BACKGROUND OF THE INVENTION1. Field of the Invention[0001]
The present invention relates generally to electronic inventory systems, and more particularly to the use of radio frequency identification (RFID) tags using anti-clash protocols.[0002]
2. Description of the Related Art[0003]
In modem business, maintaining an accurate inventory of merchandise is crucial. In the past, taking an inventory was an entirely manual process, and therefore slow and expensive. Modem automated inventory systems have improved the accuracy and speed of this process while reducing its cost. With the development of modem manufacturing methods, such as Just-In-Time Delivery, even faster and more accurate inventory methods are required. In some businesses, such as the baggage-handling aspect of the airline industry, inventories must be taken almost instantaneously.[0004]
Especially in the airline baggage handling industry, the need for quick and accurate inventories of bags cannot be exaggerated. In the past, the failure to match bags to passengers was merely an inconvenience. However, in the modem age of airline terrorism, the need to match passengers to bags has become a crucial safety concern. Following several airline bombings, the Commission on Aviation Safety and Security issued several recommendations to President Clinton on Sep. 5, 1996 to combat such terrorism. One of the recommendations stated: “Match passengers to their bags to ensure that the baggage of anyone who does not board the plane is removed.”[0005]
One approach to electronic inventory systems is the use of RFID tags. In such systems, an RFID tag is attached to each item to be inventoried. Each tag includes a microprocessor and RF circuitry capable of responding to signals sent from a tag reader. In an ideal inventory system, each tag is assigned a unique tag identification number (Tag ID).[0006]
In one such system, the reader transmits a series of clock pulses to the tags. Each clock pulse defines a time slot. Each tag selects a particular time slot using a random number generator and then counts the received time slots. When a given tag's time slot is reached, the tag transmits its Tag ID to the reader. The reader records the received Tag IDs to create an inventory of the tags read.[0007]
This approach can suffer from a problem known as “time slot contention.” Time slot contention occurs when more than one tag selects the same time slot for Tag ID transmission. When this occurs, the reader is bombarded by more than one tag transmission simultaneously. Because the tag signals interfere with each other, the reader cannot identify the tags.[0008]
SUMMARY OF THE INVENTIONThe present invention is a system and method for conducting an inventory of tags, wherein each tag is permanently assigned a Tag ID and a manufacturer number; preferably, this assignment takes place at the time of tag manufacture. Each tag can be attached to an item to take inventory of those items. A tag reader transmits a wake-up signal followed by at least one clock signal. Each tag increments a first tag count in response to the clock signals, and transmits the Tag ID assigned to the tag when the first tag count corresponds to the Tag ID assigned to the tag. The tag reader records the transmitted Tag IDs. When more than one tag transmits simultaneously, the tag reader stores the contended Tag ID in order to resolve the contention when the first read cycle is complete. In the second read cycle, the tag reader transmits the contended Tag ID followed by at least one clock signal. Each tag that contended for the transmitted Tag ID increments a second tag count in response to the clock signals, and transmits the manufacturer number assigned to the tag when the second tag count corresponds to the manufacturer number assigned to the tag. The tag reader records the transmitted Tag IDs, completing the inventory of the tags.[0009]
BRIEF DESCRIPTION OF THE FIGURESThe present invention will be described with reference to the accompanying drawings.[0010]
FIG. 1 depicts a tag reader and a plurality of tags according to the present invention for use in an electronic inventory system.[0011]
FIG. 2 is a flowchart depicting the operation of the present invention according to a preferred embodiment.[0012]
FIG. 3 is a circuit block diagram of an RFID tag according to a preferred embodiment of the present invention.[0013]
FIG. 4 is a circuit block diagram of the architecture of[0014]tag reader104 according to a preferred embodiment.
FIG. 5 is a flowchart depicting a first read operation of a timed broadcast read of the present invention.[0015]
FIG. 6 is a flowchart depicting a second read operation of a timed broadcast read of the present invention.[0016]
FIG. 7 is a flowchart depicting a third read operation of a timed broadcast read of the present invention.[0017]
FIG. 8 is a flowchart depicting a method of manufacture for the RFID tag of the present invention.[0018]
FIG. 9 depicts a pair of tags according to the present invention.[0019]
FIG. 10 is a flowchart depicting an example use of an embodiment of the present invention in the airline baggage handling industry.[0020]
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTSIntroduction[0021]
The present invention is a system and method for electronic inventory using radio frequency identification (RFID) tags and anti-clash protocol. The anti-clash protocol solves the above-mentioned problem of time slot contention. The present invention is particularly suited to use in the airline baggage-handling industry. In particular, the present invention is ideally suited for use in taking rapid inventories of passenger bags and then matching passenger bags to passengers.[0022]
The present invention involves the use of an RFID tag that is inexpensive, disposable, and ideally suited to mass production. In one embodiment, each tag is produced as a pair of tags. One of the pair is affixed to an airline passenger's ticket; the other is attached to the passenger's bag. The bags, and the passengers themselves, can then be inventoried nearly instantaneously using an unobtrusive, low power radio signal.[0023]
FIG. 1 depicts a[0024]tag reader104 and a plurality oftags102a-102gfor use in an electronic inventory system. In a preferred embodiment of the present invention, each tag is permanently allocated a unique Tag ID. In a preferred embodiment, this assignment takes place at the time of tag manufacture using technologies such as laser-programming or fusible link, which are well-known in the relevant arts. In one embodiment, the Tag ID defines a time slot during which a tag will respond totag reader104. The Tag ID can be encrypted for security purposes. In another embodiment, the Tag ID is a separate value. Referring to FIG. 1, tag102ais assigned to slot T1, tag102bis assigned time slot T2, and so on.
Each tag is also assigned a manufacturer number, representing the identity of the manufacturer of the tag, and a lot number, representing the manufacturing lot of the tag. In a preferred embodiment, this assignment takes place at the time of tag manufacture. For example, the lot number may specify the date and time of manufacture, the wafer number of the integrated circuit on the tag, etc. In a preferred embodiment, the Tag ID, manufacturer number and lot number are laser-programmed into the tag at the time of tag manufacturer. Therefore, these values are permanently fixed at the time of manufacture and cannot subsequently be changed.[0025]
Referring to FIG. 1, in a preferred embodiment of the present invention,[0026]tag reader104 emits a series of clock instructions. Each clock instruction defines a time slot.Tags102 count the time slots. When the time slot count is equivalent to the Tag ID programmed into a tag, the tag transmits its Tag ID to tagreader104. In this way,tag reader104 accumulates the Tag IDs of the inventory tags.
FIG. 2 is a flowchart depicting the operation of the present invention according to a preferred embodiment. The flowchart illustrates the present invention's use of multiple reads and multiple tag identifiers to avoid time slot contention. Referring to FIG. 2, the tags are read for the first time as described above with respect to FIG. 1, and as shown in a[0027]step202. If no time slot contention is detected, as shown by the “no” branch fromstep204, then the inventory is complete and accurate.
As described above, time slot contention occurs when multiple tags transmit to the reader in the same time slot. The tag reader can detect this contention in many ways that are well known in the art. For example, each tag could error-code its transmission, for example by using a checksum. When the tag reader receives a tag transmission, it computes a checksum. If two tags transmit simultaneously, the computed checksum will not match the transmitted checksum. When[0028]tag reader104 determines that these checksums do not match, then time slot contention has been detected. Other methods of detecting time slot contention may be employed with the present invention without departing from its spirit and scope.
If during the first tag read contention was detected, as shown by the “yes” branch from[0029]step204, then a second tag read is performed, as shown in astep206. While the first tag read was based on Tag IDs, the second tag read is based on a separate value that was permanently programmed into the tag at the time of tag manufacture. In a preferred embodiment, that second value is the manufacturer number of the tag.
During the second read, each contended tag ID is resolved separately. For each contended Tag ID, only those tags that contended for that Tag ID are polled. In the second read cycle, tag manufacturer numbers are used to select the time slot during which the tag will transmit. If no contention is detected in the second read, as shown by the “no” branch from[0030]step208, then the Tag IDs of the tags that contended in the first read have been recorded by the tag reader, and the inventory is complete. However, if time slot contention is detected during the second read, as shown by the “yes” branch fromstep208, then a third tag read is performed, as shown in astep210.
In the third read, each contended manufacturer number is resolved separately. For each contended manufacturer number, only those tags that contended for that manufacturer number are polled. In the third read cycle, a third permanent tag identifier is used to break the contention of the second read. These third identifiers are programmed into each tag at the time of manufacture. In a preferred embodiment, this third value is the lot number of the tag. In the unlikely event that the third tag read does not resolve all time slot contentions, further similar read operations may be performed without departing from the spirit and scope of the present invention.[0031]
Now the architecture of the tag is described. FIG. 3 is a circuit block diagram of an RFID tag according to a preferred embodiment of the present invention. The particular circuit of FIG. 3 is presented by way of example only. Other circuits can be employed without departing from the spirit and scope of the present invention, as would be apparent to one skilled in the relevant art.[0032]Tag102 includes at least oneantenna302, apower converter304, ademodulator306, aclock recovery circuit308, aninstruction interpreter310, a counter/shift register312, a plurality of laser-programmable taps314a-314c, a plurality of tap decoder logic circuits316a-316c, amultiplexer318, and amodulator320. In apreferred embodiment antenna302 is an omnidirectional antenna, with its impedance matched to the frequency of transmission.
In the depicted embodiment, system power for each tag is provided by a charging signal transmitted by the reader prior to the tag reading operation.[0033]Power converter circuit304 is used to convert the received charging signal to system power. Such power converter circuits are well known in the art. In a preferred embodiment, the charging signal need only be present for a short time to fully charge the tags. In an alternative embodiment,power converter304 is replaced by a battery. In that embodiment, thetag reader104 is not required to transmit a charging signal.
[0034]Demodulator306 receives signals fromtag reader104 viaantenna302. In a preferred embodiment, the received signals comprise a charging signal and one or more instructions. These instructions are described in detail below. One such instruction includes a count instruction that instructs the tags to increment their counter/shift registers312. In one embodiment, the count instruction causes counter/shift registers312 to increment by one; in alternative embodiments, the instruction causes counter/shift registers312 to increment by other values.
In a preferred embodiment, the instructions are transmitted by[0035]tag reader104 using a phase-modulated RF signal using a several hundred kilohertz baud rate and a 900 megahertz carrier frequency. The instructions are sent by the reader with a “return to center” data format; this format is well-known in the art. The instructions are decoded by the tag to generate digital input forinstruction interpreter310 and a system clock. The system clock is recovered byclock recovery circuit308.
[0036]Instruction interpreter310 receives instructions fromdemodulator306, and provides control signals and data to counter/shift register312 andmultiplexer318. Laser programmable taps314a-314care permanently programmed with predetermined values at the time of tag manufacture. In a preferred embodiment, taps314a-314care programmed by laser-cutting specific output taps of a collection of inverters. As would be apparent to one skilled in the relevant arts, other technologies can be used to permanently program these values without departing from the scope of the present invention. In a preferred embodiment, taps314aare programmed with the Tag ID, taps314bare programmed with the tag manufacturer number and taps314care programmed with the tag lot number.
Decoder logic circuits[0037]316a-316care used to monitor the outputs of programmable taps314a-314c. For example, when the value in counter/shift register312 is the same as the value programmed into Tag ID taps314a, Tag ID logic316adecodes a Tag ID enable signal, which is provided tomultiplexer318.
[0038]Control line322 is used byinstruction interpreter310 to indicate tomultiplexer318 which read cycle is being executed (that is, which permanently-programmed tag value is being tested). For example, during the second read cycle, the manufacturer number is being tested. When the counter/shift register312 reaches the manufacturer number programmed into manufacturer taps314b, manufacturer number logic316bprovides an enable signal to multiplexer318. This enable signal is selected bycontrol line322 to causeshift register312 to shift its contents (the Tag ID) tomodulator320 for transmission to tagreader104.
As will be described below, the second read cycle is initiated by providing a second read instruction to[0039]instruction interpreter310. In response to that instruction, instruction interpreter indicates to multiplexer318 that the manufacturer number is being tested. In response,multiplexer318 gates only the manufacturer number enable signal to counter/shift register312. This enable signal causes counter/shift register312 to shift the count, which is equivalent to the manufacturer number, to modulator320 for transmission to the reader. In this way, the manufacturer number of a tag is transmitted to tagreader104 when the count reaches the manufacturer number. Thus, the time at which the tag transmits during the second read cycle is controlled by the tag manufacturer number. As further described below, this mechanism is used to solve time slot contention problems.
[0040]Modulator320 transmits the data provided by counter/shift register312 to tagreader104 viaantenna302 using amplitude-modulated (AM) RF back scatter signals. In a preferred embodiment a several hundred kilohertz baud rate is used with a 900 megahertz carrier frequency. Because the tag system clock is derived from the signal provided by the tag reader, the data sent by the tag to the reader is clock-synchronized with the reader.
In one embodiment,[0041]tag102 also contains one or more sensors. Data collected by the sensors is routed to counter/shift register312 eachtime tag102 transmits. The sensor data is appended to the tag transmission and recorded bytag reader104. In one embodiment, the sensor is a gas sensor that detects the presence of chemicals associated with drugs or precursor chemicals of explosives, such as methane. When a tag equipped with such a sensor is used as a baggage tag, it is a powerful mechanism for quickly locating bags containing contraband or explosives.
The architecture of[0042]tag reader104 is now described. FIG. 4 is a circuit block diagram of the architecture oftag reader104 according to a preferred embodiment. The circuitry of tag reader is described in three categories: generic circuitry, processing circuitry, and application-specific circuitry.
Referring to FIG. 4, tag reader processing circuitry is represented by[0043]computer402.Computer402 performs high level processing functions not provided by tag reader generic circuitry. These high level functions include compiling inventory lists, handling time slot contentions, and the like, as would be apparent to one skilled in the relevant art.Computer402 may be physically co-located withtag reader104, as in the case of a stationary tag reader, or may be physically separate fromtag reader104, as may be the case with a hand-held or portable tag reader. Theconnection424 betweencomputer402 andcommand controller404 may be hard-wired or wireless.
Application-specific tag reader circuitry is represented by PCMCIA (Personal Computer Memory Card International Association)[0044]card420. In a preferred embodiment, details regarding specific tags, applications, encryption scheme, sensor configuration and data, and modes of operation to be used can be embodied inPCMCIA card420. In this embodiment, ageneric tag reader104 can be used for multiple inventory applications by merely using different PCMCIA cards.
The remaining circuitry in FIG. 4 comprises tag reader generic circuitry. This is the circuitry required by[0045]tag reader104 to perform generic functions under the control ofcomputer402 and one ormore PCMCIA cards420. Generic tag reader circuitry includescommand controller404, counter/clock406,modulator408, one ormore antennas410,demodulator412,clock recovery circuit414,digital processor416,memory424,PCMCIA decoder418, andmanual interface422.
In a preferred embodiment, tag contention is not addressed immediately after it occurs, but rather is resolved in a further read cycle. When a tag contention is detected,[0046]tag reader104 stores the contended time slot number inmemory424. In a further read cycle,tag reader104 retrieves each contended time slot number frommemory424 for resolution. To keep track of the time slots,tag reader104 employs a clock/counter406. Clock/counter406 responds to the count instructions transmitted bytag reader104 totags102. In this way, the contents of clock/counter406 are the same as the contents of counter/shift register312 in eachtag102. Thus, whentag reader104 detects time slot contention, it can record the contended time slot number by storing the contents of clock/counter406.
[0047]Command controller404 generates data and instructions under the control ofcomputer402. These data and instructions are transmitted viamodulator408 andantenna410 totags102. Tag transmissions are received viaantenna410 anddemodulator412 bydigital processor416, which communicates withcomputer402 viacommand controller404. In one embodiment, a system clock may be derived byclock recovery circuit414 for use in analyzing tag transmissions. ThePCMCIA card420 is coupled to tagreader104 via aPCMCIA decoder418. Amanual interface422 provides the operator with control over thetag reader104.
Modes of Operation—Timed Broadcast Read[0048]
As described above, the present invention provides at least three modes of operation: timed broadcast read, immediate read, and specific tag read. Timed broadcast read allows an ensemble of tags (from a few to several thousand) to be read within a time frame of a few seconds. FIG. 2 is a high-level flowchart of the timed broadcast read mode of operation of the present invention. FIG. 5 is a flowchart depicting the first read operation of the timed broadcast read of the present invention. During the first read operation, the tag reader steps the tags through a sequence of time slots. When a tag detects that a time slot matches its preprogrammed time slot, the tag transmits its Tag ID. If more than one tag transmits in the same time slot, the tag reader stores the time slot number for future resolution of the time slot contention.[0049]
First Read Cycle[0050]
Referring to FIG. 5, the timed broadcast read mode of operation begins when the tag reader transmits a first instruction alert to the tags, as shown in a[0051]step502. The first instruction alert signals to the tags that this is the first instruction in the timed broadcast read mode of operation. In response, the tags initialize. In particular, the tags initialize their counters/shift registers312, as shown in astep504. The tag reader then repeatedly transmits a clock increment instruction, as shown in astep506. In response to the increment instruction, each tag increments the count in its counter/shift register312, as shown inStep508. When a tags counter/shift register312 output matches the Tag ID programmed into Tag ID taps314a, as indicated by the “yes” branch fromstep510, the tag transmits its Tag ID as shown in astep512 and described above.
In an alternative embodiment, the tag does not transmit its Tag ID, but instead transmits a simple response signal, when a tags counter/[0052]shift register312 output matches the Tag ID programmed into Tag ID taps314a. The response signal need not convey any information describing the identity of the tag. Indeed, the response signal need not convey any information at all. The response signal need only indicate that a tag is present. In this embodiment,tag reader104 keeps track of the count in the tag counter/shift register312 by using an internal counter/clock406. Counter/clock406 is initialized instep504, and is incremented instep508 in response to the transmitted clock instruction. Whentag reader104 receives a response signal,tag reader104 records the count in counter/clock406. Because the tag transmitted the response signal when the count in its counter/shift register312 equaled its Tag ID, and because the counter/clock406 also contains that count, the presence of the particular tag that transmitted the response signal is recorded by recording the count in counter/clock406. In a preferred embodiment, the response signal contains sufficient information fortag reader104 to detect response signal contention when it occurs.
If more than one tag transmits in the same time slot,[0053]tag reader104 detects time slot contention. If time slot contention is detected, as shown by the “yes” branch fromstep514,tag reader104 stores the Tag ID, as shown in astep516.Tag reader104 keeps track of the Tag ID using counter/clock406.Tag reader104 will use the Tag IDs to resolve the time slot contention for those Tag IDs in a second read cycle, which is described below and corresponds to step206 in FIG. 2.
Second Read Cycle[0054]
In a preferred embodiment, the present invention employs a second read cycle to solve time slot contentions that occurred during the first read cycle. FIG. 6 is a flowchart depicting the operation of the present invention in the second read cycle according to a preferred embodiment. During the second read cycle, the system examines contentions for each Tag ID individually. For each contended Tag ID,[0055]tag reader104 causestags102 to count in unison. When a tag's count matches its manufacturer number, the tag transmits that manufacturer number. In this way, the tag's manufacturer number controls the time slot during which the tag transmits. Because it is highly unlikely that more than one tag will have the same Tag ID and manufacturer number, it is unlikely that two tags will transmit in the same time slot during the second read. Therefore, Tag ID contention is resolved by the second read. In the unlikely event that multiple tags have the same Tag ID and manufacturer number, contention can be resolved using a third read cycle, as described below.
Referring to FIG. 6,[0056]tag reader104 initiates the second read cycle by sending a second read mode instruction totags102, as shown in astep602. The reader then transmits a contended Tag ID to the tags, as shown in astep604. The step permits only those tags that contended for a particular Tag ID to participate in contention resolution for that Tag ID. In response to the transmission of the contended Tag ID, only those tags having that Tag ID initialize their counters/shift registers312, as shown in astep606.
[0057]Tag reader104 then transmits the first in a series of increment instructions, as shown in astep608. In response, the contending tags increment their counter/shift registers312, as shown in astep610. When the output of a tag's counter/shift register312 matches the tag manufacturer number permanently programmed into manufacturer number taps314b, as indicated by the “yes” branch fromstep612, the tag transmits its manufacturer number, as shown in astep614.
In an alternative embodiment, the tag transmits a simple response signal as described above.[0058]Tag reader104 then records the tag's manufacturer number by storing the count in its counter/clock406, as described above for the Tag ID.
If more than one tag transmits its manufacturer number simultaneously,[0059]tag reader104 detects the contention, as indicated by the “yes” branch fromstep616, andtag reader104 stores the contended manufacturer number for future contention resolution in a third read cycle, as shown in astep618.
[0060]Tag reader104steps tags102 through a predetermined range of possible manufacturer numbers. When the last count is reached, as indicated by the “yes” branch fromstep620, the process ofsteps604 through618 is repeated for the next contended Tag ID. When the last contended Tag ID has been examined, as indicated by the “yes” branch fromstep622, the second read cycle is complete.
Third Read Cycle[0061]
In one embodiment, the present invention employs a third read cycle to resolve any time slot contentions that occurred during the second read cycle. FIG. 7 is a flowchart depicting the operation of the present invention in the third read cycle according to a preferred embodiment. During the third read cycle, the system examines contentions for each manufacturer number individually.[0062]
For each contended manufacturer number,[0063]tag reader104 causestags102 to count in unison. When a tag's count matches its lot number, the tag transmits that lot number. In this way, the tag's lot number controls the time slot during which the tag transmits. Because it is highly unlikely that more than one tag will have the same Tag ID, manufacturer number, and lot number, it is extremely unlikely that two tags will transmit in the same time slot during the third read. Therefore, tag manufacturer number contention is resolved by the third read. In the unlikely event that multiple tags have the same Tag ID, manufacturer number, and lot number, contention can be resolved using a further read cycle based on other tag identification data, as would be apparent to one skilled in the relevant art using the above description.
Referring to FIG. 7,[0064]tag reader104 initiates the third read cycle by sending a third read mode instruction totags102, as shown in astep702. The reader then transmits a contended Tag ID and manufacturer number to the tags, as shown in astep704. This step permits only those tags that contended for a particular Tag ID and manufacturer number to participate in contention resolution for that Tag ID and manufacturer number. In response to the transmission of the contended Tag ID and manufacturer number, only tags having that particular Tag ID and manufacturer number initialize their counters/shift registers312, as shown in astep706.
[0065]Tag reader104 then transmits the first in a series of increment instructions, as shown in astep708. In response, the contending tags increment their counter/shift registers312, as shown in astep710. When the output of a tag's counter/shift register312 matches the tag lot number permanently programmed into lot number taps314c, as indicated by the “yes” branch fromstep712, the tag transmits its manufacturer number, as shown in astep714.
In an alternative embodiment, the tag transmits a simple response signal as described above.[0066]Tag reader104 then records the tag's lot number by storing the count in its counter/clock406, as described above for the Tag ID.
If more than one tag transmits its lot number simultaneously,[0067]tag reader104 detects the contention, as indicated by the “yes” branch fromstep716, andtag reader104 stores the contended manufacturer number for future contention resolution in a further read cycle, as shown in astep718.
[0068]Tag reader104steps tags102 through a predetermined range of possible lot numbers. When the last count is reached, as indicated by the “yes” branch fromstep720, the process ofsteps704 through718 is repeated for the next contended manufacturer number. When the last contended manufacturer number has been examined, as indicated by the “yes” branch fromstep722, the third read cycle is complete.
Immediate Read[0069]
Immediate read mode is used to read individual tags one at a time. In this mode,[0070]tag reader104 transmits an instruction to atag102 that causes the tag to bypass the time slot counting operation and to immediately transmit its Tag ID number. This mode is useful for rapid Tag identification (on the order of milliseconds) when the individual tag rapidly passes through the reader zone. An example application is the reading of tags affixed to automobiles passing through an automatic toll booth.
Specific Tag Read[0071]
Specific tag read is used to determine whether one particular tag out is present in an ensemble of tags.[0072]Tag reader104 accomplishes this by transmitting the particular Tag ID, manufacturer number, and lot number of thetag102 that is sought. Because a compete set of Tag identification parameters is transmitted, only the tag being sought should respond. This approach is useful for retrieving a specific tagged item from an ensemble of items, for example for locating and removing a suspicious bag from an airplane cargo hold.
Tag Manufacture[0073]
In order to be commercially viable, the RFID tags of the present invention must be inexpensive to manufacture. The present invention encompasses a unique method of manufacture to achieve this goal. FIG. 8 is a flowchart depicting a method of manufacture for the[0074]RFID tag102 of the present invention. This method of manufacture is described with reference to the tag pair depicted in FIG. 9. FIG. 9 depicts a pair of tags102a,102b. Such a pair of tags is ideally suited for use in the airline baggage handling industry, as mentioned above and described in detail below. In practice, tags102aand102bare separated by the ticketing agent. Tag102ais affixed to a passenger bag, while tag102bis affixed to the passenger's ticket. In this way, the airline can ensure that both the passenger and his bag board the same airplane. Eachtag102 includes anantenna302 and an application-specific integrated circuit (ASIC)904 mounted on bonding pads.
In one embodiment, baggage tag[0075]102aincorporates multiple tamper-resistant features. Tag102acan be fixed to a bag by wrapping the tag about the bag's handle and joining tag portions914aand914b. In one embodiment, one area of914 includes ASIC904 so that attempting to separate areas914aand914bafter joining destroys the ASIC and renders the tag inoperable. In another embodiment, baggage tag102aincludes one or more perforated tear lines912.Perforated tear lines912 tear easily, so that any tampering with tag102acauses the tag to separate at atear line912. This tearing provides an immediate visual indication of tampering.Tear lines912 can be placed across critical portions of the tag circuitry, such as antenna302a, such that tag separation alongtear line912 renders the tag inoperative.
As described above,[0076]tag102 is powered by a power source, such as a battery, in one embodiment. In this embodiment, the battery may be formed by placing an anode910ain one joining area914aof the tag and placing a cathode910cin the other joining area of the tag914b. At least one of anode910aand cathode910cis coated with a electrolytic material and covered by a release liner. In another embodiment,tag102 is powered by a capacitor. In that embodiment, at least one of anode910aand cathode910cis coated with a dielectric material and covered by a release liner. Other power sources may be used withtag102 without departing from the spirit and scope of the present invention, as would be apparent to one skilled in the relevant art.
The ticket agent joins the two joining areas[0077]914a,boftag102 by removing the release liner and joining cathode910cto anode910a, thereby forming the power source of the tag. Any attempt to separate areas914a,bafter joining will destroy the power source formed by anode910aand cathode910c, thereby rendering the tag inoperative. In another embodiment, separating areas914a,bafter joining also gives a visual indication of tampering. For example, separating areas914a,bcould reveal a large “VOID” sign or some other image or break pattern.
Now the manufacture of[0078]tag102 according to a preferred embodiment is described with reference to FIG. 8. In astep804 one or more ASICs are manufactured. The ASICs include the inventory response circuitry depicted in FIG. 3. The circuitry includes the circuit elements of FIG. 3 exceptantenna302. In one embodiment, all inventory response circuitry is contained upon a single ASIC. In another embodiment, RF circuitry is contained on one ASIC, and digital circuitry is contained on another ASIC. Then, in astep806, the ASIC containing the digital inventory response circuitry is permanently programmed with at least the Tag ID and manufacturer number. In one embodiment the ASIC is also programmed with a lot number for the tag. In a preferred embodiment, these values are laser-programmed into taps314a-314c, as described above.
[0079]Antenna302 and bonding pads908 are printed onto a flexible substrate using a conductive ink, as shown in astep808. Such substrates are readily available from vendors such as 3M Corporation and Flexcon. Such conductive inks are widely available. Finally, the ASIC is flip-chip bonded to bonding pads908 using a conductive adhesive, as shown in astep810. One such conductive adhesive is a “z-axis” adhesive, which is well-known in the relevant art and is commercially available. The use of such an adhesive is advantageous in that adhesive conducts only in the z-axis. Therefore, even if the adhesive is applied so as to inadvertently join two bonding pads, the two pads do not short together. In one embodiment the ASIC is also hermetically sealed. In a preferred embodiment, ASIC904 is manufactured using silicon-on-insulator technology.
As mentioned above, a key consideration in the manufacture of[0080]tags102 is cost. A large component of the cost of manufacture of such items is the cost of testing the ASICs to ensure operability. In a preferred embodiment of the present invention, operability testing is deferred until tag manufacture is complete, as shown in astep812. Also in the preferred embodiment, tags102 are manufactured in bulk on a long continuous strip of substrate. The strips can be rolled for easy packaging, delivery, and dispensing. Before packaging, the strip is passed through a testing apparatus, where each tag in the strip is tested for operability. However, rather than attempting to discard inoperable tags, inoperable tags are merely marked as inoperable and are retained on the strip. Then, when a ticket agent encounters a tag marked inoperable in a roll of tags, the ticket agent merely discards the inoperative tag. This process saves considerable cost, and allows the tags of the present invention to be manufactured very inexpensively.
Airline Baggage Handling Example[0081]
As described above, the present invention is ideally suited to use in the airline baggage handling industry. An example of this use is presented in the flowchart of FIG. 10. The process begins when a passenger approaches the ticket counter or curbside check-in at the airport, as shown in[0082]Step1004. The passenger then presents his ticket and/or a personal identification in astep1006. The system captures this information; the system can also capture other authentication information such as biometrics, as show in astep1008. When the passenger presents his baggage for check-in, as shown instep1010, the ticket agent applies a tag to each bag and to the passenger's ticket. In a preferred embodiment, each of these tags bears an identical Tag ID, manufacturer number, and lot number. The system records the Tag ID, flight number, and passenger identity, as shown in astep1018.
After the bag is sent down the chute to the distribution area, as shown in a[0083]step1022, it is placed on a baggage cart in accordance with the flight number conventionally printed on the baggage tags, as shown in astep1024. Once on the baggage cart, the bag tags are read to determine the Tag IDs. If the Tag IDs indicate that the bags are not on the proper baggage cart, as indicated by the “no” branch fromstep1030, then the bags are visually inspected and redirected to the correct baggage cart, as shown in astep1028.
The bags are then transported to the proper gate, loaded onto the designated airplane and then read again, as shown in[0084]steps1034,1036 and1038. Once on the airplane in the cargo hold, the bags are read again, as shown in astep1038. If the tag inventory determines that the bags are not on the proper plane, as indicated by the “no” branch fromstep1040, then the system sounds an alert, as shown in astep1056. Alternatively, the bags can be read on the conveyor belt before they are loaded into the cargo hold. After the alert is sounded, the bag can be removed and examined for re-routing as shown in astep1058.
Once passenger boarding has begun, an inventory of passengers can be performed by scanning the tags on the passenger tickets. If a mismatch is detected between passengers and bags, as indicated by the “no” branch from[0085]step1044, the identified bags can be pulled for examination and re-routing, as shown instep1058. As more bags are loaded onto the airplane, the process is repeated, as indicated by the “yes” branch fromstep1050. When all of the bags have been loaded as indicated by the “no” branch fromstep1050, the system reconciles the collected data, as shown instep1052.
The example use of the present invention described above provides at east two key benefits. First and foremost, the present invention provides a security benefit. In the example use described above, a would-be airline terrorist cannot place a bomb in his baggage and then have the baggage checked onto a plane unless the terrorist also boards the plane. Clearly, this is a significant deterrent to this form of terrorism.[0086]
Second, the present invention provides an efficiency benefit. The problem of lost or misrouted passenger baggage has become epidemic within the airline industry. The example use described above solves this problem. Because a passenger and his baggage must board the same airplane to satisfy the inventory system described above, lost baggage should become a thing of the past.[0087]
Electronic Article Surveillance Example[0088]
The present invention is also ideally suited to use in electronic article surveillance. In a retail clothing store, for example, a tag can be attached to each article of clothing on display. One or more tag readers can then be used to maintain an inventory of the clothing articles. For example, a tag reader can be placed on each rack or display of clothing. Periodic reads of the rack or display can disclose exactly when an item is removed.[0089]
Tag readers placed at the exits to the store can prevent shoplifting. In this example, each item bears a tag. Because the tags are extremely small, they can be placed within an article so as to prevent removal or even discovery. For example, a tag could be placed within a label, button or seam of a garment, the plastic center of a compact disk, or the case of a videocassette, to facilitate both overt and covert operation.[0090]
The store maintains an inventory database of all the articles within the store. Each entry in the database represents a garment and contains the Tag ID of the tag embedded in the article. The entry also indicates whether the item has been purchased. When a tag of an unpurchased article is detected by a door reader, an alarm is sounded, indicating that the article is being shoplifted.[0091]
When an item is purchased, its tag ID is removed from the inventory database. Therefore, when a tag attached to a purchased article moves past the door reader, no alarm is sounded. Used alone or with security cameras, the present invention provides an effective tool to combat shoplifting.[0092]
In another embodiment, the present invention could be used to implement an “unattended store,” i.e. one with no salespersons or clerks. A customer could enter the store, select items and go to a purchasing area. In the purchasing area, a tag reader would identify the customer's selections. The customer would then be presented with a bill. The customer could pay the bill with a credit card, whereupon the unattended store would remove the purchased item from its inventory database. The customer could then leave the store with the purchases.[0093]
Example Instruction Set[0094]
Now an instruction set is described that can be used with the present invention. As would be apparent to one skilled in the relevant art, other instructions can be employed with the present invention without departing from its spirit and scope. In a preferred embodiment, the reader sends an instruction stream to the tag instruction register that is Nir bits long, where Nir is the number of stages in the instruction register. The instructions have the following data field format and symbolic binary values:[0095]
Np: Preamble: alerts the tags that the reader is starting communication. This data field is useful to prevent spurious noise from “spoofing” the tags and to initialize and synchronize the tag clock. The preamble starts with a long stream of “0” pulses from the reader, which starts the tag clock and initializes the tag instruction register. The 0's are followed by Np bits of a series of “1's”, which alerts the tag that a reader instruction is following. Between instruction words, the reader sends out 0's for tag clock generation. When the preamble is present, the symbolic binary for this field is “1”. A “0” represents the absence of the preamble.[0096]
Nw: Last instruction/in process/wake up: This data field is useful for dynamic read environments, where tags are moving into and out of the read zone, and prevents tags entering the read zone during a read cycle from erroneous communication. These tags will be “woken up” at the next read cycle to properly be identified. The “last instruction” sub-field notifies the tag to shut down. The symbolic binary form for this field is:
[0097] | |
| |
| First Instruction Alert: | 001 |
| Subsequent instructions after wake up: | 010 |
| Last instruction; shut down: | 100 |
| |
Nt; Timed read cycle: Second read/first read: This field instructs the tag to go into the specified timed read cycle (first, second or third), with the following symbolic binary form:
[0098] | |
| |
| No timed read: | 000 |
| First read: | 001 |
| Second read: | 010 |
| Third read: | 100 |
| Specific read: | 111 |
| |
Ni; Immediate read: When the symbolic binary form is “1”, this field instructs the tag to immediately send out its ID number.[0099]
Nr; Specific tag read: When the symbolic binary form is “1”, this field instructs the tag to go into the specific tag read mode as designated by Nt, above. The reader will cycle through three instructions to set the tag to the proper state. The first is with Nt=001 and sets the Tag ID counter for the targeted tag. The second is with Nt=010 and sets up the second counter with the targeted manufacturer number. The third is with Nt=100 and sets up the third counter with the targeted lot number. Then the reader sends out clock with Nt=111 to read only the targeted tag at every clock instruction.[0100]
Nm; Clock/Count: This field sets the counter shift registers (SR's) into either the clocked mode to increment the counter by the next clock signal, or into the SR mode, awaiting the following time slot, wafer/lot number, or date instruction stream. It has the symbolic binary form:
[0101] | |
| |
| Clocked mode: | 01 |
| Specific count: | 10 |
| |
Ns; Clock signal/time slot. This data field contains either specific counter instruction data, or a stream of zeroes if the tag is being instructed into the count mode. The symbolic binary form is “1” when there is a specific counter instruction, and “0” for the count mode. When Nm=01 and Ns=0, a clock instruction counter, Nc, is enabled.[0102]
Nc: Clock instruction signal to increment counter/shift registers
[0103]312. The symbolic binary form is:
| |
| |
| No clock instruction: | 00 |
| Clock: | 01 |
| Last clock: | 11 |
| |
The clock instruction counter, Nc, allows the reader to “short cycle” the tag through the count sequence, bypassing the Nir instruction sequence, which can be as long as 32, 48, or 64 bits. Nc, on the other hand, could theoretically be as short as 2 bits, although 4 bits is implemented here. Once the clock instruction is sent out, the reader waits for a tag response. If none comes within a specified time frame, it sends out another clock instruction. When a tag responds with its ID number, the reader waits until the ID number transmission is completed before sending out the next clock instruction. If only a few tens to a few hundreds of tags are in the ensemble, this “short cycle” clocking can accelerate tag read time by as much as a factor of 10. On completing the clock read cycle, the full instruction register will be re-enabled for the next sequence of instructions from the reader, such as for any required contention resolution, or for tag shut down.[0104]
The n-bit instruction stream is organized as follows: Nir=Nc/Ns/Nm/Nr/Ni/Nt/Nw/Np, with each field comprised of sub-fields in the format described above. This provides the generalized symbolic binary form of Nir=xx/x/xx/x/x/xxx/xxx/x where the x's represent either 1's or 0's. An example instruction stream is shown below for each operational mode of the tag. The 1's represent a resulting action or state directed by an instruction sub-field while 0's represent the off state of an instruction sub-field.
[0105] |
|
| Timed Broadcast Read: | Nc/Ns/Nm/Nr/Ni/Nt/Nw/Np |
|
| Initialization: | 00/0/00/0/0/000/000/0 |
| First instruction of first read cycle: | 00/0/01/0/0/001/001/1 |
| Following instructions of first read cycle: | 01/0/01/0/0/001/010/1 |
| Last clock instruction: | 11/0/01/0/0/001/010/1 |
| First instruction for second cycle: | 00/1/10/1/0/010/010/1 |
| Following instructions for second cycle: | 01/0/01/0/0/010/010/1 |
| Last clock instruction for second cycle: | 11/0/01/0/0/010/010/1 |
| First instruction for third cycle: | 00/1/10/1/0/100/010/1 |
| Following instructions for third cycle: | 01/0/01/0/0/100/010/1 |
| Last clock instruction: | 11/0/01/0/0/100/010/1 |
| Last instruction (tags turn off): | 00/0/00/0/0/000/100/1 |
|
[0106] |
|
| Immediate Read: | Nc/Ns/Nm/Nr/Ni/Nt/Nw/Np |
|
| Initialization: | 00/0/00/0/0/000/000/0 |
| First instruction: | 00/0/00/0/1/000/001/1 |
| Next and last instruction (tag turns off): | 00/0/00/0/0/000/100/1 |
|
[0107] |
|
| Specific Tag Read: | Nc/Ns/Nm/Nr/Ni/Nt/Nw/Np |
|
|
| Initialization: | 00/0/00/0/0/000/000/0 |
| First instruction: | 00/1/10/1/0/001/001/1 |
| Second instruction: | 00/1/10/1/0/010/010/1 |
| Third instruction: | 00/1/10/1/0/100/010/1 |
| Following clock instructions: | 01/0/01/1/0/111/010/1 |
| Last clock instruction: | 11/0/01/0/0/111/010/1 |
| First instruction of next specific read: | 00/1/10/1/0/001/010/1 |
| Second instruction of next read: | 00/1/10/1/0/010/010/1 |
| Third instruction of next read: | 00/1/10/1/0/100/010/1 |
| Following clock instructions: | 01/0/01/1/0/111/010/1 |
| Last clock instruction: | 11/0/01/0/0/111/010/1 |
| Last instruction (tag turns off): | 00/0/00/0/0/000/100/1 |
|
CONCLUSIONWhile various embodiments of the present invention have been described above, it should be understood that they have been presented by way of example, and not limitation. It will be apparent to persons skilled in the relevant art that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Thus the present invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.[0108]