Control of wireless identification tag activation
First Claim
Patent Images
1. A method comprising:
- using at least a processor and memory for;
controlling a first wireless identification read cell to activate a first set of wireless identification tags within a first communication range;
controlling a second wireless identification read cell to activate a second set of wireless identification tags within a second communication range during activation of the first set of wireless identification tags and subsequent to initially activating the first set of wireless identification tags, wherein the first communication range overlaps with the second communication range;
receiving data from the second set of wireless identification tags; and
in response to receiving data from the second set of wireless identification tags, controlling the first wireless identification read cell to deactivate the first set of wireless identification tags.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for controlling wireless identification tag activation are disclosed. An example method includes controlling a first wireless identification read cell to activate a first set of wireless identification tags within a first communication range. Further, the method includes controlling a second wireless identification read cell to activate a second set of wireless identification tags within a second communication range during activation of the first set of wireless identification tags and subsequent to initially activating the first set of wireless identification tags. The first communication range overlaps with the second communication range.
-
Citations
21 Claims
-
1. A method comprising:
-
using at least a processor and memory for; controlling a first wireless identification read cell to activate a first set of wireless identification tags within a first communication range; controlling a second wireless identification read cell to activate a second set of wireless identification tags within a second communication range during activation of the first set of wireless identification tags and subsequent to initially activating the first set of wireless identification tags, wherein the first communication range overlaps with the second communication range; receiving data from the second set of wireless identification tags; and in response to receiving data from the second set of wireless identification tags, controlling the first wireless identification read cell to deactivate the first set of wireless identification tags. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a network interface configured to communicate with a first wireless identification read cell and a second wireless identification read cell; and a wireless identification manager configured to; control the first wireless identification read cell to activate a first set of wireless identification tags within a first communication range; control the second wireless identification read cell to activate a second set of wireless identification tags within a second communication range during activation of the first set of wireless identification tags and subsequent to initially activating the first set of wireless identification tags, wherein the first communication range overlaps with the second communication range; receive data from the second set of wireless identification tags; and control the first wireless identification read cell to deactivate the first set of wireless identification tags in response to receiving data from the second set of wireless identification tags. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product for controlling activation of wireless identification tags, said computer program product comprising:
-
a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code being readable by a computing device to cause the computing device to; control, by the computing device, a first wireless identification read cell to activate a first set of wireless identification tags within a first communication range; control, by the computing device, a second wireless identification read cell to activate a second set of wireless identification tags within a second communication range during activation of the first set of wireless identification tags and subsequent to initially activating the first set of wireless identification tags, wherein the first communication range overlaps with the second communication range; receive, by the computing device, data from the second set of wireless identification tags; and control, by the computing device, the first wireless identification read cell to deactivate the first set of wireless identification tags in response to receiving data from the second set of wireless identification tags. - View Dependent Claims (18, 19, 20, 21)
-
Specification