CA2599363A1 - Devices and methods for tracking, locating and providing protection to individuals - Google Patents
Devices and methods for tracking, locating and providing protection to individuals Download PDFInfo
- Publication number
- CA2599363A1 CA2599363A1 CA002599363A CA2599363A CA2599363A1 CA 2599363 A1 CA2599363 A1 CA 2599363A1 CA 002599363 A CA002599363 A CA 002599363A CA 2599363 A CA2599363 A CA 2599363A CA 2599363 A1 CA2599363 A1 CA 2599363A1
- Authority
- CA
- Canada
- Prior art keywords
- tag
- subscriber
- rfid
- rfid tag
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000012545 processing Methods 0.000 claims abstract description 5
- 229920005989 resin Polymers 0.000 claims description 14
- 239000011347 resin Substances 0.000 claims description 14
- 206010020751 Hypersensitivity Diseases 0.000 description 5
- 239000000853 adhesive Substances 0.000 description 5
- 230000001070 adhesive effect Effects 0.000 description 5
- 239000000463 material Substances 0.000 description 5
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 5
- 230000007815 allergy Effects 0.000 description 4
- 239000003814 drug Substances 0.000 description 4
- 229940079593 drug Drugs 0.000 description 4
- 238000012544 monitoring process Methods 0.000 description 4
- 230000001419 dependent effect Effects 0.000 description 3
- 230000003053 immunization Effects 0.000 description 3
- 238000002649 immunization Methods 0.000 description 3
- 239000000126 substance Substances 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 2
- 208000026935 allergic disease Diseases 0.000 description 2
- 238000013475 authorization Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 239000004744 fabric Substances 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 229910052710 silicon Inorganic materials 0.000 description 2
- 239000010703 silicon Substances 0.000 description 2
- 239000000758 substrate Substances 0.000 description 2
- 238000001356 surgical procedure Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- ZAMOUSCENKQFHK-UHFFFAOYSA-N Chlorine atom Chemical compound [Cl] ZAMOUSCENKQFHK-UHFFFAOYSA-N 0.000 description 1
- 229920000742 Cotton Polymers 0.000 description 1
- 206010012442 Dermatitis contact Diseases 0.000 description 1
- 239000004640 Melamine resin Substances 0.000 description 1
- 229920000877 Melamine resin Polymers 0.000 description 1
- 229920002396 Polyurea Polymers 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 125000000217 alkyl group Chemical group 0.000 description 1
- 230000000172 allergic effect Effects 0.000 description 1
- 208000030961 allergic reaction Diseases 0.000 description 1
- 208000010668 atopic eczema Diseases 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 210000004369 blood Anatomy 0.000 description 1
- 239000005018 casein Substances 0.000 description 1
- BECPQYXYKAMYBN-UHFFFAOYSA-N casein, tech. Chemical compound NCCCCC(C(O)=O)N=C(O)C(CC(O)=O)N=C(O)C(CCC(O)=N)N=C(O)C(CC(C)C)N=C(O)C(CCC(O)=O)N=C(O)C(CC(O)=O)N=C(O)C(CCC(O)=O)N=C(O)C(C(C)O)N=C(O)C(CCC(O)=N)N=C(O)C(CCC(O)=N)N=C(O)C(CCC(O)=N)N=C(O)C(CCC(O)=O)N=C(O)C(CCC(O)=O)N=C(O)C(COP(O)(O)=O)N=C(O)C(CCC(O)=N)N=C(O)C(N)CC1=CC=CC=C1 BECPQYXYKAMYBN-UHFFFAOYSA-N 0.000 description 1
- 235000021240 caseins Nutrition 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 229910052801 chlorine Inorganic materials 0.000 description 1
- 239000000460 chlorine Substances 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 208000010247 contact dermatitis Diseases 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000009849 deactivation Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 239000003599 detergent Substances 0.000 description 1
- 238000003745 diagnosis Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005108 dry cleaning Methods 0.000 description 1
- 229920001971 elastomer Polymers 0.000 description 1
- 239000000806 elastomer Substances 0.000 description 1
- 239000003822 epoxy resin Substances 0.000 description 1
- 239000006260 foam Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 230000007794 irritation Effects 0.000 description 1
- 238000004900 laundering Methods 0.000 description 1
- 239000007788 liquid Substances 0.000 description 1
- 238000002483 medication Methods 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 239000000123 paper Substances 0.000 description 1
- 239000006187 pill Substances 0.000 description 1
- 229920003023 plastic Polymers 0.000 description 1
- 239000004033 plastic Substances 0.000 description 1
- 229920000647 polyepoxide Polymers 0.000 description 1
- 229920005749 polyurethane resin Polymers 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009182 swimming Effects 0.000 description 1
- 229920002994 synthetic fiber Polymers 0.000 description 1
Classifications
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01V—GEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
- G01V15/00—Tags attached to, or associated with, an object, in order to enable detection of the object
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2462—Asset location systems combined with EAS
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/0202—Child monitoring systems using a transmitter-receiver system carried by the parent and the child
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Electromagnetism (AREA)
- Computer Security & Cryptography (AREA)
- General Life Sciences & Earth Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Geophysics (AREA)
- Emergency Management (AREA)
- Business, Economics & Management (AREA)
- General Health & Medical Sciences (AREA)
- Child & Adolescent Psychology (AREA)
- Health & Medical Sciences (AREA)
- Mobile Radio Communication Systems (AREA)
- Burglar Alarm Systems (AREA)
- Alarm Systems (AREA)
- Position Fixing By Use Of Radio Waves (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
Described herein are devices and methods for tracking, locating and/or providing protection to individuals. Such devices and methods incorporate an RFlD tag that are located with the clothing of the individual. An RFID reader and a device for data processing can also be used with such devices and methods.
Description
DEVICES AND METHODS FOR TRACKING, LOCATING AND PROVIDING
PROTECTION TO INDIVIDUALS
BACKGROUND OF THE INVENTION
[0001] Methods are needed to further protect individuals from becoming lost or abducted, and to track and locate children who are lost or abducted.
SUMMARY OF THE INVENTION
PROTECTION TO INDIVIDUALS
BACKGROUND OF THE INVENTION
[0001] Methods are needed to further protect individuals from becoming lost or abducted, and to track and locate children who are lost or abducted.
SUMMARY OF THE INVENTION
[0002] In one aspect are methods for tracking and locating an individual, and for providing protection to such an individual. In another aspect are devices for tracking and locating an individual, and for providing protection to such an individual. In certain embodiments, the methods and devices incorporate a tag. In further embodiments, the tag is an RFID tag. In further embodiments, the tag includes a microchip connected to an antenna. In further embodiments, the methods and devices incorporate an RFID
reader.
In further embodiments, the methods and devices incorporate a device for data processing. In further embodiments, the tag is incorporated into clothing. In further embodiments the methods and devices are used to track, locate, and/or provide protection to children, the elderly, the injured, the sick and other individuals in need of protection.
BRIEF DESCRIPTION OF THE DRAWINGS
reader.
In further embodiments, the methods and devices incorporate a device for data processing. In further embodiments, the tag is incorporated into clothing. In further embodiments the methods and devices are used to track, locate, and/or provide protection to children, the elderly, the injured, the sick and other individuals in need of protection.
BRIEF DESCRIPTION OF THE DRAWINGS
[0003] A better understanding of the features and advantages of the present invention will be obtained by reference to the following detailed description that sets forth illustrative embodiments, in which the principles of the invention are utilized, and the accompanying drawings of which:
[0004] FIG. 1 provides one embodiment of the devices and methods described herein for tracking, locating, and/or providing protection to individuals.
[0005] FIG. 2 provides non-limiting illustrative embodiments of Unique Smart Tags with embedded microchips.
[0006] FIG. 3 provides non-limiting illustrative embodiments of apparel incorporating the RFID tags described herein.
[0007] FIG. 4 provides non-limiting illustrative embodiments of apparel incorporating the RFID tags described herein.
[0008] FIG. 5 provides a non-limiting illustrative embodiment of a method for obtaining subscribers for a subscriber network described herein.
[0009] FIG. 6 provides a non-liiniting illustrative embodiment of a subscriber network described herein.
C0'01-0] FIG. 7-provitleg a non-limiting illustrative embodiment of the use of the RFID
tags described herein.
[0011] FIG. 8 provides a non-limiting illustrative embodiment of the use of the RFID
tags described herein.
[0012] FIG. 9 provides a non-limiting illustrative embodiment of the use of the RFID
tags described herein.
DETAILED DESCRIPTION OF THE INVENTION
Overview of RFID Technology [0013] Inside an RFID tag is a microchip connected to an antenna. The microchip can store modest amounts of information, up to about 2k bits. RFID tags are often used to store a simple identification number. In more sophisticated systems the tag can function as a portable traveling database for the item to which it is attaclied. Tags come in a variety of form factors and can be attached to basically anything [0014] An RFID Reader controls the wireless reading and writing of information stored on an RFID tag. The RFID reader generates an RF field around its antenna. The RF field energizes the tag and a means to transfer data to the reader. The tag modulates the reader's RF field and the reader can detect this. Similarly, the reader turns the RF field on and off in the right sequence in order to write the tag.
Circuit Components:
[0015] The tag is one component of the circuitry. The tag is basically an integrated circuit deposited on a small silicon chip that has an integrated small, flexible antenna.
This composite circuit creates a tag which by design is capable of processing a variety of frequency ranges and may be passive or active. The passive RFID works by magnetic induction. The integrated circuit provides data storage to record and store information.
[0016] The Reader: A reader sends a signal to the tag. The tag absorbs some of the RF
energy from the reader signal and then reflects the RF energy as a return radio signal containing information from its memory. The reader device generates an alternating magnetic field from a coil of wire. A tag also has a coil of wire that induces current from the magnetic field. This current provides power to the passive tag. The tag then sends back its own varying magnetic field which is read by the reader device.
[0017] Data Processing: Once the data is received from the reader the signal will be processed to trigger an alarm alert device, this may be in the form of a repeating audible resonance, flashing light, or a similar alert type device.
Mock Diagram of a typical RFID system. (Flow Chart) Smart Tag sewn in children's night clothes>>>>>>>>>>Radio waves emitted from tag , Received by Antenna and to Reader>>>>to Audible sound or Device.
Signal >>>>>>
Child's >>>>>>> receive >>>>>>>>>> >>>>>>
Apparel by with Antenna Smart Signal from Alarm to Tag Sntarl Tag Process ir fo. or sewn in to Reader Reader Sent to alarm Device Application of RFID technology Method foY Incorporating Iden.tifying Tag into Apparel [0018] The devices and methods described herein utilize an RFID tag called a Unique Smart Tag configured as described herein and integrated into a wearable item.
[0019] In order for the Unique Smart Tag to be integrated into an item of clothing, it must be resistant to wear and tear from laundering, folding, and daily use of the clothing itself. It must be resistant to a certain amount of heat from sources such as outdoor teniperatures, body heat, and clothes dryers. It must be resistant to water and chemicals such as laundry detergent, chlorine, dry cleaning procedures, and the like.
[0020] The Unique Smart Tag is a microchip that is attached to a small, flexible antenna or antennae. The microchip is composed of an integrated circuit deposited on a small silicon chip. The critical component of the Unique Smart Tag is this microchip since any damage to its circuitry could render the device useless. However, the microchip must be attached to the antenna or antennae in order for the signal to reach the microchip.
[0021] The antenna is attached to the microchip by means that are known in the prior art.
The microchip portion of the Unique Smart Tag is embedded in a material that is impervious to physical abuse, heat, water, and chemical damage. FIG. 2 displays an array of Unique Smart Tags with embedded microchips. The embedding "material"
may be a resin or laminate. By way of example, the resin may be melamine resin, epoxy resin, polyurethane resin, polyurea elastomer resin, alkyl resin, casein, or mixtures thereof.
[0022] The method of manufacture for embedding the Unique Smart Tag in resin or laminate involves placing a predetermined amount of the resin or laminate on a substrate, allowing the resin or laminate to gel or soften and then placing the Unique Smart Tag on the resin or laminate with the microchip component centered on the resin or laminate drop. After placement of the Unique Smart Tag, another predetermined amount of resin or Urh'friate'19 pladbd ot4 too 'o'f the microchip component before the first gelled layer of resin or laminate is allowed to fully cure. This method seals the microchip in the resin or laminate completely.
[0023] A Unique Smart Tag that is ruggedized and therefore protected from physical abuse, heat and chemical damage can be integrated into various wearable items.
Practically every wearable item is capable of having a Unique Smart Tag integrated into it during manufacture. Outerwear, sleepwear, clothing, underwear, and even footwear and accessories have locations where a Unique Smart Tag may be attached or carried.
[0024] Although the Unique Smart Tag may be attached to virtually any surface via an adhesive backing or other means of attachment, the preferred embodiment for attaching it to an individual's clothing is one in which the Unique Smart Tag is "incorporated" into a "concealed area" and therefore hidden from plain sight while the individual is wearing the clothing. In this way, an abductor may not be aware of, and cannot remove the Unique Smart Tag from the individual. Additionally, hiding the Unique Smart Tag protects the tag from further wear and tear, therefore extending the life of the tag.
Furthermore, concealment of the Unique Smart Tag protects the individual from irritation, either from physical friction with the tag or conditions such as allergies or contact dermatitis.
[0025] A "wearable" item into or onto which the Unique Smart Tag may be incorporated comprises apparel, jewelry, accessories, patches, tags, or any other means by which something may be attached to or carried on an individual. In one embodiment, the wearable item can be "apparel" such as clothes, footwear, underwear, outerwear, sleepwear, and accessories. The wearable item comprises clothing patches, zippers, strings, collars, pockets, or any other item that can be sewn, ironed onto, tied, or otherwise attached to an item of apparel.
[0026] The Unique Smart Tag is small enough that it can be placed on fabric and sewn into a hem, waistband, collar or seam. In one embodiment, on outerwear such as shown in FIG. 3, the Unique Smart Tag is sewn into a collar as in A, a seam as in B, or a waistband as in C. In another embodiment such as the pair ofjeans shown in FIG. 3, the Unique Smart Tag is sewn into a waistband as in D or a side seam as in E. In one embodiment, the Unique Smart Tag is sewn into clothing when an elastic waistband is incorporated into the article. In another embodiment, the Unique Smart Tag is sewn into a pocket. In yet another embodiment, the Unique Smart Tag is part of the heel, insole, midsole, or upper portion of footwear as show in FIG. 4.
[002,7] TlYd'6P6ratY'uiial'd69igf1 and use of SmartWear is specifically designed for is individual safety and security, anti-kidnapping circumstance and or similar abduction situations. The devices and methods described herein utilize a Unique Smart Tag (Transponder) configured as described herein and sewn the individual's apparel.
[0028] The Unique Smart Tag may also be used for more temporary purposes. In one embodiment, it may be incorporated into a patch that has an adhesive to be attached to a person either by placing it directly on the slcin or by placing it on the person's clothing.
A patch with a Unique Smart Tag may be used to attach information about a patient directly on his person. This may be useful particularly in triage during a large event where many people are injured, medical charts are not available, and patients may be moved frequently.
[0029] The Unique Smart Tag is incorporated into the patch by the existence of two layers. The first layer has an adhesive backing and the second layer is a covering layer.
A resin-encapsulated or lanzinate-covered Unique Smart Tag is located between these two layers. In one embodiment, the Unique Smart Tag is manufactured using one of the layers as a substrate and the top layer is fused on top using an adhesive. The layers may be made of paper, fabric, foam, or other sheet-like material. In one embodiment the material may be naturally-derived, such as cotton. In another embodiment the material may by synthetic such as plastic. In another embodiment the layers are a combination of natural and synthetic materials. The adhesive is similar to those used on medical bandages, is skin-friendly, and readily removable.
Busitaess Method [0030] A consumer purchases or otherwise acquires said RFID tag-enabled product. At this stage, the point-of-sale, the consumer has the option to enter a subscription agreement and activate said RFID tag. To activate the RFID tag, a unique code is programmed into the tag using an RFID tag encoding device and assigned to the consumer, now subscriber. In another embodiment, the unique identification code which has been previously embedded on the RFID tag is read by an RFID tag reader and given to the consumer. This code is then entered into a subscriber network database by the retailer or consumer, along with identifying personal information of the subscriber.
[0031] A "subscriber" is a primary purchaser or consumer of the RFID tagged product as well as the purchaser or consumer's family members such as the purchaser's spouse, children or dependents. In another embodiment, an RFID-tagged product may be bought as a gift for a third party and the RFID tag may be activated by the third party, now subscriber, at the retailer at a later time. In another embodiment, an RFID-tagged product may b&"purcTl~f~ed'"ag'a-'gifC''lb-r a third party and the RFID tag unique identification code is provided for the third party, who is now the subscriber. The subscriber has the option of returning to the point-of-sale after the purchase of an RFID tag-enabled product has been made to subscribe to the network.
[0032] In one embodiment, the RFID tag has no information embedded in it. In another embodiment, the RFID tag is already programmed with an SKU number for the purposes of inventory tracking. This number is removed from the RFID tag at point of sale. The SKU number is overwritten with the subscriber code in the event the customer subscribes to the network.
[0033] The subscriber "network" is a secured computer network that contains a database of all unique identifiers assigned to the RFID tags and the accompanying information assigned to each code. A "unique identifier" is an entry within the database, associated with a subscriber's information. In one embodiment, each RFID tag-enabled product contains a unique identifier that is unique from all other RFID tag-enabled products. In another einbodiment, the unique identifier is used for any number of RFID tag-enabled products. In this embodiment, a unique identifier belonging to a subscriber is unique from all other subscribers and the subscriber keeps a record of his/her unique identifier to encode all the RFID tag-enabled products which the subscriber owns. The subscriber provides his/her code when the RFID tag is activated at the point-of-sale.
[0034] The subscriber has the option at any time to add additional relevant information to the database entry corresponding to said code. The subscriber has the option at any time to remove any or all information correlating to his/her code from the database, thereby ending his/her affiliation with the code. Removal of information from the database requires the subscriber to access to the database as an authorized user.
[0035] The quantity and content of the information a subscriber may add is entirely at the discretion of the subscriber. This information is likely to be at least one of the following:
(1) name of the subscriber (and dependents), (2) date of birth, (3) address, (4) telephone number, (5) emergency contact information, (6) next of kin, (7) medical conditions or requirements, (8) social security number, (9) physical description, (10) photograph, (11) any other information the subscriber deems relevant.
[0036] In one embodiment, relevant subscriber information is provided at the point of sale by a means determined by the method of sale. In another embodiment, relevant subscriber information is provided post-sale by one or more of the following methods: (1) telephoning the network provider customer service, (2) via the internet, (3) by mail, (4) by speaking to a network representative in person.
[0037] In one em'Uotiin'1'ent"tht subscriber can add or remove relevant subscriber information at any time through one or more of the following methods: (1) telephoning the network provider customer service, (2) via the internet, (3) by mail, (4) by speaking to a network representative in person.
[0038] Access to the subscriber network will be highly secured and limited only to authorized persons. Access will be by a usemame and password system unique to all authorized persons and all access will be logged by username, date, time and information accessed.
[0039] The subscriber will have access to personal information only as pertains to the subscriber's own subscription. The subscriber maintains control over access privileges to each individual item of the subscriber's information within the network.
[0040] Full access will be available only to "authorized persons" defined as (1) certain employees of the network provider company and their affiliates, (2) emergency services personnel such as fire, police, ambulance, emergency medical personnel, physicians, Coast Guard, and National Guard, (3) other authorized personnel as required on a case by case basis and authorized by subscriber.
[0041] Authorized users will be able to access and view the subscriber's information using the code assigned to the RFID tag. The code assigned to the RFID tag can be associated with identifying information in the network via (1) telephone, (2) internet, (3) by speaking to a network representative, or (4) other secure means of routing information from a network in a fast and reliable manner.
Subscriber Network [0042] In one embodiment as shown in FIG. 5, a retailer offers for sale an RFID tag-enabled product. In one embodiment, the product is sold in a retail establishment or store.
In another embodiment, the product is sold through a website or via the internet. In another embodiment the product is sold through a catalogue and mail order process.
[0043] A consumer purchases or otherwise acquires said RFID tag-enabled product. At this stage, the point-of-sale, the consumer has the option to enter a subscription agreement and activate said RFID tag. To activate the RFID tag, a unique code is programmed into the tag using an RFID tag encoding device and assigned to the consumer, now subscriber. In another embodiment, the unique identirication code which has been previously embedded on the RFID tag is read by an RFID tag reader and given to the consumer. This code is then entered into a subscriber network database by the retailer or consumer, along with identifying personal information of the subscriber.
[004-4] A MbScrYlYet" As a"prYYnary purchaser or consumer of the RFID tagged product as well as the purchaser or consumer's family members such as the purchaser's spouse, children or dependents. In another embodiment, an RFID-tagged product may be bought as a gift for a third party and the RFID tag may be activated by the third party, now subscriber, at the retailer at a later time. In another embodiment, an RFID-tagged product may be purchased as a gift for a third party and the RFID tag unique identification code is provided for the third party, who is now the subscriber. The subscriber has the option of returning to the point-of-sale after the purchase of an RFID tag-enabled product has been made to subscribe to the network.
[0045] In one embodiment, the RFID tag has no information einbedded in it. In another embodiment, the RFID tag is already programmed with an SKU number for the purposes of inventory tracking. This number is removed from the RFID tag at point of sale. The SKU number is overwritten with the subscriber code in the event the customer subscribes to the network.
[0046] An RFID Tag Reader controls the wireless reading and writing of information stored on an RFID tag. The RFID reader generates an RF field around its antenna. The RF field energizes the tag and a means to transfer data to the reader. The tag modulates the reader's RF field and the reader can detect this. Similarly, the reader turns the RF
field on and off in the right sequence in order to write the tag.
[0047] The subscriber "network" is a secured computer network that contains a database of all unique identifiers assigned to the RFID tags and the accompanying information assigned to each code. A "unique identifier" is an entry within the database, associated with a subscriber's information. In one embodiment, each RFID tag-enabled product contains a unique identifier that is unique from all other RFID tag-enabled products. In another embodiment, the unique identifier is used for any number of RFID tag-enabled products. In this embodiment, a unique identifier belonging to a subscriber is unique from all other subscribers and the subscriber keeps a record of his/her unique identifier to encode all the RFID tag-enabled products which the subscriber owns. The subscriber provides his/her code when the RFID tag is activated at the point-of-sale.
[0048] The subscriber has the option at any time to add additional relevant information to the database entry corresponding to said code. The subscriber has the option at any time to remove any or all information correlating to his/her code from the database, thereby ending his/her affiliation with the code. Removal of information from the database requires the subscriber to access to the database as an authorized user.
[0'049] This',qu'antPty; athd ewYtent of the information a subscriber may add or remove is entirely at the discretion of the subscriber. FIG. 6 outlines possible discrete information fields that a subscriber may want to add content to. These fields all linlc to the main subscriber profile and consist of sub-fields of information that fall under the unbrella of the parent field. These fields are descibed fitrther below.
[0050] In one embodiment, the medication profile field contain the following set of sub-fields for each medication being taken. Name of Medication; Condition being treated;
Strength; Units; Form (Liquid, Pill, etc); Frequency; Duration; Directions;
Start Date;
Currently Taking (Yes/No); Prescribing Doctor.
[0051] In one embodiment, the Doctor/Hospital Profile field contains the following set of sub-fields for each of the subscriber's doctors: First Name; Last Name; Title;
Clinic or Hospital; Address 1; Address 2; City; State; Postal Code; Office Phone; Mobile Phone;
Home Phone; Email.
[0052] In one embodiment the Allergy Profile field contains the following set of sub-fields for each allergy indicated: Allergic to; Allergic Reaction; Other Reaction;
Treatment; Doctor;
[0053] In one emboidment, the condition/illness profile field contains the following sub-fields for each set of condition/illness: Condition or illness; Active(active, inactive, resolved); Date of onset; Date of diagnosis; Date of resolution; Method of treatment;
Doctor;
[0054] In one embodiment, the immunizations profile contains the following set of sub-fields for each immunization performed: Immunized for; Date of immunization;
Doctor;
[0055] In one embodiment, the family member profile field contains the following set of sub-fields for each family member listed: Prefix; First Name; Last Name;
Suffix; Date of birth; Gender; Race; Primary Language; Height; Weight; Eye color; Blood type;
Photo 1 (Head Shot); Photo 2 (Profile); Instructions in event of emergency; Medical Authorization; Medical Authorization digital signature; Smartwear Digital ID;
Date Added; User ID; Subscriber ID.
[0056] In one embodiment the emergency contact profile field contains the following set of subfields for each contact listed: Prefix; First Name; Last Name; Address 1; Address 2;
City; State; Postal Code; Relationship; Day phone; Evening phone; Mobile phone; Email address [0057] In one embodiment the surgery & procedures profile field contains the following set of subfields for each surgery or procedure: Procedure; Date; Result;
Doctor;
C~0'058] 1'mone embotYirderlt,'tPle subscriber profile field contains the following sub-fields:
User name; Password; First name; Last name; Email; Work phone; Mobile phone;
Important information; Date joined; Status; Billing code.
[0059] In one embodiment the biometric profile field contains the following sub-fields:
Finger print scans; Iris Scan; DNA profile;
[0060] In one embodiment, each field has a number of sub-fields common to each field, these include: Comments; Date updated; User ID; Access level where access levels allows subscribers to predetermine who will be able to access each discrete field. For example, a subscriber could allow a school or similar agency to access only the contact information, allow doctors and hospitals to access medications and allergies and allow law enforcement agencies to access eveiy field.
[0061] In one embodiment, each information field is stored on a separate server in separate locations to facilitate greater security, faster access, improved reliability and flexibility in data control and access.
[0062] Full automatic and unrestricted access will be available only to certain individuals as indicated in the subscription agreement and may include (1) certain employees of the network provider company and their affiliates, (2) emergency services personnel such as fire, police, ambulance, emergency medical personnel and physicians, coast guard, National Guard, (3) other authorized personnel as required on a case by case basis and authorized by subscriber.
[0063] Authorized personnel will be assigned a usemame and password that will allow them access to the network at their access level (doctor, school, law enforcement etc) and will be able to access and view the subscriber's information using the code assigned to the RFID tag(s). The code assigned to the RFID tag can be associated with identifying information in the network via one or more of the following (1) telephone, (2) internet, (3) by speaking to a network representative, or (4) other secure means of routing information from a network in a fast and reliable manner.
Early Warning Systein and Locator Device [0064] Also described herein is a method for the tracking of individuals as they enter and exit a certain predefined area. In effect, this embodiment creates an invisible electronic fence around a home or building such that when an individual comes in close proximity of an exit portal, an audible or visible alarm will be triggered. This monitoring system is useful to prevent the abduction of individuals from homes and schools, or the departure of a sleepwalker, mentally disabled, or elderly person from a house or building. Such a rnonizarhig sysiem c'an be"Y'h~ifiluable in which only one or a few individuals need to be monitored such that the system is not triggered by pets, full-capacity adults, or guests.
[0065] The illustration of FIG. 7 provides an overview of the components of one embodiment of the early warning system and locator device. In general, the system of the present enibodiment collects data from an RFID device attached to a child 1 via one or more remote RFID readers which are located in a entryway or exit 2 and 4 or a window 3.
[0066] The predefined area is a locality such as a house, apartment, condominium, or other dwelling. The locality can be a building such as a day care facility or school. In anther embodiment, the locality comprises a geographic area such as a neighborhood, amusement park, nature preserve, campsite, sports arena, department store, shopping mall, ski resort, etc. The geographic area could be defined by sphere of activity or physical boundaries.
[0067] The monitoring system is small in size and can be integrated into a new or existing home alarm system. In this way, the system is unobtrusive, and cannot be tampered with easily. Furthermore, the system may be such that a home alarm system is installed with it concurrently, in the same areas of the home, and can be turned on or off with the same action. The alarm device is also adoptable with cell phone technology.
[0068] The monitoring system of the present invention includes an RFID reader which controls the wireless reading and writing of information stored on an RFID
tag. The RFID reader generates an RF field around its antenna. The RF field energizes the tag and a means to transfer data to the reader. The tag modulates the reader's RF
field and the reader can detect this. Similarly, the reader turns the RF field on and off in the right sequence in order to write the tag.
[0069] The RFID tag is integrated into a child or individual's sleepwear, apparel, or footwear, or can be otherwise worn or carried on the person as a wristband, bandage, or accessory.
[0070] The RFID tag is activated by programming a unique code into the tag using an RFID reader. The unique code can be a simple alphanumerical code.
Alternatively, the unique code can be identifying data such as a name, address, phone number, or even a photo.
[0071] RFID readers are embedded in certain strategic locations such as window frames, door frames, driveways, fences, or water sources. Water sources comprise swimming pools, spas, jacuzzis, hot tubs, water gardens, ponds, lakes, streams, or rivers. FIG. 8 is ail illtistraribn-bf-one ernl7odYi'nent in which the RFID reader 5 is located adjacent to a door frame and the RFID device is attached to a child's clothing 6.
[0072] When an encoded RFID device passes in close proximity of an RFID
reader, the system compares the stored ID with those stored in the system and triggers an audible and/or visible alarm if the ID matches any within the system. Alternatively, in the event the individual is physically moved outside a specified distance or range, as defined by specification, a detection notification in the form of an audible alarm or flashing lights will be activated. The alarm may be audible or visible either at the source of the triggering event, at another location such as a base station within the home or a parent's bedroom, or at multiple locations throughout the system. Since the system is wireless, once activated, deactivation by an intruder is virtually impossible.
[0073] In one embodiment, the identification tags are semi-passive devices. A
semi-passive RFID tag is able to use an attached power source, but the power source is not continually transmitting information. An RFID reader is able to read and write data to a semi-passive RFID tag at a greater speed and distance than that of a passive RFID tag.
[0074] It is one object of the methods and devices described herein to create a small, efficient sensor which is capable of detecting a specific encoded RFID device when it traverses a predefined area. In one application, this predefined area is an entrance to a house or residential building.
[0075] It is a further object of the methods and devices described herein to provide detailed information regarding the location of an individual, should the individual leave the predefined area and need to be tracked in a larger environment.
[0076] The devices and methods described herein provide a constant monitoring system that is wireless and able to be placed in an undetectable part of the individual's apparel.
Moreover it has the ability to penetrate room walls, and similar obstacles normally encountered in the home or other similar environments. The Unique Smart Tag is highly reliable and can withstand severe environments and hot/cold temperature extremes.
GPS Devices arad Lofag Rayage Passive/Active Tags [0077] Also described herein is the use of a GPS device with long range passive/active tags to locate an individual. New technology allows GPS-enabled devices to be incorporated into wearable objects, including clothing (using the principles described for RFID-enabled tags described elsewhere herein).
[0078] In one embodiment, the identification tags are compliant with longer range detectors. The GPS-enabled device which is worn or attached to the person or child is such that it is not only capable of communicating with a short-range RFID
reader, but al'so is'-capa151'o 'of l,'ralhsi'nitt4ng data to a GPS network such that location information within a larger area can be communicated via a satellite network.
[0079] In one embodiment, such as illustrated in FIG. 9, a lost or abducted person 7 who is in an open environment may be located via a signal given by the GPS-enabled device (which also has RFID capability) to a GPS satellite 8. The signal received by the GPS
satellite is transmitted to a GPS receiver 9 and retransmitted to a person or persons 10 with specific information on the location of the lost or abducted person.
[0080] In one embodiment, the identification tags are active devices. An active GPS-enabled device system consists of the same features and functionality as a passive system with the addition of a power source associated with the tag. This power source enables reading and writing of the GPS-enabled device (which also has RFID capability) at a greater speed and distance and permits the tag to transmit information to a RFID reader.
If an active identification tag is used, the active RFID system can be integrated with permanent structures such cellular telephone towers.
[0081] While embodiments of the present invention have been shown and described herein, it will be obvious to those skilled in the art that such embodiments are provided by way of example only. Numerous variations, changes, and substitutions will now occur to those skilled in the art without departing from the invention. It should be understood that various alternatives to the embodiments of the invention described herein may be employed in practicing the invention. It is intended that the following claims define the scope of the invention and that methods and structures within the scope of these claims and their equivalents be covered thereby.
C0'01-0] FIG. 7-provitleg a non-limiting illustrative embodiment of the use of the RFID
tags described herein.
[0011] FIG. 8 provides a non-limiting illustrative embodiment of the use of the RFID
tags described herein.
[0012] FIG. 9 provides a non-limiting illustrative embodiment of the use of the RFID
tags described herein.
DETAILED DESCRIPTION OF THE INVENTION
Overview of RFID Technology [0013] Inside an RFID tag is a microchip connected to an antenna. The microchip can store modest amounts of information, up to about 2k bits. RFID tags are often used to store a simple identification number. In more sophisticated systems the tag can function as a portable traveling database for the item to which it is attaclied. Tags come in a variety of form factors and can be attached to basically anything [0014] An RFID Reader controls the wireless reading and writing of information stored on an RFID tag. The RFID reader generates an RF field around its antenna. The RF field energizes the tag and a means to transfer data to the reader. The tag modulates the reader's RF field and the reader can detect this. Similarly, the reader turns the RF field on and off in the right sequence in order to write the tag.
Circuit Components:
[0015] The tag is one component of the circuitry. The tag is basically an integrated circuit deposited on a small silicon chip that has an integrated small, flexible antenna.
This composite circuit creates a tag which by design is capable of processing a variety of frequency ranges and may be passive or active. The passive RFID works by magnetic induction. The integrated circuit provides data storage to record and store information.
[0016] The Reader: A reader sends a signal to the tag. The tag absorbs some of the RF
energy from the reader signal and then reflects the RF energy as a return radio signal containing information from its memory. The reader device generates an alternating magnetic field from a coil of wire. A tag also has a coil of wire that induces current from the magnetic field. This current provides power to the passive tag. The tag then sends back its own varying magnetic field which is read by the reader device.
[0017] Data Processing: Once the data is received from the reader the signal will be processed to trigger an alarm alert device, this may be in the form of a repeating audible resonance, flashing light, or a similar alert type device.
Mock Diagram of a typical RFID system. (Flow Chart) Smart Tag sewn in children's night clothes>>>>>>>>>>Radio waves emitted from tag , Received by Antenna and to Reader>>>>to Audible sound or Device.
Signal >>>>>>
Child's >>>>>>> receive >>>>>>>>>> >>>>>>
Apparel by with Antenna Smart Signal from Alarm to Tag Sntarl Tag Process ir fo. or sewn in to Reader Reader Sent to alarm Device Application of RFID technology Method foY Incorporating Iden.tifying Tag into Apparel [0018] The devices and methods described herein utilize an RFID tag called a Unique Smart Tag configured as described herein and integrated into a wearable item.
[0019] In order for the Unique Smart Tag to be integrated into an item of clothing, it must be resistant to wear and tear from laundering, folding, and daily use of the clothing itself. It must be resistant to a certain amount of heat from sources such as outdoor teniperatures, body heat, and clothes dryers. It must be resistant to water and chemicals such as laundry detergent, chlorine, dry cleaning procedures, and the like.
[0020] The Unique Smart Tag is a microchip that is attached to a small, flexible antenna or antennae. The microchip is composed of an integrated circuit deposited on a small silicon chip. The critical component of the Unique Smart Tag is this microchip since any damage to its circuitry could render the device useless. However, the microchip must be attached to the antenna or antennae in order for the signal to reach the microchip.
[0021] The antenna is attached to the microchip by means that are known in the prior art.
The microchip portion of the Unique Smart Tag is embedded in a material that is impervious to physical abuse, heat, water, and chemical damage. FIG. 2 displays an array of Unique Smart Tags with embedded microchips. The embedding "material"
may be a resin or laminate. By way of example, the resin may be melamine resin, epoxy resin, polyurethane resin, polyurea elastomer resin, alkyl resin, casein, or mixtures thereof.
[0022] The method of manufacture for embedding the Unique Smart Tag in resin or laminate involves placing a predetermined amount of the resin or laminate on a substrate, allowing the resin or laminate to gel or soften and then placing the Unique Smart Tag on the resin or laminate with the microchip component centered on the resin or laminate drop. After placement of the Unique Smart Tag, another predetermined amount of resin or Urh'friate'19 pladbd ot4 too 'o'f the microchip component before the first gelled layer of resin or laminate is allowed to fully cure. This method seals the microchip in the resin or laminate completely.
[0023] A Unique Smart Tag that is ruggedized and therefore protected from physical abuse, heat and chemical damage can be integrated into various wearable items.
Practically every wearable item is capable of having a Unique Smart Tag integrated into it during manufacture. Outerwear, sleepwear, clothing, underwear, and even footwear and accessories have locations where a Unique Smart Tag may be attached or carried.
[0024] Although the Unique Smart Tag may be attached to virtually any surface via an adhesive backing or other means of attachment, the preferred embodiment for attaching it to an individual's clothing is one in which the Unique Smart Tag is "incorporated" into a "concealed area" and therefore hidden from plain sight while the individual is wearing the clothing. In this way, an abductor may not be aware of, and cannot remove the Unique Smart Tag from the individual. Additionally, hiding the Unique Smart Tag protects the tag from further wear and tear, therefore extending the life of the tag.
Furthermore, concealment of the Unique Smart Tag protects the individual from irritation, either from physical friction with the tag or conditions such as allergies or contact dermatitis.
[0025] A "wearable" item into or onto which the Unique Smart Tag may be incorporated comprises apparel, jewelry, accessories, patches, tags, or any other means by which something may be attached to or carried on an individual. In one embodiment, the wearable item can be "apparel" such as clothes, footwear, underwear, outerwear, sleepwear, and accessories. The wearable item comprises clothing patches, zippers, strings, collars, pockets, or any other item that can be sewn, ironed onto, tied, or otherwise attached to an item of apparel.
[0026] The Unique Smart Tag is small enough that it can be placed on fabric and sewn into a hem, waistband, collar or seam. In one embodiment, on outerwear such as shown in FIG. 3, the Unique Smart Tag is sewn into a collar as in A, a seam as in B, or a waistband as in C. In another embodiment such as the pair ofjeans shown in FIG. 3, the Unique Smart Tag is sewn into a waistband as in D or a side seam as in E. In one embodiment, the Unique Smart Tag is sewn into clothing when an elastic waistband is incorporated into the article. In another embodiment, the Unique Smart Tag is sewn into a pocket. In yet another embodiment, the Unique Smart Tag is part of the heel, insole, midsole, or upper portion of footwear as show in FIG. 4.
[002,7] TlYd'6P6ratY'uiial'd69igf1 and use of SmartWear is specifically designed for is individual safety and security, anti-kidnapping circumstance and or similar abduction situations. The devices and methods described herein utilize a Unique Smart Tag (Transponder) configured as described herein and sewn the individual's apparel.
[0028] The Unique Smart Tag may also be used for more temporary purposes. In one embodiment, it may be incorporated into a patch that has an adhesive to be attached to a person either by placing it directly on the slcin or by placing it on the person's clothing.
A patch with a Unique Smart Tag may be used to attach information about a patient directly on his person. This may be useful particularly in triage during a large event where many people are injured, medical charts are not available, and patients may be moved frequently.
[0029] The Unique Smart Tag is incorporated into the patch by the existence of two layers. The first layer has an adhesive backing and the second layer is a covering layer.
A resin-encapsulated or lanzinate-covered Unique Smart Tag is located between these two layers. In one embodiment, the Unique Smart Tag is manufactured using one of the layers as a substrate and the top layer is fused on top using an adhesive. The layers may be made of paper, fabric, foam, or other sheet-like material. In one embodiment the material may be naturally-derived, such as cotton. In another embodiment the material may by synthetic such as plastic. In another embodiment the layers are a combination of natural and synthetic materials. The adhesive is similar to those used on medical bandages, is skin-friendly, and readily removable.
Busitaess Method [0030] A consumer purchases or otherwise acquires said RFID tag-enabled product. At this stage, the point-of-sale, the consumer has the option to enter a subscription agreement and activate said RFID tag. To activate the RFID tag, a unique code is programmed into the tag using an RFID tag encoding device and assigned to the consumer, now subscriber. In another embodiment, the unique identification code which has been previously embedded on the RFID tag is read by an RFID tag reader and given to the consumer. This code is then entered into a subscriber network database by the retailer or consumer, along with identifying personal information of the subscriber.
[0031] A "subscriber" is a primary purchaser or consumer of the RFID tagged product as well as the purchaser or consumer's family members such as the purchaser's spouse, children or dependents. In another embodiment, an RFID-tagged product may be bought as a gift for a third party and the RFID tag may be activated by the third party, now subscriber, at the retailer at a later time. In another embodiment, an RFID-tagged product may b&"purcTl~f~ed'"ag'a-'gifC''lb-r a third party and the RFID tag unique identification code is provided for the third party, who is now the subscriber. The subscriber has the option of returning to the point-of-sale after the purchase of an RFID tag-enabled product has been made to subscribe to the network.
[0032] In one embodiment, the RFID tag has no information embedded in it. In another embodiment, the RFID tag is already programmed with an SKU number for the purposes of inventory tracking. This number is removed from the RFID tag at point of sale. The SKU number is overwritten with the subscriber code in the event the customer subscribes to the network.
[0033] The subscriber "network" is a secured computer network that contains a database of all unique identifiers assigned to the RFID tags and the accompanying information assigned to each code. A "unique identifier" is an entry within the database, associated with a subscriber's information. In one embodiment, each RFID tag-enabled product contains a unique identifier that is unique from all other RFID tag-enabled products. In another einbodiment, the unique identifier is used for any number of RFID tag-enabled products. In this embodiment, a unique identifier belonging to a subscriber is unique from all other subscribers and the subscriber keeps a record of his/her unique identifier to encode all the RFID tag-enabled products which the subscriber owns. The subscriber provides his/her code when the RFID tag is activated at the point-of-sale.
[0034] The subscriber has the option at any time to add additional relevant information to the database entry corresponding to said code. The subscriber has the option at any time to remove any or all information correlating to his/her code from the database, thereby ending his/her affiliation with the code. Removal of information from the database requires the subscriber to access to the database as an authorized user.
[0035] The quantity and content of the information a subscriber may add is entirely at the discretion of the subscriber. This information is likely to be at least one of the following:
(1) name of the subscriber (and dependents), (2) date of birth, (3) address, (4) telephone number, (5) emergency contact information, (6) next of kin, (7) medical conditions or requirements, (8) social security number, (9) physical description, (10) photograph, (11) any other information the subscriber deems relevant.
[0036] In one embodiment, relevant subscriber information is provided at the point of sale by a means determined by the method of sale. In another embodiment, relevant subscriber information is provided post-sale by one or more of the following methods: (1) telephoning the network provider customer service, (2) via the internet, (3) by mail, (4) by speaking to a network representative in person.
[0037] In one em'Uotiin'1'ent"tht subscriber can add or remove relevant subscriber information at any time through one or more of the following methods: (1) telephoning the network provider customer service, (2) via the internet, (3) by mail, (4) by speaking to a network representative in person.
[0038] Access to the subscriber network will be highly secured and limited only to authorized persons. Access will be by a usemame and password system unique to all authorized persons and all access will be logged by username, date, time and information accessed.
[0039] The subscriber will have access to personal information only as pertains to the subscriber's own subscription. The subscriber maintains control over access privileges to each individual item of the subscriber's information within the network.
[0040] Full access will be available only to "authorized persons" defined as (1) certain employees of the network provider company and their affiliates, (2) emergency services personnel such as fire, police, ambulance, emergency medical personnel, physicians, Coast Guard, and National Guard, (3) other authorized personnel as required on a case by case basis and authorized by subscriber.
[0041] Authorized users will be able to access and view the subscriber's information using the code assigned to the RFID tag. The code assigned to the RFID tag can be associated with identifying information in the network via (1) telephone, (2) internet, (3) by speaking to a network representative, or (4) other secure means of routing information from a network in a fast and reliable manner.
Subscriber Network [0042] In one embodiment as shown in FIG. 5, a retailer offers for sale an RFID tag-enabled product. In one embodiment, the product is sold in a retail establishment or store.
In another embodiment, the product is sold through a website or via the internet. In another embodiment the product is sold through a catalogue and mail order process.
[0043] A consumer purchases or otherwise acquires said RFID tag-enabled product. At this stage, the point-of-sale, the consumer has the option to enter a subscription agreement and activate said RFID tag. To activate the RFID tag, a unique code is programmed into the tag using an RFID tag encoding device and assigned to the consumer, now subscriber. In another embodiment, the unique identirication code which has been previously embedded on the RFID tag is read by an RFID tag reader and given to the consumer. This code is then entered into a subscriber network database by the retailer or consumer, along with identifying personal information of the subscriber.
[004-4] A MbScrYlYet" As a"prYYnary purchaser or consumer of the RFID tagged product as well as the purchaser or consumer's family members such as the purchaser's spouse, children or dependents. In another embodiment, an RFID-tagged product may be bought as a gift for a third party and the RFID tag may be activated by the third party, now subscriber, at the retailer at a later time. In another embodiment, an RFID-tagged product may be purchased as a gift for a third party and the RFID tag unique identification code is provided for the third party, who is now the subscriber. The subscriber has the option of returning to the point-of-sale after the purchase of an RFID tag-enabled product has been made to subscribe to the network.
[0045] In one embodiment, the RFID tag has no information einbedded in it. In another embodiment, the RFID tag is already programmed with an SKU number for the purposes of inventory tracking. This number is removed from the RFID tag at point of sale. The SKU number is overwritten with the subscriber code in the event the customer subscribes to the network.
[0046] An RFID Tag Reader controls the wireless reading and writing of information stored on an RFID tag. The RFID reader generates an RF field around its antenna. The RF field energizes the tag and a means to transfer data to the reader. The tag modulates the reader's RF field and the reader can detect this. Similarly, the reader turns the RF
field on and off in the right sequence in order to write the tag.
[0047] The subscriber "network" is a secured computer network that contains a database of all unique identifiers assigned to the RFID tags and the accompanying information assigned to each code. A "unique identifier" is an entry within the database, associated with a subscriber's information. In one embodiment, each RFID tag-enabled product contains a unique identifier that is unique from all other RFID tag-enabled products. In another embodiment, the unique identifier is used for any number of RFID tag-enabled products. In this embodiment, a unique identifier belonging to a subscriber is unique from all other subscribers and the subscriber keeps a record of his/her unique identifier to encode all the RFID tag-enabled products which the subscriber owns. The subscriber provides his/her code when the RFID tag is activated at the point-of-sale.
[0048] The subscriber has the option at any time to add additional relevant information to the database entry corresponding to said code. The subscriber has the option at any time to remove any or all information correlating to his/her code from the database, thereby ending his/her affiliation with the code. Removal of information from the database requires the subscriber to access to the database as an authorized user.
[0'049] This',qu'antPty; athd ewYtent of the information a subscriber may add or remove is entirely at the discretion of the subscriber. FIG. 6 outlines possible discrete information fields that a subscriber may want to add content to. These fields all linlc to the main subscriber profile and consist of sub-fields of information that fall under the unbrella of the parent field. These fields are descibed fitrther below.
[0050] In one embodiment, the medication profile field contain the following set of sub-fields for each medication being taken. Name of Medication; Condition being treated;
Strength; Units; Form (Liquid, Pill, etc); Frequency; Duration; Directions;
Start Date;
Currently Taking (Yes/No); Prescribing Doctor.
[0051] In one embodiment, the Doctor/Hospital Profile field contains the following set of sub-fields for each of the subscriber's doctors: First Name; Last Name; Title;
Clinic or Hospital; Address 1; Address 2; City; State; Postal Code; Office Phone; Mobile Phone;
Home Phone; Email.
[0052] In one embodiment the Allergy Profile field contains the following set of sub-fields for each allergy indicated: Allergic to; Allergic Reaction; Other Reaction;
Treatment; Doctor;
[0053] In one emboidment, the condition/illness profile field contains the following sub-fields for each set of condition/illness: Condition or illness; Active(active, inactive, resolved); Date of onset; Date of diagnosis; Date of resolution; Method of treatment;
Doctor;
[0054] In one embodiment, the immunizations profile contains the following set of sub-fields for each immunization performed: Immunized for; Date of immunization;
Doctor;
[0055] In one embodiment, the family member profile field contains the following set of sub-fields for each family member listed: Prefix; First Name; Last Name;
Suffix; Date of birth; Gender; Race; Primary Language; Height; Weight; Eye color; Blood type;
Photo 1 (Head Shot); Photo 2 (Profile); Instructions in event of emergency; Medical Authorization; Medical Authorization digital signature; Smartwear Digital ID;
Date Added; User ID; Subscriber ID.
[0056] In one embodiment the emergency contact profile field contains the following set of subfields for each contact listed: Prefix; First Name; Last Name; Address 1; Address 2;
City; State; Postal Code; Relationship; Day phone; Evening phone; Mobile phone; Email address [0057] In one embodiment the surgery & procedures profile field contains the following set of subfields for each surgery or procedure: Procedure; Date; Result;
Doctor;
C~0'058] 1'mone embotYirderlt,'tPle subscriber profile field contains the following sub-fields:
User name; Password; First name; Last name; Email; Work phone; Mobile phone;
Important information; Date joined; Status; Billing code.
[0059] In one embodiment the biometric profile field contains the following sub-fields:
Finger print scans; Iris Scan; DNA profile;
[0060] In one embodiment, each field has a number of sub-fields common to each field, these include: Comments; Date updated; User ID; Access level where access levels allows subscribers to predetermine who will be able to access each discrete field. For example, a subscriber could allow a school or similar agency to access only the contact information, allow doctors and hospitals to access medications and allergies and allow law enforcement agencies to access eveiy field.
[0061] In one embodiment, each information field is stored on a separate server in separate locations to facilitate greater security, faster access, improved reliability and flexibility in data control and access.
[0062] Full automatic and unrestricted access will be available only to certain individuals as indicated in the subscription agreement and may include (1) certain employees of the network provider company and their affiliates, (2) emergency services personnel such as fire, police, ambulance, emergency medical personnel and physicians, coast guard, National Guard, (3) other authorized personnel as required on a case by case basis and authorized by subscriber.
[0063] Authorized personnel will be assigned a usemame and password that will allow them access to the network at their access level (doctor, school, law enforcement etc) and will be able to access and view the subscriber's information using the code assigned to the RFID tag(s). The code assigned to the RFID tag can be associated with identifying information in the network via one or more of the following (1) telephone, (2) internet, (3) by speaking to a network representative, or (4) other secure means of routing information from a network in a fast and reliable manner.
Early Warning Systein and Locator Device [0064] Also described herein is a method for the tracking of individuals as they enter and exit a certain predefined area. In effect, this embodiment creates an invisible electronic fence around a home or building such that when an individual comes in close proximity of an exit portal, an audible or visible alarm will be triggered. This monitoring system is useful to prevent the abduction of individuals from homes and schools, or the departure of a sleepwalker, mentally disabled, or elderly person from a house or building. Such a rnonizarhig sysiem c'an be"Y'h~ifiluable in which only one or a few individuals need to be monitored such that the system is not triggered by pets, full-capacity adults, or guests.
[0065] The illustration of FIG. 7 provides an overview of the components of one embodiment of the early warning system and locator device. In general, the system of the present enibodiment collects data from an RFID device attached to a child 1 via one or more remote RFID readers which are located in a entryway or exit 2 and 4 or a window 3.
[0066] The predefined area is a locality such as a house, apartment, condominium, or other dwelling. The locality can be a building such as a day care facility or school. In anther embodiment, the locality comprises a geographic area such as a neighborhood, amusement park, nature preserve, campsite, sports arena, department store, shopping mall, ski resort, etc. The geographic area could be defined by sphere of activity or physical boundaries.
[0067] The monitoring system is small in size and can be integrated into a new or existing home alarm system. In this way, the system is unobtrusive, and cannot be tampered with easily. Furthermore, the system may be such that a home alarm system is installed with it concurrently, in the same areas of the home, and can be turned on or off with the same action. The alarm device is also adoptable with cell phone technology.
[0068] The monitoring system of the present invention includes an RFID reader which controls the wireless reading and writing of information stored on an RFID
tag. The RFID reader generates an RF field around its antenna. The RF field energizes the tag and a means to transfer data to the reader. The tag modulates the reader's RF
field and the reader can detect this. Similarly, the reader turns the RF field on and off in the right sequence in order to write the tag.
[0069] The RFID tag is integrated into a child or individual's sleepwear, apparel, or footwear, or can be otherwise worn or carried on the person as a wristband, bandage, or accessory.
[0070] The RFID tag is activated by programming a unique code into the tag using an RFID reader. The unique code can be a simple alphanumerical code.
Alternatively, the unique code can be identifying data such as a name, address, phone number, or even a photo.
[0071] RFID readers are embedded in certain strategic locations such as window frames, door frames, driveways, fences, or water sources. Water sources comprise swimming pools, spas, jacuzzis, hot tubs, water gardens, ponds, lakes, streams, or rivers. FIG. 8 is ail illtistraribn-bf-one ernl7odYi'nent in which the RFID reader 5 is located adjacent to a door frame and the RFID device is attached to a child's clothing 6.
[0072] When an encoded RFID device passes in close proximity of an RFID
reader, the system compares the stored ID with those stored in the system and triggers an audible and/or visible alarm if the ID matches any within the system. Alternatively, in the event the individual is physically moved outside a specified distance or range, as defined by specification, a detection notification in the form of an audible alarm or flashing lights will be activated. The alarm may be audible or visible either at the source of the triggering event, at another location such as a base station within the home or a parent's bedroom, or at multiple locations throughout the system. Since the system is wireless, once activated, deactivation by an intruder is virtually impossible.
[0073] In one embodiment, the identification tags are semi-passive devices. A
semi-passive RFID tag is able to use an attached power source, but the power source is not continually transmitting information. An RFID reader is able to read and write data to a semi-passive RFID tag at a greater speed and distance than that of a passive RFID tag.
[0074] It is one object of the methods and devices described herein to create a small, efficient sensor which is capable of detecting a specific encoded RFID device when it traverses a predefined area. In one application, this predefined area is an entrance to a house or residential building.
[0075] It is a further object of the methods and devices described herein to provide detailed information regarding the location of an individual, should the individual leave the predefined area and need to be tracked in a larger environment.
[0076] The devices and methods described herein provide a constant monitoring system that is wireless and able to be placed in an undetectable part of the individual's apparel.
Moreover it has the ability to penetrate room walls, and similar obstacles normally encountered in the home or other similar environments. The Unique Smart Tag is highly reliable and can withstand severe environments and hot/cold temperature extremes.
GPS Devices arad Lofag Rayage Passive/Active Tags [0077] Also described herein is the use of a GPS device with long range passive/active tags to locate an individual. New technology allows GPS-enabled devices to be incorporated into wearable objects, including clothing (using the principles described for RFID-enabled tags described elsewhere herein).
[0078] In one embodiment, the identification tags are compliant with longer range detectors. The GPS-enabled device which is worn or attached to the person or child is such that it is not only capable of communicating with a short-range RFID
reader, but al'so is'-capa151'o 'of l,'ralhsi'nitt4ng data to a GPS network such that location information within a larger area can be communicated via a satellite network.
[0079] In one embodiment, such as illustrated in FIG. 9, a lost or abducted person 7 who is in an open environment may be located via a signal given by the GPS-enabled device (which also has RFID capability) to a GPS satellite 8. The signal received by the GPS
satellite is transmitted to a GPS receiver 9 and retransmitted to a person or persons 10 with specific information on the location of the lost or abducted person.
[0080] In one embodiment, the identification tags are active devices. An active GPS-enabled device system consists of the same features and functionality as a passive system with the addition of a power source associated with the tag. This power source enables reading and writing of the GPS-enabled device (which also has RFID capability) at a greater speed and distance and permits the tag to transmit information to a RFID reader.
If an active identification tag is used, the active RFID system can be integrated with permanent structures such cellular telephone towers.
[0081] While embodiments of the present invention have been shown and described herein, it will be obvious to those skilled in the art that such embodiments are provided by way of example only. Numerous variations, changes, and substitutions will now occur to those skilled in the art without departing from the invention. It should be understood that various alternatives to the embodiments of the invention described herein may be employed in practicing the invention. It is intended that the following claims define the scope of the invention and that methods and structures within the scope of these claims and their equivalents be covered thereby.
Claims (10)
1. A method for tracking or locating an individual comprising: providing the individual with clothing in which an RFID tag has been embedded, using a device to read a signal from the RFID tag, and processing the signal to track or locate the individual.
2. The method of Claim 1, wherein the RFID tag contains a unique identifying number.
3. The method of Claim 1 further comprising a network of information on the individual that can be accessed by providing the unique identifying number.
4. The method of Claim 3 wherein the individual is a child.
5. The method of Claim 4 wherein the RFID tag is completely covered in resin.
6. An assemblage for tracking or locating an individual comprising an RFID tag that has been embedded into an article of clothing, a device that can read the RFID
tag, and a device that can determine the location of the RFID tag.
tag, and a device that can determine the location of the RFID tag.
7. The assemblage of Claim 6, wherein the RFID tag contains a unique identifying number.
8. The assemblage of Claim 7 further comprising a network of information on the individual that can be accessed by providing the unique identifying number.
9. The assemblage of Claim 8 wherein the individual is a child.
10. The assemblage of Claim 9 wherein the RFID tag is completely covered in resin.
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US67860005P | 2005-05-06 | 2005-05-06 | |
US60/678,600 | 2005-05-06 | ||
US74459006P | 2006-04-10 | 2006-04-10 | |
US74458606P | 2006-04-10 | 2006-04-10 | |
US60/744,590 | 2006-04-10 | ||
US60/744,586 | 2006-04-10 | ||
PCT/US2006/017753 WO2006122041A2 (en) | 2005-05-06 | 2006-05-05 | Devices and methods for tracking, locating and providing protection to individuals |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2599363A1 true CA2599363A1 (en) | 2006-11-16 |
Family
ID=37397206
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002599363A Abandoned CA2599363A1 (en) | 2005-05-06 | 2006-05-05 | Devices and methods for tracking, locating and providing protection to individuals |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP1880371A4 (en) |
JP (1) | JP2008541244A (en) |
AU (1) | AU2006244141A1 (en) |
CA (1) | CA2599363A1 (en) |
GB (1) | GB2437588A (en) |
WO (1) | WO2006122041A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8760520B2 (en) | 2008-11-10 | 2014-06-24 | Eduard Levin | System and method for tracking and monitoring personnel and equipment |
Families Citing this family (130)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007041343A1 (en) * | 2007-08-31 | 2009-03-05 | Siemens Ag | Arrangement for locating train manning person in passenger train, has multiple coaches, and train manning person locally assigns object, which is equipped with selective identifier for train manning person |
GB2473860A (en) * | 2009-09-25 | 2011-03-30 | Michael William Anthony Cartwright | Accident mitigation system |
US9092963B2 (en) | 2010-03-29 | 2015-07-28 | Qualcomm Incorporated | Wireless tracking device |
US9999038B2 (en) | 2013-05-31 | 2018-06-12 | At&T Intellectual Property I, L.P. | Remote distributed antenna system |
US9525524B2 (en) | 2013-05-31 | 2016-12-20 | At&T Intellectual Property I, L.P. | Remote distributed antenna system |
US8897697B1 (en) | 2013-11-06 | 2014-11-25 | At&T Intellectual Property I, Lp | Millimeter-wave surface-wave communications |
JP6705619B2 (en) * | 2014-08-18 | 2020-06-03 | とし子 岩井 | How to sell clothing that makes it easier to find |
US9768833B2 (en) | 2014-09-15 | 2017-09-19 | At&T Intellectual Property I, L.P. | Method and apparatus for sensing a condition in a transmission medium of electromagnetic waves |
US10063280B2 (en) | 2014-09-17 | 2018-08-28 | At&T Intellectual Property I, L.P. | Monitoring and mitigating conditions in a communication network |
US9615269B2 (en) | 2014-10-02 | 2017-04-04 | At&T Intellectual Property I, L.P. | Method and apparatus that provides fault tolerance in a communication network |
US9685992B2 (en) | 2014-10-03 | 2017-06-20 | At&T Intellectual Property I, L.P. | Circuit panel network and methods thereof |
US9503189B2 (en) | 2014-10-10 | 2016-11-22 | At&T Intellectual Property I, L.P. | Method and apparatus for arranging communication sessions in a communication system |
US9973299B2 (en) | 2014-10-14 | 2018-05-15 | At&T Intellectual Property I, L.P. | Method and apparatus for adjusting a mode of communication in a communication network |
US9312919B1 (en) | 2014-10-21 | 2016-04-12 | At&T Intellectual Property I, Lp | Transmission device with impairment compensation and methods for use therewith |
US9780834B2 (en) | 2014-10-21 | 2017-10-03 | At&T Intellectual Property I, L.P. | Method and apparatus for transmitting electromagnetic waves |
US9769020B2 (en) | 2014-10-21 | 2017-09-19 | At&T Intellectual Property I, L.P. | Method and apparatus for responding to events affecting communications in a communication network |
US9577306B2 (en) | 2014-10-21 | 2017-02-21 | At&T Intellectual Property I, L.P. | Guided-wave transmission device and methods for use therewith |
US9653770B2 (en) | 2014-10-21 | 2017-05-16 | At&T Intellectual Property I, L.P. | Guided wave coupler, coupling module and methods for use therewith |
US9627768B2 (en) | 2014-10-21 | 2017-04-18 | At&T Intellectual Property I, L.P. | Guided-wave transmission device with non-fundamental mode propagation and methods for use therewith |
US10009067B2 (en) | 2014-12-04 | 2018-06-26 | At&T Intellectual Property I, L.P. | Method and apparatus for configuring a communication interface |
US9997819B2 (en) | 2015-06-09 | 2018-06-12 | At&T Intellectual Property I, L.P. | Transmission medium and method for facilitating propagation of electromagnetic waves via a core |
US9461706B1 (en) | 2015-07-31 | 2016-10-04 | At&T Intellectual Property I, Lp | Method and apparatus for exchanging communication signals |
US9954287B2 (en) | 2014-11-20 | 2018-04-24 | At&T Intellectual Property I, L.P. | Apparatus for converting wireless signals and electromagnetic waves and methods thereof |
US9800327B2 (en) | 2014-11-20 | 2017-10-24 | At&T Intellectual Property I, L.P. | Apparatus for controlling operations of a communication device and methods thereof |
US10243784B2 (en) | 2014-11-20 | 2019-03-26 | At&T Intellectual Property I, L.P. | System for generating topology information and methods thereof |
US9544006B2 (en) | 2014-11-20 | 2017-01-10 | At&T Intellectual Property I, L.P. | Transmission device with mode division multiplexing and methods for use therewith |
US9742462B2 (en) | 2014-12-04 | 2017-08-22 | At&T Intellectual Property I, L.P. | Transmission medium and communication interfaces and methods for use therewith |
US10340573B2 (en) | 2016-10-26 | 2019-07-02 | At&T Intellectual Property I, L.P. | Launcher with cylindrical coupling device and methods for use therewith |
US9876570B2 (en) | 2015-02-20 | 2018-01-23 | At&T Intellectual Property I, Lp | Guided-wave transmission device with non-fundamental mode propagation and methods for use therewith |
US9749013B2 (en) | 2015-03-17 | 2017-08-29 | At&T Intellectual Property I, L.P. | Method and apparatus for reducing attenuation of electromagnetic waves guided by a transmission medium |
US9705561B2 (en) | 2015-04-24 | 2017-07-11 | At&T Intellectual Property I, L.P. | Directional coupling device and methods for use therewith |
US10224981B2 (en) | 2015-04-24 | 2019-03-05 | At&T Intellectual Property I, Lp | Passive electrical coupling device and methods for use therewith |
US9793954B2 (en) | 2015-04-28 | 2017-10-17 | At&T Intellectual Property I, L.P. | Magnetic coupling device and methods for use therewith |
US9748626B2 (en) | 2015-05-14 | 2017-08-29 | At&T Intellectual Property I, L.P. | Plurality of cables having different cross-sectional shapes which are bundled together to form a transmission medium |
US9871282B2 (en) | 2015-05-14 | 2018-01-16 | At&T Intellectual Property I, L.P. | At least one transmission medium having a dielectric surface that is covered at least in part by a second dielectric |
US9490869B1 (en) | 2015-05-14 | 2016-11-08 | At&T Intellectual Property I, L.P. | Transmission medium having multiple cores and methods for use therewith |
US10650940B2 (en) | 2015-05-15 | 2020-05-12 | At&T Intellectual Property I, L.P. | Transmission medium having a conductive material and methods for use therewith |
US9917341B2 (en) | 2015-05-27 | 2018-03-13 | At&T Intellectual Property I, L.P. | Apparatus and method for launching electromagnetic waves and for modifying radial dimensions of the propagating electromagnetic waves |
US9912381B2 (en) | 2015-06-03 | 2018-03-06 | At&T Intellectual Property I, Lp | Network termination and methods for use therewith |
US10812174B2 (en) | 2015-06-03 | 2020-10-20 | At&T Intellectual Property I, L.P. | Client node device and methods for use therewith |
US9866309B2 (en) | 2015-06-03 | 2018-01-09 | At&T Intellectual Property I, Lp | Host node device and methods for use therewith |
US9913139B2 (en) | 2015-06-09 | 2018-03-06 | At&T Intellectual Property I, L.P. | Signal fingerprinting for authentication of communicating devices |
US9820146B2 (en) | 2015-06-12 | 2017-11-14 | At&T Intellectual Property I, L.P. | Method and apparatus for authentication and identity management of communicating devices |
US9667317B2 (en) | 2015-06-15 | 2017-05-30 | At&T Intellectual Property I, L.P. | Method and apparatus for providing security using network traffic adjustments |
US9509415B1 (en) | 2015-06-25 | 2016-11-29 | At&T Intellectual Property I, L.P. | Methods and apparatus for inducing a fundamental wave mode on a transmission medium |
US9640850B2 (en) | 2015-06-25 | 2017-05-02 | At&T Intellectual Property I, L.P. | Methods and apparatus for inducing a non-fundamental wave mode on a transmission medium |
US9865911B2 (en) | 2015-06-25 | 2018-01-09 | At&T Intellectual Property I, L.P. | Waveguide system for slot radiating first electromagnetic waves that are combined into a non-fundamental wave mode second electromagnetic wave on a transmission medium |
US10205655B2 (en) | 2015-07-14 | 2019-02-12 | At&T Intellectual Property I, L.P. | Apparatus and methods for communicating utilizing an antenna array and multiple communication paths |
US9853342B2 (en) | 2015-07-14 | 2017-12-26 | At&T Intellectual Property I, L.P. | Dielectric transmission medium connector and methods for use therewith |
US9628116B2 (en) | 2015-07-14 | 2017-04-18 | At&T Intellectual Property I, L.P. | Apparatus and methods for transmitting wireless signals |
US10320586B2 (en) | 2015-07-14 | 2019-06-11 | At&T Intellectual Property I, L.P. | Apparatus and methods for generating non-interfering electromagnetic waves on an insulated transmission medium |
US9847566B2 (en) | 2015-07-14 | 2017-12-19 | At&T Intellectual Property I, L.P. | Method and apparatus for adjusting a field of a signal to mitigate interference |
US10044409B2 (en) | 2015-07-14 | 2018-08-07 | At&T Intellectual Property I, L.P. | Transmission medium and methods for use therewith |
US10148016B2 (en) | 2015-07-14 | 2018-12-04 | At&T Intellectual Property I, L.P. | Apparatus and methods for communicating utilizing an antenna array |
US9722318B2 (en) | 2015-07-14 | 2017-08-01 | At&T Intellectual Property I, L.P. | Method and apparatus for coupling an antenna to a device |
US9882257B2 (en) | 2015-07-14 | 2018-01-30 | At&T Intellectual Property I, L.P. | Method and apparatus for launching a wave mode that mitigates interference |
US10090606B2 (en) | 2015-07-15 | 2018-10-02 | At&T Intellectual Property I, L.P. | Antenna system with dielectric array and methods for use therewith |
US9793951B2 (en) | 2015-07-15 | 2017-10-17 | At&T Intellectual Property I, L.P. | Method and apparatus for launching a wave mode that mitigates interference |
US9948333B2 (en) | 2015-07-23 | 2018-04-17 | At&T Intellectual Property I, L.P. | Method and apparatus for wireless communications to mitigate interference |
US9749053B2 (en) | 2015-07-23 | 2017-08-29 | At&T Intellectual Property I, L.P. | Node device, repeater and methods for use therewith |
US9871283B2 (en) | 2015-07-23 | 2018-01-16 | At&T Intellectual Property I, Lp | Transmission medium having a dielectric core comprised of plural members connected by a ball and socket configuration |
US9912027B2 (en) | 2015-07-23 | 2018-03-06 | At&T Intellectual Property I, L.P. | Method and apparatus for exchanging communication signals |
US9967173B2 (en) | 2015-07-31 | 2018-05-08 | At&T Intellectual Property I, L.P. | Method and apparatus for authentication and identity management of communicating devices |
US9735833B2 (en) | 2015-07-31 | 2017-08-15 | At&T Intellectual Property I, L.P. | Method and apparatus for communications management in a neighborhood network |
US9904535B2 (en) | 2015-09-14 | 2018-02-27 | At&T Intellectual Property I, L.P. | Method and apparatus for distributing software |
US9769128B2 (en) | 2015-09-28 | 2017-09-19 | At&T Intellectual Property I, L.P. | Method and apparatus for encryption of communications over a network |
US9729197B2 (en) | 2015-10-01 | 2017-08-08 | At&T Intellectual Property I, L.P. | Method and apparatus for communicating network management traffic over a network |
US9876264B2 (en) | 2015-10-02 | 2018-01-23 | At&T Intellectual Property I, Lp | Communication system, guided wave switch and methods for use therewith |
US10355367B2 (en) | 2015-10-16 | 2019-07-16 | At&T Intellectual Property I, L.P. | Antenna structure for exchanging wireless signals |
US9860075B1 (en) | 2016-08-26 | 2018-01-02 | At&T Intellectual Property I, L.P. | Method and communication node for broadband distribution |
US10340600B2 (en) | 2016-10-18 | 2019-07-02 | At&T Intellectual Property I, L.P. | Apparatus and methods for launching guided waves via plural waveguide systems |
US10135146B2 (en) | 2016-10-18 | 2018-11-20 | At&T Intellectual Property I, L.P. | Apparatus and methods for launching guided waves via circuits |
US10135147B2 (en) | 2016-10-18 | 2018-11-20 | At&T Intellectual Property I, L.P. | Apparatus and methods for launching guided waves via an antenna |
US9991580B2 (en) | 2016-10-21 | 2018-06-05 | At&T Intellectual Property I, L.P. | Launcher and coupling system for guided wave mode cancellation |
US9876605B1 (en) | 2016-10-21 | 2018-01-23 | At&T Intellectual Property I, L.P. | Launcher and coupling system to support desired guided wave mode |
US10811767B2 (en) | 2016-10-21 | 2020-10-20 | At&T Intellectual Property I, L.P. | System and dielectric antenna with convex dielectric radome |
US10374316B2 (en) | 2016-10-21 | 2019-08-06 | At&T Intellectual Property I, L.P. | System and dielectric antenna with non-uniform dielectric |
US10312567B2 (en) | 2016-10-26 | 2019-06-04 | At&T Intellectual Property I, L.P. | Launcher with planar strip antenna and methods for use therewith |
US10498044B2 (en) | 2016-11-03 | 2019-12-03 | At&T Intellectual Property I, L.P. | Apparatus for configuring a surface of an antenna |
US10225025B2 (en) | 2016-11-03 | 2019-03-05 | At&T Intellectual Property I, L.P. | Method and apparatus for detecting a fault in a communication system |
US10291334B2 (en) | 2016-11-03 | 2019-05-14 | At&T Intellectual Property I, L.P. | System for detecting a fault in a communication system |
US10224634B2 (en) | 2016-11-03 | 2019-03-05 | At&T Intellectual Property I, L.P. | Methods and apparatus for adjusting an operational characteristic of an antenna |
US10178445B2 (en) | 2016-11-23 | 2019-01-08 | At&T Intellectual Property I, L.P. | Methods, devices, and systems for load balancing between a plurality of waveguides |
US10340603B2 (en) | 2016-11-23 | 2019-07-02 | At&T Intellectual Property I, L.P. | Antenna system having shielded structural configurations for assembly |
US10340601B2 (en) | 2016-11-23 | 2019-07-02 | At&T Intellectual Property I, L.P. | Multi-antenna system and methods for use therewith |
US10090594B2 (en) | 2016-11-23 | 2018-10-02 | At&T Intellectual Property I, L.P. | Antenna system having structural configurations for assembly |
US10535928B2 (en) | 2016-11-23 | 2020-01-14 | At&T Intellectual Property I, L.P. | Antenna system and methods for use therewith |
US10305190B2 (en) | 2016-12-01 | 2019-05-28 | At&T Intellectual Property I, L.P. | Reflecting dielectric antenna system and methods for use therewith |
US10361489B2 (en) | 2016-12-01 | 2019-07-23 | At&T Intellectual Property I, L.P. | Dielectric dish antenna system and methods for use therewith |
US10326494B2 (en) | 2016-12-06 | 2019-06-18 | At&T Intellectual Property I, L.P. | Apparatus for measurement de-embedding and methods for use therewith |
US10694379B2 (en) | 2016-12-06 | 2020-06-23 | At&T Intellectual Property I, L.P. | Waveguide system with device-based authentication and methods for use therewith |
US10135145B2 (en) | 2016-12-06 | 2018-11-20 | At&T Intellectual Property I, L.P. | Apparatus and methods for generating an electromagnetic wave along a transmission medium |
US9927517B1 (en) | 2016-12-06 | 2018-03-27 | At&T Intellectual Property I, L.P. | Apparatus and methods for sensing rainfall |
US10755542B2 (en) | 2016-12-06 | 2020-08-25 | At&T Intellectual Property I, L.P. | Method and apparatus for surveillance via guided wave communication |
US10382976B2 (en) | 2016-12-06 | 2019-08-13 | At&T Intellectual Property I, L.P. | Method and apparatus for managing wireless communications based on communication paths and network device positions |
US10637149B2 (en) | 2016-12-06 | 2020-04-28 | At&T Intellectual Property I, L.P. | Injection molded dielectric antenna and methods for use therewith |
US10819035B2 (en) | 2016-12-06 | 2020-10-27 | At&T Intellectual Property I, L.P. | Launcher with helical antenna and methods for use therewith |
US10727599B2 (en) | 2016-12-06 | 2020-07-28 | At&T Intellectual Property I, L.P. | Launcher with slot antenna and methods for use therewith |
US10020844B2 (en) | 2016-12-06 | 2018-07-10 | T&T Intellectual Property I, L.P. | Method and apparatus for broadcast communication via guided waves |
US10439675B2 (en) | 2016-12-06 | 2019-10-08 | At&T Intellectual Property I, L.P. | Method and apparatus for repeating guided wave communication signals |
US10547348B2 (en) | 2016-12-07 | 2020-01-28 | At&T Intellectual Property I, L.P. | Method and apparatus for switching transmission mediums in a communication system |
US10359749B2 (en) | 2016-12-07 | 2019-07-23 | At&T Intellectual Property I, L.P. | Method and apparatus for utilities management via guided wave communication |
US10243270B2 (en) | 2016-12-07 | 2019-03-26 | At&T Intellectual Property I, L.P. | Beam adaptive multi-feed dielectric antenna system and methods for use therewith |
US10027397B2 (en) | 2016-12-07 | 2018-07-17 | At&T Intellectual Property I, L.P. | Distributed antenna system and methods for use therewith |
US9893795B1 (en) | 2016-12-07 | 2018-02-13 | At&T Intellectual Property I, Lp | Method and repeater for broadband distribution |
US10446936B2 (en) | 2016-12-07 | 2019-10-15 | At&T Intellectual Property I, L.P. | Multi-feed dielectric antenna system and methods for use therewith |
US10168695B2 (en) | 2016-12-07 | 2019-01-01 | At&T Intellectual Property I, L.P. | Method and apparatus for controlling an unmanned aircraft |
US10139820B2 (en) | 2016-12-07 | 2018-11-27 | At&T Intellectual Property I, L.P. | Method and apparatus for deploying equipment of a communication system |
US10389029B2 (en) | 2016-12-07 | 2019-08-20 | At&T Intellectual Property I, L.P. | Multi-feed dielectric antenna system with core selection and methods for use therewith |
US10777873B2 (en) | 2016-12-08 | 2020-09-15 | At&T Intellectual Property I, L.P. | Method and apparatus for mounting network devices |
US10103422B2 (en) | 2016-12-08 | 2018-10-16 | At&T Intellectual Property I, L.P. | Method and apparatus for mounting network devices |
US10530505B2 (en) | 2016-12-08 | 2020-01-07 | At&T Intellectual Property I, L.P. | Apparatus and methods for launching electromagnetic waves along a transmission medium |
US10389037B2 (en) | 2016-12-08 | 2019-08-20 | At&T Intellectual Property I, L.P. | Apparatus and methods for selecting sections of an antenna array and use therewith |
US10411356B2 (en) | 2016-12-08 | 2019-09-10 | At&T Intellectual Property I, L.P. | Apparatus and methods for selectively targeting communication devices with an antenna array |
US10938108B2 (en) | 2016-12-08 | 2021-03-02 | At&T Intellectual Property I, L.P. | Frequency selective multi-feed dielectric antenna system and methods for use therewith |
US10916969B2 (en) | 2016-12-08 | 2021-02-09 | At&T Intellectual Property I, L.P. | Method and apparatus for providing power using an inductive coupling |
US10326689B2 (en) | 2016-12-08 | 2019-06-18 | At&T Intellectual Property I, L.P. | Method and system for providing alternative communication paths |
US9998870B1 (en) | 2016-12-08 | 2018-06-12 | At&T Intellectual Property I, L.P. | Method and apparatus for proximity sensing |
US10601494B2 (en) | 2016-12-08 | 2020-03-24 | At&T Intellectual Property I, L.P. | Dual-band communication device and method for use therewith |
US10069535B2 (en) | 2016-12-08 | 2018-09-04 | At&T Intellectual Property I, L.P. | Apparatus and methods for launching electromagnetic waves having a certain electric field structure |
US9911020B1 (en) | 2016-12-08 | 2018-03-06 | At&T Intellectual Property I, L.P. | Method and apparatus for tracking via a radio frequency identification device |
US10264586B2 (en) | 2016-12-09 | 2019-04-16 | At&T Mobility Ii Llc | Cloud-based packet controller and methods for use therewith |
US9838896B1 (en) | 2016-12-09 | 2017-12-05 | At&T Intellectual Property I, L.P. | Method and apparatus for assessing network coverage |
US10340983B2 (en) | 2016-12-09 | 2019-07-02 | At&T Intellectual Property I, L.P. | Method and apparatus for surveying remote sites via guided wave communications |
US9973940B1 (en) | 2017-02-27 | 2018-05-15 | At&T Intellectual Property I, L.P. | Apparatus and methods for dynamic impedance matching of a guided wave launcher |
CN106845585B (en) * | 2017-02-28 | 2019-07-09 | 北京交通大学 | A kind of old people's air defense based on radio frequency identification and data processing technique is wandered away system |
DE112018000705T5 (en) | 2017-03-06 | 2019-11-14 | Cummins Filtration Ip, Inc. | DETECTION OF REAL FILTERS WITH A FILTER MONITORING SYSTEM |
US10298293B2 (en) | 2017-03-13 | 2019-05-21 | At&T Intellectual Property I, L.P. | Apparatus of communication utilizing wireless network devices |
JP6417461B1 (en) * | 2017-10-03 | 2018-11-07 | グンゼ株式会社 | Clothing management system and clothing management method |
US11924196B2 (en) | 2020-04-30 | 2024-03-05 | Konica Minolta, Inc. | Communication terminal and position detection system |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0756991A (en) * | 1993-08-20 | 1995-03-03 | Csk Corp | Managing system for location in facility |
CA2270352C (en) * | 1996-11-19 | 2003-03-18 | Precision Dynamics Corporation | Linkage identification system |
US7066781B2 (en) * | 2000-10-20 | 2006-06-27 | Denise Chapman Weston | Children's toy with wireless tag/transponder |
US7017822B2 (en) * | 2001-02-15 | 2006-03-28 | Integral Technologies, Inc. | Low cost RFID antenna manufactured from conductive loaded resin-based materials |
JP2002319083A (en) * | 2001-04-18 | 2002-10-31 | Yasunao Fukushima | System by rfid for preventing dementia patient from wandering about |
JP2002329294A (en) * | 2001-05-02 | 2002-11-15 | Asahi Eng Co Ltd | Tracking system |
US7076441B2 (en) * | 2001-05-03 | 2006-07-11 | International Business Machines Corporation | Identification and tracking of persons using RFID-tagged items in store environments |
US6614392B2 (en) * | 2001-12-07 | 2003-09-02 | Delaware Capital Formation, Inc. | Combination RFID and GPS functionality on intelligent label |
JP2003317169A (en) * | 2002-04-26 | 2003-11-07 | Masato Harada | Moving body recognition, tracking and imaging monitor system |
US6933849B2 (en) * | 2002-07-09 | 2005-08-23 | Fred Sawyer | Method and apparatus for tracking objects and people |
JP3766407B2 (en) * | 2003-08-01 | 2006-04-12 | 鹿島建設株式会社 | How to detect the position of firefighters |
JP2005084954A (en) * | 2003-09-09 | 2005-03-31 | Hitachi Ltd | Electronic tag-mounted combinational device and electronic tag |
-
2006
- 2006-05-05 JP JP2008510313A patent/JP2008541244A/en active Pending
- 2006-05-05 EP EP06790238A patent/EP1880371A4/en not_active Withdrawn
- 2006-05-05 WO PCT/US2006/017753 patent/WO2006122041A2/en active Application Filing
- 2006-05-05 CA CA002599363A patent/CA2599363A1/en not_active Abandoned
- 2006-05-05 AU AU2006244141A patent/AU2006244141A1/en not_active Abandoned
-
2007
- 2007-06-11 GB GB0711230A patent/GB2437588A/en not_active Withdrawn
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8760520B2 (en) | 2008-11-10 | 2014-06-24 | Eduard Levin | System and method for tracking and monitoring personnel and equipment |
Also Published As
Publication number | Publication date |
---|---|
WO2006122041A2 (en) | 2006-11-16 |
WO2006122041A3 (en) | 2007-04-26 |
EP1880371A4 (en) | 2009-08-26 |
EP1880371A2 (en) | 2008-01-23 |
JP2008541244A (en) | 2008-11-20 |
GB2437588A (en) | 2007-10-31 |
AU2006244141A1 (en) | 2006-11-16 |
GB0711230D0 (en) | 2007-07-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2599363A1 (en) | Devices and methods for tracking, locating and providing protection to individuals | |
US7327251B2 (en) | RFID system for locating people, objects and things | |
US20210090723A1 (en) | Computer-implemented system and method for tracking patient location | |
US10176691B2 (en) | Tracking and monitoring system | |
US20220148726A1 (en) | Secure Systems for Contactless Identification and Vital Sign Monitoring | |
JP2010518461A (en) | Proximity location system | |
WO2014041363A2 (en) | Angeleye | |
US11309083B2 (en) | Systems for identification and tracking vital signs in the field with redundant electronic/visual security mechanisms | |
US20190156643A1 (en) | Child/Individual Tracking System | |
US7821386B1 (en) | Departure-based reminder systems | |
US9361783B2 (en) | Person locator with imbedded tracker and personal identification | |
JP6417461B1 (en) | Clothing management system and clothing management method | |
US20190180538A1 (en) | Inaudible Tones Tracking Chip and System for Security and Safety | |
JP5873946B1 (en) | Relief method, relief system, deaf person protection method and deaf person protection system | |
Gillenson et al. | I've Got You Under My Skin: The Past, Present, and Future Use of RFID Technology in People and Animals. | |
Masters et al. | Humancentric applications of RFID implants: the usability contexts of control, convenience and care | |
Visvanathan et al. | Framework for preventing falls in acute hospitals using passive sensor enabled radio frequency identification technology | |
EP0246237A1 (en) | Patient alert locator | |
JP3195257U (en) | A person information management system that monitors and notifies the careless going out | |
US20210241901A1 (en) | Systems for secure contactless identification and tracking with redundant electronic/visual security mechanisms | |
US20240023300A1 (en) | Emf protective device | |
JP2006350458A (en) | Lost child prevention system | |
US11818628B2 (en) | Wearable tracking device and system for tracking people and personal items | |
JP2016218992A (en) | Rescue method, rescue system, wanderer protection method, and wanderer protection system | |
WO2002041237A1 (en) | A system for non-contact identification and retrieval of an individuals personal information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Discontinued |