Automated real-time distributed tag reader network
First Claim
1. A method of conducting a wireless inventory of items using a network tag reader and tags, wherein a unique tag is attached to each item and each tag is permanently assigned a tag identification number (Tag ID), the method comprising the steps of:
- selecting one of a plurality of remote access sensor modules, which communicate wirelessly with the items, wherein the selected remote access sensor module comprises a coverage pattern that defines a physical area containing a plurality of items with their associated tags;
interrogating the tags in a defined physical area through the corresponding selected remote access sensor module, thereby receiving information from the tags in the defined physical area;
storing the information received in the interrogating step in an inventory database;
repeating the selecting, interrogating, and storing steps for each remote access sensor module; and
after the selecting, interrogating, and storing steps are performed for each remote access sensor module, processing the information in the inventory database, wherein the interrogating step comprises the steps of;
at the network tag reader,transmitting through the selected remote access sensor module a wake-up signal followed by a first clock signal;
at each tag within the physical area defined by the coverage pattern of the selected remote access sensor module,incrementing a first tag count in response to the first clock signal, andtransmitting the Tag ID assigned to each tag when the Tag ID of each tag corresponds to the first tag count;
at the network tag reader,incrementing a first reader count in response to the first clock signal,storing a given first reader count when more than one tag responds to the first clock signal that corresponds to the given first reader count, andtransmitting through the selected remote access sensor module the given first reader count followed by a second clock signal; and
at each tag that responds to the transmitted given first reader count,incrementing a second tag count in response to the second clock signal, andtransmitting a second number assigned to each tag when the second number of each tag corresponds to the second count.
6 Assignments
0 Petitions
Accused Products
Abstract
A method and system for conducting an inventory of items by a network tag reader, wherein a tag is attached to each item and each tag is permanently assigned a tag identification number (Tag ID). A method according to the present invention includes selecting one of a plurality of remote access sensor modules, where the selected remote access sensor module has a coverage pattern that defines a physical area. The method also includes interrogating tags through the selected remote access sensor module. These tags are within the physical area defined by the coverage pattern. As a result of the interrogating step, the network tag reader receives information regarding these tags. This information is stored in a plurality of inventory records.
191 Citations
37 Claims
-
1. A method of conducting a wireless inventory of items using a network tag reader and tags, wherein a unique tag is attached to each item and each tag is permanently assigned a tag identification number (Tag ID), the method comprising the steps of:
-
selecting one of a plurality of remote access sensor modules, which communicate wirelessly with the items, wherein the selected remote access sensor module comprises a coverage pattern that defines a physical area containing a plurality of items with their associated tags; interrogating the tags in a defined physical area through the corresponding selected remote access sensor module, thereby receiving information from the tags in the defined physical area; storing the information received in the interrogating step in an inventory database; repeating the selecting, interrogating, and storing steps for each remote access sensor module; and after the selecting, interrogating, and storing steps are performed for each remote access sensor module, processing the information in the inventory database, wherein the interrogating step comprises the steps of; at the network tag reader, transmitting through the selected remote access sensor module a wake-up signal followed by a first clock signal; at each tag within the physical area defined by the coverage pattern of the selected remote access sensor module, incrementing a first tag count in response to the first clock signal, and transmitting the Tag ID assigned to each tag when the Tag ID of each tag corresponds to the first tag count; at the network tag reader, incrementing a first reader count in response to the first clock signal, storing a given first reader count when more than one tag responds to the first clock signal that corresponds to the given first reader count, and transmitting through the selected remote access sensor module the given first reader count followed by a second clock signal; and at each tag that responds to the transmitted given first reader count, incrementing a second tag count in response to the second clock signal, and transmitting a second number assigned to each tag when the second number of each tag corresponds to the second count. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of conducting a wireless inventory of items in a distributed tag reader network, wherein a tag is attached to each item, and wherein each tag is assigned a plurality of identification numbers, the method comprising the steps of:
-
selecting at least one remote access sensor module from a plurality of remote access sensor modules in the distributed tag reader network, wherein each remote access sensor module communicates wirelessly with the tags, and each remote access sensor module has a coverage pattern that defines a physical area; transmitting, through the at least one selected remote access sensor module, an interrogation signal to one or more tags, wherein the one or more tags are within the physical area defined by the coverage pattern of the at least one selected remote access sensor, and wherein each tag is configured to receive the interrogation signal, evaluate one or more of its plurality of identification numbers, and reply to the interrogation signal, if appropriate; resolving contention between multiple tags that responded to the interrogation signal, if appropriate; identifying which tags are within the coverage area of the at least one selected remote access module; and maintaining a record of each tag that was identified. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A distributed tag reader network used to conduct a wireless inventory of items, wherein a tag is attached to each item, and wherein each tag is assigned a plurality of identification numbers, and each tag is configured to receive and transmit signals, the distributed tag reader network comprising:
-
a network reader, comprising a database; and a plurality of remote access sensor modules coupled to the network reader, wherein each remote access sensor module has a coverage pattern that defines a physical area, and communicates wirelessly with the tags, wherein the network reader selects at least one remote access sensor module from the plurality of remote access sensor modules in the distributed tag reader network; and transmits, through the at least one selected remote access sensor module, an interrogation signal to one or more tags, wherein the one or more tags are within the physical area defined by the coverage pattern of the at least one selected remote access sensor, and wherein each tag is configured to receive the interrogation signal, evaluate one or more of its plurality of identification numbers, and reply to the interrogation signal, if appropriate; wherein the network reader or the at least one selected remote access sensor module resolves contention between multiple tags that responded to the interrogation signal; and
identifies which tags are within the coverage area of the selected remote access module; andwherein the network reader maintains a record of each tag that was identified in its database. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37)
-
Specification