Radio Frequency Identification (RFID) system for manufacturing distribution and retailing of keys
First Claim
Patent Images
1. A key assembly, consisting:
- a. a key, and b. an RFID tag attached to the key.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention generally provides apparatus and methods for tracking, counting and inventorying keys throughout the supply chain, from manufacturing through retailing to the end user. In addition, the present invention provides apparatus and methods for improving the accuracy of duplicating keys. The apparatus and methods generally rely on Radio Frequency Identification (RFID) technology, where information is stored to and collected from RFID tags that are located proximate to keys. The apparatus and methods provided for in this invention improve efficiency and accuracy in the key supply chain.
-
Citations
24 Claims
-
1. A key assembly, consisting:
-
a. a key, and b. an RFID tag attached to the key. - View Dependent Claims (2, 3, 4)
-
-
5. A key assembly, consisting:
-
a. a key;
b. an sheath, into which the key can be selectively positioned; and
c. a RFID tag attached to the sheath. - View Dependent Claims (6)
-
-
7. A key assembly, comprising:
-
a. a key;
b. an RFID tag holder;
c. an RFID tag attached to the RFID tag holder; and
d. an attachment device to attach the RFID tag holder to the key. - View Dependent Claims (8)
-
-
9. A system for restocking a merchandising rack comprising:
-
a. an RFID-enabled merchandising rack, comprising;
i. at least one display means; and
ii. at least one indicator means positioned near the at least one display means;
b. an RFID reader; and
c. a database. - View Dependent Claims (10, 11, 12)
-
-
13. A method for restocking a merchandising rack comprising the following steps:
-
a. receiving of a shipment of keys;
b. individually placing keys in the read zone of an RFID reader;
c. reading information from an RFID tag located proximate to the key;
d. determining proper location on the rack to store key; and
e. indicating the proper location.
-
-
14. A method for selecting proper key blank for the cutting of a duplicated key comprising the following steps:
-
a. placing an original key in the read zone of a RFID reader;
b. reading information from an RFID tag attached to the key;
c. processing information through a host computer to determine proper key blank to be used; and
d. directing a merchandise rack to energize a light emitting diode proximate to the proper key blank.
-
-
15. A method for calculating the inventory of keys on a merchandising rack comprising the following steps:
-
a. initiating an inventory inquiry by initiating at least one RFID reader;
b. gathering RFID information from each key located on a merchandising rack; and
c. calculating inventory of each type of key located on the merchandising rack based on the RFID information. - View Dependent Claims (16)
-
-
17. A method for cutting duplicate keys comprising the following steps:
-
a. selecting a blank to be cut into a duplicate key;
b. reading information from an RFID tag on the key blank with an RFID reader;
c. setting jaws of a cutter to accommodate an original key and the duplicate key based on information from RFID tag; and
d. manually testing the fit of the original key into the jaws.
-
-
18. A method for moving keys through a supply chain comprising the following steps:
-
a. placing an RFID tag proximate to at least one key;
b. storing information specific to the at least one key on the RFID tag;
c. moving the at least one key from a first node in the supply chain to a second node in the supply chain;
d. reading information from the RFID tag; and
e. processing business rules to determine if an action needs to be initiated based on information from the RFID tag. - View Dependent Claims (19)
-
-
20. A method for preparing keys for movement through a supply chain comprising the following steps:
-
a. placing an RFID tag proximate to at least one key;
b. storing information specific to the at least one key on the RFID tag;
c. assembling keys into a group for shipping;
d. reading all RFID tags in the group of keys; and
e. producing a bill of lading for group of keys based on information read from all RFID tags.
-
-
21. A method for using real time inventory information comprising the steps:
-
a. initiating a reading of key inventory at one node of a supply chain;
b. utilizing remote communication means to initiate a reading of a key inventory at at least one other node in the supply chain;
c. processing inventory readings by comparing inventory to business rules; and
d. determining actions to be taken based on the inventory readings.
-
-
22. A method of authorizing duplication of a key comprising the following steps:
-
a. placing unique information on an RFID tag attached to an original key;
b. retrieving unique information from the RFID tag when duplicating the original key;
c. comparing the unique information with information provided by a person wanting to duplicate the key; and
d. duplicating the key if the unique information and the provided information are a match. - View Dependent Claims (23, 24)
-
Specification