. The user interface 258 may include, for example, a keyboard, a mouse, a joystick, a display (e.g., a touch screen display), a microphone, a speaker, or other input/output mechanisms. Further, the processor 250 may comprise, or be in communication with, user interface circuitry configured to control at least some functions of one or more elements of the user interface. The processor 250 and/or user interface circuitry may be configured to control one or more functions of one or more elements of the user interface through computer program instructions (e.g., software and/or firmware) stored on a memory accessible to the processor 250 (e.g., volatile memory, non-volatile memory, and/or the like). In some example embodiments, the user interface circuitry is configured to facilitate user control of at least some functions of the monitoring terminal 62 through the use of a display configured to respond to user inputs. The processor 250 may also comprise, or be in communication with, display circuitry configured to display at least a portion of a user interface, the display and the display circuitry configured to facilitate user control of at least some functions of the monitoring terminal 258.
  • The communication interface 252 may be any means such as a device or circuitry embodied in either hardware, software, or a combination of hardware and software that is configured to receive and/or transmit data from/to a network and/or any other device or module in communication with the monitoring terminal 62. According to some example embodiments where the monitoring terminal 62 is directly connected to the monitoring system, the communications interface 252 may include an appropriately configured configurable monitoring device. Further, the communication interface 252 may include, for example, an antenna (or multiple antennas) and supporting hardware and/or software for enabling communications with a wireless communication network 30 or other devices (e.g., other configurable monitoring devices). In some environments, the communication interface 252 may alternatively or additionally support wired communication. As such, for example, the communication interface 252 may include a communication modem and/or other hardware/software for supporting communication via cable, digital subscriber line (DSL), universal serial bus (USB) or other mechanisms.
  • In an exemplary embodiment, the communication interface 252 may support communication via one or more different communication protocols or methods. In some embodiments, the communication interface 252 may be configured to support relatively low power, low data rate communication. As such, for example, a low power and short range communication radio (e.g., radio transmitter/receiver) may be included in the communication interface 252. In some examples, the radio transmitter/receiver may include a transmitter and corresponding receiver configured to support radio frequency (RF) communication in accordance with an IEEE (Institute of Electrical and Electronics Engineers) communication standard such as IEEE 802.15. As such, for example, some embodiments may employ Bluetooth, Wibree, ultra-wideband (UWB), WirelessHART, MiWi or other communication standards employing relatively short range wireless communication in a network such as a wireless personal area network (WPAN). In some cases, IEEE 802.15.4 based communication techniques such as ZigBee or other low power, short range communication protocols such as a proprietary technique based on IEEE 802.15.4 may be employed.
  • In an exemplary embodiment, the communication interface 252 may additionally or alternatively be configured to support communication via radio frequency identification (RFID) or other short range communication techniques. Accordingly, the monitoring terminal 62 may be configured to interface configurable monitoring devices, in addition to conventional RFID tags and modules. In another embodiment, the monitoring terminal 62 may be configured to interface a barcode scanner, or other data entry devices.
  • As mentioned above, monitoring terminal 62 may be directly connected to the monitoring system via a configurable monitoring device configured as a gateway, or the monitoring terminal 62 may be connected to the monitoring system 60 via a gateway and an external network 30. The network 30 to which the communication interface 252 may connect may be a local network (e.g., a WPAN) that may in some cases further connect to or otherwise communicate with a remote network on either a periodic or continuous basis. The network 30 may include a collection of various different nodes, devices or functions that may be in communication with each other via corresponding wired and/or wireless interfaces.
  • As indicated above, the processor 250 of the monitoring terminal 62 may be embodied as, include or otherwise control the monitoring system manager 256. The monitoring system manager 256 may be any means such as a device or circuitry operating in accordance with firmware/software or otherwise embodied in hardware or a combination of hardware and firmware/software (e.g., processor 250 operating under software control, the processor 250 embodied as an ASIC or FPGA specifically configured to perform the operations described herein, or a combination thereof) thereby configuring the device or circuitry to perform the corresponding functions of the monitoring system manager 256, as described herein. Thus, in examples in which software is employed, a device or circuitry (e.g., the processor 250 in one example) executing the software forms the structure associated with such means.
  • The monitoring system manager 256 of the monitoring terminal may be configured to coordinate, manage, and configure the operation of configurable monitoring devices. In this regard, the monitoring system manager 256 may be configured to perform a number of activities with regard to a monitoring system as further described below and otherwise herein. While the monitoring system manager 256 may be configured to perform all of the functionality described with respect to the monitoring system manager 256 herein, it is also contemplated that the monitoring system manager 256 could be configured to perform any sub-set of the described functionality.
  • According to some example embodiments, the monitoring system manager 256 may be configured to define, assign, and manage the role configuration of the configurable monitoring devices. To do so, the monitoring system manager 256 may generate configuration information that indicates the role or mode of operation for a target configurable monitoring device and transmits the configuration information to the configurable monitoring device for storage on the device. Configurable monitoring devices may each be assigned a unique identifier that may be used for communication message addressing. As such, configuration information may be generated by the monitoring system manager 256 and addressed to a target configurable monitoring device to configure the configurable monitoring device for a particular role.
  • The configuration information may include role policy information that indicates the functionality that the configurable monitoring device should perform within the device's assigned role, and attribute information, such as associated product attributes. Attribute information may be data that a configurable monitoring device may utilize within the role to perform functionality. For example, if a product that the configurable monitoring device is attached to is clothing, the attribute information may include a clothing classification (e.g., shirt, pants, tie, dress, etc.), a color or colors indicator, a size indicator, a price indicator, a lot indicator, and/or the like. Based on the attribute information, the functionality performed by a configurable monitoring device may be determined. For example, configurable monitoring devices configured with the same role policy information, may trigger different types of alarm responses based on the price of the product. According to some example embodiments, attribute information may be stored in a central location, rather than at the configurable monitoring device, and the configurable monitoring devices may access this information remotely via the network of the monitoring system as needed.
  • According to some example embodiments, the configuration information may include executable code that is, possibly decompressed, and stored on the configurable monitoring device for subsequent execution by the configurable monitoring device. However, in some example embodiments, a configurable monitoring device may be manufactured with executable code in the form of configuration information stored within the memory of the device. Alternatively, a hardware device, such as a memory device or preconfigured processing device with pre-stored configuration information may be inserted into and/or electrically connected to the configurable monitoring device to provide configuration information and assign a role to the configurable monitoring device. The pre-stored configuration information may be directed to a number of possible roles that the configurable monitoring device could be configured to perform. In this regard, to configure the configurable monitoring device, the monitoring system manager 256 may provide a message including a data indicator of which role the configurable monitoring device is to perform. The configurable monitoring device may receive the indicator and begin performing (e.g., transition into) the role described by the indicator by executing the appropriate portion of the pre-stored configuration information.
  • Once a configurable monitoring device is assigned a role via the configuration information, the device may begin operating within its respective role. Roles or configurations may be simple or complex based on, for example, the processing capabilities and the memory storage available to a configurable monitoring device. In this regard, a configurable monitoring device may be configured to perform minimal data processing, and a monitoring terminal may be configured to perform incrementally more processing of data. Alternatively, some configurable monitoring devices may include relatively higher processing power and larger memory storage to support increased data processing at the configurable monitoring device, rather than at the monitoring terminal.
  • For example, in embodiments where a configurable monitoring device includes minimal storage memory, attribute information describing the article to which a configurable monitoring device is attached may be stored at the monitoring terminal. When a inquiry device (e.g., price scanner, inventory scanner) requests the attribute information from the tag, the tag may communicate the request to the monitoring terminal, and the monitoring terminal may provide the attribute information to the inquiry device, either though the monitoring device or through a connection external to the monitoring device.
  • Alternatively, in embodiments where the configurable monitoring device includes a relatively large storage memory, attribute information describing the article to which a configurable monitoring device is affixed may be stored, e.g., local to the tag, within the storage memory of the tag. When an inquiry device (e.g., price scanner, inventory scanner) requests the attribute information from the tag, the tag may directly communicate, or initiate the communication of, the attribute information from the tag to the inquiry device.
  • The following describes some of the roles that may be implemented by the configurable monitoring devices and the interactions that may involve the monitoring terminal 62 and the monitoring system manager 256 while the configurable monitoring devices are operating within their roles. As described above, and generally herein, a configurable monitoring device may include a processor and a memory. The processor may be configured to support network communications. According to various example embodiments, the processor may be configured, for example, via instructions stored on the memory (e.g., instructions derived from configuration information), to support communications in accordance with a role defined by configuration information. Further, the processor of the configurable monitoring device may include input/output (I/O) ports (or pins). Via configuration information, the I/O ports may be configured to interface with any number of external devices such as, electronic security devices, merchandising displays, tags on equipment, employee identification cards, alarms, speakers, microphones, lights (e.g., light emitting diodes (LEDs)), buttons, keypads, monitors, displays (e.g., for changeable pricing labels), sensors (e.g., accelerometers, movement sensors, light sensors, temperature sensors), cameras, security gates, store audio systems, customer counters, lighting switches, employee communicators (e.g., headsets, handheld radios), door strike mats, jewelry case mats, Lojack® devices, global positioning system (GPS) devices, and the like. As such, the I/O ports may be configured to support one or more roles that the configurable monitoring device may be configured to perform.
  • Via the I/O ports of the processor, various functionalities may be triggered, based on the role and the configuration information of the configurable monitoring device. Following from the discussion above, triggering may be initiated either at the configurable monitoring device level or at the monitoring terminal level. For example, the I/O ports of a configurable monitoring device's processor may interface with a display for a price tag, when the configurable monitoring device is configured as a tag. Within the tag's configured role, for example, the price depicted on the display may be set to reduce at a given time. In some example embodiments, the time may monitored by the processor of the tag and when the given time is reached, the processor may direct the I/O ports and the connected display to depict a reduced price. Alternatively, an example that includes triggering at the monitoring terminal level may include the time being monitored by the monitoring terminal, and the monitoring terminal may communicate a message including a reduced price, or an indication to reduce the price, to the tag at the given time to trigger the tag to reduce the price accordingly. Further, the I/O ports may interface with a camera, and the configurable monitoring device may be configured to control the movement of the camera, detect events, and capture still camera pictures for forwarding to store personnel or the authorities, and the like.
  • While the roles described herein may be considered from the perspective of an implementation in a retail sales environment, the scope of the invention should not be limited to such implementations. For ease of understanding, FIG. 3, which illustrates an example of a given space, namely retail environment 100, is referred to in order to describe some of the roles that may be implemented by the configurable monitoring devices within an exemplary monitoring system.
  • FIG. 3 illustrates a diagram of various configurable monitoring devices configured to define a monitoring system. In this regard, FIG. 3 depicts an exemplary retail environment 100 including a stock room 110 where excess inventory is maintained, an office space 120 from which monitoring activity may be coordinated or otherwise viewed (e.g., via a monitoring terminal 62), fitting rooms 130 in which articles of clothing may be tried on by potential buyers, a retail floor 140 on which various products may be displayed or otherwise made available for buyers to purchase and restrooms 150. FIG. 3 also depicts a point of sale (POS) terminal 160 at which payment may be made for products and a door 170 through which customers may enter and exit the retail floor 140.
  • Within a retail environment application, various different products may each be provided with a corresponding configurable monitoring device operating as a tag. Furthermore, several other configurable monitoring devices may be provided at various locations throughout the retail environment to operate, for example, as nodes. In this regard, the location of a node within the retail environment may be known (e.g., coordinates of the nodes may be known) to, for example, the monitoring terminal 62 and the monitoring system manager 256 to facilitate implementation of a real-time location system (RTLS) for the tags via the nodes. Several configurable monitoring devices operating in a tag mode are illustrated in FIG. 3 as circles with the letter “T” therein. Some other configurable monitoring devices may be configured during commissioning to operate in a node mode. Examples of configurable monitoring devices operating in node mode are shown in FIG. 3 as circles with the letter “N” therein. An example of a configurable monitoring device operating in a gateway mode is shown in FIG. 3 as a circle with the letter “G” therein. The circles with the letter “C” may be configurable monitoring devices configured to operate with customer counting devices (e.g., strike pads, and the like). The circles with the letter “D” may be configurable monitoring devices configured to operate with door opening monitoring devices configured to determine and report a number of times customers open, for example a freezer door in grocery frozen food section. The circle with the letter “P” may be configurable monitoring devices configured to operate with a camera to capture digital photographs when an event, such as the alarming of a tag has occurred. The configurable monitoring device interfacing with the camera may be configured to control the movement of the camera and forward video or pictures. Still others (or a single configurable monitoring device) may be configured to operate as gates or in a hub or gateway mode. While configurable monitoring devices may be configured as tags, nodes, gateways, etc., each of these roles may be further refined, for example via configuration information, to specialize the functionality of a configurable monitoring device within a particular role (such as, e.g., a ping node within the broader node role).
  • Various techniques may be utilized to associate and dissociate a configurable monitoring device. For example, a specific network identifier (e.g., PAN ID) may be provided to the configurable monitoring device at manufacturing. Further, low transmission power association and dissociation may be implemented using close proximity signaling. Further, hardware, switches (e.g., DIP (dual in-line package) switches), jumpers, MAC address filtering, button actuated association/dissociation, separate communications link associating/dissociating, or a barcode scanners may be used for associated or dissociated.
  • A configurable monitoring device configured to operate as a tag may perform functionalities supporting security functions, inventory functions, marketing functions, combinations thereof, and the like. In this regard, subsequent to configuring a configurable monitoring device as a tag, a commissioning or binding procedure may be performed. Prior to commissioning, a configurable monitoring device may be configured as a tag, but the device may not yet be associated with, or attached to, a product. Upon associating the tag with a product, the tag may be commissioned. The monitoring terminal 62 and the monitoring system manager 256 may manage the commissioning and decommissioning of tags via wireless communications with the tags. For example, the procedure for commissioning and decommissioning a tag may include RFID scanning the tag, a barcode scanning the tag, and/or hardware (e.g., specialized microchip) attachment or connection.
  • To commission a tag, the monitoring system manager 256 may provide a signal to the tag indicating that the tag is now active with respect to its configured role. In this regard, alarming, inventory, and marketing functionality may be downloaded and/or activated. For example, a functionality profile, including various electronic instructions, may be downloaded and/or activated. While commissioned, the tag may continue to receive instructions or other information useful for making determinations as to the functionality to be employed and the corresponding role/mode of operation to assume.
  • Decommissioning of the tag may include powering down the tag, clearing or resetting data (e.g., product-specific and/or functional data), and/or directing the tag to enter an idle or non-transmitting mode in order to conserve battery power until the tag is re-commissioned. The tag may be decommissioned by instructions and/or signals received from the monitoring terminal 62 and the monitoring system manager 256.
  • Decommissioning may occur at a point of sale, such as POS 160. A node associated with the point of sale (POS node) may be configured, via configuration information, to perform decommissioning functionality. In this regard, the POS node may be configured to decommission the tag when the product is entered into a sales transaction. The monitoring system manager 256 may be configured to interface with a sales database or sale system to monitor transactions. Upon detecting a transaction, data about the product involved in the transaction may be acquired, and, based on the acquired data, a decommission signal may be transmitted to the affected tag. According to some example embodiments, direct access to a sales database or sales system may not be available due to concerns regarding the confidentiality of sales and customer information. In these situations, example embodiments of the present invention may implement a barcode scanning wedge as an interface to the transaction activities without accessing the sales database or sales system.
  • According to some example embodiments, a battery check may be performed by a tag during decommissioning. In this regard, the configurable monitoring device may include the hardware and software (e.g., processor configured by instructions) to provide for monitoring the battery charge level. If the battery charge level for a tag has fallen below a given threshold, the tag may alarm or otherwise indicate to the store personnel that the tag should be removed from service for recharging or battery replacement. Tags that have battery levels above the given threshold may be decommissioned and identified as being available for re-commissioning. According to some example embodiments, a tag having a battery level that has fallen below a given threshold may be prevented from being re-commissioned until the battery charge level is sufficiently improved. This would also desirably limit the need for a store clerk to retrieve low battery tags from the field or store environment.
  • The barcode scanning wedge may be installed in-line between a barcode scanner and a point of sale checkout terminal for receiving data acquired by the barcode scanner. The wedge may be configured to intercept some or all data acquired by the barcode scanner and to provide the data to a monitoring system, for example, via a POS node, without otherwise interrupting the flow of data to the point of sale terminal.
  • The wedge may be configured to facilitate the commissioning or decommissioning of a communications tag that is part of a monitoring system. For example, when a cashier scans a barcode of a product during a purchase transaction, data confirming the transaction may be uploaded to the monitoring system and the monitoring system manager 256 via the wedge. Confidential consumer and sales information may not be uploaded to the retail security network in some embodiments. In response to receiving a sales confirmation, the monitoring system manager 256 may be configured to transmit a decommission signal to an associated tag attached to the purchased product to cause the tag to be decommissioned. Decommissioning may be associated with removal of the tag from the product and/or removal or modification of a record or information (e.g., inventory information) for the tag stored by the monitoring system manager 256, for example, in the memory device 254.
  • A configurable monitoring device may also be configured as a manager's key to be implemented within the monitoring system. FIG. 4 a depicts an example block diagram of a key, such as manager's key. The key of FIG. 4 a is depicted as using the Zigbee protocol, but any protocol may be used. In some applications, a mounting device that mechanically attaches the configurable monitoring device to a product may be unlockable by the implementation of a key. According to some exemplary embodiments, a tag having a mounting device may take the form of a pin tag (for protecting a clothing), a keeper or plastic enclosure (for protecting compact disks, software, cologne, and the like), a Spider Wrap™ or wire wrap device (for protecting larger boxed products), or the like. One such mounting device may be configured to attach to the shaft of a golf club or similar article such as the device disclosed in U.S. Pat. No. 7,266,979 herein incorporated by reference in its entirety. Other such mounting devices may be configured to attach to a bottle neck or a bottle cap such as the devices disclosed in U.S. Pat. Nos. 7,259,674 and 7,007,523, both herein incorporated by reference in their entirety. Still other mounting devices may be configured to attach through a product such as an article of clothing or a blister pack such as the hard-tag disclosed in U.S. Pat. No. 6,920,769 incorporated herein by reference in its entirety. Each of the aforementioned patents being commonly owned by the assignee of the present application.
  • As mentioned above, Alpha Security Products' Spider Wrap™, which is disclosed in U.S. Pat. No. 7,162,899 and herein incorporated by reference in its entirety, may also be configured to operate as a mounting device. Further, a cable lock, such as the Alpha Security Products' Cablelok™ device disclosed in U.S. Pat. No. 7,249,401 or a keeper, such as that disclosed in U.S. Pat. No. 6,832,498 may be a mounting device. Each of the aforementioned patents being commonly owned by the assignee of the present application and herein incorporated by reference in their entirety.
  • The key may be embodied in many different ways. In this regard, in some situations, the key may be a specially formed device that mates mechanically with some portion of the mounting device in order to disable a locking mechanism of the mounting device. As an alternative, the key may be a magnetic device configured to interface with a locking mechanism of the mounting device to enable the mounting device to be unlocked to permit removal of the mounting device from the corresponding product to which the mounting device is affixed or otherwise attached. As yet another alternative, the key may actually include an electrical component for exchanging signals or information with the tag associated with the mounting device to enable unlocking of the mounting device. As such, for example, the key could be an embodiment of a configurable monitoring device that is provided with specific configuration information defining functionality for the configurable monitoring device to function as the key for unlocking the mounting devices of tags. In such implementations, the key (or the configuration information associated with the key) may include a software component or code that is unique to a particular individual (e.g., a specific manager or assistant manager).
  • The key may also report unlocking activities and/or other information regarding other devices encountered or activities undertaken to monitoring system manager 256, so that activity of the key (or persons possessing the key) may be monitored, logged, and/or tracked. The examples discussed below, in connection with locating a tag or network component, could be applied to the managers key as well. Additionally, authenticity of the code may be defined or verified so that, for example, if a particular manager's key is lost or a manager leaves, the corresponding code for the manager's key may be invalidated so that further unlocking operations with the manager's key may not be possible. With respect to the security of the key itself, the key may be configured to alarm and/or destroy necessary aspects of the key's functionality if the key is, for example, improperly removed from the retail environment. For example, the key may clear the memory of the key, rendering the key useless.
  • Utilization of the key for unlocking security devices may be limited by rules stored on the key or at a monitoring terminal. For example, rules for using the key may be defined with respect to the location of the key (e.g., inside/outside the store, inside/outside a department zone), the employee using the key (e.g., as indicated by a passcode or detection of a user's RFID tag), a time of day, a day of the week, a work schedule. Use of the key in violation of the rules may cause the key to alarm.
  • In addition to, or as an alternative to unlocking mounting devices, the key may be useful for setting an alarm or turning an alarm on or off. In this regard, to utilize the key, a button on the key may be actuated which indicates that the key is preparing to or is performing a locking or unlocking function. An indication that the button has been pressed may be commutated to the tag that is to be interacted with or the monitoring terminal. Further, in consideration of the locating functionality described below, the key may be located and tracked, and zones of use (e.g., the key cannot be used in the stock room 110) and other rules may be defined and enforced with respect to the key.
  • According to some example embodiments, a configurable monitoring device configured as a tag, whether commissioned or decommissioned, may provide a status signal (or heartbeat signal) to the monitoring system. The status signal may be a short transmission of a unique identifier associated with the tag. The status signal may also provide other types of indications, such as whether the battery is or is not yet drained and/or whether the tag is otherwise properly functioning. The status signal may also be used for real time locationing system (“RTLS”) purposes, some examples of which are further described below. The status signal may be received by the monitoring system manager 256. The monitoring system manager 256 and/or the tag may maintain a log of the most recent receipt of a status signal from a tag and/or node. Other types of logs, some of which are discussed below, can also be maintained for and/or by one or more of the configurable monitoring devices. If the tag fails to provide a status signal that is received by the monitoring manager and/or any other network entity within a threshold period of time, an alarm or error indication may be generated.
  • According to some example embodiments, nodes of the monitoring system may be configured to provide ping signals. The tags may be configured to receive a ping signal and communicate information in response to receipt of a ping signal. For example, battery status, alarm status, received signal strength, and the like may be provided in response to a ping signal.
  • As alluded to above, within the role of a tag various functionalities may be implemented, such as advanced security functionalities. For example, complex alarming conditions may be defined for a tag based on data received from sensors on the tag, location information, movement information, and the like. For example, tags may be configured to operate as or with EAS tags, such that when the tag passes through an EAS gate, the EAS gate may detect the tag (or a connected EAS tag), and possibly sound an alarm. According to some example embodiments, the monitoring terminal 62 may have received a communication regarding the alarm condition.
  • With regard to operation within EAS systems, configurable monitoring devices may be configured to operate as tags to be detected, or as gate nodes for detecting tags. In this regard, via configuration information provided to a configurable monitoring device, the configurable monitoring device may assume the role of a gate node, such as gate nodes 180 located at the doorway 170. The gate nodes may be configured to detect passing EAS tags, such as a conventional EAS tag or a configurable monitoring device configured to operate as an EAS tag, and sound an alarm (e.g., an alarm included on the tag, an alarm included with the gate node, a storewide alarm). A gate node may directly sound a local alarm, or the gate node may communicate with the monitoring system manager 256 to sound an alarm.
  • It is noteworthy that, due to the dynamic reconfiguration ability of configurable monitoring devices, any configurable monitoring device may be configured to operate as a gate node. As such, EAS gates may be implemented dynamically at many locations within a retail environment. For example, configurable monitoring devices that have been configured to operate as tags and are affixed to a product on a shelf within the retail environment may also be re-configured to operate as a gate node for the aisle where the products are located.
  • In addition to performing EAS functionality, a monitoring system may be configured to perform additional advanced security functionality. Some advanced security features, as well as a number of other inventory, marketing, and other features may rely upon implementation of an RTLS within a monitoring system. To implement RTLS solutions, configurable monitoring devices may be configured as locating nodes.
  • According to some example embodiments, the ping signals generated by the nodes may be used for locating a tag. In this regard, a tag may be configured to report to, for example, the monitoring terminal that the tag is currently within the range of a ping signal provided by a particular node. The nodes may be configured to randomly, based on an algorithm, modify the ping signal strength. When the signal strength is modified, some tags that were in range may no longer be in range, or some tags that were previously in range may now be within range of the ping signal. As tags come in and out of range, due to the changing signal strength, the signal strength at the time may be used to determine the distance that a tag is from a particular node. In some cases, if the distance is determined with respect to multiple nodes, a physical location of the tag can be determined.
  • According to some example embodiments, standard operating power settings (describing standard fluctuations in power discussed below) may be utilized in a standard locating mode. However, in an active locate mode, when the location of a specific article is desired, an active locate power setting may be utilized.
  • Additionally, or alternatively, a locating node may be configured to use multilateration, hyperbolic positioning, time difference of arrival (TDOA), trilateration, triangulation, received signal strength indication (RSSI), global positioning systems (GPS), any other locating mechanisms, or combination thereof to support identifying the location of a tag within a retail environment. According to some example embodiments, a locating node may operate in isolation to detect the presence, and possibly the strength of a signal to determine when a tag is nearby. Locating nodes may take signal measurements and forward the information to, for example, the monitoring system manager 256 to analyze the signal and determine a location. According to some example embodiments, locating nodes may be placed at strategic locations within the retail environment to support accurate locating of tags.
  • Due to interference that can occur in enclosed environments, such as retail stores, a signal power optimization procedure may be performed by the monitoring system, for example, directed by the monitoring terminal, to minimize interference and determine optimum signal strength for ping signals. In this regard, the signal strength of the various nodes may be modified to determine settings where minimal interference and node signal overlap occurs.
  • FIG. 5 a illustrates an example retail environment 500, where a monitoring system has been installed and implemented, such as the monitoring system described in U.S. Provisional Patent Application 61/244,320, filed Sep. 21, 2009, the content of which was incorporated by reference in its entirety above, and U.S. Provisional Patent Application No. 61/246,393, filed Sep. 28, 2009, the content of which was also incorporated by reference in its entirety above. The monitoring system may include tags, ping nodes, communication routing nodes, and a network coordinator and gateway node. The tags and nodes of the monitoring system may be configurable monitoring devices, such as those described in U.S. Provisional Patent Application 61/244,320 filed Sep. 21, 2009, the content of which is hereby incorporated by reference in its entirety, and U.S. Provisional Patent Application No. 61/246,388, filed Sep. 28, 2009, the content of which is also incorporated by reference in its entirety.
  • The monitoring system may also include a monitoring terminal (not depicted in FIG. 5 a) that provides a user interface to the monitoring system and provides control over the operations of the monitoring system. The monitoring terminal may be connected directly to the monitoring system as a peer, or the monitoring terminal may be connected to the monitoring system via another network, such as the Internet. In some example embodiments, the monitoring terminal may include a server that is configured to control the monitoring system on-site, where the monitoring system is installed. A user may interface with the monitoring system by establishing a connection between a remote device (e.g., a personal computer) and the server. The server may be configured to perform predefined operations, and log information received from the tags and nodes. The server may be connected to a gateway or coordinator node, and the server may communicate with tags and nodes via the gateway or coordinator node.
  • As depicted in FIG. 5 a, the retail environment 500 houses a number of ping nodes (e.g., ping nodes 510, 520, 530, 540, 550, 560, and 570) and tags (e.g., tags 590 and 591). The ping nodes may be configured to provide ping signals at regular (or irregular) intervals. The ping signals may include information regarding the ping node that has transmitted the signal. In this regard, a ping signal may provide a unique identifier of the ping node that is providing the signal. According to some example embodiments, the ping signal may also include timing or time code information. In some embodiments, the ping signal is considered location information. For example, when a tag's location can be determined based upon it's position relative to one or more stationary ping nodes, the corresponding ping signals, which have a unique identifier that identifies the broadcasting ping node, can be considered to include location information. The tag may log the location and other information it extracts from the ping signal and/or report (i.e., send, upload, etc.) some or all of the information to a network entity, such as monitoring system manager 256. After saving and/or reporting the information, the tag can engage its timer and enter a sleep mode (as discussed above), and enter a sleep mode to conserve power while waiting for another triggering event (such as detection of movement or the timer expiring).
  • In some embodiments, the ping nodes are also configured to receive signals and communications from other entities connected to the monitoring system such as tags, fixed nodes, or the monitoring terminal. In particular, the ping nodes may listen, possibly periodically, to the fixed nodes. As a result, communications with the ping nodes may occur directly between a tag and a ping node, or tags and ping nodes may communicate via the fixed nodes. In this regard, a fixed node may be a node that support network communications and may be stationary relative to a given space, which may or may not be moving. For example, the given space could be the cabin of an elevator, airplane or cruise ship. The location of the fixed nodes may be known, and as such, the fixed nodes may be used as reference locations for identifying the locations of the ping nodes or tags as described in further detail below.
  • FIG. 5 b depicts another representation of the retail environment 100 which includes fixed nodes 515, 525, and 535. As described above, the fixed nodes may be a node that support network communications and may be stationary. In some example embodiments, the fixed nodes may be mains powered. The fixed nodes may be configured to support communications between tags and the monitoring system, or nodes and the monitoring system. The fixed nodes may also be configured to support locationing within a monitoring system with respect to the ping nodes.
  • In this regard, the fixed nodes 515, 525, and 535 may be configured to listen for ping signals or other communications from the ping nodes and determine the position of the ping nodes. While ping node may be relatively stationary, according to some example embodiments, ping nodes may be positioned on movable shelving or displays. As such, when ping nodes are moved or when new ping nodes are introduced to the environment, the monitoring system may need to determine the location of the ping nodes. With the assistance of the fixed nodes, the locations of the ping nodes may be determined using various techniques including but not limited to received signal strength indication (RSSI) techniques, angle of arrival techniques, time of arrival and time difference of arrival techniques, and the like. Since the locations of the fixed nodes are known, the locations of the fixed nodes may be used as reference points for determining the locations of the fixed nodes.
  • A signaling and communications period 600 for a ping node, depicted in FIG. 6, may include a first portion 610 dedicated to transmitting repeated ping signals 620, and a second portion 630 dedicated to support network communications. A ping node may be configured to repeat the signaling and communications period 600 indefinitely, or until an instruction is received by the ping node that causes the ping node to change its operation.
  • Tags, such as tags 590 and 591, may be configured to determine and store the identifier of the closest ping node. The tags may also be configured to report the identity of the closest ping node to the monitoring terminal. According to some example embodiments, a tag may enter a “seek closest ping node” state (i.e., seek_closest state), where the tag is configured to identify the ping node that is closest to the tag. When a tag receives only one ping signal, the tag may determine that the ping node providing the only received ping signal is the closest ping node. However, when a tag receives sufficiently strong ping signals from more than one ping node, a locating procedure according to various example embodiments of the present invention may be triggered.
  • In accordance with various example embodiments, ping nodes may be placed within the given space, such as a retail environment, in a manner that provides sufficient ping signal coverage to the environment. In this regard, a ping signal may have an associated signal strength, and the strength of the signal may determine the range of the ping signal. The strength of a ping signal may fade as the distance between the ping node and the measurement point is increased. The range of a ping node may be defined by a distance from the ping node where the signal strength is at a range threshold. Signals below the range threshold may still be received by tags, but the tags may be configured to ignore signals having signal strengths below the range threshold. The range threshold may define a circle (or sphere) with the ping node at the center of the circle.
  • Since locating a tag may involve determining which ping node the tag should be associated with, according to some example embodiments, it may be beneficial to minimize the range overlap between ping nodes. In this regard, the ping nodes may be set to have as large of a range as possible, while also minimizing overlap. However, in some example embodiments, ping nodes may be associated with a given space comprising or consisting of at least a portion of a particular display shelving unit or rack. The ping node may be configured to define a range that merely encompasses the display, shelving unit, or rack, so as not to associate tags with the ping node that are not placed on the display, shelving node, or rack. As such, pings nodes may be configured to ensure coverage of some or all areas of the sales floor, or configured for a specific purpose to provide coverage of, for example, a particular display.
  • According to some example embodiments, a ping node signal strength optimization procedure may be undertaken by the monitoring system, possibly controlled by the monitoring terminal. In this regard, the signal strengths of the various ping nodes may be modified to determine optimal settings considering factors such as coverage, desired range for a particular ping, interference, range overlap, reflections, and the like. Based on criteria such as these, an optimal settings for the ping normal operating signal power levels may be determined.
  • FIG. 5 a shows the retail environment 500 with the placement of a number of ping nodes and their associated ranges. Ping node 510 has been set to provide a ping signal strength such that the range threshold is for ping node 510 is reached at a range 511. Ping node 520, having a range 521 may be a ping node that covers a larger area of the retail environment, such as a departmental area (e.g., the shoe department). Ping nodes 570 and 580, having respective ranges 571 and 581, may also provide coverage to respective departmental areas. Ping nodes 530, 540, 550, and 560, and smaller respective ranges 531, 541, 551, and 561, may provide coverage to small floor display, where it may be important to be able to determine precisely which floor display a particular tagged product is located on.
  • In some embodiments, it is noteworthy that, as depicted in FIG. 5 a, to provide coverage to all or substantially all of the retail environment, the coverage areas of the ping nodes may overlap. In these overlapping regions, a tag may receive a sufficiently strong ping signal from more than one ping node. As such, a locating procedure may be employed (when necessary) to determine which ping node is closer to the tag.
  • In addition to the issues that can arise as a result of overlapping ping node coverage, ping signal reflections may also create issues. In this regard, since many retail environments are enclosed areas, signal reflections within the environments may create situations where ping signals are received by nodes as reflected signals. As a result, a tag may not be located within an overlap area as defined by the range of the ping nodes, but the tag may still receive signals from multiple ping nodes due to reflections. Further, the receipt of reflected signals may occur dynamically, and not in a predicable pattern. For example, in a retail embodiment, the movement of customers, store personnel, and other objects can cause dynamically changing signal reflection issues. Non-uniform architecture of the shopping floor may also contribute to reflection issues. According to various example embodiments, some locating procedures provided herein overcome the issues that arise from ping range overlap, as well as, the issues that can arise from signal reflections.
  • With reference to FIG. 5 a, tag 590 is located within range of ping node 570. In an example scenario, tag 590 receives a ping signal from only the ping node 570. As such, when the tag 590 enters the seek_closest mode, the tag may detect and receive the ping signal associated with ping node 570 and associate the location of tag 590 with ping node 570. The tag 590 may be configured to store the identifier of ping node 570, as provided in the ping signal, and report the association of the tag 590 with the ping node 570 to the monitoring terminal via the monitoring system.
  • In another example scenario, tag 591 is located in an overlap region between ping node 510 and ping node 580. Tag 591 receives ping signals, having sufficient signal strength, from both ping node 510 and 580. Since tag 591 has received ping signals from more than one ping node, a locating procedure may be undertaken to determine which ping node is closer to the tag.
  • FIG. 7 illustrates the ping nodes 510 and 580, and the tag 591 in isolation from the rest of the retail environment 500 of FIG. 5 a, for illustration purposes. In accordance with various example embodiments, the tag 591, having transitioned into a seek_closest state may report to the monitoring terminal that the tag 591 is currently receiving ping signals from more than one ping node. The tag 591 may be configured to report the identities of the ping nodes to the monitoring terminal. In response, the monitoring terminal may generate a signal power modification instruction, and transmit the signal power modification instruction to the identified ping nodes 510 and 580. According to some example embodiments, rather than the monitoring terminal generating and transmitting the signal power modification instruction, the affected tag 591 may be configured to generate the signal power modification instruction and transmit the signal power modification instruction to the identified ping nodes 510 and 580.
  • In response to receiving the signal power modification instruction, the ping nodes 510 and 580 may be configured to reduce the power output, used to generate of their respective ping signals, to a minimum threshold level. The minimum threshold level need not be the absolute minimum value, but can be a relative value that is preprogrammed into at least two nodes configured to implement this type of locationing. For example, the minimum threshold level could be 20 mW, 10 W, and/or any other given value.
  • Referring now to FIG. 8, ping node 510 may reduce the power output, thereby reducing the ping signal to range 511 a. Similarly, ping node 580 may also reduce its power output to the same value as ping node 510, and its ping signal will have the same range as ping node 510, as shown by range 581 a. It is noteworthy that ping nodes 510 and 580 initially (i.e., before the nodes received the signal power modification instructions) transmitted ping signals at different signal strengths resulting in different starting ranges, possibly for coverage reasons. However, according to various example embodiments, the ping nodes, in response to receiving the signal power modification instruction, are configured to modify their respective signal strengths to an equal or substantially equal power level, or so their ranges are equal or substantially equal.
  • Upon reducing the signal strength based on a minimum threshold power level, the ping nodes may be configured to begin a process of incrementally increasing the signal strength of the ping signals. The ping nodes may be configured to perform periodic step increases in the signal strength, thereby causing a period step increase in signal range. For example, the power level can increase such that the corresponding signal range increase some distance (e.g., 2 inches, 2 feet, or any other acceptable distance) every set amount of time (e.g., 0.2 seconds, 2 seconds, 20 seconds, or any other acceptable amount of time). The ping nodes may include clocks that are synchronized with each other and/or the broader monitoring system, and the ping nodes may use the synchronized clocks to trigger the incremental changes to the signal strength at regular intervals. Having lost the ping signals from the ping nodes 510 and 580, due to the reduction of signal strength, the tag 591 may be configured to detect or listen for the first ping signal that is received after the signal power modification instruction is issued, or after the tag 591 reports the reception of multiple ping signals to the monitoring terminal.
  • Referring to FIG. 8, after a first interval, the ping nodes 510 and 580 may increase their respective ping signal strength by an equal or substantially equal amount. In this regard, the ping nodes 510 and 580 may be configured to increase the signal strength to achieve the ranges 511 b and 581 b, respectively. After a second interval, the ping nodes 510 and 580 may again increase their respective ping signal strength by an equal or substantially equal amount. The ping nodes 510 and 580 may be configured to increase the signal strength to achieve the ranges 511 c and 581 c, respectively.
  • At range 511 c, the tag 591 may receive the ping signal from ping node 510, but not from ping node 580. As a result, the tag 591 may be configured to determine that the tag 591 is closer to ping node 510. The tag may store the identifier of ping node 510, and report the tag's association to ping node 510 to the monitoring terminal and/or other network entity.
  • Upon determining that the tag 591 is closer to ping node 510, the process of incrementing the power may cease. For example, in some embodiments, the power incrementing may cease in response to an end power modification instruction issued by the tag 591, the monitoring terminal and/or other network entity, and received by the ping nodes 510 and 580. The ping nodes 510 and 580 may be configured to return to their respective original or normal operating ranges 511 and 581, respectively.
  • As an alternative to decreasing the signal strength to an equal level, followed by subsequent increases in signal strength, a similar example procedure may be undertaken where the signal strength is first increased to a maximum threshold level. Subsequent to increasing the ping signal strength to the maximum level, the signal strength of the involved ping nodes may be reduced periodically by incremental amounts until the node receives a signal from only one ping node. The last ping node that the tag receives a signal from may be identified as the closest ping node to the tag.
  • As another alternative, according to some example embodiments, rather than initially reducing the ping signal strength to a minimum threshold level or raising the ping signal strength to a maximum threshold level, the ping nodes involved in the locate procedure may reduce/raise the signal strength to the current lowest/highest signal strength of the ping nodes involved in the locate procedure. Based on whether the tag receives a signal from a single ping after modifying the signal strengths in this manner, the tag may be configured to determine whether the further procedure of incrementally increasing/decreasing the signal strength of the ping nodes is required. In this manner, according to various example embodiments, the procedure for locating the closest ping node may be expedited.
  • According to various example embodiments, in addition to determining which pings nodes that a tag is receiving ping signal from, a tag may be configured to measure the signal strength of the ping signals. In some example embodiments, information about signal strength and distances may be acquire from the data included in a communication in consideration of the modulation that was used to transmit the data, and analysis of the data may reveal information about signal strength and distance information. According to various example embodiments, the tag may consider the signal strength of ping signals that the tag is receiving when determining which ping node is closer. For example, signal strengths may fluctuate for a number of reasons (e.g., movement of customers or products within a retail environment). As such, the tag may be configured to determine the closest ping node by monitoring the signal strengths over a period of time to, for example, determine an absolute maximum signal strength or determine an average signal strength, and identify the closest ping node based on these values. Further, according to some example embodiments, received signal strength indication (RSSI) techniques may be used to assist in identifying a closest ping node.
  • Additionally, in some embodiments an averaging scheme may be utilized in an attempt to normalize or remove incorrect closest ping node determinations. In this regard, a tag may keep a running log and average of signal strength values detected from a particular ping node or a closest ping node. And if signals or communications are received that are determined to be outside of a threshold range from the running average, those deviations in signal strength may be disregarded as being a result of a reflection or other unexplained occurrence. If a given number of signals or communications (e.g., 10) are received that are outside the threshold, a change in the placement of ping nodes may have occurred, and the generation of a new running average may be triggered. Changes in this regard, may be the result of movement of the tag, movement of the ping nodes, or the introduction or removal of a ping node to or from the environment. For example, the log and running average can include the last 10, 100, 1000, or any other suitable number of signals or communication values. In some embodiments, the number of suitable signal or communication values can be time dependent (e.g., a running average can be made from each signal or communication received over the past hour, 10 hours, day, two days, week, or any other suitable period of time).
  • FIG. 9 illustrates an example method of the present invention that may be implemented by a tag or a monitoring terminal. The example method begins at 900, where an indication that a tag is receiving ping signals from multiple ping nodes may be received. A tag may receive this indication internal to, for example, the processor of the tag, or the monitoring terminal may receive this indication. At 910, the identification of each of the ping nodes that the tag is receiving ping signals from may be determined. Further, at 920, a signal power modification instruction may be generated. The signal power modification instruction may be addressed to the ping nodes identified at 910.
  • At 930, the signal power modification instruction may be transmitted to each of the identified ping nodes. The identified ping nodes may subsequently perform the operations of a power modification procedure at 940, for example, as indicated in FIG. 10. Upon determining the closest ping node, an indication of the identified ping node that is closest to the tag may be received at 950. The tag may then be associated with the closest node for location purposes.
  • FIG. 10 illustrates an example method of the present invention that may be implemented by a ping node. The example method begins at 1000, where a signal power modification instruction may be received. At 1010, the signal strength may be lowered to a minimum threshold level (or raised to a maximum threshold level). At 1020, the signal strength of the ping signal may be periodically increased (or decreased) by an incremental amount. Subsequent to performing one or more signal strength modifications, the ping node may return the signal strength to a normal operating level at 1030.
  • FIGS. 11 and 12 illustrate the modification of normal operating levels for ping nodes. It is noteworthy that the ping nodes in FIGS. 11 and 12 are stationary, but the normal operating levels of the ping nodes have changed. In this regard, a monitoring system, via a tag, fixed node, or other ping nodes. As described above, the monitoring system may perform an optimization procedure to determine the normal operating levels of the ping nodes. In this regard, the normal operating levels may be optimized based on identified signal reflection issues, area coverage, and the like. According to some example embodiments, the normal operating levels of the various ping nodes may be modified to achieve particular goals with respect to, for example, locating a particular tag or group of tags. By dynamically changing the normal operating levels of the ping nodes, different gradients of coverage density may be generated within a given space or portion thereof.
  • FIG. 11 depicts a number of ping nodes on the left side of the space that may be associated with aisles of a department store, which are positioned in a uniform manner with associated ping nodes on the shelving or the like. The right side of the environment may be representative of a non-uniform floor space where a number of displays are located close together. Tags located in the right side may be more likely to interact with multiple ping nodes configured as shown in FIG. 11.
  • In response to, for example a detected theft event, an inventory sweep, regular modification of normal operating levels, or the like, the normal operating levels of the ping nodes may be modified resulting in a different gradient of coverage density within the environment. For example, as shown in FIG. 12, the normal operating levels of the ping nodes can be modified from those depicted in FIG. 11. In this regard, the coverage is increased on the right side of the space, resulting in increased overlap in some ping node coverage. On the other hand, the left side of the environment, coverage has been decreased such that there is little or no interaction between the respective ping signals. As a result, the right portion of the space, which included substantial overlap in coverage in FIG. 11, now has little or no overlap in coverage.
  • To implement the modifications to the normal operating levels of the ping nodes, a triggering event may occur. A triggering event may be, as described above, a detected theft event, an inventory sweep, regular modification of normal operating levels, or the like. In response to the triggering event, the ping nodes may be communicated a normal operating level modification message. In response to receiving the message, the ping nodes may adjust the normal operating level accordingly.
  • FIGS. 9 and 10 illustrate flowcharts of example systems, methods, and/or computer program products according to example embodiments of the invention. It will be understood that each operation of the flowcharts, and/or combinations of operations in the flowcharts, can be implemented by various means. Means for implementing the operations of the flowcharts, combinations of the operations in the flowchart, or other functionality of example embodiments of the present invention described herein may include hardware, and/or a computer program product including a computer-readable storage medium (as opposed to a computer-readable transmission medium which describes a propagating signal) having one or more computer program code instructions, program instructions, or executable computer-readable program code instructions stored therein. In this regard, program code instructions may be stored on a memory device of an example apparatus (e.g., a tag, a monitoring terminal, a ping node, etc.) and executed by a processor of the apparatus. As will be appreciated, any such program code instructions may be loaded onto a computer or other programmable apparatus from a computer-readable storage medium to produce a particular machine, such that the particular machine becomes a means for implementing the functions specified in the flowcharts' operations. These program code instructions may also be stored in a computer-readable storage medium that can direct a computer, a processor, or other programmable apparatus to function in a particular manner to thereby generate a particular machine or particular article of manufacture. The instructions stored in the computer-readable storage medium may produce an article of manufacture, where the article of manufacture becomes a means for implementing the functions specified in the flowcharts' operation(s). The program code instructions may be retrieved from a computer-readable storage medium and loaded into a computer, processor, or other programmable apparatus to configure the computer, processor, or other programmable apparatus to execute operations to be performed on or by the computer, processor, or other programmable apparatus. Retrieval, loading, and execution of the program code instructions may be performed sequentially such that one instruction is retrieved, loaded, and executed at a time. In some example embodiments, retrieval, loading and/or execution may be performed in parallel such that multiple instructions are retrieved, loaded, and/or executed together or simultaneously. Execution of the program code instructions may produce a computer-implemented process such that the instructions executed by the computer, processor, or other programmable apparatus provide operations for implementing the functions specified in the flowcharts' operations.
  • Accordingly, the execution of instructions associated with the operations of the flowcharts by a processor, or storage of instructions associated with the blocks or operations of the flowcharts in a computer-readable storage medium, support combinations of operations for performing the specified functions. It will also be understood that one or more operations of the flowcharts, and combinations of blocks or operations in the flowcharts, may be implemented by special purpose hardware-based computer systems and/or processors which perform the specified functions (e.g., field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), or combinations of special purpose hardware and program code instructions.
  • To support real-time locating of tags (and the products to which the tag is affixed), tags may be configured to provide locating signals (e.g., status signals) that may be received, for example, by configurable monitoring devices configured as locating nodes. Indications of the locating signals may be provided to the monitoring system manager 256 for analysis to determine the location of the tags within the retail environment. Upon determining the location of a tag, the monitoring system manager 256 may be configured to output the location of the tag on a map displayed via the user interface 258 as shown for example in FIG. 13.
  • Returning to the discussion of FIG. 3, in addition to simply outputting the location of the tag to the user interface 258, the monitoring system manager 256 may be configured to consider the location information of a tag with respect to defined rules, alarm conditions, and alarm responses. In this regard, zones of interest within a retail environment may be defined, and when the monitoring system manager 256 determines that a tag has entered a zone of interest security functionality, such as an alarm response, may be implemented. For example, store personnel may wish to define an alarm condition when products enter the restroom area 150 of FIG. 3. As such, a zone of interest may be defined for the restroom area 150. Accordingly, when the monitoring system manager 256 determines that a tag has entered the restroom area, an alarm signal or message may be generated, and an alarm response may be implemented sounding an alarm. The alarm signal or message may be sent to the tag, and an alarm on the tag may be activated. Additionally or alternatively, a notification may be provided to store personnel, via for example, a mobile communications terminal and/or a remote alarm may be activated. Further, zones of interest may be defined with respect a variety of areas within the retail environment (e.g., the stock room, point of sale, fitting room, etc.). Additionally, zone-based functionality profiles can be used by the tags. Like the more generic functionality profiles discussed above, zone-based functionality profiles can be stored and accessed locally within the tag and/or at a network entity, such as monitoring system manager 256. The zone-based functionality profile can include instructions and other commands that are specific to a particular location zone of the given space.
  • For example, a location zone of interest may also be associated with additional parameters, such as a time interval or duration, which may be included in the tag's zone-based functionality profile for the location zone. A customer, for example, may be permitted to bring an article with a tag into the fitting room 130, but only for a threshold duration of time. Store personnel may, for example, wish to set a thirty minute duration for the fitting room. Accordingly, the monitoring system manager 256 may be configured to define a duration of time, such as thirty minutes, for a zone of interest. The monitoring system manager 256 may be configured to implement a timer based on the threshold duration. The timer may continue to run while the tag is located within the zone of interest and, when the time reaches the threshold, an event signal can be generated. The event signal, for example, may include an alarm instruction and be based on the zone-based functionality profile. The alarm instruction can be executed, causing an alarm signal or alarm message (e.g., an automatically generated e-mail to a user device, etc.) to be generated and transmitted by and/or to the monitoring system manager 256 and/or tag. In some embodiments, the event signal can include other types of instructions and/or other data may not include or initiate an alarm signal. For example, the event signal can comprise data that indicates the tag's, includes tag location information, causes the tag's or other device's light(s) to illuminate, cause another network device (such as a closed circuit video camera) to flag data as relevant, and/or any other type of data that can cause any other type of desired response. For example, the event signal can cause the monitoring system manager 256 to determine that the tag has moved out of the zone of interest (such as a fitting room) and, in response, the monitoring system manager 256 and/or the tag may be configured to reset the timer. In this manner, the monitoring system can implement a delay before alarming; thereby giving the customer time to try on an article of clothing before determining that a suspicious event may have occurred or be occurring.
  • Locating a tag may also allow for tracking the movement of a tag and the associated product through the store. Tracking the movement of the product may provide inventory, security, and marketing functionality. With respect to security functionality, it has been determined that many experienced shoplifters move about a store in a particular manner. Based on the location information determined for a tag, the movement of a product may be tracked by the monitoring system manager 256 and a movement profile may be generated and compared to suspicious activity movement profiles. If a match is identified, a notification may be provided to a manager, security guard, or the like via a mobile communications terminal to investigate the situation. Further, according to some example embodiments, the monitoring system manager 256 may have configured other tags, or may signal (e.g., send alarm instructions to) other tags on nearby devices to alarm when a match is identified to, for example, assist in locating the shoplifter. Adjacent tags could then provide an alarming pattern that “follows” a would-be shoplifter around or through the retail environment.
  • Additionally, the monitoring system manager 256 and/or other network entity may be configured to interface, via a network connection or the like, with customer information terminals 195 to support security functionality. Customer information terminals 195 may be computing devices including a display and audio output capabilities (e.g., speaker, speaker driver, etc.). A customer information terminal may be located at strategic security locations such as exits and entrances. The monitoring system manager 256 may be configured to interface with the customer information terminals 195, via for example a network connection, to provide output to customers and would-be shoplifters. For example, a customer information terminal and a movable video camera may be located at the exit of a retail environment. The moveable video camera may be controlled by the monitoring system manager 256. When the monitoring system manager 256 determines that a tag has moved into a zone of interest defined near the exit, the movable camera may move to capture the image of the individual carrying the tag (and the associated product). The video captured by the camera may be displayed on the customer information terminal to indicate to the shoplifter that they are being recorded and thereby have a deterrent effect. In addition, in some embodiments, the store's background music system may be quieted or muted and/or other noise overcoming strategies may be implemented, in response to the monitoring system 256 determining that a tag has moved into a zone of interest and/or entered an alarm state.
  • In a similar application involving customer information terminals, tags entering a store may be considered. For example, if the monitoring system manager 256 determines that a tag has entered the store through the front entrance, the monitoring system manager 256 may be configured to cause the customer information terminal to either visually and/or audibly direct the customer to the customer service desk for product returns.
  • In addition to configurable monitoring devices being configured as EAS gate nodes, configurable monitoring devices may also be configured to operate as gate nodes via the locating functionality described above or based on a determination that a tag is within range of a gate node's ping signal. In some example embodiments, a gate node may detect the proximity of a tag by receiving communications from the tag in response to a ping signal provided by the gate node. To avoid situations where a gate node detects the proximity of a tag that is properly within the retail environment, and is not located so close to the exit so as to indicate that the attached article is being stolen, guard nodes may be implemented. The guard nodes may be located near an exit and may be configured to prevent tags within the store from improperly associating themselves to the gate nodes and causing erroneous alarming.
  • A gate node may be connected to mains power, and may include a battery to support operation when mains power is lost. The gate node may transmit regular ping signals, which include the gate node's unique identifier, and listen for responses from tags that are within range. If a tag detects that the strongest ping signal that the tag is receiving is from a gate node, the tag may transmit a message including the tag's unique identifier to the gate node and the tag may enter a first alarm mode. In this regard, a tag may maintain a list of identifiers for gate nodes to determine when a signal is being detected from a gate node.
  • In the first alarm mode, the tag may be configured to emit an audible chirp every second (or other predetermined time period), providing a deterrent indication to an individual holding the article to which the tag is affixed. While in the first alarm mode, the tag may continue to listen for ping signals from other nodes, and if a ping signal from a non-gate node becomes the strongest ping signal detected by the tag, the tag may transfer from the first alarm mode to a normal mode (e.g., since the tag has apparently moved away from the gate node and the exit). However, if the strongest received ping signal continues to be the signal from the gate node, and the received signal strength passes a predefined gate node signal strength threshold, the tag may transfer into a second alarm mode. In the second alarm mode, the tag may be configured to alarm continuously. Again, the tag may continue to listen for ping signals from other nodes, and if a ping signal from a non-gate node becomes the strongest ping signal detected by the tag, the tag may transfer from the second alarm mode to the first alarm mode or a normal mode (e.g., since the tag has apparently moved away from the gate node and the exit).
  • As mentioned above, tag tracking may also provide marketing benefits. Movement of tags associated with particular products may logged by the monitoring system manager 256 over a period time, and the monitoring system manager 256 may be configured identify customer trends by aggregating the data. Using the trends, product layout within a store may be modified to increase sales. The customer trends may reveal purchasing patterns, customer traffic patterns, in-store dead-spots, and the like, which may not have otherwise been identified. Further, information regarding the effects of moving product display racks and associated products within the store may be determined based on the movement of customers and the sales of the associated products.
  • With respect to additional marketing functionality, since the location of a product can be determined, the monitoring system and the monitoring system manager 256 may be configured to make suggestions to customers for purchasing other products. For example, movement of a tag associated with a dress shirt may be detected, and the movement may be tracked to a sales area for neck ties. The monitoring system manager 256 may be configured to consult a database to suggest a neck tie that matches the shirt, based on attribute information associated with the tag affixed to and associated with the shirt. To implement the suggestion procedure, the monitoring system manager 256 may interface with a customer information terminal 195 located near the neck tie retail area.
  • Example marketing compliance applications and functionality may also be implemented by the monitoring system. In this regard, some retail stores may have requirements for how the store should be set (i.e., where particular products should be located within the store). A floor plan or set design may be followed for setting the store. To ensure that a store complies with a given set design, the location of tags may be queried. Tags associated with particular products may be checked against a stored, electronic set design to ensure that the products are located in the correct locations within the store. For example, the location of the winter sweaters within the store may be queried, to determine if the winter sweaters have been located on a table at the entrance of the store in accordance with a set design. The results of the query may be compared to the set design to determine whether the store complies in this regard.
  • Another example marketing application may be automatic price modification. In this regard, a tag may be configured to change the price of a product (or suggest the change of a price for the product) based on various factors. A tag may be configured to implement a timer and determine, for example, a “time on the sales floor” value. If the time on the sales floor value reaches a threshold level, the price for the article that the tag is associated with may be modified. To support this functionality, according to some example embodiments, when the tag is commissioned or is placed on the sales floor, a time and date threshold for the article may be defined. For example, a thirty day threshold may be set. When thirty days has passed, as determined by the tag or the monitoring terminal, the tag may be configured to, or the monitoring terminal may direct the tag to, modify or suggest modification of the price of the article. Additionally, or alternatively, the tag may alarm when the threshold is reached indicating to sales personnel that the tag should be moved to the clearance rack. The price may also be modified based on the sales of related products. For example, if sales of a particular product have been increasing, the price could be raised.
  • Another example marketing application may involve a tag being associated with, or assigned to, a specific customer (customer tag). In this regard, the customer tag may be permanently assigned to a customer (e.g., the customer leaves the retail store with the tag), or the tag may be temporarily assigned to a customer upon visiting the retail store (e.g., the customer returns the tag upon leaving the store). The tag and/or the monitoring system may be configured to store profile information about the customer in association with the tag. In this regard, the customer's profile information may be stored on the tag or at the monitoring terminal. In some example embodiments, the tag may be configured to wirelessly interface with a cell phone to retrieve profile information. The profile information may include the customer's name, age, gender, home address, phone numbers, credit card numbers, credit information, purchasing preferences, and the like.
  • The profile information may also include information indicative of a customer loyalty level. In this regard, based on the customer loyalty level, various loyalty program features may or may not be available to the customer. For example, tags associated with a customer having a particular customer loyalty level may be configured to allow a customer to use the self check out lane at a retail store, open a display case without the assistance of store personnel, open a security device that protects a product, purchase a product using pre-stored credit card information, de-commission security tags associated with a purchased product, and the like.
  • The customer tag may also be configured to provide for tracking and positioning the customer in the store. Further, the customer tag may be configured to receive, for example via the monitoring system, a product list (e.g., a grocery list), and the customer tag may assist the customer in locating the products on the list. The product list may be provided to the monitoring system via, for example, the monitoring system's internet connection. In this regards, the product list may have been created remotely from, e.g., the user's home computer running a web application, cellular phone, and/or any other remote device. For example, the monitoring system can provide real-time inventory data associated with a particular store and the remote device can enable the user to reserve one or more particular products for pick-up and/or purchase at the store.
  • According to various example embodiments, a tag, such as a tag configured for security functionality, marketing functionality, inventory functionality, or as a key (e.g., a manager's key) may be configured to provide for assisting an individual with locating another tag and the associated product. In this regard, a locator tag, in the possession of an individual attempting to locate a target tag, may be configured to provide a user with an indication of the where the target tag is located or how far the target tag is away from the locator tag. The locating tag and/or the target tag may be configured to provide audible and/or visual feedback to the user to indicate the location of the target tag. For example, the locating tag and/or the target tag may be configured to output audible beeps or clicks (similar to the sound of a Geiger counter), the frequency of which may increase as the locating tag moves closer to the target tag. The output may be based on locating that is performed via the ping nodes described above, or via signal strength detection directly between the locating tag and the target tag.
  • As mentioned above, tag location assistance functionality, such as the Geiger counter-type functionality described above may be implemented in a number of applications. In another example, a locator tag, such as a tag configured as a manager's key, may be used to locate tags that have reached a threshold battery charge level. A tag with a low battery level, where the tag includes battery monitoring circuitry (e.g., via a processor) may be configured to alarm to indicate the low battery condition. Additionally, a tag with low battery level may be configured to provide a wireless signal indicating the low battery condition. The wireless signal may be detected by the locator tag and the locator tag may be configured to provide an indication of the location of the low battery level to a user of the locator tag. According to some example embodiments, tags near a low battery level tag may be configured to relay the low battery level indication via a wireless signal to neighboring tags, and the neighboring tags may report the low battery power condition to provide for locating the low battery level tag, even after the low battery level tag can no longer communicate.
  • With respect to inventory applications, the monitoring system manager 256 may be configured to track inventory generally, as well as track the location of inventory via tags. The monitoring system manager 256 may be configured to track inventory by monitoring and logging status signals provided by the tags, in addition to commissioning and decommissioning activities.
  • The monitoring system manager 256 may also assist in locating particular inventory to, for example, assist in a sale. The monitoring system manager 256 may be configured to receive requests for a particular product (e.g., brown slacks, waist size 32, in-seam length 30) and communicate with tags that meet the criteria of the request to cause the tags to alarm. An alarm in this regard, may be a subtle, soft audio alarm that would assist a sales person and a customer in locating the desired product.
  • Another example inventory application may involve the monitoring system's interaction with totes. A tote may be a shipping container, such as a plastic shipping container, that can hold smaller, and often higher value, products, such as pharmaceuticals, makeup, batteries, film, jewelry, and the like. Totes may be loaded at a warehouse, or another store, and shipped to a destination store. A tote may include a mechanical locking mechanism that requires, for example, a magnetic key or mechanical interaction with a key, to open the tote and access the products inside the tote. In some example embodiments, a tote may also include a configurable monitoring device configured as a tote tag.
  • A tote tag may be used for locating the tote, similar to the manners described above. A tote tag may also be configured to detect the presence of tags, and associated products within the tote. In this manner, a tote tag may operate similar to a node, with respect to the tags stored within the tote. In some embodiments, the tote tag may maintain an inventory of the products within the tote by virtue of communication with each respective tagged product in the tote and the extraction and/or storage of product related information associated with each respective tag. As the tote moves from the warehouse to a destination store, the inventory information may be verified at both locations to ensure that the contents of the tote have not been tampered with or stolen.
  • The tote tag may also interface with a key, such as a manager's key. In this regard, the key may be enabled to deactivate security functionality of the tote tag, such as alarming. The tote tag may be configured to alarm if an attempt is made to open the tote without the key or with an unapproved key. The tote tag may also alarm if communication is lost with the tag of one or more of the tagged products within the tote. A key may be configured to interface with the tote tag, either directly or through the monitoring system, to deactivate, or activate, the tote tag's alarming functionality. The monitoring system, or the tote tag may be configured to manage access to the contents of the tote by, for example, maintaining a list identifying the particular keys or the types of keys (e.g., high level manager's key) that have been enabled to open the tote. In the event that an unapproved key is used, or is attempted to be used, for opening a tote, the tote tag may alarm.
  • Based on the forgoing, FIG. 14 illustrates an example method for managing configurable monitoring devices in accordance with various example embodiments of the present invention that may be implemented by the monitoring system manager 256. At 1400, configuration information for a configurable monitoring device may be generated that defines a role for the target configurable monitoring device. Specific parameters such as rules, alarming conditions, alarming responses, attribute information, and the like may be defined and included in the configuration information. At 1410, the configuration information may be provided to a target configurable monitoring device via, for example, a wireless network connection. The target configurable monitoring device may receive and store the configuration information and subsequently operate within the role defined by the configuration information. If the configuration information defines the role of a node or a gateway, role-based communications may be received from, and transmitted to, the node or gateway during the operation of the configurable monitoring device as a node or gateway.
  • If the configuration information defines the role of a tag, a commission signal may subsequently be provided to commission the tag at 1430. Subsequently, role-based communications may be received from, and transmitted to, the tag at 1440 during the operation of the configurable monitoring device as a tag. The tag may later be provided a decommission signal to decommission the tag 1450. Once decommissioned, the tag may await re-commissioning at 1430 by providing another commission signal.
  • FIGS. 13 and 15-17 illustrate example windows for displaying aspects of a user interface that may be implemented on a monitoring terminal. FIG. 13 illustrates an example window 1300 displaying a rendered representation of a monitoring system. The tag map 1310 illustrates an example sales floor for a retail environment. The tag map 1310 includes location-based representations of nodes (referred to as “hubs”) that are positioned at various locations throughout the sales floor. The nodes are uniquely identified by a label (e.g., “Hub 14”) followed by an associated tag count in parentheses, indicating the number of nearby tags (or tags within range of the signals (e.g., ping signals) being provided by the nodes. When the monitoring terminal determines, based on communications from the tags or the nodes, that a tag has moved, such that the tag is disassociated with a first node and newly associated with a second node, the tag count may be decremented at first node and incremented at the second node. The tag map 1310 also depicts POS nodes (e.g., “Pos2”, “Pos 3”, etc.). Near the entry area a gate node, “Gate1”, is depicted which is configured to protect the entry/exit area. The tag map 1310 also includes a gateway node, “Root0” configured to interface with an external network, to which the monitoring terminal may be connected.
  • The example window 1300 also includes a tag tree 1320. The tag tree 1320 includes a listing of the nodes that are members of the monitoring system. A node that has tags within range, such as Hub16, may be expanded to display entries for each tag that is currently within range of, or otherwise associated with the node. As tags move form node to node, the tag tree 1320 may be updated to show the current associations between the tags and the nodes. The tag tree 1320 also includes a status legend 1321 for describing the status of the tags or nodes. In this regard, the monitoring terminal may be configured to highlight, for example, an alarming tag red, an unresponsive tag purple, and a low battery tag yellow, or some other color/highlighting scheme may be employed.
  • The example window 1300 also includes an event log 1330. The information depicted in the event log may be linked to the currently selected item in the tag tree 1320. As such, event information for the selected tag may be displayed. A time stamp may be associated with each event. Example events may include tag movement between node events, alarm events, failed communications events, tamper events, low battery events, etc.
  • FIG. 15 illustrates an example tag information window 1500 for attribute information associated with a tag or node. The example tag information window 1500 depicts attribute information for a tag. An image 1510 of an article to which the associated tag is affixed may be provided in the example tag information window 1500. Further, additional attribute information may be provided in the tabular area 1520, such as the tag address, the current battery level, the currently associated hub, a description of the affixed article, a stock-keeping unit (SKU) value, the time/date of the last report from the tag, the time/date of the last transition between nodes for the tag, the time/date of the last commission of the tag, the time/date of the last decommission of the tag, and the like.
  • FIG. 16 illustrates an example hub information window 1600. The hub information window 1600 may include a tabular area 1610 that includes information about the hub (or node). Example hub attribute information may include the hub address, the hub label or description, the battery level for the hub, the current number of associated tags, the date/time that the hub last reported, for example, to the monitoring terminal, and the like.
  • FIG. 17 illustrates an example battery level window 1700 for a tag. The battery level window may include a graphical representation of the past and current battery level on a line graph. The graph may be provided with respect to voltage on the y-axis, and time on the x-axis. A threshold battery level 1730 may also be included on the graph, which may indicate the battery level that would place the tag in a low battery status.
  • Many of applications and functionality described herein utilize wireless communications between the monitoring terminal 62 and the configurable monitoring devices. In addition to, or in lieu of, communicating with individual tags via this air interface, the communications interface 252 of the monitoring terminal 62 may communicate with a separate bridge device to forward and receive information and data to and from configurable monitoring devices. The bridge device may operate unilaterally or in conjunction with the monitoring terminal 62 to manage configurable monitoring devices. The bridge device, which may be a hand-held scanner-type device, can be configured to operate in one of two communication modes to interface with tags affixed to retail products for security, inventory, and other purposes. In a first communication mode, the bridge device is configured to communicate with tags that are configured for RFID type communications. For example, the tags and the bridge device may be configured to communicate in accordance with the Generation II Ultra High Frequency (UHF) RFID standards. In a second communication mode, the bridge device is configured to communicate with tags using a protocol built on the IEEE 802.15.4 standard, such as ZigBee or a proprietary protocol built on IEEE 802.15.4. To support the dual modes of communication, the bridge device may include a transmitter/receiver and an antenna configured to support IEEE 802.15.4, as well as, a modulator/demodulator, and possibly a separate antenna, to support RFID communications. According to some example embodiments, the bridge device may include a configurable monitoring device configured to operate a bridge device. Via seamless transition between the two communications modes, a single, possibly hand-held, bridge device can operate as a tag reader, and may be used to communicate with disparate types of tags. Communications with the tags may be performed for a variety of reasons, such as for counting inventory, price checking, tag firmware upgrades, tag encoding, and the like.
  • The flexible nature of the configurable monitoring device and the monitoring system of embodiments of the present invention may enable dynamic configuration of configurable monitoring devices within a network to introduce robust capabilities for providing services and functionality and, for providing updates to existing capabilities with updated configuration information. Embodiments of the present invention may be implemented by various means, such as hardware, firmware, processor, circuitry and/or other device associated with execution of software including one or more computer program instructions. For example, one or more of the procedures or activities described above may be embodied by computer program instructions. In this regard, the computer program instructions which embody the procedures or activities described above may be stored by a memory device of an apparatus employing an embodiment of the present invention and executed by a processor in the apparatus. As will be appreciated, any such computer program instructions may be loaded onto a computer or other programmable apparatus (e.g., hardware) to produce a machine, such that the resulting computer or other programmable apparatus embody means for implementing the functions specified in the corresponding procedure or activity. These computer program instructions may also be stored in a computer-readable storage memory (as opposed to a computer-readable transmission medium such as a carrier wave or electromagnetic signal) that may direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture the execution of which implements the function specified in the corresponding procedure or activity. The computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the corresponding procedure or activity described above.
  • Also, the terms “substantially,” “about,” “approximately” or the like as used herein are intended to reflect variances in a value or relationship that may be due to various factors such as the effects of environmental conditions, common error tolerances, or the like. It should further be understood that although some values or other relationships may be expressed herein without a modifier, these values or other relationships may also be exact or may include a degree of variation due to various factors such as the effects of environmental conditions, common error tolerances, or the like.
  • Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the inventions are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of this disclosure. Moreover, although the foregoing descriptions and the associated drawings describe exemplary embodiments in the context of certain exemplary combinations of elements and/or functions, it should be appreciated that different combinations of elements and/or functions may be provided by alternative embodiments without departing from the scope of this disclosure. In this regard, for example, different combinations of elements and/or functions than those explicitly described above are also contemplated as may be set forth in some of this disclosure. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (27)

1-41. (canceled)
42. A system for tracking articles comprising:
a first ping node configured to:
transmit a first ping signal having a first ping signal strength;
receive a first signal power modification instruction; and
in response to receiving the first signal power modification instruction, transmit a location signal having a location signal strength that is different than the first ping signal strength;
a second ping node configured to transmit a second ping signal having a second ping signal strength; and
a monitoring device configured for attachment to an article, the monitoring device comprising a processor, the processor configured to:
receive the first ping signal from the first ping node;
receive the second ping signal from the second ping node;
receive the location signal from the first ping node; and
determine location information relating to the monitoring device based at least in part on the location signal.
43. (canceled)
44. The system of 42, wherein the processor is further configured to:
send the first signal power modification instruction for instructing the first ping node to lower the first ping signal strength to a minimum threshold and transmit the location signal one or more times starting at the minimum threshold and increasing incrementally to the location signal strength; and
send a second signal power modification instruction for instructing the second ping node to lower the second ping signal strength to the minimum threshold and transmit a second location signal one or more times starting at the minimum threshold and increasing incrementally.
45. The system of claim 42, wherein the processor is further configured to:
send the first signal power modification instruction for instructing the first ping node raise the first ping signal strength to a maximum threshold and transmit the location signal one or more times starting at the maximum threshold and decreasing incrementally; and
send a second signal power modification instruction for instructing the second ping node to increase the second ping signal strength to the maximum threshold and transmit a second location signal one or more times starting at the maximum threshold and decreasing incrementally.
46. The system of claim 42, wherein:
the first ping node is configured to transmit the first ping signal at a first range, wherein the first range includes a first retail shelving unit; and
the second ping node is configured to transmit the second ping signal at a second range, wherein the second range includes a second retail shelving unit.
47. The system of claim 46, wherein the first range and the second range are configured to be consistent with a coordinated, multi-ping node gradient of coverage density.
48. A method for tracking articles using a monitoring device affixed to an article comprising:
receiving, from a first ping node, a first ping signal having a first ping signal strength;
receiving, from a second ping node, a second ping signal having a second ping signal strength; and
receiving, from the first ping node, a location signal having a location signal strength that is different than the first ping signal strength; and
determining location information relating to the article based at least in part on the location signal.
49. (canceled)
50. The method of claim 48 further comprising:
sending a first signal power modification instruction for instructing the first ping node to lower the first ping signal strength to a minimum threshold and transmit the location signal one or more times starting at the minimum threshold and increasing incrementally to the location signal strength;
sending a second signal power modification instruction for instructing the second ping node to lower the second ping signal strength to the minimum threshold and transmit a second location signal one or more times starting at the minimum threshold and increasing incrementally.
51. The method of claim 48 further comprising:
sending a first signal power modification instruction for instructing the first ping node to increase the first ping signal strength to a maximum threshold and transmit the location signal one or more times starting at the maximum threshold and decreasing incrementally to the location signal strength;
sending a second signal power modification instruction for instructing the second ping node to increase the second ping signal strength to a maximum threshold and transmit a second location signal one or more times starting at the maximum threshold and decreasing incrementally.
52. The method of claim 48 further comprising:
transmitting, from the first ping node, the first ping signal within a first range, wherein the first range includes a first retail shelving unit; and
transmitting, from the second ping node, the second ping signal within a second range, wherein the second range includes a second retail shelving unit.
53. The method of claim 52, further comprising the first ping node and the second ping node receiving configuration information that causes the first range and the second range to be consistent with a coordinated, multi-ping node gradient of coverage density.
54. A computer program product for position tracking of an article, the computer program product comprising:
a computer-readable storage medium having computer readable program code embodied in said medium, said computer-readable program code to:
receive, from a first ping node, a first ping signal having a first ping signal strength;
receive, from a second ping node, a second ping signal having a second ping signal strength;
receive, from the first ping node, a location signal having a location signal strength that is different than the first ping signal strength;
attach, using an attachment mechanism, to an article; and
determine location information relating to the article based at least in part on the location signal.
55. The a computer-readable storage medium of claim 54 further comprising computer-readable program code to:
send a first signal power modification instruction for instructing the first ping node to lower the first ping signal strength to a minimum threshold and transmit the location signal one or more times starting at the minimum threshold and increasing incrementally to the location signal strength;
send a second signal power modification instruction for instructing the second ping node to lower the second ping signal strength to the minimum threshold and transmit a second location signal one or more times starting at the minimum threshold and increasing incrementally.
56. The a computer-readable storage medium of claim 54 further comprising computer-readable program code to:
send a first signal power modification instruction for instructing the first ping node to increase the first ping signal strength to a maximum threshold and transmit the location signal one or more times starting at the maximum threshold and decreasing incrementally to the location signal strength;
send a second signal power modification instruction for instructing the second ping node to increase the second ping signal strength to a maximum threshold and transmit a second location signal one or more times starting at the maximum threshold and decreasing incrementally.
57. The system of claim 42, further comprising a network entity that is configured to transmit the first signal power modification instruction.
58. The system of claim 57, wherein the network entity is configured to transmit the first signal power modification instruction in response to the network entity determining a triggering event has occurred.
59. The system of claim 57, wherein the network entity is further configured to transmit a second signal power modification instruction.
60. The system of claim 59, wherein the network entity is configured to transmit the second signal power modification instruction in response to the network entity determining a triggering event has occurred.
61. The system of claim 59, wherein the first signal power modification instruction is the same as the second signal power modification instruction.
62. The system of claim 57, wherein the network entity is configured to determine efficient pathways for communicating messages from the monitoring device to various entities within a network.
63. The method of claim 48 further comprising transmitting a first signal power modification instruction from a network entity, wherein the first signal power modification causes the first ping node to transmit the location signal.
64. The method of claim 63, wherein transmitting the first signal power modification instruction occurs in response to the network entity determining a triggering event has occurred.
65. The method of claim 63 further comprising transmitting a second signal power modification instruction from the network entity.
66. The method of claim 65, wherein transmitting the second signal power modification instruction occurs in response to the network entity determining a triggering event has occurred.
67. The method of claim 65, wherein transmitting the first signal power modification instruction and transmitting the second signal power modification instruction includes transmitting a single instruction that is received by both the first ping node and the second ping node.
US12/636,564 2009-09-21 2009-12-11 Systems, methods, and apparatuses for managing configurable monitoring devices Abandoned US20110068906A1 (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
US12/636,564 US20110068906A1 (en) 2009-09-21 2009-12-11 Systems, methods, and apparatuses for managing configurable monitoring devices
MX2012003457A MX2012003457A (en) 2009-09-21 2010-09-21 Retail product tracking system, method, and apparatus.
CN201080051263.5A CN102741893B (en) 2009-09-21 2010-09-21 Systems, methods, and apparatuses for managing configurable monitoring devices
AU2010295352A AU2010295352B2 (en) 2009-09-21 2010-09-21 Retail product tracking system, method, and apparatus
PCT/US2010/049653 WO2011035302A1 (en) 2009-09-21 2010-09-21 Retail product tracking system, method, and apparatus
EP10763513A EP2481035A1 (en) 2009-09-21 2010-09-21 Retail product tracking system, method, and apparatus
PCT/US2010/049672 WO2011035309A2 (en) 2009-09-21 2010-09-21 Systems, methods, and apparatuses for managing configurable monitoring devices
US12/887,228 US8452868B2 (en) 2009-09-21 2010-09-21 Retail product tracking system, method, and apparatus
US13/901,926 US20160239794A9 (en) 2009-09-21 2013-05-24 Retail product tracking system, method, and apparatus

Applications Claiming Priority (11)

Application Number Priority Date Filing Date Title
US24432009P 2009-09-21 2009-09-21
US24639309P 2009-09-28 2009-09-28
US24638809P 2009-09-28 2009-09-28
US24826909P 2009-10-02 2009-10-02
US24823909P 2009-10-02 2009-10-02
US24822309P 2009-10-02 2009-10-02
US24824209P 2009-10-02 2009-10-02
US24822809P 2009-10-02 2009-10-02
US24823309P 2009-10-02 2009-10-02
US24819609P 2009-10-02 2009-10-02
US12/636,564 US20110068906A1 (en) 2009-09-21 2009-12-11 Systems, methods, and apparatuses for managing configurable monitoring devices

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US12/628,863 Continuation-In-Part US8508367B2 (en) 2009-09-21 2009-12-01 Configurable monitoring device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/887,228 Continuation-In-Part US8452868B2 (en) 2009-09-21 2010-09-21 Retail product tracking system, method, and apparatus

Publications (1)

Publication Number Publication Date
US20110068906A1 true US20110068906A1 (en) 2011-03-24

Family

ID=43756143

Family Applications (2)

Application Number Title Priority Date Filing Date
US12/628,863 Expired - Fee Related US8508367B2 (en) 2009-09-21 2009-12-01 Configurable monitoring device
US12/636,564 Abandoned US20110068906A1 (en) 2009-09-21 2009-12-11 Systems, methods, and apparatuses for managing configurable monitoring devices

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/628,863 Expired - Fee Related US8508367B2 (en) 2009-09-21 2009-12-01 Configurable monitoring device

Country Status (3)

Country Link
US (2) US8508367B2 (en)
CN (1) CN102741893B (en)
WO (2) WO2011035303A1 (en)

Cited By (81)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100231388A1 (en) * 2009-03-12 2010-09-16 Checkpoint Systems, Inc. Disposable cable lock and detachable alarm module
US20110068921A1 (en) * 2009-09-21 2011-03-24 Checkpoint Systems, Inc. configurable monitoring device
NL2007029C2 (en) * 2011-02-24 2012-08-27 Cross Point B V SYSTEM WITH ARTICLE-MONITORING DEVICE, ARTICLE-MONITORING DEVICE AND METHOD FOR VISUALIZING SET-UP INFORMATION.
US20120236768A1 (en) * 2011-03-18 2012-09-20 Honeywell International Inc. Adapter device for coupling an industrial field instrument to an industrial wireless network and related system and method
US20120323636A1 (en) * 2011-06-16 2012-12-20 Luis Albisu Methods, Devices, and Computer Program Products for Associating a Tag With a Recorded Event
US20130067018A1 (en) * 2011-09-13 2013-03-14 Patrick A. Reynolds Methods and computer program products for monitoring the contents of network traffic in a network device
US20130120119A1 (en) * 2011-11-16 2013-05-16 Symbol Technologies, Inc. Adapting radio frequency identification reqader power levels
US20130297976A1 (en) * 2012-05-04 2013-11-07 Paraccel, Inc. Network Fault Detection and Reconfiguration
US8640509B2 (en) 2010-04-30 2014-02-04 Checkpoint Systems, Inc. Security assembly for attachment to an object
US20140075020A1 (en) * 2012-09-10 2014-03-13 Masato Takahashi Server device, information processing method, and computer program product
US20140081786A1 (en) * 2011-05-27 2014-03-20 Nec Infrontia Corporation Pos system, bar code scanner, and method for controlling pos system
WO2014074816A1 (en) * 2012-11-09 2014-05-15 Hirsch Kenneth A System for item and location information distribution
US20140132412A1 (en) * 2012-09-07 2014-05-15 Juan José DECO Wi-fi tracker system for persons and objects
US20140162690A1 (en) * 2010-09-22 2014-06-12 General Electric Company System and method for determining the location of wireless sensors
CN103996259A (en) * 2014-06-04 2014-08-20 广西科技大学鹿山学院 Multi-point-control pneumatic door/window anti-theft alarm triggering device
US8818417B2 (en) 2011-10-13 2014-08-26 Honeywell International Inc. Method for wireless device location using automatic location update via a provisioning device and related apparatus and system
US8878673B2 (en) 2011-05-19 2014-11-04 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US8890694B2 (en) 2012-09-13 2014-11-18 W G Security Products Anti-theft hang tag
CN104269022A (en) * 2014-10-11 2015-01-07 郑州捷利工业设备有限公司 Wireless voice distress calling device
EP2866177A1 (en) * 2013-10-28 2015-04-29 Samsung Electro-Mechanics Co., Ltd. Method of grouping electronic tags and method of managing group IDs
US20150161423A1 (en) * 2005-09-30 2015-06-11 Zebra Enterprise Solutions Corp. Wide-area dynamic rfid system using uwb
US20150206118A1 (en) * 2014-01-23 2015-07-23 Pomo Search Ltd System and method for point of sale transaction logging
US20160019515A1 (en) * 2014-07-16 2016-01-21 Sony Corporation Mesh network applied to fixed establishment with movable items therein
US9298954B1 (en) * 2010-02-03 2016-03-29 Synapse Wireless, Inc. Tag security systems and methods for articles of merchandise
US20160171861A1 (en) * 2014-12-15 2016-06-16 Autodesk, Inc. Smart tools and workspaces for do-it-yourself tasks
US9405285B2 (en) 2011-03-18 2016-08-02 Honeywell International Inc. Interface for local configuration and monitoring of an industrial field device with support for provisioning onto an industrial wireless network and related system and method
US9437088B2 (en) 2013-09-29 2016-09-06 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US9443406B2 (en) * 2014-12-18 2016-09-13 Checkpoint Systems, Inc. Dual mode security tags
EP3070978A1 (en) * 2015-03-18 2016-09-21 SK Planet Co., Ltd. Apparatus and method for providing payment service based on beacon in beacon service system
WO2016177939A1 (en) * 2015-05-04 2016-11-10 Noccela Oy A system, method and apparatuses for electronic article surveillance
US9507976B2 (en) 2011-08-22 2016-11-29 Metrologic Instruments, Inc. Encoded information reading terminal with item locate functionality
US9516461B2 (en) 2014-07-16 2016-12-06 Sony Corporation Mesh network applied to arena events
US9567776B2 (en) 2013-06-11 2017-02-14 Invue Security Products Inc. Anti-theft device for portable electronic device
CN106463028A (en) * 2014-04-16 2017-02-22 因戴姆解决方案有限责任公司 Fitting room management and occupancy monitoring system
CN106463035A (en) * 2014-04-23 2017-02-22 乔凡尼·萨尔沃 Methods, devices, kits and systems for modulating activation of self-alarming tags
GB2548972A (en) * 2016-02-19 2017-10-04 Wal Mart Stores Inc A multi-capability apparatus supporting background RFID tag-reading and corresponding methods
US9826368B2 (en) 2014-07-16 2017-11-21 Sony Corporation Vehicle ad hoc network (VANET)
US9900748B2 (en) 2014-07-16 2018-02-20 Sony Corporation Consumer electronics (CE) device and related method for providing stadium services
GB2553017A (en) * 2016-05-18 2018-02-21 Symbol Technologies Llc Arrangement for, and method of, reading RFID product tags with improved performance by reading RFID tags of interest in a venue
US9906897B2 (en) 2014-07-16 2018-02-27 Sony Corporation Applying mesh network to pet carriers
GB2554134A (en) * 2016-07-07 2018-03-28 Symbol Technologies Llc System for and method of deterring theft of items from a venue
GB2561257A (en) * 2017-04-07 2018-10-10 Sita Inf Networking Computing Usa Inc Article tracking system and method
US20180332548A1 (en) * 2017-05-09 2018-11-15 U.S.A. as represented by the Administrator of NASA System and Method to Synchronize Clocks Across a Distributed Network of Nodes
US20190006037A1 (en) * 2017-06-28 2019-01-03 Perceptimed, Inc. Inventory Assurance
AU2013305512B2 (en) * 2012-08-24 2019-01-17 Perceptimed, Inc. Package locating system
US10223881B2 (en) 2015-02-18 2019-03-05 Invue Security Products Inc. System and method for calibrating a wireless security range
CN109801122A (en) * 2017-11-16 2019-05-24 松下电器(美国)知识产权公司 Trade managing system, exchange management method and program
US10441867B2 (en) * 2013-06-04 2019-10-15 Isolynx, Llc Systems and methods for tracking tag management
US10482739B2 (en) 2015-06-25 2019-11-19 Invue Security Products Inc. Wireless merchandise security system
US10535425B2 (en) 2017-06-28 2020-01-14 Perceptimed, Inc. Inventory management
US10740503B1 (en) * 2019-01-17 2020-08-11 Middle Chart, LLC Spatial self-verifying array of nodes
US10760991B2 (en) 2017-02-22 2020-09-01 Middle Chart, LLC Hierarchical actions based upon monitored building conditions
US10762251B2 (en) 2017-02-22 2020-09-01 Middle Chart, LLC System for conducting a service call with orienteering
US10776529B2 (en) 2017-02-22 2020-09-15 Middle Chart, LLC Method and apparatus for enhanced automated wireless orienteering
US10824774B2 (en) * 2019-01-17 2020-11-03 Middle Chart, LLC Methods and apparatus for healthcare facility optimization
US10831945B2 (en) 2017-02-22 2020-11-10 Middle Chart, LLC Apparatus for operation of connected infrastructure
US10872179B2 (en) 2017-02-22 2020-12-22 Middle Chart, LLC Method and apparatus for automated site augmentation
US10877127B2 (en) * 2018-09-24 2020-12-29 Science Applications International Corporation System and method for dismounted assured position, navigation and timing (DAPNT)
US10902160B2 (en) 2017-02-22 2021-01-26 Middle Chart, LLC Cold storage environmental control and product tracking
RU2744229C1 (en) * 2020-06-04 2021-03-03 Андрей Александрович Красовский Wireless ultra frequency detector of signals and commands of uhf rfid readers and method for detecting signals and commands of uhf rfid readers
CN112492526A (en) * 2014-05-28 2021-03-12 联邦快递服务公司 Enabling node delivery notifications using elements of a wireless node network
US10949579B2 (en) 2017-02-22 2021-03-16 Middle Chart, LLC Method and apparatus for enhanced position and orientation determination
US10984146B2 (en) 2017-02-22 2021-04-20 Middle Chart, LLC Tracking safety conditions of an area
US11054335B2 (en) 2017-02-22 2021-07-06 Middle Chart, LLC Method and apparatus for augmented virtual models and orienteering
US11120172B2 (en) 2017-02-22 2021-09-14 Middle Chart, LLC Apparatus for determining an item of equipment in a direction of interest
EP3913590A1 (en) * 2020-05-20 2021-11-24 3SI Security Systems Inc. Security tracking device with zone-based alert suppression
US11188686B2 (en) 2017-02-22 2021-11-30 Middle Chart, LLC Method and apparatus for holographic display based upon position and direction
US11194938B2 (en) 2020-01-28 2021-12-07 Middle Chart, LLC Methods and apparatus for persistent location based digital content
US11348421B2 (en) * 2018-12-14 2022-05-31 Invue Security Products Inc. Wireless tracking system for merchandise security
US11436389B2 (en) 2017-02-22 2022-09-06 Middle Chart, LLC Artificial intelligence based exchange of geospatial related digital content
US11468209B2 (en) 2017-02-22 2022-10-11 Middle Chart, LLC Method and apparatus for display of digital content associated with a location in a wireless communications area
US11475177B2 (en) 2017-02-22 2022-10-18 Middle Chart, LLC Method and apparatus for improved position and orientation based information display
US11481527B2 (en) 2017-02-22 2022-10-25 Middle Chart, LLC Apparatus for displaying information about an item of equipment in a direction of interest
US11507714B2 (en) 2020-01-28 2022-11-22 Middle Chart, LLC Methods and apparatus for secure persistent location based digital content
WO2022256689A1 (en) * 2021-06-04 2022-12-08 Invue Security Products Inc. Wireless beacon tracking system for merchandise security
US11625510B2 (en) 2017-02-22 2023-04-11 Middle Chart, LLC Method and apparatus for presentation of digital content
US11640486B2 (en) 2021-03-01 2023-05-02 Middle Chart, LLC Architectural drawing based exchange of geospatial related digital content
WO2023111035A1 (en) * 2021-12-14 2023-06-22 Zliide Technologies Aps A system for securing and tracking consumer goods
US11688258B2 (en) * 2019-08-30 2023-06-27 Sensormatic Electronics, LLC Radio frequency identification (RFID) tag location verification using short range communication
US11900022B2 (en) 2017-02-22 2024-02-13 Middle Chart, LLC Apparatus for determining a position relative to a reference transceiver
US11900021B2 (en) 2017-02-22 2024-02-13 Middle Chart, LLC Provision of digital content via a wearable eye covering

Families Citing this family (145)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6686838B1 (en) * 2000-09-06 2004-02-03 Xanboo Inc. Systems and methods for the automatic registration of devices
US6658091B1 (en) 2002-02-01 2003-12-02 @Security Broadband Corp. LIfestyle multimedia security system
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US20090077623A1 (en) 2005-03-16 2009-03-19 Marc Baum Security Network Integrating Security System and Network Devices
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US7711796B2 (en) 2006-06-12 2010-05-04 Icontrol Networks, Inc. Gateway registry methods and systems
US10062273B2 (en) 2010-09-28 2018-08-28 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11316958B2 (en) 2008-08-11 2022-04-26 Icontrol Networks, Inc. Virtual device systems and methods
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US10721087B2 (en) 2005-03-16 2020-07-21 Icontrol Networks, Inc. Method for networked touchscreen with integrated interfaces
US11244545B2 (en) 2004-03-16 2022-02-08 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US10313303B2 (en) 2007-06-12 2019-06-04 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US8635350B2 (en) 2006-06-12 2014-01-21 Icontrol Networks, Inc. IP device discovery systems and methods
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems
US11368429B2 (en) 2004-03-16 2022-06-21 Icontrol Networks, Inc. Premises management configuration and control
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US9531593B2 (en) 2007-06-12 2016-12-27 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US20170118037A1 (en) 2008-08-11 2017-04-27 Icontrol Networks, Inc. Integrated cloud system for premises automation
US11201755B2 (en) 2004-03-16 2021-12-14 Icontrol Networks, Inc. Premises system management using status signal
US10444964B2 (en) 2007-06-12 2019-10-15 Icontrol Networks, Inc. Control system user interface
US10339791B2 (en) 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US10348575B2 (en) 2013-06-27 2019-07-09 Icontrol Networks, Inc. Control system user interface
US11489812B2 (en) 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10375253B2 (en) 2008-08-25 2019-08-06 Icontrol Networks, Inc. Security system with networked touchscreen and gateway
US9141276B2 (en) 2005-03-16 2015-09-22 Icontrol Networks, Inc. Integrated interface for mobile device
US10382452B1 (en) 2007-06-12 2019-08-13 Icontrol Networks, Inc. Communication protocols in integrated systems
US8963713B2 (en) 2005-03-16 2015-02-24 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US20050216302A1 (en) 2004-03-16 2005-09-29 Icontrol Networks, Inc. Business method for premises management
US10522026B2 (en) 2008-08-11 2019-12-31 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US9729342B2 (en) 2010-12-20 2017-08-08 Icontrol Networks, Inc. Defining and implementing sensor triggered response rules
US10156959B2 (en) 2005-03-16 2018-12-18 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11277465B2 (en) 2004-03-16 2022-03-15 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US11113950B2 (en) 2005-03-16 2021-09-07 Icontrol Networks, Inc. Gateway integrated with premises security system
US11159484B2 (en) 2004-03-16 2021-10-26 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10999254B2 (en) 2005-03-16 2021-05-04 Icontrol Networks, Inc. System for data routing in networks
US20110128378A1 (en) 2005-03-16 2011-06-02 Reza Raji Modular Electronic Display Platform
US9306809B2 (en) 2007-06-12 2016-04-05 Icontrol Networks, Inc. Security system with networked touchscreen
US20120324566A1 (en) 2005-03-16 2012-12-20 Marc Baum Takeover Processes In Security Network Integrated With Premise Security System
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US20170180198A1 (en) 2008-08-11 2017-06-22 Marc Baum Forming a security network including integrated security system components
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
US7633385B2 (en) 2007-02-28 2009-12-15 Ucontrol, Inc. Method and system for communicating with and controlling an alarm system from a remote server
US8451986B2 (en) 2007-04-23 2013-05-28 Icontrol Networks, Inc. Method and system for automatically providing alternate network access for telecommunications
US11423756B2 (en) 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US10389736B2 (en) 2007-06-12 2019-08-20 Icontrol Networks, Inc. Communication protocols in integrated systems
US11212192B2 (en) 2007-06-12 2021-12-28 Icontrol Networks, Inc. Communication protocols in integrated systems
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US11218878B2 (en) 2007-06-12 2022-01-04 Icontrol Networks, Inc. Communication protocols in integrated systems
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US10523689B2 (en) 2007-06-12 2019-12-31 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10666523B2 (en) 2007-06-12 2020-05-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US10616075B2 (en) 2007-06-12 2020-04-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US10498830B2 (en) 2007-06-12 2019-12-03 Icontrol Networks, Inc. Wi-Fi-to-serial encapsulation in systems
US11237714B2 (en) 2007-06-12 2022-02-01 Control Networks, Inc. Control system user interface
US11316753B2 (en) 2007-06-12 2022-04-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US10423309B2 (en) 2007-06-12 2019-09-24 Icontrol Networks, Inc. Device integration framework
US11089122B2 (en) 2007-06-12 2021-08-10 Icontrol Networks, Inc. Controlling data routing among networks
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
FR2925736B1 (en) * 2007-12-21 2010-09-24 Eads Secure Networks METHOD FOR PRODUCING PROOF OF PRESENCE OR OPERATION OF AN ENTITY IN AN IDENTIFIED AREA DURING A PERIOD EXCEEDING A THRESHOLD, AND MONITORING SYSTEM
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US20170070563A1 (en) * 2008-08-11 2017-03-09 Ken Sundermeyer Data model for home automation
US20170185278A1 (en) 2008-08-11 2017-06-29 Icontrol Networks, Inc. Automation system user interface
US11792036B2 (en) 2008-08-11 2023-10-17 Icontrol Networks, Inc. Mobile premises automation platform
US10530839B2 (en) 2008-08-11 2020-01-07 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11258625B2 (en) 2008-08-11 2022-02-22 Icontrol Networks, Inc. Mobile premises automation platform
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US8638211B2 (en) 2009-04-30 2014-01-28 Icontrol Networks, Inc. Configurable controller and interface for home SMA, phone and multimedia
US9765551B2 (en) * 2009-06-15 2017-09-19 Universal Surveillance Corporation Article surveillance tag
US8315617B2 (en) 2009-10-31 2012-11-20 Btpatent Llc Controlling mobile device functions
US8145199B2 (en) 2009-10-31 2012-03-27 BT Patent LLC Controlling mobile device functions
US8451109B1 (en) * 2010-01-07 2013-05-28 F3M3 Companies, Inc. System and method for improving vehicle operator awareness
TR201808160T4 (en) * 2010-01-19 2018-07-23 Bluechain Pty Ltd Method, device and system for securing payment data for transmission over open communication networks.
JP5168596B2 (en) * 2010-01-29 2013-03-21 横河電機株式会社 Control network system
US10206570B2 (en) * 2010-02-28 2019-02-19 Covidien Lp Adaptive wireless body networks
US20110213217A1 (en) * 2010-02-28 2011-09-01 Nellcor Puritan Bennett Llc Energy optimized sensing techniques
AU2011250886A1 (en) 2010-05-10 2013-01-10 Icontrol Networks, Inc Control system user interface
DE102010029671B4 (en) * 2010-06-02 2012-03-01 Cargoguard Gmbh Backup module for position monitoring of objects
US8836467B1 (en) 2010-09-28 2014-09-16 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US11750414B2 (en) 2010-12-16 2023-09-05 Icontrol Networks, Inc. Bidirectional security sensor communication for a premises security system
US9147337B2 (en) 2010-12-17 2015-09-29 Icontrol Networks, Inc. Method and system for logging security event data
US20120262292A1 (en) * 2011-04-14 2012-10-18 Martin Moser Portable device inventory tracking
US8941495B2 (en) * 2011-06-10 2015-01-27 Checkpoint Systems, Inc. Wireless shelf pusher activity detection system and associated methods
US8976541B2 (en) * 2011-08-31 2015-03-10 Potens Ip Holdings Llc Electrical power and data distribution apparatus
US9041527B2 (en) 2012-04-20 2015-05-26 Numerex Corp. System and method for using alarm system zones for remote objects
US9037922B1 (en) * 2012-05-01 2015-05-19 Amazon Technololgies, Inc. Monitoring and analysis of operating states in a computing environment
US9423870B2 (en) 2012-05-08 2016-08-23 Google Inc. Input determination method
US9324220B2 (en) * 2012-08-21 2016-04-26 Southern Imperial, Inc. Theft detection device and method for controlling same
US10270709B2 (en) 2015-06-26 2019-04-23 Microsoft Technology Licensing, Llc Allocating acceleration component functionality for supporting services
US20140249887A1 (en) * 2013-03-01 2014-09-04 Rapidblue Solutions Oy System for monitoring customers within retail premises
EP2973208A2 (en) * 2013-03-15 2016-01-20 Assa Abloy Ab Tamper credential
US20140313040A1 (en) * 2013-04-23 2014-10-23 John Richard Wright, SR. Tactile and Visual Smoke Detector System
US10582374B2 (en) * 2014-01-02 2020-03-03 Connovate Technology Private Ltd Wirelessly triggering smart devices
US9792792B2 (en) * 2014-02-14 2017-10-17 B&G Plastics, Inc. Security tag for wire handle
US11146637B2 (en) 2014-03-03 2021-10-12 Icontrol Networks, Inc. Media content management
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
KR20160014242A (en) * 2014-07-29 2016-02-11 삼성전자주식회사 Method and device for mapping location of sensor and event operation with monitoring device
US20170277888A1 (en) * 2014-08-25 2017-09-28 ACCO Brands Corporation Security device for an electronic apparatus
BR112017013997B1 (en) * 2014-12-29 2022-06-28 Invue Security Products Inc MERCHANDISE SECURITY SYSTEM AND METHOD FOR PROTECTING AN THEFT-SUSCEPTIBLE MERCHANDISE
US10009667B2 (en) 2014-12-31 2018-06-26 Walmart Apollo, Llc System and method for monitoring gas emission of perishable products
US10521614B2 (en) 2015-03-03 2019-12-31 GBT Technologies, Inc. Electronic circuits for secure communications and associated systems and methods
US20160275767A1 (en) * 2015-03-16 2016-09-22 Menonthemoon Pty Ltd. Intelligent beacon and system including same
US9723448B2 (en) * 2015-04-01 2017-08-01 AthenTek Incorporated Tracking device, battery charger, and tracking method thereof
US20160308952A1 (en) * 2015-04-17 2016-10-20 Sennco Solutions, Inc. Apparatus, system and method for wirelessly collecting data corresponding to a security device
US10511478B2 (en) * 2015-04-17 2019-12-17 Microsoft Technology Licensing, Llc Changing between different roles at acceleration components
US9792154B2 (en) 2015-04-17 2017-10-17 Microsoft Technology Licensing, Llc Data processing system having a hardware acceleration plane and a software plane
US10296392B2 (en) 2015-04-17 2019-05-21 Microsoft Technology Licensing, Llc Implementing a multi-component service using plural hardware acceleration components
US10198294B2 (en) 2015-04-17 2019-02-05 Microsoft Licensing Technology, LLC Handling tenant requests in a system that uses hardware acceleration components
CN107750356B (en) * 2015-05-08 2020-02-14 西安姆贝拉有限公司 Method and apparatus for automated software development of a set of controller-based devices
US10216555B2 (en) 2015-06-26 2019-02-26 Microsoft Technology Licensing, Llc Partially reconfiguring acceleration components
US10496968B2 (en) * 2015-09-25 2019-12-03 Everi Payments Inc. Financial terminal that automatically reconfigures into different financial processing terminal types
CN105160375B (en) * 2015-10-15 2019-02-12 丹阳伦图电子技术有限公司 A kind of wireless articles loss prevention system based on ESL
US20170168082A1 (en) * 2015-12-15 2017-06-15 Checkpoint Systems, Inc. Apparatus and method for motion vector threshold determination
US10021522B2 (en) * 2016-01-06 2018-07-10 Gopher Protocol Inc. Tracking devices, systems and methods using patch packages with embedded electronic circuits
US10466111B2 (en) * 2016-05-05 2019-11-05 Walmart Apollo, Llc Systems and methods for monitoring temperature or movement of merchandise
US20180040219A1 (en) * 2016-08-04 2018-02-08 Tyco Fire & Security Gmbh Tag detection using waveform radiating devices
US10140834B2 (en) * 2016-08-08 2018-11-27 Blackberry Limited Mobile transceiver having asset-based alarm profile and a method of operation
US20190183259A1 (en) 2016-08-31 2019-06-20 Invue Security Products Inc. Modular shelf sweep detector
US10222449B2 (en) * 2016-12-14 2019-03-05 Nxp B.V. System and method for determining location of object using RFID tag
EP3596593A4 (en) 2017-03-14 2021-01-27 Ciambella Ltd. Method and apparatus for automatically generating and incorporating code in development environments
CN116629743A (en) 2017-05-23 2023-08-22 沃尔玛阿波罗有限责任公司 Automated inspection system
US11080976B2 (en) * 2017-06-15 2021-08-03 Ncr Corporation Real time bypass detection in scanner
US10117052B1 (en) * 2017-08-16 2018-10-30 Tile, Inc. Tracking device operation in behavior-classified zone
US10490039B2 (en) 2017-12-21 2019-11-26 At&T Intellectual Property I, L.P. Sensors for detecting and monitoring user interaction with a device or product and systems for analyzing sensor data
US10621815B2 (en) 2018-02-02 2020-04-14 Aristocrat Technologies Australia Pty Limited Electronic gaming machine and methods for displaying supplemental information
US11448632B2 (en) 2018-03-19 2022-09-20 Walmart Apollo, Llc System and method for the determination of produce shelf life
US10885753B2 (en) 2018-03-21 2021-01-05 Fasteners For Retail, Inc. Anti-theft device with remote alarm feature
US11393082B2 (en) 2018-07-26 2022-07-19 Walmart Apollo, Llc System and method for produce detection and classification
CN109242563A (en) * 2018-09-03 2019-01-18 索信科技(北京)有限公司 A kind of intelligent information monitoring application method and system
US11539609B2 (en) * 2018-09-11 2022-12-27 Trilliant Networks, Inc. Method and apparatus for reporting power down events in a network node without a backup energy storage device
US11715059B2 (en) 2018-10-12 2023-08-01 Walmart Apollo, Llc Systems and methods for condition compliance
WO2020106332A1 (en) 2018-11-20 2020-05-28 Walmart Apollo, Llc Systems and methods for assessing products
CN110009845B (en) * 2018-11-27 2021-03-09 杭州朗泽安防技术有限公司 Warning system for commodity safety
WO2021026127A1 (en) * 2019-08-05 2021-02-11 Xlink Enterprises, Inc. Merchandise security tag
US11589303B2 (en) * 2019-10-10 2023-02-21 Qualcomm Incorporated Power-saving mode indication
US11087601B1 (en) 2020-04-02 2021-08-10 Fasteners For Retail, Inc Anti-theft device with cable attachment
USD956607S1 (en) 2020-04-16 2022-07-05 Fasteners For Retail, Inc. Security tag holder
US20210334925A1 (en) * 2020-04-23 2021-10-28 Sennco Solutions, Inc. Network detection-based monitoring of electronic merchandise
CN114821930A (en) * 2022-04-18 2022-07-29 深圳市东峰盛科技有限公司 Alarm method and device applied to target area, electronic equipment and storage medium

Citations (103)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4021807A (en) * 1975-04-02 1977-05-03 Texas Instruments Incorporated Beacon tracking system
US4141006A (en) * 1976-07-14 1979-02-20 Braxton Kenneth J Security system for centralized monitoring and selective reporting of remote alarm conditions
US4141078A (en) * 1975-10-14 1979-02-20 Innovated Systems, Inc. Library circulation control system
US4196418A (en) * 1976-11-01 1980-04-01 N.V. Nederlandsche Apparatenfabriek Nedap Detection plate for an identification system
US4327353A (en) * 1978-03-06 1982-04-27 George W. Beard Security system
US4572976A (en) * 1982-12-10 1986-02-25 N.V. Nederlandsche Apparatenfabriek Nedap Transponder for electromagnetic detection system with non-linear circuit
US4580041A (en) * 1983-12-09 1986-04-01 Walton Charles A Electronic proximity identification system with simplified low power identifier
US4656463A (en) * 1983-04-21 1987-04-07 Intelli-Tech Corporation LIMIS systems, devices and methods
US4667185A (en) * 1985-12-06 1987-05-19 Minnesota Mining And Manufacturing Company Wireless synchronization system for electronic article surveillance system
US4742341A (en) * 1985-06-14 1988-05-03 N.V. Nederlandsche Apparatenfabriek Nedap Electromagnetic detection system, as well as a responder for such a system
US4746830A (en) * 1986-03-14 1988-05-24 Holland William R Electronic surveillance and identification
US4814751A (en) * 1987-02-27 1989-03-21 Wildlife Materials, Inc. Patient tracking system
US4827395A (en) * 1983-04-21 1989-05-02 Intelli-Tech Corporation Manufacturing monitoring and control systems
US4907845A (en) * 1988-09-16 1990-03-13 Salomon Sa Bed patient monitoring system
US4918432A (en) * 1988-09-27 1990-04-17 B. I. Incorporated House arrest monitoring system
US4924210A (en) * 1987-03-17 1990-05-08 Omron Tateisi Electronics Company Method of controlling communication in an ID system
US4926161A (en) * 1989-10-23 1990-05-15 Cupp Ted W Method of monitoring golf carts on a golf course
US5006830A (en) * 1989-10-16 1991-04-09 Rebecca Merritt Method and device for deterring the unauthorized removal of a newborn from a defined area
US5008660A (en) * 1988-03-04 1991-04-16 N.V. Nederlandsche Apparatenfabriek Nedap Electromagnetic detection system
US5014206A (en) * 1988-08-22 1991-05-07 Facilitech International Incorporated Tracking system
US5019815A (en) * 1979-10-12 1991-05-28 Lemelson Jerome H Radio frequency controlled interrogator-responder system with passive code generator
US5019813A (en) * 1987-04-13 1991-05-28 N.V. Nederlandsche Apparatenfabriek Nedap System for the contactless exchange of data
US5099227A (en) * 1989-07-18 1992-03-24 Indala Corporation Proximity detecting apparatus
US5099226A (en) * 1991-01-18 1992-03-24 Interamerican Industrial Company Intelligent security system
US5103222A (en) * 1987-07-03 1992-04-07 N.V. Nederlandsche Apparatenfabriek Nedap Electronic identification system
US5105190A (en) * 1986-04-22 1992-04-14 N.V. Nederlandsche Apparatenfabriek Nedap Electromagnetic identification system
US5151684A (en) * 1991-04-12 1992-09-29 Johnsen Edward L Electronic inventory label and security apparatus
US5181786A (en) * 1989-11-15 1993-01-26 N.V. Nederlandsche Apparatenfabriek Nedap Method and apparatus for producing admission tickets
US5214410A (en) * 1989-07-10 1993-05-25 Csir Location of objects
US5214409A (en) * 1991-12-03 1993-05-25 Avid Corporation Multi-memory electronic identification tag
US5288980A (en) * 1992-06-25 1994-02-22 Kingsley Library Equipment Company Library check out/check in system
US5317309A (en) * 1990-11-06 1994-05-31 Westinghouse Electric Corp. Dual mode electronic identification system
US5396224A (en) * 1991-11-22 1995-03-07 Hewlett-Packard Company Telemetered patient location system and method
US5596313A (en) * 1995-05-16 1997-01-21 Personal Security & Safety Systems, Inc. Dual power security location system
US5608380A (en) * 1994-05-18 1997-03-04 N.V. Nederlandsche Apparatenfabriek Nedap Deactivation and coding system for a contactless antitheft or identification label
US5709942A (en) * 1991-05-20 1998-01-20 Alliedsignal Inc. Product and process improvement of coated polymeric monofilament
US5874896A (en) * 1996-08-26 1999-02-23 Palomar Technologies Corporation Electronic anti-shoplifting system employing an RFID tag
US5881846A (en) * 1997-04-17 1999-03-16 Carttronics Llc Security device for shopping carts and the like
US6061914A (en) * 1997-07-23 2000-05-16 Speed France Cutting line with improved degradability for brush cutters and edge trimmers
US6181248B1 (en) * 1995-11-29 2001-01-30 N.V. Nederlandsche Apparatenfabriek Nedap Deactivatable article security label with data carrier function
US6380894B1 (en) * 1999-08-30 2002-04-30 Wherenet Corporation Multi-lateration system with automatic calibration and error removal
US6512478B1 (en) * 1999-12-22 2003-01-28 Rockwell Technologies, Llc Location position system for relay assisted tracking
US6703934B1 (en) * 2000-04-11 2004-03-09 Koninklijke Philips Electronics N.V. Method for dynamic pricing of goods and services
US6837427B2 (en) * 2001-11-21 2005-01-04 Goliath Solutions, Llc. Advertising compliance monitoring system
US6861954B2 (en) * 2001-03-30 2005-03-01 Bruce H. Levin Tracking medical products with integrated circuits
US20050110636A1 (en) * 2001-10-12 2005-05-26 Touraj Ghaffari Real time total asset visibility system
US20050202818A1 (en) * 2004-03-15 2005-09-15 Nec Corporation System, communication device, and base station for wireless communications, and control method thereof
US20050212663A1 (en) * 2004-03-23 2005-09-29 Michihiro Matsumoto Equipment installation-place setting system, equipment control apparatus, electrical equipment, equipment installation-place setting method and computer-readable record medium storing equipment installation-place setting program
US6984807B2 (en) * 2002-07-12 2006-01-10 Harley-Davidson Motor Company Group, Inc. Heated motorcycle handgrips
US20060022815A1 (en) * 2004-07-30 2006-02-02 Fischer Jeffrey H Interference monitoring in an RFID system
US20060033662A1 (en) * 2004-07-27 2006-02-16 Ubisense Limited Location system
US7007523B2 (en) * 2003-02-24 2006-03-07 Alpha Security Products, Inc. Bottle security device
US20060049250A1 (en) * 2004-09-09 2006-03-09 Sullivan Michael S RFID system performance monitoring
US20060049946A1 (en) * 2004-09-09 2006-03-09 Sullivan Michael S RFID tag sensitivity
US20060059367A1 (en) * 2004-03-29 2006-03-16 Yarvis Mark D Radio frequency identification tag lock and key
US7020501B1 (en) * 2001-11-30 2006-03-28 Bbnt Solutions Llc Energy efficient forwarding in ad-hoc wireless networks
US20060081020A1 (en) * 2004-10-20 2006-04-20 Yu-Ling Hsiao Anti-theft apparatus and anti-theft subject for rental or the like
US20060092016A1 (en) * 2004-10-20 2006-05-04 Modes Jerold R Systems, methods and devices for area-based localization
US7046149B1 (en) * 1999-10-08 2006-05-16 N.V. Nederlandsche Apparatenfabriek Nedap Real-time system for monitoring theft protection
US20060109125A1 (en) * 2004-11-08 2006-05-25 Goliath Solutions Llc. System for RF detection and location determination of merchandising materials in retail environments
US20060214773A1 (en) * 2005-02-10 2006-09-28 Psc Scanning, Inc. RFID tag singulation
US7162899B2 (en) * 2004-12-28 2007-01-16 Alpha Security Products, Inc. Cable wrap security device
US20070018787A1 (en) * 2005-07-22 2007-01-25 Neology, Inc. Systems and methods for secure locking mechanisms
US20070024448A1 (en) * 2002-04-08 2007-02-01 Universal Surveillance Corporation Article surveillance tag having a vial
US20070050261A1 (en) * 2005-08-31 2007-03-01 Tao Lin Tracking assets between organizations in a consortium of organizations
US7194880B2 (en) * 2002-10-11 2007-03-27 Pietro Necchi Anti-theft case for miscellaneous items, particularly for videocassettes, DVD, compact disks, cassettes tapes and the like
US20070096873A1 (en) * 2005-10-28 2007-05-03 Ramin Sadr Rfid receiver
US20070096876A1 (en) * 2005-10-20 2007-05-03 Raj Bridgelall Adaptive RFID devices
US20070106518A1 (en) * 2003-05-14 2007-05-10 Wildman Timothy D Combined locating, tracking and communications system
US20070120669A1 (en) * 2005-11-29 2007-05-31 Alpha Security Products, Inc. Security device with perimeter alarm
US20070178911A1 (en) * 2004-06-09 2007-08-02 Koninklijke Philips Electronics, N.V. Automatic generation of signal strength map for location determination of mobile devices
US20080012710A1 (en) * 2006-07-11 2008-01-17 Ramin Sadr Rfid beam forming system
US7327262B2 (en) * 2005-10-12 2008-02-05 Mantic Point Solutions Limited System and method for electronic article surveillance
US20080030422A1 (en) * 2006-07-11 2008-02-07 John Gevargiz Rfid antenna system
US20080039023A1 (en) * 2004-06-02 2008-02-14 Ubisense Limited Tag Frequency Control
US7336183B2 (en) * 2004-04-30 2008-02-26 Kimberly-Clark Worldwide, Inc. Decommissioning an electronic data tag
US7336180B2 (en) * 2002-04-08 2008-02-26 Sayegh Adel O Article surveillance tag having a metal clip
US7342495B2 (en) * 2004-06-02 2008-03-11 Sayegh Adel O Integrated theft deterrent device
US7374096B2 (en) * 2001-11-21 2008-05-20 Goliath Solutions, Llc Advertising compliance monitoring system
US20080122610A1 (en) * 2000-01-24 2008-05-29 Nextreme L.L.C. RF-enabled pallet
US7474209B2 (en) * 2005-01-14 2009-01-06 Checkpoint Systems, Inc. Cable alarm security device
US20090022078A1 (en) * 2007-05-02 2009-01-22 Patterson Wade C Systems and methods for controlling sleep states of network nodes
US20090051536A1 (en) * 2007-08-22 2009-02-26 International Business Machines Corporation Decommissioning bin for automatic decommissioning of electronic tags
US7504952B2 (en) * 2005-12-28 2009-03-17 Sandlinks Ltd. Wide band RFID system with tag on flexible label
US20090079633A1 (en) * 2006-04-20 2009-03-26 Ubisense Limited Calibration of a location system
US20090080455A1 (en) * 2007-09-24 2009-03-26 Ewing David B Systems and methods for reducing data collisions in wireless network communications
US20090079573A1 (en) * 2007-08-31 2009-03-26 Bing Jiang Large scale folded dipole antenna for near-field rfid applications
US7511604B2 (en) * 2002-05-16 2009-03-31 Sandlinks Systems Ltd. Method and system for distance determination of RF tags
US7510123B2 (en) * 2004-11-18 2009-03-31 Goliath Solutions, Llc RF contact signal detector
US20090091451A1 (en) * 2007-10-08 2009-04-09 Christopher Richard Jones Systems and methods for secure supply chain management and inventory control
US20090103671A1 (en) * 2004-05-13 2009-04-23 Sandlinks Systems Ltd. Low Power Fast Impulse Radio Synchronization
US20090167502A1 (en) * 2007-12-31 2009-07-02 3M Innovative Properties Company Device for verifying a location and functionality of a radio-frequency identification (RFID) tag on an item
US7624918B2 (en) * 2005-02-04 2009-12-01 Philip Morris Usa Inc. Wireless identification based display
US7649490B2 (en) * 2006-12-19 2010-01-19 Samsung Electronics Co., Ltd. Method, and apparatus for measuring distance using radio frequency signal
US7652576B1 (en) * 2006-08-24 2010-01-26 Onasset Intelligence, Inc. Method and apparatus for locating and/or otherwise monitoring an ID tagged asset's condition
US7657740B2 (en) * 2004-12-28 2010-02-02 International Business Machines Corporation Verifying the ownership of an owner's authority in terms of product and service
US20100065362A1 (en) * 2008-09-16 2010-03-18 Honda Motor Co., Ltd. Canister-holding structure for supporting a cylindrical canister in a vehicle, combined canister and canister-holding structure, and motorcycle incorporating same
US20100097223A1 (en) * 2008-10-14 2010-04-22 James Robert Kruest Product security system
US20100102929A1 (en) * 2006-11-09 2010-04-29 Philippe Haumann Protection, security and displacement tracking luminous badge system
US7733836B2 (en) * 2005-12-09 2010-06-08 Honeywell International Inc. Method and apparatus for location estimation
US7743980B2 (en) * 2003-11-12 2010-06-29 De Sylva Robert Francis System and method for facilitating monetary transactions
US20110068921A1 (en) * 2009-09-21 2011-03-24 Checkpoint Systems, Inc. configurable monitoring device
US20110072132A1 (en) * 2009-09-21 2011-03-24 Checkpoint Systems, Inc. Retail Product Tracking System, Method, and Apparatus

Family Cites Families (167)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NO126975B (en) 1967-03-30 1973-04-16 John Welsh
US3961323A (en) 1971-02-22 1976-06-01 American Multi-Lert Corporation Cargo monitor apparatus and method
US3752960A (en) 1971-12-27 1973-08-14 C Walton Electronic identification & recognition system
US3816708A (en) 1973-05-25 1974-06-11 Proximity Devices Electronic recognition and identification system
US3984807A (en) 1973-11-05 1976-10-05 Products Of Information Systems Vehicle location system
DE2417228A1 (en) 1974-04-09 1975-11-06 Heller Geb PROCEDURE FOR SUCTIONING SMALL DRILLS FROM THE DRILLING SITE OF A DRILL AND DRILL, DRILL AND ADAPTER FOR CARRYING OUT THE PROCEDURE
US4209787A (en) 1975-04-16 1980-06-24 Gould Inc. Method for monitoring the location of monitored objects
NL7708012A (en) 1977-07-19 1979-01-23 Nedap Nv DETECTION SYSTEM.
US4223830A (en) 1978-08-18 1980-09-23 Walton Charles A Identification system
US4225953A (en) 1978-09-29 1980-09-30 Simon William F Personnel locator
US4242663A (en) 1979-02-01 1980-12-30 Lockheed Electronics Corporation Electronic identification system
US4366481A (en) 1980-03-26 1982-12-28 Micro Magnetic Industries, Inc. Vending machine acquisition system
US4336531A (en) 1980-11-03 1982-06-22 Kincaid Robert A Shoplifting alarm system and method
US4462022A (en) 1981-11-12 1984-07-24 A. R. F. Products, Inc. Security system with radio frequency coupled remote sensors
NL8200138A (en) 1982-01-14 1983-08-01 Nedap Nv DETECTION SYSTEM.
US4700179A (en) 1982-04-12 1987-10-13 Ici Americas Inc. Crossed beam high frequency anti-theft system
NL8202951A (en) 1982-07-21 1984-02-16 Nedap Nv ABSORPTION DETECTION SYSTEM.
US4453636A (en) 1983-05-03 1984-06-12 Meadows Bernard A Safe container
US4531117A (en) 1983-07-05 1985-07-23 Minnesota Mining And Manufacturing Company Variable frequency RF electronic surveillance system
US4862160A (en) 1983-12-29 1989-08-29 Revlon, Inc. Item identification tag for rapid inventory data acquisition system
US4688026A (en) 1984-05-15 1987-08-18 Scribner James R Method of collecting and using data associated with tagged objects
US4792018A (en) 1984-07-09 1988-12-20 Checkrobot Inc. System for security processing of retailed articles
US4630035A (en) 1985-01-04 1986-12-16 Motorola, Inc. Alarm system having alarm transmitter indentification codes and acoustic ranging
US4866661A (en) 1986-03-26 1989-09-12 Prins Maurits L De Computer controlled rental and sale system and method for a supermarket and the like
DE3687527T2 (en) 1986-04-14 1993-05-13 Avicom International Inc PROCESS MONITORING AND SECURITY CONTROL SYSTEM.
US4857893A (en) 1986-07-18 1989-08-15 Bi Inc. Single chip transponder device
NL8602033A (en) 1986-08-08 1988-03-01 Nedap Nv PRECISION FOCUS ON RECOGNITION SYSTEM.
NL8700369A (en) 1987-02-16 1988-09-16 Nedap Nv METHOD FOR PLACING AN ELECTRONIC RESPONDER IN A METAL ENVIRONMENT
NL8700388A (en) 1987-02-17 1988-09-16 Nedap Nv FLEXIBLE IDENTIFICATION LABEL.
AU586356B2 (en) 1987-06-03 1989-07-06 Magry Systems Co., Ltd. Shoplifting preventing device
US4837568A (en) 1987-07-08 1989-06-06 Snaper Alvin A Remote access personnel identification and tracking system
NL8702426A (en) 1987-10-12 1989-05-01 Nedap Nv METHOD AND APPARATUS FOR IDENTIFYING METAL PALLETS AND CONTAINERS.
US4951029A (en) 1988-02-16 1990-08-21 Interactive Technologies, Inc. Micro-programmable security system
US4870391A (en) 1988-04-05 1989-09-26 Knogo Corporation Multiple frequency theft detection system
US5059951A (en) 1988-11-14 1991-10-22 Checkpoint Systems, Inc. Method and apparatus for integrated data capture and electronic article surveillance
US4881061A (en) 1988-12-05 1989-11-14 Minnesota Mining And Manufacturing Company Article removal control system
NL8803170A (en) 1988-12-27 1990-07-16 Nedap Nv IDENTIFICATION SYSTEM.
JPH0780386B2 (en) 1989-01-25 1995-08-30 東海金属株式会社 Resonant tag and manufacturing method thereof
NL8900461A (en) 1989-02-24 1990-09-17 Nedap Nv WAFER WITH MOUNTING BRACKET.
NL8900658A (en) 1989-03-17 1990-10-16 Nedap Nv HIGH-FREQUENT SHOPPING THEFT DETECTION SYSTEM ACCORDING TO THE TRANSMISSION PRINCIPLE.
US5031098A (en) 1989-04-28 1991-07-09 Norand Corporation Transaction control system including portable data terminal and mobile customer service station
NL8901659A (en) 1989-06-30 1991-01-16 Nedap Nv MULTIPASS SYSTEM.
US4961533A (en) 1989-09-27 1990-10-09 Viac Inc. Inventory control system
JP2964514B2 (en) * 1990-01-19 1999-10-18 ソニー株式会社 Sound signal reproduction device
NL9000186A (en) 1990-01-25 1991-08-16 Nedap Nv DEACTIVATOR.
DE4003410A1 (en) 1990-02-05 1991-08-08 Anatoli Stobbe PORTABLE FIELD PROGRAMMABLE DETECTOR TAG
US5153842A (en) 1990-02-05 1992-10-06 Pitney Bowes Inc. Integrated circuit package label and/or manifest system
DE4010327C1 (en) 1990-03-30 1991-12-19 Helmut 5330 Koenigswinter De Braehler
NL9001033A (en) 1990-05-01 1991-12-02 Nedap Nv SHOP THEFT DETECTION SYSTEM WITH PARTIALLY PROTECTED ANTENNAS.
US5119104A (en) 1990-05-04 1992-06-02 Heller Alan C Location system adapted for use in multipath environments
NL9002120A (en) 1990-09-28 1992-04-16 Nedap Nv PULSE DEACTIVATOR.
NL9002683A (en) 1990-12-06 1992-07-01 Nedap Nv RETRO-REFLECTIVE MICROWAVE TRANSPONDER.
US5365516A (en) 1991-08-16 1994-11-15 Pinpoint Communications, Inc. Communication system and method for determining the location of a transponder unit
NL9200835A (en) 1992-05-11 1993-12-01 Nedap Nv FLEXIBLE COIL CONSTRUCTION IN IDENTIFICATION CARD.
NL9201072A (en) 1992-06-18 1994-01-17 Nedap Nv INTEGRATED MICROWAVE / INDUCTIVE TRANSPONDER.
US5346210A (en) 1992-08-28 1994-09-13 Teem Systems, Inc. Object locator system
US5311185A (en) 1992-08-31 1994-05-10 Hochstein Peter A Supervised personnel monitoring system
DE4321650C1 (en) 1993-06-30 1994-10-20 Stihl Maschf Andreas Mowing filament for a free-cutting appliance
US5486768A (en) * 1994-05-31 1996-01-23 Southwest Research Institute Surface resistivity meter for determining surface degradation of high resistivity materials
US5671362A (en) 1995-04-04 1997-09-23 Cowe; Alan B. Materials monitoring systems, materials management systems and related methods
JPH08279083A (en) 1995-04-07 1996-10-22 Alps Electric Co Ltd Robbery monitor device with alarm
CN1233327A (en) 1996-10-17 1999-10-27 准确定位公司 Article tracking system
IT1298682B1 (en) 1997-02-14 2000-01-12 Pietro Necchi ANTI-THEFT CASE WITH SMALL SPACE, IN PARTICULAR FOR COMPACT DISK, MUSIC CASSETTE, VIDEO CASSETTE AND SIMILAR
FR2760596B1 (en) 1997-03-14 1999-04-02 Speed France COMPOSITE CUTTING WIRE FOR TRIMMERS AND TRIMMERS
US6125972A (en) 1997-04-17 2000-10-03 Carttronics Llc Security apparatus and method for shopping carts and the like
PL190461B1 (en) 1998-01-29 2005-12-30 Necchi Srl Theft preventing display case in particular for displaying compact discs, video cassettes, magnetic sound recording tape cassettes and the like
US5942978A (en) 1998-04-24 1999-08-24 Sensormatic Electronics Corporation Wireless transmitter key for EAS tag detacher unit
US5955951A (en) 1998-04-24 1999-09-21 Sensormatic Electronics Corporation Combined article surveillance and product identification system
WO2000016564A1 (en) 1998-09-11 2000-03-23 Key-Trak, Inc. Object control and tracking system with zonal transition detection
US6486768B1 (en) 1998-09-16 2002-11-26 Carttronics, Llc Cart return loyalty credit system
JP4349534B2 (en) 1999-02-16 2009-10-21 株式会社明治ゴム化成 Plastic container with lid
US6356809B1 (en) 1999-06-11 2002-03-12 Cbi Systems Corporation Electro-statically shielded processing module
AU6217100A (en) 1999-07-15 2001-02-05 Pinpoint Corporation Method and apparatus for mobile tag reading
US6486769B1 (en) 1999-12-22 2002-11-26 Intermec Ip Corp. Method and system for automatic adjustment and diagnosis of radio frequency identification systems using programmable checktags
AU2001273664A1 (en) 2000-06-30 2002-01-14 Alpha Security Products, Inc. Security storage container
US7062823B2 (en) 2000-10-26 2006-06-20 Alpha Security Products, Inc. Theft deterrent device
US6762691B2 (en) 2001-01-10 2004-07-13 International Business Machines Corporation Method and system for automatically locating equipment stored in a rack
US7242306B2 (en) 2001-05-08 2007-07-10 Hill-Rom Services, Inc. Article locating and tracking apparatus and method
US20020174695A1 (en) 2001-05-25 2002-11-28 David K. Huehner Theft deterrent tag
WO2002103645A2 (en) 2001-06-14 2002-12-27 Rf Code, Inc. Wireless identification system and protocol
US6951305B2 (en) 2001-11-21 2005-10-04 Goliath Solutions, Llc. Advertising compliance monitoring system
EP1316814A1 (en) 2001-11-30 2003-06-04 Cross Point RFAPP B.V. i.o. Tracing of transponder-tagged objects
US7023356B2 (en) 2001-11-26 2006-04-04 Aero-Vision Technologies, Inc. System and method for monitoring individuals and objects associated with wireless identification tags
AU2003209188B2 (en) 2002-01-09 2009-01-22 Tyco Fire & Security Gmbh Intelligent Station Using Multiple RF Antennae and Inventory Control System and Method Incorporating Same
US8321302B2 (en) 2002-01-23 2012-11-27 Sensormatic Electronics, LLC Inventory management system
US6701588B2 (en) 2002-02-07 2004-03-09 Sony Ericsson Mobile Communications Ab Pin lock
US6755055B2 (en) 2002-02-26 2004-06-29 Alpha Security Products, Inc. Theft deterrent device
US7061367B2 (en) 2002-04-30 2006-06-13 General Electric Company Managing access to physical assets
WO2005022292A2 (en) * 2003-05-06 2005-03-10 Argo-Tech Corporation Tracking system and associated method
GB0219374D0 (en) 2002-08-20 2002-09-25 Dubois Ltd Security container
US20040104814A1 (en) * 2002-11-14 2004-06-03 Christensen Henrik Thorning Method and apparatus for vehicle coupling
BR0317442A (en) * 2002-12-17 2005-11-16 Ube Industries Multilayer structure with excellent fuel barrier performance
GB0301790D0 (en) 2003-01-25 2003-02-26 Ubiquitous Systems Ltd System for detecting intruders in a populated space
US7021807B2 (en) * 2003-02-25 2006-04-04 Tong Fatt Chew Signal lamp incorporating spatially separated clustered light emitting devices
NL1023843C2 (en) 2003-07-07 2005-01-10 Nedap Nv Assembly of an activity meter and a mounting tape for attaching the activity meter to the neck or leg of an animal.
US7834816B2 (en) 2003-07-25 2010-11-16 Sensormatic Electronics Llc Apparatus for and method of using a diversity antenna
WO2005010798A2 (en) 2003-07-29 2005-02-03 Dan Raphaeli Method and corresponding system for hand-held rf tag locator
US7148805B2 (en) 2003-08-08 2006-12-12 Sensormatic Electronics Corporation Hard security tag and detaching device
DE602004019239D1 (en) 2003-08-13 2009-03-12 Sandlinks Systems Ltd ANALOG SIGNAL SAMPLER FOR PROVIDING A DIGITAL REPRESENTATION THEREOF
FR2862999B1 (en) 2003-12-02 2009-03-06 Fors France ANTI-THEFT DEVICE COMPRISING TWO SLIDING BODIES ONE TOGETHER THE OTHER TO HIDE AN ARTICLE
US7471199B2 (en) 2004-01-09 2008-12-30 Intermec Ip Corp. Mobile key using read/write RFID tag
WO2005071790A2 (en) 2004-01-16 2005-08-04 Meadwestvaco Corporation Systems for and methods of assigning priority to reader antennae
WO2005106748A2 (en) 2004-04-22 2005-11-10 Sensitech Inc. Pedigree and integrity evaluation of packages
US7098794B2 (en) 2004-04-30 2006-08-29 Kimberly-Clark Worldwide, Inc. Deactivating a data tag for user privacy or tamper-evident packaging
US7225903B2 (en) 2004-04-30 2007-06-05 Carttronics, Llc Shopping cart tilt and tip prevention device
JP4123195B2 (en) 2004-06-22 2008-07-23 オムロン株式会社 Tag communication device, tag communication device control method, tag communication control program, and tag communication management system
US7266979B2 (en) 2004-07-30 2007-09-11 Alpha Security Products, Inc. Theft deterrent device
US7109867B2 (en) 2004-09-09 2006-09-19 Avery Dennison Corporation RFID tags with EAS deactivation ability
WO2006030422A2 (en) 2004-09-13 2006-03-23 Sandlinks Systems Ltd. Communication and distance measurement in an addressed wide band rfid system
CN100564180C (en) 2004-09-22 2009-12-02 配尔特·莱克齐 Antitheft and the safety gear that is used for bottle
US7614556B2 (en) 2004-11-05 2009-11-10 Goliath Solutions, Llc Distributed RFID antenna array utilizing circular polarized helical antennas
US7148804B2 (en) 2004-11-08 2006-12-12 Checkpoint Systems, Inc. System and method for detecting EAS/RFID tags using step listen
US7535337B2 (en) * 2004-11-18 2009-05-19 Goliath Solutions, Llc Systems and methods for monitoring open stock merchandising
AU2005307767A1 (en) 2004-11-19 2006-05-26 Goliath Solutions L.L.C. Low stock alert system
AU2005309628A1 (en) 2004-11-24 2006-06-01 Sensormatic Electronics, LLC System and method for integrating point of sale and electronic article surveillance data
US7259674B2 (en) 2004-12-22 2007-08-21 Alpha Security Products, Inc. Bottle security device
US20060174667A1 (en) 2005-02-07 2006-08-10 Garner Glen W Security device and system for use therewith
US7304574B2 (en) 2005-02-10 2007-12-04 Sensormatic Electronics Corporation Alarm investigation using RFID
CN102946625A (en) 2005-03-03 2013-02-27 传感电子有限责任公司 Apparatus for and method of using an intelligent network and RFID signal router
US7755485B2 (en) 2005-03-08 2010-07-13 Inpoint Systems, Inc. System and method for electronic article surveillance
US20070074936A1 (en) * 2005-04-26 2007-04-05 Means Jay S Braking shell for shopping cart security device
US7604178B2 (en) 2005-05-11 2009-10-20 Intelleflex Corporation Smart tag activation
RU2418933C2 (en) 2005-05-23 2011-05-20 Сенсормэтик Электроникс, Ллк Protective device with engaging element
US20060290519A1 (en) 2005-06-22 2006-12-28 Boate Alan R Two-way wireless monitoring system and method
WO2007017871A2 (en) 2005-08-08 2007-02-15 Sandlinks Systems Ltd. Rfid-uwb system connected to wlan infrastructure
US7394376B1 (en) 2005-10-19 2008-07-01 Sayegh Adel O Theft deterrent tag
US8552835B2 (en) 2005-10-28 2013-10-08 Mojix, Inc. RFID system with low complexity implementation and pallet coding error correction
US20070290924A1 (en) 2005-12-14 2007-12-20 Innerwireless, Inc. Wireless resource monitoring system and method
US7443298B2 (en) 2006-02-15 2008-10-28 International Business Machines Corporation Dynamic boundary mapping using position-determination systems
US20070205896A1 (en) 2006-03-02 2007-09-06 Axcess International Inc. System and Method for Determining Location, Directionality, and Velocity of RFID Tags
US7446658B2 (en) 2006-03-09 2008-11-04 Avago Technologies General Ip (Singapore) Pte. Ltd. Identification (ID) system and method of operation thereof
US20070285241A1 (en) 2006-03-20 2007-12-13 Axcess International Inc. Multi-Tag Tracking Systems and Methods
US20070222596A1 (en) * 2006-03-21 2007-09-27 Chep Usa Radio Frequency Identification System and Tag
US7423516B2 (en) 2006-05-04 2008-09-09 Goliath Solutions, Llc Systems and methods for approximating the location of an RFID tag
SE529117C2 (en) 2006-06-02 2007-05-02 Optosolutions Sweden Ab Lock, comprises first part with magnetic locking member designed to move into path of actuator in a second part to block movement of this latter part opposite to the locking direction
US9087226B2 (en) 2006-06-09 2015-07-21 Intelleflex Corporation System, method and computer program product for calibrating interrogator signal strength and/or tag response range setting
US20080085727A1 (en) 2006-06-14 2008-04-10 Kratz Tyler M System and method for determining mobile device position information
US7583195B2 (en) 2006-08-22 2009-09-01 Checkpoint Systems, Inc. Security tag adapter for containers
US7310070B1 (en) 2006-08-23 2007-12-18 Goliath Solutions, Llc Radio frequency identification shelf antenna with a distributed pattern for localized tag detection
US8477013B2 (en) 2006-08-31 2013-07-02 Sanjay Sarma Method and system for performing mobile RFID asset detection and tracking
US7952464B2 (en) * 2006-10-05 2011-05-31 Intermec Ip Corp. Configurable RFID tag with protocol and band selection
US8044806B2 (en) 2006-10-19 2011-10-25 Sayegh Adel O Security tag with engaging element
US7717326B2 (en) 2006-11-15 2010-05-18 International Business Machines Corporation Method and system for protecting data
US7760095B2 (en) 2006-12-15 2010-07-20 Symbol Technologies, Inc. Context-driven RFID tag and system content
US7420461B2 (en) 2006-12-28 2008-09-02 Carttronics, Llc Caster-lock with dual receivers
US7808390B2 (en) 2007-01-05 2010-10-05 Adel Sayegh Security tag having a swiveling engagement
US20080174404A1 (en) 2007-01-23 2008-07-24 Microsoft Corporation Dynamic updates in rfid manager
US7859410B2 (en) 2007-01-24 2010-12-28 United Security Applications Id, Inc. Universal tracking assembly
US8395482B2 (en) 2007-03-23 2013-03-12 Mojix, Inc. RFID systems using distributed exciter network
WO2008118989A1 (en) 2007-03-26 2008-10-02 Wavetrack Systems, Inc. System and method for wireless security theft prevention
WO2008132269A1 (en) 2007-04-26 2008-11-06 Nokia Corporation Short range communication
US7953216B2 (en) 2007-05-04 2011-05-31 3V Technologies Incorporated Systems and methods for RFID-based access management of electronic devices
US20080279307A1 (en) 2007-05-07 2008-11-13 Decawave Limited Very High Data Rate Communications System
US7782207B2 (en) 2007-06-12 2010-08-24 Checkpoint Systems, Inc. Comprehensive theft security system
US8026814B1 (en) * 2007-07-25 2011-09-27 Pinpoint Technologies Inc. Wireless mesh network for an asset tracking system
US7956746B2 (en) 2007-10-19 2011-06-07 Awarepoint Corporation Wireless tracking system and method with tag removal detection
CA2706759A1 (en) * 2007-11-26 2009-06-04 Lawrence J. Karr Anti-tamper cargo container locator system
US7800490B2 (en) 2008-01-09 2010-09-21 Sensormatic Electronics, LLC Electronic article surveillance system neural network minimizing false alarms and failures to deactivate
US8422398B2 (en) 2008-01-23 2013-04-16 Zebra Enterprise Solutions Corp. Media access control (MAC) for an active RFID system
US7973661B2 (en) 2008-03-06 2011-07-05 Sensomatic Electronics, LLC Detacher system and method having an RFID antenna for a combination EAS and RFID tag
FR2932590B1 (en) 2008-06-17 2010-05-21 Mpe Technology MULTI-FUNCTIONAL AND CONTACTLESS ELECTRONIC LABEL FOR GOODS
US7954712B2 (en) 2008-09-12 2011-06-07 Transparent Visibility Holdings, LLC Product, asset, and device tracking, identification, and pricing system
CA2745691A1 (en) 2008-12-03 2010-06-10 Checkpoint Systems, Inc. Locking device for tote bin
US20100141445A1 (en) 2008-12-08 2010-06-10 Savi Networks Inc. Multi-Mode Commissioning/Decommissioning of Tags for Managing Assets
US8258953B2 (en) 2009-02-12 2012-09-04 Symbol Technologies, Inc. Displaying radio frequency identification (RFID) read range of an RFID reader based on feedback from fixed RFID beacon tags
US20100201520A1 (en) 2009-02-12 2010-08-12 Symbol Technologies, Inc. System for determining item location based on feedback from fixed radio frequency identification (rfid) readers and/or fixed rfid beacon tags
EP2483877B1 (en) 2009-09-28 2015-10-21 Checkpoint Systems, Inc. System, method, and apparatus for triggering an alarm

Patent Citations (109)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4021807A (en) * 1975-04-02 1977-05-03 Texas Instruments Incorporated Beacon tracking system
US4141078A (en) * 1975-10-14 1979-02-20 Innovated Systems, Inc. Library circulation control system
US4141006A (en) * 1976-07-14 1979-02-20 Braxton Kenneth J Security system for centralized monitoring and selective reporting of remote alarm conditions
US4196418A (en) * 1976-11-01 1980-04-01 N.V. Nederlandsche Apparatenfabriek Nedap Detection plate for an identification system
US4327353A (en) * 1978-03-06 1982-04-27 George W. Beard Security system
US5019815A (en) * 1979-10-12 1991-05-28 Lemelson Jerome H Radio frequency controlled interrogator-responder system with passive code generator
US4572976A (en) * 1982-12-10 1986-02-25 N.V. Nederlandsche Apparatenfabriek Nedap Transponder for electromagnetic detection system with non-linear circuit
US4827395A (en) * 1983-04-21 1989-05-02 Intelli-Tech Corporation Manufacturing monitoring and control systems
US4656463A (en) * 1983-04-21 1987-04-07 Intelli-Tech Corporation LIMIS systems, devices and methods
US4580041A (en) * 1983-12-09 1986-04-01 Walton Charles A Electronic proximity identification system with simplified low power identifier
US4742341A (en) * 1985-06-14 1988-05-03 N.V. Nederlandsche Apparatenfabriek Nedap Electromagnetic detection system, as well as a responder for such a system
US4667185A (en) * 1985-12-06 1987-05-19 Minnesota Mining And Manufacturing Company Wireless synchronization system for electronic article surveillance system
US4746830A (en) * 1986-03-14 1988-05-24 Holland William R Electronic surveillance and identification
US5105190A (en) * 1986-04-22 1992-04-14 N.V. Nederlandsche Apparatenfabriek Nedap Electromagnetic identification system
US4814751A (en) * 1987-02-27 1989-03-21 Wildlife Materials, Inc. Patient tracking system
US4924210A (en) * 1987-03-17 1990-05-08 Omron Tateisi Electronics Company Method of controlling communication in an ID system
US5019813A (en) * 1987-04-13 1991-05-28 N.V. Nederlandsche Apparatenfabriek Nedap System for the contactless exchange of data
US5103222A (en) * 1987-07-03 1992-04-07 N.V. Nederlandsche Apparatenfabriek Nedap Electronic identification system
US5008660A (en) * 1988-03-04 1991-04-16 N.V. Nederlandsche Apparatenfabriek Nedap Electromagnetic detection system
US5014206A (en) * 1988-08-22 1991-05-07 Facilitech International Incorporated Tracking system
US4907845A (en) * 1988-09-16 1990-03-13 Salomon Sa Bed patient monitoring system
US4918432A (en) * 1988-09-27 1990-04-17 B. I. Incorporated House arrest monitoring system
US5214410A (en) * 1989-07-10 1993-05-25 Csir Location of objects
US5099227A (en) * 1989-07-18 1992-03-24 Indala Corporation Proximity detecting apparatus
US5006830A (en) * 1989-10-16 1991-04-09 Rebecca Merritt Method and device for deterring the unauthorized removal of a newborn from a defined area
US4926161A (en) * 1989-10-23 1990-05-15 Cupp Ted W Method of monitoring golf carts on a golf course
US5181786A (en) * 1989-11-15 1993-01-26 N.V. Nederlandsche Apparatenfabriek Nedap Method and apparatus for producing admission tickets
US5317309A (en) * 1990-11-06 1994-05-31 Westinghouse Electric Corp. Dual mode electronic identification system
US5099226A (en) * 1991-01-18 1992-03-24 Interamerican Industrial Company Intelligent security system
US5151684A (en) * 1991-04-12 1992-09-29 Johnsen Edward L Electronic inventory label and security apparatus
US5709942A (en) * 1991-05-20 1998-01-20 Alliedsignal Inc. Product and process improvement of coated polymeric monofilament
US5396224A (en) * 1991-11-22 1995-03-07 Hewlett-Packard Company Telemetered patient location system and method
US5214409A (en) * 1991-12-03 1993-05-25 Avid Corporation Multi-memory electronic identification tag
US5288980A (en) * 1992-06-25 1994-02-22 Kingsley Library Equipment Company Library check out/check in system
US5608380A (en) * 1994-05-18 1997-03-04 N.V. Nederlandsche Apparatenfabriek Nedap Deactivation and coding system for a contactless antitheft or identification label
US5596313A (en) * 1995-05-16 1997-01-21 Personal Security & Safety Systems, Inc. Dual power security location system
US6181248B1 (en) * 1995-11-29 2001-01-30 N.V. Nederlandsche Apparatenfabriek Nedap Deactivatable article security label with data carrier function
US5874896A (en) * 1996-08-26 1999-02-23 Palomar Technologies Corporation Electronic anti-shoplifting system employing an RFID tag
US5881846A (en) * 1997-04-17 1999-03-16 Carttronics Llc Security device for shopping carts and the like
US6061914A (en) * 1997-07-23 2000-05-16 Speed France Cutting line with improved degradability for brush cutters and edge trimmers
US6380894B1 (en) * 1999-08-30 2002-04-30 Wherenet Corporation Multi-lateration system with automatic calibration and error removal
US7046149B1 (en) * 1999-10-08 2006-05-16 N.V. Nederlandsche Apparatenfabriek Nedap Real-time system for monitoring theft protection
US6512478B1 (en) * 1999-12-22 2003-01-28 Rockwell Technologies, Llc Location position system for relay assisted tracking
US20080122610A1 (en) * 2000-01-24 2008-05-29 Nextreme L.L.C. RF-enabled pallet
US6703934B1 (en) * 2000-04-11 2004-03-09 Koninklijke Philips Electronics N.V. Method for dynamic pricing of goods and services
US6861954B2 (en) * 2001-03-30 2005-03-01 Bruce H. Levin Tracking medical products with integrated circuits
US20050110636A1 (en) * 2001-10-12 2005-05-26 Touraj Ghaffari Real time total asset visibility system
US6837427B2 (en) * 2001-11-21 2005-01-04 Goliath Solutions, Llc. Advertising compliance monitoring system
US7021535B2 (en) * 2001-11-21 2006-04-04 Goliath Solutions, Llc Advertising compliance monitoring system
US7374096B2 (en) * 2001-11-21 2008-05-20 Goliath Solutions, Llc Advertising compliance monitoring system
US7020501B1 (en) * 2001-11-30 2006-03-28 Bbnt Solutions Llc Energy efficient forwarding in ad-hoc wireless networks
US20070024448A1 (en) * 2002-04-08 2007-02-01 Universal Surveillance Corporation Article surveillance tag having a vial
US7336180B2 (en) * 2002-04-08 2008-02-26 Sayegh Adel O Article surveillance tag having a metal clip
US7511604B2 (en) * 2002-05-16 2009-03-31 Sandlinks Systems Ltd. Method and system for distance determination of RF tags
US6984807B2 (en) * 2002-07-12 2006-01-10 Harley-Davidson Motor Company Group, Inc. Heated motorcycle handgrips
US7194880B2 (en) * 2002-10-11 2007-03-27 Pietro Necchi Anti-theft case for miscellaneous items, particularly for videocassettes, DVD, compact disks, cassettes tapes and the like
US7007523B2 (en) * 2003-02-24 2006-03-07 Alpha Security Products, Inc. Bottle security device
US20070106518A1 (en) * 2003-05-14 2007-05-10 Wildman Timothy D Combined locating, tracking and communications system
US7743980B2 (en) * 2003-11-12 2010-06-29 De Sylva Robert Francis System and method for facilitating monetary transactions
US20050202818A1 (en) * 2004-03-15 2005-09-15 Nec Corporation System, communication device, and base station for wireless communications, and control method thereof
US20050212663A1 (en) * 2004-03-23 2005-09-29 Michihiro Matsumoto Equipment installation-place setting system, equipment control apparatus, electrical equipment, equipment installation-place setting method and computer-readable record medium storing equipment installation-place setting program
US20060059367A1 (en) * 2004-03-29 2006-03-16 Yarvis Mark D Radio frequency identification tag lock and key
US7336183B2 (en) * 2004-04-30 2008-02-26 Kimberly-Clark Worldwide, Inc. Decommissioning an electronic data tag
US20090103671A1 (en) * 2004-05-13 2009-04-23 Sandlinks Systems Ltd. Low Power Fast Impulse Radio Synchronization
US7342495B2 (en) * 2004-06-02 2008-03-11 Sayegh Adel O Integrated theft deterrent device
US20080039023A1 (en) * 2004-06-02 2008-02-14 Ubisense Limited Tag Frequency Control
US20070178911A1 (en) * 2004-06-09 2007-08-02 Koninklijke Philips Electronics, N.V. Automatic generation of signal strength map for location determination of mobile devices
US20060033662A1 (en) * 2004-07-27 2006-02-16 Ubisense Limited Location system
US20060022815A1 (en) * 2004-07-30 2006-02-02 Fischer Jeffrey H Interference monitoring in an RFID system
US20060049250A1 (en) * 2004-09-09 2006-03-09 Sullivan Michael S RFID system performance monitoring
US20080106416A1 (en) * 2004-09-09 2008-05-08 Sullivan Michael S RFID tag sensitivity
US7378967B2 (en) * 2004-09-09 2008-05-27 The Gillette Company RFID tag sensitivity
US20060049946A1 (en) * 2004-09-09 2006-03-09 Sullivan Michael S RFID tag sensitivity
US7161489B2 (en) * 2004-09-09 2007-01-09 The Gillette Company RFID system performance monitoring
US20060081020A1 (en) * 2004-10-20 2006-04-20 Yu-Ling Hsiao Anti-theft apparatus and anti-theft subject for rental or the like
US20060092016A1 (en) * 2004-10-20 2006-05-04 Modes Jerold R Systems, methods and devices for area-based localization
US20060109125A1 (en) * 2004-11-08 2006-05-25 Goliath Solutions Llc. System for RF detection and location determination of merchandising materials in retail environments
US7510123B2 (en) * 2004-11-18 2009-03-31 Goliath Solutions, Llc RF contact signal detector
US7162899B2 (en) * 2004-12-28 2007-01-16 Alpha Security Products, Inc. Cable wrap security device
US7657740B2 (en) * 2004-12-28 2010-02-02 International Business Machines Corporation Verifying the ownership of an owner's authority in terms of product and service
US7474209B2 (en) * 2005-01-14 2009-01-06 Checkpoint Systems, Inc. Cable alarm security device
US7624918B2 (en) * 2005-02-04 2009-12-01 Philip Morris Usa Inc. Wireless identification based display
US20060214773A1 (en) * 2005-02-10 2006-09-28 Psc Scanning, Inc. RFID tag singulation
US20070018787A1 (en) * 2005-07-22 2007-01-25 Neology, Inc. Systems and methods for secure locking mechanisms
US20070050261A1 (en) * 2005-08-31 2007-03-01 Tao Lin Tracking assets between organizations in a consortium of organizations
US7327262B2 (en) * 2005-10-12 2008-02-05 Mantic Point Solutions Limited System and method for electronic article surveillance
US20070096876A1 (en) * 2005-10-20 2007-05-03 Raj Bridgelall Adaptive RFID devices
US20070096873A1 (en) * 2005-10-28 2007-05-03 Ramin Sadr Rfid receiver
US20070120669A1 (en) * 2005-11-29 2007-05-31 Alpha Security Products, Inc. Security device with perimeter alarm
US7733836B2 (en) * 2005-12-09 2010-06-08 Honeywell International Inc. Method and apparatus for location estimation
US7504952B2 (en) * 2005-12-28 2009-03-17 Sandlinks Ltd. Wide band RFID system with tag on flexible label
US20090079633A1 (en) * 2006-04-20 2009-03-26 Ubisense Limited Calibration of a location system
US20080012710A1 (en) * 2006-07-11 2008-01-17 Ramin Sadr Rfid beam forming system
US20080030422A1 (en) * 2006-07-11 2008-02-07 John Gevargiz Rfid antenna system
US7652576B1 (en) * 2006-08-24 2010-01-26 Onasset Intelligence, Inc. Method and apparatus for locating and/or otherwise monitoring an ID tagged asset's condition
US20100102929A1 (en) * 2006-11-09 2010-04-29 Philippe Haumann Protection, security and displacement tracking luminous badge system
US7649490B2 (en) * 2006-12-19 2010-01-19 Samsung Electronics Co., Ltd. Method, and apparatus for measuring distance using radio frequency signal
US20090022078A1 (en) * 2007-05-02 2009-01-22 Patterson Wade C Systems and methods for controlling sleep states of network nodes
US20090051536A1 (en) * 2007-08-22 2009-02-26 International Business Machines Corporation Decommissioning bin for automatic decommissioning of electronic tags
US20090079573A1 (en) * 2007-08-31 2009-03-26 Bing Jiang Large scale folded dipole antenna for near-field rfid applications
US20090080455A1 (en) * 2007-09-24 2009-03-26 Ewing David B Systems and methods for reducing data collisions in wireless network communications
US20090080423A1 (en) * 2007-09-24 2009-03-26 Ewing David B Systems and methods for adaptively adjusting codec rates for communication networks
US20090098898A1 (en) * 2007-09-24 2009-04-16 Patterson Wade C Systems and methods for communicating panic messages in wireless communication networks
US20090091451A1 (en) * 2007-10-08 2009-04-09 Christopher Richard Jones Systems and methods for secure supply chain management and inventory control
US20090167502A1 (en) * 2007-12-31 2009-07-02 3M Innovative Properties Company Device for verifying a location and functionality of a radio-frequency identification (RFID) tag on an item
US20100065362A1 (en) * 2008-09-16 2010-03-18 Honda Motor Co., Ltd. Canister-holding structure for supporting a cylindrical canister in a vehicle, combined canister and canister-holding structure, and motorcycle incorporating same
US20100097223A1 (en) * 2008-10-14 2010-04-22 James Robert Kruest Product security system
US20110068921A1 (en) * 2009-09-21 2011-03-24 Checkpoint Systems, Inc. configurable monitoring device
US20110072132A1 (en) * 2009-09-21 2011-03-24 Checkpoint Systems, Inc. Retail Product Tracking System, Method, and Apparatus

Cited By (155)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150161423A1 (en) * 2005-09-30 2015-06-11 Zebra Enterprise Solutions Corp. Wide-area dynamic rfid system using uwb
US20100231388A1 (en) * 2009-03-12 2010-09-16 Checkpoint Systems, Inc. Disposable cable lock and detachable alarm module
US9169670B2 (en) 2009-03-12 2015-10-27 Checkpoint Systems, Inc. Disposable cable lock and detachable alarm module
US20110068921A1 (en) * 2009-09-21 2011-03-24 Checkpoint Systems, Inc. configurable monitoring device
US8508367B2 (en) 2009-09-21 2013-08-13 Checkpoint Systems, Inc. Configurable monitoring device
US9298954B1 (en) * 2010-02-03 2016-03-29 Synapse Wireless, Inc. Tag security systems and methods for articles of merchandise
US8640509B2 (en) 2010-04-30 2014-02-04 Checkpoint Systems, Inc. Security assembly for attachment to an object
US20140162690A1 (en) * 2010-09-22 2014-06-12 General Electric Company System and method for determining the location of wireless sensors
US9215556B2 (en) * 2010-09-22 2015-12-15 General Electric Company System and method for determining the location of wireless sensors
WO2012115517A1 (en) * 2011-02-24 2012-08-30 Cross Point B.V. System with article surveillance device, article surveillance device and method for displaying configuration information
NL2007029C2 (en) * 2011-02-24 2012-08-27 Cross Point B V SYSTEM WITH ARTICLE-MONITORING DEVICE, ARTICLE-MONITORING DEVICE AND METHOD FOR VISUALIZING SET-UP INFORMATION.
US9065813B2 (en) * 2011-03-18 2015-06-23 Honeywell International Inc. Adapter device for coupling an industrial field instrument to an industrial wireless network and related system and method
US20120236768A1 (en) * 2011-03-18 2012-09-20 Honeywell International Inc. Adapter device for coupling an industrial field instrument to an industrial wireless network and related system and method
US9405285B2 (en) 2011-03-18 2016-08-02 Honeywell International Inc. Interface for local configuration and monitoring of an industrial field device with support for provisioning onto an industrial wireless network and related system and method
US10015826B2 (en) 2011-03-18 2018-07-03 Honeywell International Inc. Adapter device for coupling an industrial field instrument to an industrial wireless network
US11568721B2 (en) 2011-05-19 2023-01-31 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US9728054B2 (en) 2011-05-19 2017-08-08 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US10475307B2 (en) 2011-05-19 2019-11-12 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US10002505B1 (en) 2011-05-19 2018-06-19 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US9552708B2 (en) 2011-05-19 2017-01-24 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US8878673B2 (en) 2011-05-19 2014-11-04 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US9928703B2 (en) 2011-05-19 2018-03-27 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US20140081786A1 (en) * 2011-05-27 2014-03-20 Nec Infrontia Corporation Pos system, bar code scanner, and method for controlling pos system
US9874645B2 (en) * 2011-05-27 2018-01-23 Nec Platforms, Ltd. POS system, bar code scanner, and method for controlling POS system
US20150019446A1 (en) * 2011-06-16 2015-01-15 At&T Intellectual Property L, L.P. Methods, Systems, and Computer-Readable Storage Devices Facilitating Analysis of Recorded Events
US8849686B2 (en) * 2011-06-16 2014-09-30 At&T Intellectual Property I, L.P. Methods, devices, and computer program products for associating a tag with a recorded event
US10592935B2 (en) * 2011-06-16 2020-03-17 At&T Intellectual Property I, L.P. Methods, systems, and computer-readable storage devices facilitating analysis of recorded events
US20120323636A1 (en) * 2011-06-16 2012-12-20 Luis Albisu Methods, Devices, and Computer Program Products for Associating a Tag With a Recorded Event
US10049238B2 (en) 2011-08-22 2018-08-14 Metrologic Instruments, Inc. Encoded information reading terminal with item locate functionality
US9507976B2 (en) 2011-08-22 2016-11-29 Metrologic Instruments, Inc. Encoded information reading terminal with item locate functionality
US8645532B2 (en) * 2011-09-13 2014-02-04 BlueStripe Software, Inc. Methods and computer program products for monitoring the contents of network traffic in a network device
US20130067018A1 (en) * 2011-09-13 2013-03-14 Patrick A. Reynolds Methods and computer program products for monitoring the contents of network traffic in a network device
US8818417B2 (en) 2011-10-13 2014-08-26 Honeywell International Inc. Method for wireless device location using automatic location update via a provisioning device and related apparatus and system
US20130120119A1 (en) * 2011-11-16 2013-05-16 Symbol Technologies, Inc. Adapting radio frequency identification reqader power levels
US20130297976A1 (en) * 2012-05-04 2013-11-07 Paraccel, Inc. Network Fault Detection and Reconfiguration
US9239749B2 (en) * 2012-05-04 2016-01-19 Paraccel Llc Network fault detection and reconfiguration
US10552578B2 (en) * 2012-08-24 2020-02-04 Perceptimed, Inc. Package locating system
AU2013305512B2 (en) * 2012-08-24 2019-01-17 Perceptimed, Inc. Package locating system
US20140132412A1 (en) * 2012-09-07 2014-05-15 Juan José DECO Wi-fi tracker system for persons and objects
US20140075020A1 (en) * 2012-09-10 2014-03-13 Masato Takahashi Server device, information processing method, and computer program product
US8890694B2 (en) 2012-09-13 2014-11-18 W G Security Products Anti-theft hang tag
WO2014074816A1 (en) * 2012-11-09 2014-05-15 Hirsch Kenneth A System for item and location information distribution
US20190366188A1 (en) * 2013-06-04 2019-12-05 Isolynx, Llc Self-configurable tracking tags and methods of use
US10953304B2 (en) * 2013-06-04 2021-03-23 Isolynx, Llc Self-configurable tracking tags and methods of use
US10441867B2 (en) * 2013-06-04 2019-10-15 Isolynx, Llc Systems and methods for tracking tag management
US11753852B2 (en) 2013-06-11 2023-09-12 Invue Security Products Inc. Anti-theft device for portable electronic device
US10738508B2 (en) 2013-06-11 2020-08-11 Invue Security Products Inc. Anti-theft device for portable electronic device
US10227796B2 (en) 2013-06-11 2019-03-12 Invue Security Products Inc. Anti-theft device for portable electronic device
US9970217B2 (en) 2013-06-11 2018-05-15 Invue Security Products Inc. Anti-theft device for portable electronic device
US11293202B2 (en) 2013-06-11 2022-04-05 Invue Security Products Inc. Anti-theft device for portable electronic device
US9567776B2 (en) 2013-06-11 2017-02-14 Invue Security Products Inc. Anti-theft device for portable electronic device
US9437088B2 (en) 2013-09-29 2016-09-06 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
US10482734B2 (en) 2013-09-29 2019-11-19 Invue Security Products Inc. Systems and methods for protecting retail display merchandise from theft
EP2866177A1 (en) * 2013-10-28 2015-04-29 Samsung Electro-Mechanics Co., Ltd. Method of grouping electronic tags and method of managing group IDs
US20150206118A1 (en) * 2014-01-23 2015-07-23 Pomo Search Ltd System and method for point of sale transaction logging
US11093922B2 (en) 2014-01-23 2021-08-17 Google Llc System and method for point of sale transaction logging
US11663572B2 (en) 2014-01-23 2023-05-30 Google Llc System and method for point of sale transaction logging
US10169751B2 (en) 2014-01-23 2019-01-01 Pomo Search Ltd System and method for point of sale transaction logging
US9881289B2 (en) * 2014-01-23 2018-01-30 Pomo Search Ltd. System and method for point of sale transaction logging
CN106463028A (en) * 2014-04-16 2017-02-22 因戴姆解决方案有限责任公司 Fitting room management and occupancy monitoring system
CN106463035A (en) * 2014-04-23 2017-02-22 乔凡尼·萨尔沃 Methods, devices, kits and systems for modulating activation of self-alarming tags
CN112492526A (en) * 2014-05-28 2021-03-12 联邦快递服务公司 Enabling node delivery notifications using elements of a wireless node network
CN103996259A (en) * 2014-06-04 2014-08-20 广西科技大学鹿山学院 Multi-point-control pneumatic door/window anti-theft alarm triggering device
US9826368B2 (en) 2014-07-16 2017-11-21 Sony Corporation Vehicle ad hoc network (VANET)
US10127601B2 (en) * 2014-07-16 2018-11-13 Sony Corporation Mesh network applied to fixed establishment with movable items therein
RU2626348C2 (en) * 2014-07-16 2017-07-26 Сони Корпорейшн Application of multi-compatible network on stationary enterprise with mobile positions
US20160019515A1 (en) * 2014-07-16 2016-01-21 Sony Corporation Mesh network applied to fixed establishment with movable items therein
US9516461B2 (en) 2014-07-16 2016-12-06 Sony Corporation Mesh network applied to arena events
US9906897B2 (en) 2014-07-16 2018-02-27 Sony Corporation Applying mesh network to pet carriers
US9900748B2 (en) 2014-07-16 2018-02-20 Sony Corporation Consumer electronics (CE) device and related method for providing stadium services
CN104269022A (en) * 2014-10-11 2015-01-07 郑州捷利工业设备有限公司 Wireless voice distress calling device
US10777005B2 (en) * 2014-12-15 2020-09-15 Autodesk, Inc. Smart tools and workspaces for do-it-yourself tasks
US20160171861A1 (en) * 2014-12-15 2016-06-16 Autodesk, Inc. Smart tools and workspaces for do-it-yourself tasks
US9443406B2 (en) * 2014-12-18 2016-09-13 Checkpoint Systems, Inc. Dual mode security tags
US11749076B2 (en) 2015-02-18 2023-09-05 In Vue Security Products Inc. System and method for calibrating a wireless security range
US10223881B2 (en) 2015-02-18 2019-03-05 Invue Security Products Inc. System and method for calibrating a wireless security range
CN105989465A (en) * 2015-03-18 2016-10-05 Sk普兰尼特有限公司 Apparatus and method for providing payment service based on beacon in beacon service system
US9922316B2 (en) 2015-03-18 2018-03-20 Sk Planet Co., Ltd. Apparatus and method for providing payment service based on beacon in beacon service system
EP3070978A1 (en) * 2015-03-18 2016-09-21 SK Planet Co., Ltd. Apparatus and method for providing payment service based on beacon in beacon service system
WO2016177939A1 (en) * 2015-05-04 2016-11-10 Noccela Oy A system, method and apparatuses for electronic article surveillance
US11403928B2 (en) 2015-05-04 2022-08-02 Noccela Oy System, method and apparatuses for electronic article surveillance
US11113940B2 (en) 2015-06-25 2021-09-07 Invue Security Products Inc. Wireless merchandise security system
US10482739B2 (en) 2015-06-25 2019-11-19 Invue Security Products Inc. Wireless merchandise security system
GB2548972B (en) * 2016-02-19 2019-07-24 Walmart Apollo Llc A multi-capability apparatus supporting background RFID tag-reading and corresponding methods
GB2548972A (en) * 2016-02-19 2017-10-04 Wal Mart Stores Inc A multi-capability apparatus supporting background RFID tag-reading and corresponding methods
US9977937B2 (en) 2016-02-19 2018-05-22 Walmart Apollo, Llc Multi-capability apparatus supporting background RFID tag-reading and corresponding methods
GB2553017B (en) * 2016-05-18 2022-02-16 Symbol Technologies Llc Arrangement for, and method of, reading RFID product tags with improved performance by reading RFID tags of interest in a venue
GB2553017A (en) * 2016-05-18 2018-02-21 Symbol Technologies Llc Arrangement for, and method of, reading RFID product tags with improved performance by reading RFID tags of interest in a venue
GB2554134B (en) * 2016-07-07 2020-04-29 Symbol Technologies Llc System for and method of deterring theft of items from a venue
GB2554134A (en) * 2016-07-07 2018-03-28 Symbol Technologies Llc System for and method of deterring theft of items from a venue
US10438470B2 (en) 2016-07-07 2019-10-08 Symbol Technologies, Llc System for and method of deterring theft of items from a venue
US10949579B2 (en) 2017-02-22 2021-03-16 Middle Chart, LLC Method and apparatus for enhanced position and orientation determination
US10760991B2 (en) 2017-02-22 2020-09-01 Middle Chart, LLC Hierarchical actions based upon monitored building conditions
US10866157B2 (en) 2017-02-22 2020-12-15 Middle Chart, LLC Monitoring a condition within a structure
US10872179B2 (en) 2017-02-22 2020-12-22 Middle Chart, LLC Method and apparatus for automated site augmentation
US11893317B2 (en) 2017-02-22 2024-02-06 Middle Chart, LLC Method and apparatus for associating digital content with wireless transmission nodes in a wireless communication area
US10902160B2 (en) 2017-02-22 2021-01-26 Middle Chart, LLC Cold storage environmental control and product tracking
US11900022B2 (en) 2017-02-22 2024-02-13 Middle Chart, LLC Apparatus for determining a position relative to a reference transceiver
US10776529B2 (en) 2017-02-22 2020-09-15 Middle Chart, LLC Method and apparatus for enhanced automated wireless orienteering
US11475177B2 (en) 2017-02-22 2022-10-18 Middle Chart, LLC Method and apparatus for improved position and orientation based information display
US11468209B2 (en) 2017-02-22 2022-10-11 Middle Chart, LLC Method and apparatus for display of digital content associated with a location in a wireless communications area
US11436389B2 (en) 2017-02-22 2022-09-06 Middle Chart, LLC Artificial intelligence based exchange of geospatial related digital content
US10984148B2 (en) 2017-02-22 2021-04-20 Middle Chart, LLC Methods for generating a user interface based upon orientation of a smart device
US10984146B2 (en) 2017-02-22 2021-04-20 Middle Chart, LLC Tracking safety conditions of an area
US10983026B2 (en) 2017-02-22 2021-04-20 Middle Chart, LLC Methods of updating data in a virtual model of a structure
US10762251B2 (en) 2017-02-22 2020-09-01 Middle Chart, LLC System for conducting a service call with orienteering
US11054335B2 (en) 2017-02-22 2021-07-06 Middle Chart, LLC Method and apparatus for augmented virtual models and orienteering
US11080439B2 (en) 2017-02-22 2021-08-03 Middle Chart, LLC Method and apparatus for interacting with a tag in a cold storage area
US10831945B2 (en) 2017-02-22 2020-11-10 Middle Chart, LLC Apparatus for operation of connected infrastructure
US11625510B2 (en) 2017-02-22 2023-04-11 Middle Chart, LLC Method and apparatus for presentation of digital content
US11100260B2 (en) 2017-02-22 2021-08-24 Middle Chart, LLC Method and apparatus for interacting with a tag in a wireless communication area
US11106837B2 (en) 2017-02-22 2021-08-31 Middle Chart, LLC Method and apparatus for enhanced position and orientation based information display
US11429761B2 (en) 2017-02-22 2022-08-30 Middle Chart, LLC Method and apparatus for interacting with a node in a storage area
US11120172B2 (en) 2017-02-22 2021-09-14 Middle Chart, LLC Apparatus for determining an item of equipment in a direction of interest
US11610033B2 (en) 2017-02-22 2023-03-21 Middle Chart, LLC Method and apparatus for augmented reality display of digital content associated with a location
US11188686B2 (en) 2017-02-22 2021-11-30 Middle Chart, LLC Method and apparatus for holographic display based upon position and direction
US11481527B2 (en) 2017-02-22 2022-10-25 Middle Chart, LLC Apparatus for displaying information about an item of equipment in a direction of interest
US11900021B2 (en) 2017-02-22 2024-02-13 Middle Chart, LLC Provision of digital content via a wearable eye covering
US11514207B2 (en) 2017-02-22 2022-11-29 Middle Chart, LLC Tracking safety conditions of an area
US11900023B2 (en) 2017-02-22 2024-02-13 Middle Chart, LLC Agent supportable device for pointing towards an item of interest
US10360785B2 (en) 2017-04-07 2019-07-23 Sita Information Networking Computing Usa, Inc. Article tracking system and method
US11189155B2 (en) 2017-04-07 2021-11-30 Sita Information Networking Computing Usa, Inc. Article tracking system and method
GB2561257A (en) * 2017-04-07 2018-10-10 Sita Inf Networking Computing Usa Inc Article tracking system and method
US10736062B2 (en) * 2017-05-09 2020-08-04 United States Of America As Represented By The Administrator Of Nasa System and method to synchronize clocks across a distributed network of nodes
US20180332548A1 (en) * 2017-05-09 2018-11-15 U.S.A. as represented by the Administrator of NASA System and Method to Synchronize Clocks Across a Distributed Network of Nodes
US10535425B2 (en) 2017-06-28 2020-01-14 Perceptimed, Inc. Inventory management
US20190006037A1 (en) * 2017-06-28 2019-01-03 Perceptimed, Inc. Inventory Assurance
US11532021B2 (en) 2017-11-16 2022-12-20 Panasonic Intellectual Property Corporation Of America Transaction management system, transaction management method, and program
CN109801122A (en) * 2017-11-16 2019-05-24 松下电器(美国)知识产权公司 Trade managing system, exchange management method and program
US11280874B2 (en) 2018-09-24 2022-03-22 Science Applications International Corporation System and method for dismounted assured position, navigation and timing (DAPNT)
US10877127B2 (en) * 2018-09-24 2020-12-29 Science Applications International Corporation System and method for dismounted assured position, navigation and timing (DAPNT)
US11756394B2 (en) * 2018-12-14 2023-09-12 Invue Security Products Inc. Wireless tracking system for merchandise security
US11348421B2 (en) * 2018-12-14 2022-05-31 Invue Security Products Inc. Wireless tracking system for merchandise security
US20220292940A1 (en) * 2018-12-14 2022-09-15 Invue Security Products Inc. Wireless tracking system for merchandise security
US11636236B2 (en) 2019-01-17 2023-04-25 Middle Chart, LLC Methods and apparatus for procedure tracking
US10824774B2 (en) * 2019-01-17 2020-11-03 Middle Chart, LLC Methods and apparatus for healthcare facility optimization
US11593536B2 (en) 2019-01-17 2023-02-28 Middle Chart, LLC Methods and apparatus for communicating geolocated data
US11861269B2 (en) 2019-01-17 2024-01-02 Middle Chart, LLC Methods of determining location with self-verifying array of nodes
US10740503B1 (en) * 2019-01-17 2020-08-11 Middle Chart, LLC Spatial self-verifying array of nodes
US11100261B2 (en) 2019-01-17 2021-08-24 Middle Chart, LLC Method of wireless geolocated information communication in self-verifying arrays
US11436388B2 (en) * 2019-01-17 2022-09-06 Middle Chart, LLC Methods and apparatus for procedure tracking
US10943034B2 (en) 2019-01-17 2021-03-09 Middle Chart, LLC Method of wireless determination of a position of a node
US11042672B2 (en) * 2019-01-17 2021-06-22 Middle Chart, LLC Methods and apparatus for healthcare procedure tracking
US11361122B2 (en) 2019-01-17 2022-06-14 Middle Chart, LLC Methods of communicating geolocated data based upon a self-verifying array of nodes
US11688258B2 (en) * 2019-08-30 2023-06-27 Sensormatic Electronics, LLC Radio frequency identification (RFID) tag location verification using short range communication
US20230298448A1 (en) * 2019-08-30 2023-09-21 Sensormatic Electronics, LLC Radio frequency identification (rfid) tag location verification using short range communication
US11194938B2 (en) 2020-01-28 2021-12-07 Middle Chart, LLC Methods and apparatus for persistent location based digital content
US11507714B2 (en) 2020-01-28 2022-11-22 Middle Chart, LLC Methods and apparatus for secure persistent location based digital content
EP3913590A1 (en) * 2020-05-20 2021-11-24 3SI Security Systems Inc. Security tracking device with zone-based alert suppression
US11620889B2 (en) 2020-05-20 2023-04-04 3Si Security Systems, Inc. Security tracking device with zone-based alert suppression
RU2744229C1 (en) * 2020-06-04 2021-03-03 Андрей Александрович Красовский Wireless ultra frequency detector of signals and commands of uhf rfid readers and method for detecting signals and commands of uhf rfid readers
US11809787B2 (en) 2021-03-01 2023-11-07 Middle Chart, LLC Architectural drawing aspect based exchange of geospatial related digital content
US11640486B2 (en) 2021-03-01 2023-05-02 Middle Chart, LLC Architectural drawing based exchange of geospatial related digital content
WO2022256689A1 (en) * 2021-06-04 2022-12-08 Invue Security Products Inc. Wireless beacon tracking system for merchandise security
WO2023111035A1 (en) * 2021-12-14 2023-06-22 Zliide Technologies Aps A system for securing and tracking consumer goods

Also Published As

Publication number Publication date
WO2011035303A1 (en) 2011-03-24
US8508367B2 (en) 2013-08-13
WO2011035309A3 (en) 2011-11-24
CN102741893B (en) 2014-07-23
WO2011035309A2 (en) 2011-03-24
CN102741893A (en) 2012-10-17
US20110068921A1 (en) 2011-03-24

Similar Documents

Publication Publication Date Title
US20110068906A1 (en) Systems, methods, and apparatuses for managing configurable monitoring devices
US9449202B2 (en) Localizing tagged assets in a configurable monitoring device system
US8452868B2 (en) Retail product tracking system, method, and apparatus
US20160239794A9 (en) Retail product tracking system, method, and apparatus
US11756394B2 (en) Wireless tracking system for merchandise security
WO2011035256A2 (en) Beamforming and localizing in a configurable monitoring device system
US8344884B2 (en) System, method, and apparatus for triggering an alarm
US9298954B1 (en) Tag security systems and methods for articles of merchandise
US20110084840A1 (en) Key Device for Monitoring Systems
US20130002879A1 (en) Systems and methods for tracking a commodity
US10997381B2 (en) Systems and methods for using radio frequency identification as an adaptive alarm threshold
JP2014099857A (en) Locator beacon and radar application for mobile device
US10621841B2 (en) System and method for tag management and theft detection
US11514768B2 (en) Systems and methods for increasing alarm confidence in EAS detection systems
US10817833B2 (en) System and method for managing inventory based on RFID technology
US20210241593A1 (en) System and method for increased exit interrogation of rfid tags

Legal Events

Date Code Title Description
AS Assignment

Owner name: CHECKPOINT SYSTEMS, INC., NEW JERSEY

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SHAFER, GARY MARK;MERCIER, MICHAEL;SIGNING DATES FROM 20100428 TO 20100429;REEL/FRAME:024347/0141

AS Assignment

Owner name: WELLS FARGO BANK, NORTH CAROLINA

Free format text: SECURITY AGREEMENT;ASSIGNOR:CHECKPOINT SYSTEMS, INC.;REEL/FRAME:028714/0552

Effective date: 20120731

AS Assignment

Owner name: BANK OF AMERICA, N.A., PENNSYLVANIA

Free format text: SECURITY AGREEMENT;ASSIGNOR:CHECKPOINT SYSTEMS, INC.;REEL/FRAME:031805/0001

Effective date: 20131211

AS Assignment

Owner name: CHECKPOINT SYSTEMS, INC., NEW JERSEY

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:WELLS FARGO BANK, NATIONAL ASSOCIATION;REEL/FRAME:031825/0545

Effective date: 20131209

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE