摘要:
An RFID tag in a receptacle is active and includes a microprocessor, a data storage device operable to store a selected code (e.g. an ID code to identify said object or said product), the object including a display for displaying the aforesaid selected code upon a signal from the microprocessor and an energy storage device (e.g. a lithium ion battery), operable to energize the microprocessor, the display, and the transmitter. The tag has an antenna having a dimension thereof that is substantially as large as to a maximum dimension of receptacle.
摘要:
An area-reading antenna (in RF linkage with myriad RF tags) is dynamically tuned. It may be dynamically tuned as to its transmission of a power/clock field, or dynamically tuned as to its transmission of a data signal, or dynamically tuned as to its reception of a data signal, or some combination of all three. In this way, a base station has an improved ability to communicate with a greater fraction of the RF tags within its reading area, despite detuning of individual tags due to proximity of detuning influences such as metal or liquids.
摘要:
A circular data-bearing medium having a hub hole has a chip and two distinct loop antennas, each offset from the other, each antenna disposed around the hub hole, the chip electrically connected with each of the two distinct antennas. The circular data-bearing medium does not have a battery. When bathed in RF energy the chip receives power from one of the loop antennas. During the power-up time the chip may receive messages on the other of the loop antennas, and may respond, on that antenna, to some of the received messages and not others, based upon internal states within the chip. At least one of the internal states is reset upon loss and restoration of the bathing RF energy. When passed nearby to an EAS sensor, for example at an exit of a store, the chip can selectively either trigger the sensor or not trigger the sensor, as a function of whether an EAS link has or has not been blown, and the triggering response is non-identical from one data-bearing medium to the next.
摘要:
The invention disclosed provides a method, system, and associated tag for detection and tracking of inanimate and animate objects. The novel method broadly comprises the steps of: a) attaching a low radio frequency detection tag to each of the objects, each tag comprising a tag antenna operable at a low radio frequency not exceeding 1 megahertz (preferably not exceeding 300 kilohertz), a transceiver operatively connected to the tag's antenna, the transceiver being operable to transmit and receive data signals at the low radio frequency, a data storage device operable to store data comprising identification data for identifying said detection tag, a programmed data processor operable to process data received from the transceiver and the data storage device and to send data to cause the transceiver to emit an identification signal based upon the identification data stored in said data storage device, and an energy source for activating the tag's transceiver and data processor; b) storing, in the data storage device of each tag, shipping data selected from object description data, address-of-origin data, destination address data, object vulnerability data, and object status data; c) commingling the objects in a repository selected from a warehouse and a truck, the repository being provided with at least one large loop field antenna operable at said low radio frequency; the field antenna being disposed at a distance from each object that permits effective communication therewith at the low radio frequency, d) reading the identification data and shipping data from the transceiver of each tag by interrogating all tags commingled in said repository with data signals, such as specific IP addresses or other identification codes, via said field antenna; and e) transmitting the identification data and shipping data from each tag to a central data processor to provide a tally of the objects in said repository.
摘要:
Passive tags use two antennas with only limited mutual coupling, one of which receives a power/clock field and the other of which receives a data signal. An area-reading antenna, or two or more antennas, are deployed to generate the power/clock field, from a base station. The base station, or active tags, or both, generate the data signals from time to time. This topology together with the use of low frequencies permits area reads, and permits small and economical passive tags, and further permits localization of a particular passive tag as being nearby to a particular active tag.
摘要:
An alternative for smart card financial transactions is provided in which the smart card functionality is provided as part of a watch containing a RuBee antenna and transceiver for transmitting the authorization information to a receiver separate from the watch. This form factor allows the user to maintain the card in a readily usable and convenient location. In addition, the watch can be used to allow the user to specifically authorize or override a financial transaction, and to view and/or store information about the financial transaction, as well as conventional functionality such as alarms, and calendars. The watch of the invention can also provide access control or identification in corporate environments if desired.
摘要:
The system employs full transceivers, each having peer-to-peer, client/server, and IP networking capabilities, and covering open-area ranges of up to 100 feet. The system uses Low Frequency for data communications so it can achieve both low cost (less costly than many RF-ID tags) and long battery life (10-15 years). Additionally, since these tags have batteries, static RAM maybe be added at very low cost, as well as sensors, LED's displays etc. The system also employs a sidewinder that communicates to said tag regularly, said sidewinder keeps the IP address of said tag. The system also employs an embedded VPN. The VPN includes a suite of diagnostic tools that run on a laptop. The diagnostic tools talk direct to the sidewinder, the tools read and program said tag providing the tools have correct IP address of the tag. The system also includes a visibility data server that communicates to the sidewinder by the VPN. The data server includes a virtual tag data base, said virtual tag data base updated by the sidewinder. The web enabled reports and control are managed by two “plugs”. The SQL plug supports data requests, and the Air Traffic Control (ATC) plug provides control (LED's, read rates). The system also employs a user web based ERP to create a real-time visibility reports and a user event export tools to create reports that fit a specific event.
摘要:
This invention relates to a method and system for authenticating and for preventing alteration of histories of events occurring within at least one repository (e.g. a cargo container, fixed warehouse or a movable vehicle) for objects (e.g. auto parts, pharmaceutical materials, computer parts, laptops, etc.) held for a period of time, where the repository is exposed to an unauthorized intrusion therewithin (and potential theft of said objects therefrom and potential insertion of dangerous items therewithin). The events include changes in environmental conditions (e.g. light levels, infrared levels, temperature, air pressure, etc) which indicate an unauthorized intrusion.
摘要:
A system for tracking files and documents includes: a plurality of programmable networked tags operable at a low radio frequency not exceeding one megahertz; a plurality of files with the programmable networked tag affixed to each file; a container for the plurality of files; a base station configured for transmission of signals to and from the plurality of programmable networked tags; and a computer in communication with the base station. The computer includes software for enabling real-time transmissions and a graphical user interface for enabling a user to read and write data to be transmitted to and from the plurality of programmable networked tags.
摘要:
The invention disclosed provides a method, system, and associated tag for detection and tracking of inanimate and animate objects. The novel method broadly comprises the steps of: a) attaching a low radio frequency detection tag to each of the objects, each tag comprising a tag antenna operable at a low radio frequency not exceeding 1 megahertz (preferably not exceeding 300 kilohertz), a transceiver operatively connected to the tag's antenna, the transceiver being operable to transmit and receive data signals at the low radio frequency, a data storage device operable to store data comprising identification data for identifying said detection tag, a programmed data processor operable to process data received from the transceiver and the data storage device and to send data to cause the transceiver to emit an identification signal based upon the identification data stored in said data storage device, and an energy source for activating the tag's transceiver and data processor; b) storing, in the data storage device of each tag, shipping data selected from object description data, address-of-origin data, destination address data, object vulnerability data, and object status data; c) commingling the objects in a repository selected from a warehouse and a truck, the repository being provided with at least one large loop field antenna operable at said low radio frequency; the field antenna being disposed at a distance from each object that permits effective communication therewith at the low radio frequency, d) reading the identification data and shipping data from the transceiver of each tag by interrogating all tags commingled in said repository with data signals, such as specific IP addresses or other identification codes, via said field antenna; and e) transmitting the identification data and shipping data from each tag to a central data processor to provide a tally of the objects in said repository.