TWI280517B - Article identification and tracking using electronic shadows created by RFID tags - Google Patents

Article identification and tracking using electronic shadows created by RFID tags Download PDF

Info

Publication number
TWI280517B
TWI280517B TW93113945A TW93113945A TWI280517B TW I280517 B TWI280517 B TW I280517B TW 93113945 A TW93113945 A TW 93113945A TW 93113945 A TW93113945 A TW 93113945A TW I280517 B TWI280517 B TW I280517B
Authority
TW
Taiwan
Prior art keywords
antenna
shadow
tracking system
identification
sensor
Prior art date
Application number
TW93113945A
Other languages
Chinese (zh)
Other versions
TW200515316A (en
Inventor
Eric Eckstein
Gary T Mazoki
William Richie Jr
Original Assignee
Checkpoint Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Checkpoint Systems Inc filed Critical Checkpoint Systems Inc
Publication of TW200515316A publication Critical patent/TW200515316A/en
Application granted granted Critical
Publication of TWI280517B publication Critical patent/TWI280517B/en

Links

Landscapes

  • Burglar Alarm Systems (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

A tracking system uses RFID (radio frequency identification) tag technology to facilitate the identification and tracking of items in an environment through a technique known as shadowing. As an object or target moves within a pre-described detection zone with communicating antenna and RFID sensors, the object or target blocks the line of sight between respective antenna and sensors, preventing electromagnetic coupling between the sensor and the antenna and thus casting an electromagnetic shadow along the line of sight. One approach of this invention uses this shadow technique to perform functions such as theft (shrink) deterrence/detection; tracking the motion of objects through an environment by monitoring the shadow; and correlation analysis of people shadows to tagged items (e.g., merchandise, articles) to foster marketing and merchandising effectiveness.

Description

1280517 玖、發明說明: 【發明戶斤屬之技術領域3 發明領域 本發明是有關於射頻辨識(RHD)技術,以及尤其是有 5 關於一種射頻辨識(RFID)安全系統,其具有在安全區域中 根據資訊之損失以非侵犯式方式偵測與追蹤物體之能力。 發明背景 10 15 將注意力集中於損失(例如:竊盜)防止之零售商通常有 三種方式將損失最小化:(1)將商品固定於位置(例如:將商 品裝附電纜,將物件置入顯示箱中,以及置於櫃台後面); (2)使用視訊觀察系統及/或安全警衛以監視在商店中每一 個人;以及(3)使用具有特殊標籤裝附於物件之警訊系統, 其在此順手偷竊者嘗試與此具有標籤之物件一起離開時發 出警訊。將商品固定於位置會使得購物者難以檢查物件以 及試穿服裝。客戶必須等候店員將物件釋出,以便客戶玎 以試穿或仔細察看。此種不便會驅使購物者至其商品可更 容易取得觀叙商賴物。此外將商品岐是非常昂貴, 因為商店必須提供人力將商品解除料。視訊觀察系統包 括:監視裝置、觀察鏡、以及安全卡,其屬於打擊順手偷 竊者之最早方法。然而,直人 士、 ,、人工成本昂貴且其觀察系統具 有侵犯性,特別是購物者偏好笨 雨野系種私度隱私性之區域(例 如:更衣室)中。 會對任何尺寸物品盜竊 射頻(RF)標籤安全系統在有機 20 1280517 機會時有用。使用標籤技術(例如:電子物件安全作as)射 頻辨識(RFID))使得零售商可以在展示場顯示受人歡迎之 物件,在該處它們可以被看到,而不是將其置入加鎖之箱 中或櫃台之後。使用EAS與RFID系統以偵測與防止盜竊、 5 或未經授權將物件與物品從設施搬除已變得非常廣泛。通 常,此種系統具有RF天線,其在天線之安全或偵測區域中 偵測裝附於物件之共振標籤。此種系統通常位於出口點或 附近,而當此物件通過出口點時,可以偵測到安全標鐵因 此可偵測到物件。 10 EAS系統受限於其標籤之能力。不幸的是EAS並不包含 資訊。它們僅是設置於該處或不在該處。設計此標籤系統 將資訊加至RF標籤,而使用射頻辨識(RFID)技術從RFID標 籤讀取資訊。RFID標籤可以儲存有關於產品之資訊,以及 獨特地辨識各產品。不幸的是,RF1D系統遭遇到阻障或失 15 去方向之問題。在RFID技術中,天線與標籤沿著天線之視 線彼此通信,其發出整合信號,並讀取來自標籤之反應信 號。此RFID信號會被導電物體例如人阻擋、吸收、反射、 或以其他方式修正。如果在此標籤與天線間之直接通路被 阻擋,則此通過感測器網或RFID天線偵測區之RFID標籤將 20 不會被此天線偵測到。這即是人可以容易地將標籤隱藏, 而不被RFID系統看到(例如:讀取、偵測)。此隱藏標籤之 人可以經由此RFID系統之偵測區域走過而不會造成發出警 訊,且此系統無法將此損失之標籤與相關物件定位。如果 此RFID標籤被隱藏,則其無法被已知之標籤系統辨識或追 1280517 蹤。一種可能之方法是將rfid系統與視訊觀察系統結合, 其可以即時地追蹤與此隱藏或損失標籤有關之人。然而, 此種方法是昂貴且具侵犯性。因此,須要一種系統其可以 非侵犯性地追蹤附有標籤之產品,而不論此標籤是否可以 5被看到。此外,如果能提供一種系統:其可以無須視訊觀 察而非侵犯性地遍識舆追蹤移動物件則將是有益的。 倉庫正使用RF標籤技術,其具有:位於地板中之共振 式標籤、與用於庫存目的之在叉式起重機上之矩陣讀取 器。汽車系統使用RF標籤系統,其具有埋設於道路中之共 10振式標籤以幫助駕駛車輛。當車輛駛下道路時,此車輛上 之天線辨識出此埋設之標籤作為記號以接近或保持在〜 側,以協助車輛保持在車道中。然而,這些方法並無法解 決以無侵犯方式辨識與追蹤移動物體之需求。 【明内^1】 15 發明概要 本發明較佳實施例特別是有關於:安全、RFID、行鱗、 以及令售之領域。本發明其他之實施例可以應用至各種應 用,例如··倉庫與分配系統、製造地板環境、以及人員計 异。本發明使用被動之RFID(射頻辨識)標籤技術,以方便 2〇絰由被知為陰影(shadowing)之技術,辨識與追蹤在環境中 之物件。本發明之一方法使用此陰影技術以執行例如以下 之功能··偷竊(減少)防止/偵測;藉由監視陰影而追蹤經由 %境之移動物件;以人員陰影對標籤物件(例如:商品、物 。口)之相關分析,以增進商品之行銷舆銷售功效。 1280517 在此為了方便起見使用某些術語,但其不應作為本發 明之限制。 5 15 在此處較佳實施例中所說明之專有名詞“天線”通常是 指一種電路,其從一裝置(例如:辨識感測器或標籤)搞合至 其本身,其目的為傳送能量與接收回資料。此種天線包括: RFI〇讀取器或詢問器,其藉由在此技術中為人所熟知之交 狄式輕合,而與RFID感測器通信。雖然並不受限於特定理 兩此RFID δ買取器與询問器通常包括·發射器與接收哭, 其藉由發出詢問信號至感測器以及讀來自感測器之響應信 號,而沿著RFID讀取器與RF1D感測器間之視線…狀〇f sight)與RFID感測器通信。當然,其他之天線設計亦可與本 發明一起使用,且本發明並不受限於所描述之特定天線。 換句話說,如同由熟習此技術之人士瞭解, 使用“天線,,此專有名詞是指:詢問器與讀取器,= 所 之頻率、崎子與雜子储方式而與反應感測 裔或標戴通信。 隹此處較佳實施例中所描述之RFm感測器包括:初 $半主動或主動(電池提供電罐觸標籤。咖增 響1=中為人所熟知辨識標籤型式之-,且典型地包右 电(例如.被動共振射頻(RF)電路、雙 此標鐵是在由讀取器或詢問器所監視之; 2此電路用於偵測,如同為此技術中所熟知者。1 器,其共振RFt路具有:線圈天線與” 起7成具有職共振鱗之LC電路。此用於感 20 1280517 測益之電力典型地是以傳統方式導出(例如:從在線圈天線 接收來自詢問信號之能量)。各感測器較佳具有獨特之辨識 號碼j序列號碼用於辨識個別感測器。此獨特之辨識是在 曰中發出,且在接收到詢問信號時傳送回而由各讀 5取為讀取。當然,其他之標籤輯亦可與本發明—起使用, 且树明並不受限於所描述之特定感測器。例如任何界定 二曰、α私路之辨硪(ID)感測器包括:Rfid標籤、雙極標籤、 ,、、天、泉可以包括於本發明之範圍中。因此,RFID標籤、 感測杰、雙極標籤、修補天線是在本發明 10 測器之例。 ^ 此在較佳實施例中所界定之專用名詞“陰影,,或“電子 陰T是指:未備測到已知之RF_測器。當此容積安全之 先別描迹之感測器網環境中或具有通信天線與腿⑽測器 之摘測區中物件或目標移動時,此物件或目標阻擔各天線 15與感測器之間之視線,防止感測器與天線間之電磁輕合, 、及口此著視線投下電磁陰影。例如在裝設有感測器之 地板上行走之人員,會阻擋RFID感測器之偵測,因此產生 電子陰影。這即是,站在贿D感測器上之人員會造成信號 吸收、反射、以及衰減,其防止由有關天線讀取RFID感測 时此電子陰影之序列(電子陰影之即時序列)可以辨識在容 積偵測區域中人員之向量移動。 根據本發明較佳實施例,此追蹤系統包括:RFID感測 态、天線、以及處理構件。此111711)感測器具有共振射頻(RF) 電路且設置在第一位置。此天線是設置在第二位置,以及 1280517 適用於藉由天線與腿賊測器間之交談式耦合㈣由立間 之龜信^侧RF_•。此電子構件適合靜決定 二=法_到此RFID感測器,將此無法偵測到解釋 三…、喊不在第一位置與第二位置間之電子陰影,以及推 _此物件之存在為電子陰影之原因。 10 15 同由以下例子職明’此追蹤纟統之較佳實施例包 括。種方去,祕沿著第—位置與第二位置間之視線傳送 信號’用於在第二位置_所傳送之錢,用於確定在第 二位置無法__傳送信號之―,用於解釋說明此無法 備測到為料在第―位置與第二位置間之陰影,以及用於 推論物件之存在作為陰影之原因。 本卷月之較佳實施例亦說明作為方法用於將物件作為 目才母,/ 士 不/、匕括以下步驟:沿著第一位置與第二位置間之視 線傳送信號,+ » 〜在弟二位置偵測所傳送之信號,癌定在第二 位置無法偵測到所傳送信號之一,解釋說明此無法偵測到 為顯示在第—^☆里 復置與第二位置間之陰影,以及推論物件之 存在作為陰影之原因。 本發明靡用β ++ w⑺之其他範圍將由以下詳細說明而明顯。然 土_應瞭解此等詳細說明與特定例子,雖然顯示本發明較 也例但僅作為例子而已,且本發明並不受限於所示 準雀之配置與礎備,因為本發明將由此詳細說明對熟習此 技術之人士為明顯。 、、下本^明較佳實施例將之詳細說明將由參考所附圖 、‘彳于更佺之瞭解,其中相同之參考號碼代表相同元件。 20 1280517 圖式簡單說明 第1圖為根據本發明實施例產生感側器網之天線含蓋 範圍與重疊偵測區之平面圖; 第2圖為類似於第1圖中所示感測器網之天線含蓋範圍 5 感測器網之正視圖;以及 第3圖為說明根據本發明較佳實施例之另一感側器網 之正視圖。 t實施方式】 較佳實施例之詳細說明 10 雖然並不受限於特定理論,本發明是在使用:超高頻 (UHF)RFID詢問器、天線、以及標籤(感測器)之系統中說 明,其較佳在介於800MHz與1GHz之間之頻率操作。然而, 本發明之範圍包括在其他頻率(MHz、GHz、THz)操作之詢 問器、天線、以及標籤,其具有在信號吸收、反射、以及 15 衣減領域之類似電磁特性,而具有導電、半導電、以及南 濕度内容物件(包括:人類與野獸)且包括離子與非離子輻 射。在理論上,頻率愈高,此系統運作愈佳。 當頻率變得更高時波長變得更短,而陰影變得更可界 定。此外,對於較高頻帶可以將天線與感測器製得較小。 20 本發明之電子陰影追蹤系統(以下亦稱為追蹤系統)允 許電腦程式藉由以下方式將一區域繪製成圖(例如:零售商 店、運輸中心、會議中心、倉庫、以及分配中心之地板): 藉由使用設置在地板上幾何圖案中之RFID標籤(固定之 RFID感測器),以及藉由設置在天花板中、及/或在牆壁上、 11 1280517 或甚至在底座中或底座上天線之讀取。固定之Rf?ID感測器 亦可以裝附於商店設備、貨物架、或銷售點之計數機,以 將此等物件辨識及/或定位。除了固定之RFID感測器外,亦 可有設置裝附於在此環境中移動物件之移動式RFID感測 5 器,其允許追蹤系統以辨識裝附於行動式感測器之物件、 物體、或人員。例如:此行動式RF1D感測器可以裝附於在 零售商店銷售之產品,或可以為職員識別標誌之形式以辨 識在商店中之工作人員。根據較佳實施例,電腦程式可以 使用RFID感測器與天線以繪製一區域之圖形,其亦稱為减 10測裔網、彳貞測區域、或在各種位置之安全區域,在該處可 以令人所欲地追蹤貨物及/或人員,像是例如:倉庫、機場、 火車站、地下火車站、公共汽車站、運動場、會議中心、 以及沿著產品分配線之任何場所。 一般而言,當通信信號(例如:詢問信號、響應信號) 15由造成陰影之物件阻擋時,此被阻擋之通信信號無法由各 天線或RFID感測器讀取,因此顯示此造成陰影之物件存在 介於天線與RFID感測器間之視線中。當天線無法從詢問信 號接收到所期望之響應信號時,此追蹤系統推論存在著造 成陰影之物件,且沿著被阻擋之視線繪製電子陰影。 2〇 電腦程式知道固定RFID感測器與天線之幾何位置。以 單一天線與介於天線與感測器間之重複連續週期之通信, 電驷耘式可以根據所產生陰影之位置以確定造成陰影物件 之移動。以多個天線與關於天線與@sRFID之位置與幾何 狀之知識’此電腦程式可以估計此造成陰影物件之尺 12 1280517 寸,如同以下將詳細說明者。如果此較佳實施例之追縱系 統確定此設有標籤之物件是與陰影有關(例如:此設有標藏 之物件隨著陰影移動,此設有標籤之物件被阻擋或去能 時,此相關之陰影存留),則此電腦系統可以陰影追蹤物 5 件,並且因此知道此物件之位置。 因此,此追蹤系統從缺乏知識提供獲得知識之效益。 這即是,在本發明之前,安全系統在沒有視覺監視系統(例 如:攝影機、監視器、以及個人電腦)之協助與額外成本之 情況下,尤其如果此標籤被阻擋與去能之情況時,無法知 10道發生了什麼或此設有標籤之物件移往何處。然而,根據 本發明實施例,此追蹤系統如所期望(例如與所設標籤物件 有關:通過偵測區、上火車、在行動帶上移動、經由分配 埠與通迢移動)非侵犯性地追蹤造成陰影物體(人員、車輛、 載體、行李、箱子、、名線袋等)之移動。此追縱系統為非侵 15犯性,至少是因為此追蹤系統並不實際上看到或視覺上監 視人員。而是此追蹤系統監視人員或物體所投射之電子陰 影。此追縱系統並不根據種族、宗教、教義、國籍、性別、 或與標準無關之尺寸以分別、區別,亦不以其形成輪廊, 因為此天線並無法看到任何人之外部特徵。此追縱系統可 2〇以估計造成陰影物體(例如··人)之大小,這在例如如果嘗試 找到小孩時將會有幫助。 —移動式仅1?3[13感測器之例為裝附於服裝之硬塑膠標 籤在硬塑膠標籤中是RFID設備(天線與RFID唯讀或讀寫 晶片),以及選擇性地EAS感測器、。固定式腿减測器與移 13 1280517 動式RFID感測器在結構上相同或實質上相同,此在此技術 中為人所熟知,但其在環境中分佈而可由天線以規律或週 期之基礎看到。雖然並不受限於特定理論,此等固定式感 測裔較佳相隔至少一個波長(例如:大約相隔一英尺)。雖然 5並不受限於特定理論,此位於天花板中之天線通常具有在 /、下地板上二平方么尺之偵測面積。如果想使用多於一個 天、、泉’則較佳將此專其他天線定位,以致於其彳貞測面積重 $。如果想要有造成陰影物體較大解析度,則其天線之重 豐度應增加,即,此等天線應設置得更加靠近在一起。換 1〇句話說,可以藉由將天線設置,以致於個RFID感測器可以 由一個以上之天線偵測到,則可以根據由各天線從特定物 體所偵測之陰影,而估計造成陰影物體之形狀。 此等天線較佳設置於天花板、牆壁、或底座中或之上, 父开^成各積偵測區或安全區,而以固定式RFID感測器設置 於地板、牆壁或一些其他固定結構中。此容積偵測區其亦 秸為感測器網,可以由整個零售商店構成,或可以僅為在 此商店中經控制之陣列區域。用於人員計算,此容積偵測 區域可以包括進出區域。 作為用於執行本發明之較佳方法,將天線安裝於零售 2G 商店由 T,以致於其整個内容或僅為須要監視之内容,是在 此侦剛之實質連續範圍中,其在此稱為感測器網。為了建 構此感測器網,將RFiD標籤設置在(地板及/或牆壁)之足夠 表面上/中,以致於在此感測器網中之天線可以看到感測器 (例如·讀取來自其之響應信號)。在此感測器網中,可以將 14 1280517 標籤與天線設置於幾何起陣 器間)之距離是根據所想I 其所具有天線fa1(以及感剛 之幾何密度越大,财彳度數4 ;此料籤與天線 天線之位置為已知,以^之解析度越精細。此等標籤與 定之最初環境圖。應瞭解;此系統具有由此感測器網所界 與零售商店-_明,h雖然本發明之較佳實施例通常 ^ 〜承發明之實施例並不受限於零隹 商店裱境,而是可以應用夂 ° 、谷種想要追蹤貨物及/或人員之 σ種環境,像是例如:倉庫、 ,^ . . Ν 平擴ζ %、火車站、地下火車站、 公共汽車站、運動場、合場 10 15 20 朴 曰遘中心、運輸中心、博物館、以 及沿著產品分配線之任何場所。 第至3圖σ兒明感别為網(例如:偵測區)以及如何形成陰 〜。月茶考第1圖,此根據較佳實施例之追縱系統由在的之 例說明。此追縱系統包括··天線12、RFm感測器14、以及 處理器構件(例如:電腦16、電腦程式17)。雖然並不受限於 特定理論,此天線12與肝_測驗佳具有所熟知天線與 RFro標籤之相同結構,但在環境中分佈以形成偵測區。即, 天線i2(亦知為詢問器)較佳固定且設置靠近於天花板或另 一結構(例如:牆壁、底座、柱等)或設置於其中,如同於此 技術中所容易瞭解者。RFID感測器14較佳固定於由天線〇 所看到之偵測區中之地板下。RFID感測器14亦可設置於此 偵測區域中之牆壁、柱、桌子、或其他結構中或其上。轸 佳將天線12與感測器14固定,以致於追蹤系統1〇知道天複 與感測器在何處,其對於決定在偵測區中物件與物體之仅 置相當重要。換句話說,系統10知道由天線12與標籤14所 15 1280517 產生之環境圖(例如:感測器網偵測區)。此地圖給予系統1〇 環境知識’以致於當失去資訊(例如:未偵測到所預期之传 , 號)時,此糸統可以確定此陰影以及其相關造成陰影物體之 位置。 5 不論其在偵測區中之位置’將天線12與感測器14定 位,以偵測在此區域中造成電磁陰影之物體。亦可配置天 線12以偵測在此偵測區中未被磁性阻擋之行動式RFID伊、 籤。因此,RFID標籤可以裝附於··用於銷售之物件、商店 人員、或商品容器,如同由熟習此技術人士所瞭解者。 鲁 10 電腦16電性連接至各天線12之輸出,用於解釋與處 理:在此偵測區域中從RFID感測器與其他RFID標籤所接收 之響應信號、或預期但未收到之信號。此結果由與電腦16 所整合為一體之電腦程式(例如:軟體、中間體、軔體、鹿 用程式)解釋,以決定在偵測區域中物體之存在。將各 15感測器14定位,因此其通常與至少一天線12通信。如同在 第1圖中可以看出,將各天線配置以查詢與讀取在一般為圓 錐形容積區域上之RF信號,此區域通常例如由與各天線有 · 關視界邊界18所界定。設計各天線12以看到位於此天線通 信範圍中之RFID感測器14,其在第丄圖中可以辨識為由視界 20邊界18所界定之圓錐形容積區,此假設此天線可以由其間 未受阻擋之視線看到rFID感測器。 應瞭解將電腦16與電腦程式17顯示作為處理構件之例 子但其他之處理器構件設計,包括:單獨之電腦與電腦 程式或與其他電腦、網、或程式之組合亦可與本發明一 16 1280517 t使用i本ι明並不受限於所描述之特定處理構件。亦 應瞭解可以將屯城1δ與電腦程式η以任何方式連接至天線 12以允斗兒月向與電腦程式接達存取天線之通信結果。因 可以凋正私腦16與電腦程式17以接達存取天線12之讀 5數且可以有線或無線結構連接至系統,如同由熟習此技 術人士所瞭解者。 根據第1圖中所不,各天線12可以看到安裝在地板20 下之RFID感測器中之四個。應瞭解本發明並不受限於特定 t每個天線之感測器數目,因為此數目可以由許多因素決 疋匕括·用於造成陰景多物體之所想要之解析度位準,天 線12與RFID感測器14間之距離,以及詢問器信號之波長。 只要此感測器14在運作,且沒有物體阻擋在各天線U與感 測麗間之視線,則此天線與感測器可以此技術中所熟知之 方式通信。例如:天線12在此天線之視野區域中將詢問信 15说傳运至RFID感測器14。此接收詢問信號之感測器邮 振,而將具有感測器辨識之響應信號傳送回天線12。由於 追蹤系統1〇,以及尤其電腦程式17(例如:處理通信之軟體) 知道偵測區環境,以及因此知道各天線12與感測㈣之位 置,於是此追蹤系統可以將各天線與感測器間之視線定 20位。如果在各天線偵測區中之感測器14傳送回之響應信號 而由詢問天線12接收,則此追蹤系統1〇知道:在通信期間 沒有阻擋物體存在介於各別天線與感測器之間。然而,如 果天線12在其偵測區並未收到來自感測器14之響廯俨號, 則此追蹤系統10推論得知:一物體阻擋介於各別天線與感 17 1280517 測器間之視線。 因此,此追蹤系統10從失去資訊(例如:天線未接收到 響應信號),藉由確認一物體阻擋介於各別天線12與感測器 14間之通信通路,而獲得資訊。此失去資訊造成沿著各別 5 通信線之電子陰影。各RFID感測器14較佳設置在多於—個 天線12之偵測區域中,其藉由分析由物體投射之陰影而估 a十阻擔彳§ 3虎物件之尺寸。當天線12重複且持續地發出詢問 信號且讀取相對應之響應信號時,此追蹤系統10可以根據 RFID感測器14是否由天線12看到(例如:讀取響應信號)或 10 未看到(例如:信號被阻擋),即時地追蹤阻擋信號物體之移 動。 第1圖說明陰影之例。在第1圖中顯示具有參考號碼為 22、24、以及%之三個天線;以及各具有參考號碼為28、 30、32、以及34之四個RFID感測器。天線22、24、以及26 I5 與以上讨論之天線12相同,而各天線具有獨特之辨識號 碼。同樣地,RFID感測器28、30、32、以及34與RFID感測 器14相同,而各感測器具有獨特之辨識號碼。仍然請參考 第1圖,其顯示造成陰影物體36是在地板20上且在感測器30 與32之上。此造成陰影物體36代表阻擋介於天線12、22、 20 24、以及26與RFID感測器14、28、30、32、以及34間通信 之任何物體。 在第1圖中所說明之實施例中,天線、22、24、以及 26在其視界範圍中傳送詢問信號以警告相關之rFID感測器 14、28、30、32、以及34。如果此等詢問信號與相對應之 18 1280517 響應信號如所預期地被接收,則並沒有陰影發生。然而, 如果天線12、22、24、以及26對於所傳送之詢問信號並未 接收到相對應之響應信號,則追蹤系統推論沿著相對應天 線與感測器間之視線存在陰影。如同在第1圖中可以看出, 5 此造成陰影物體36在RFID感測器28、30、32、以及34之上 與之間造成陰影38。在RFID感測器14上並未造成陰影,因 為在RF1D感測為14與天線2之間並不存在任何造成陰影物 體。然而,天線22無法從感測器3〇接收響應信號,天線24 然法彳文感測為28、30、32、以及34接收響應信號,以及天 1〇線26無法從感測器32接收響應信號。因此,此系統1〇辨識 出陰影38形成於地板20上而在RFID感測器28、3〇、32、以 及34之上與之間。 較佳將天線與RFID感測器定位,以致於各感測器是在 個以上天線之視界範圍中。這允許追蹤系統1〇較佳地估 汁4成陰景》物體36之大小。例如,仍然請參考第丄圖,RFID 感測器28是在天線22與24之視界範圍中。以造成陰影物體 36疋位如同於第1圖中所示,天線22可以看到感測器%(例 如.天線22收到來自感測器28之相對應響應信號卜然而, 天線24並热法看到感測器28,因為此造成陰影物體36阻擋 兩者之間之通信。因此,陰影38sRF][D感測器28上延伸, 而追縱系統10獲得資訊··此造成陰影物體36是足夠大以阻 擋在天線24舆感測器28間之通信之視線。追蹤系統1〇亦獲 侍貝矾··此造成陰影物體36並不涵蓋;RFID感測器28,且並 不阻擋介於天線24與感測器綱之視線。由於聰〇感測器 19 1280517 28是在天線22與24之視界範圍中,但只可由天線22看到, 因此追蹤系統10經由電腦程式17能夠更佳估計造成陰影物 體36之大小,因為其具有足夠高度以阻擋天線24與感測器 28間之通信,但並未延伸至感測器28之上。RFID感測器30 5 無法由相對應天線22與24看到,因此允許追蹤系統10假設 此造成陰影物體36是位於感測器30之上。同樣地,RHD感 測器32無法由相關天線24與26看到,因此允許追蹤系統10 假設此造成陰影物體36亦位於感測器32之上。RFID感測器 34無法由相對應天線之一天線24看到,但可以由另一相對 10應天線26看到。從此資訊追蹤系统1〇可以確定陰影38在感 測器34上延伸,但此造成陰影物體36並未延伸至感測器34 之上、或阻擋介於感測器34與天線26間之視線。因此,追 蹤系統10經由電腦程式17可以將此造成陰影物體36定位且 估計其大小,因為其高度足以阻擋介於天線24以及RFID感 15測态28與34間之視線,且亦具有小於其陰影38之腳印。 以相同之方式,追蹤系統1〇可以根據此等偵測未經阻 擋感測器之天線12、22、24、以及26,將未經阻擋行動式 RFID感測裔定位,如同由熟習此技術人士所瞭解者。例如, 此由天線22與24所偵測之未經阻擋行動式感測器,可以位 20 於偵測天線22與24之偵測區域中。 ㈣將追縱祕10建構成在天線域測器之間週期性 地通k ’此追縱系統可以追踽造成陰影物體%隨著時間之 移動。換句話說’取決其應用,追縱系統1〇可以如同所想 要地追縱:人員、車輛、庫存、以及產品等。同樣地,追 20 1280517 縱系統1G可以追縱設有標籤(例如,具有行動式主動或去能 感測器)之商品’以及如果適當的話,將商品與造成陰影物 粗36相關^。根據造成陰影物體36之移動、以及與未講買 商品有關之陰影,可以使用此追縱系⑽如 5 警訊或通知管理人㈣板上之活^ ^ 10之頂視部份截面圖。第2圖尤其說明用於將奸1〇感測器14 第2圖為根據本發明實施例之於幻圖中所示追縱系統 置、也板下之典型平面圖。第2圖亦顯示視界範圍圓圈 4〇而以各視界範圍圓圈概要顯示由各別天線U所看到地 10板之區域,此等天線是置於地板上,且較佳是在地板上靠 近天花板處。例如,視界·關40表示在幻圖中所示: 視界範圍邊界18與地板2_交之處。如同於第2圖中可以看 出,。較佳將各天線12定位與定向以便可以看到多個rfid感 測器14,以及配置各感㈣器,以致於它可以由一個以上之 15 天線看到或辨識。 π仍然請參考第2圖,此造成陰影物體雜擔天線與感測 杰28、30、32、以及34間之通信而造成陰影38。然而,在 類=用於第謂之上述方法中,此追蹤系可以藉由在 此寺無法被其各別天線所看到之RF_測器上實施三角形 2〇法,而估計造成陰影物體36之大小。使用此方法,電腦程 式可以確定此造成陰影物體具有陰影,其足夠大以而包括 刷D感測H3G與32,且具有足夠高度以阻播其他天線烈、 Μ、42以及44間之通信。當隨時間使用時,此追縱系統 可以非侵犯地追蹤在债測區之感測器網中此造成陰影物體 21 1280517 36之移動,此偵測區是由天線與感測區之位置與結構所界 定。 應瞭解,取決於此用於追蹤系統10之應用所想要達成 之解析度位準,可以將天線與感測器配置得更加分開或更 5 加靠近。如果想要有較小之解析度,例如:此追蹤系統10 能夠辨識與追蹤成陰影物體36但並不過度地關切此物體之 大小,則天線12與感測器可以分得更開。此外,如果想要 有較大之解析度位準以較佳辨識各造成陰影物體36,則可 將天線12與感測器14緊密地設置在一起,以致於各感測器 10 可以由多個天線觀看,以準確地決定此造成陰影物體之大 小與形狀。 第3圖為類似於第2圖之頂視圖,但顯示根據本發明實 施例之追蹤系統10,其所具有之天線與感測器較在第1與2 圖中之例所示者分散得較開。如同於第3圖中可以看出,一 15 些RFID感測器14可以由多個天線看到,而其他之感測器只 可以由一個感測器看到。其間隔允許追蹤系統10辨識與追 蹤造成陰影物體,但取決於此造成陰影物體之大小,但此 追蹤系統可能無法以與在第1與2圖中所示實施例相同解析 度或由其所決定詳細地辨識造成陰影物體。例如:此造成 20 陰影物體是足夠小以而僅能阻擋一感測器與天線間之通 信,則此追蹤系統無法估計在陰影中造成陰影物體之大 小。然而,當此造成陰影物體在安全網中移動時,其可以 在RFID感測器上造成陰影而可以由一個以上天線看到,以 允許較佳估計此造成陰影物體之大小。因此,隨著時間當 22 1280517 此造成陰影物體在安全網中移動時,此追蹤系統仍然可以 估計此造成陰影物體之大小與形狀。此電子陰影向量與行 動式RFID感測器之偵測、以及其各別向量之移動,可以產 生弘子映像圖形(electr〇nic mapping fingerprint)。此電子映 像圖形可以是電子陰影向量之加總,而具有或不具有行動 式RFID感測器,如同在此將詳細說明者。電腦程式如同所 期望分析此電子映像圖形,以及提供:安全、行銷、以及 後勤功能,其樣本使用包括以下所示者: 例1 ·防止損失—可以使用電子圖形與電子陰影,以決 10 15 20 疋向s移動/方向(例如:朝向商店之出口、或朝向銷售點- =銀機)’以及在零售商店中客戶之速度(速率)。藉由將此 貝u戶所擁有產品之資訊(例如:確實型式、數量、價 值合’可以確定此產品是否可能被偷竊。尤其是具有非 冓貝物。口之陰衫之朝向出口之移動可以顯示企圖之偷竊, 特別是此陰影/標籤不通過銷售點時。此資訊與事件序列可1280517 玖, invention description: [Technical field of invention] 3 FIELD OF THE INVENTION The present invention relates to radio frequency identification (RHD) technology, and in particular to a radio frequency identification (RFID) security system having a security zone The ability to detect and track objects in a non-invasive manner based on the loss of information. BACKGROUND OF THE INVENTION 10 15 Retailers who focus their attention on loss (eg, theft) are generally minimized in three ways: (1) fixing the item in place (eg, attaching the item to the cable, placing the item in the object) (2) use a video observation system and/or security guard to monitor everyone in the store; and (3) use a police system with special tags attached to the object, The handicap stealer attempts to alert when leaving with the tagged item. Fixing the item to the location makes it difficult for the shopper to inspect the item and try on the item. The customer must wait for the clerk to release the item so that the customer can try it on or take a closer look. This inconvenience will drive shoppers to their goods to make it easier to get a view of the business. In addition, the goods are very expensive, because the store must provide manpower to release the goods. Video surveillance systems include surveillance devices, viewing glasses, and security cards, which are among the earliest methods of combating thieves. However, straight people, , and labor are expensive and their observing systems are invasive, especially in areas where shoppers prefer privacy and privacy (eg, locker rooms). Theft of any size item Radio Frequency (RF) tag security system is useful in organic 20 1280517 opportunities. Using tag technology (eg, electronic object security as) radio frequency identification (RFID) allows retailers to display popular objects on the display where they can be seen instead of being locked In the box or after the counter. The use of EAS and RFID systems to detect and prevent theft, 5 or unauthorized removal of objects and items from the facility has become very widespread. Typically, such systems have an RF antenna that detects the resonant tag attached to the object in the security or detection area of the antenna. Such a system is usually located at or near the exit point, and when the object passes through the exit point, the safety target can be detected and the object can be detected. 10 EAS systems are limited by their ability to tag. Unfortunately, EAS does not contain information. They are only placed there or not there. This tagging system is designed to add information to the RF tag and use radio frequency identification (RFID) technology to read information from the RFID tag. RFID tags store information about the product and uniquely identify each product. Unfortunately, the RF1D system suffers from obstacles or missing directions. In RFID technology, the antenna and tag communicate with each other along the line of sight of the antenna, which emits an integrated signal and reads the response signal from the tag. This RFID signal can be blocked, absorbed, reflected, or otherwise corrected by a conductive object such as a person. If the direct path between the tag and the antenna is blocked, the RFID tag that passes through the sensor network or the RFID antenna detection zone will not be detected by the antenna. This means that people can easily hide tags without being seen by the RFID system (eg reading, detecting). The person with the hidden tag can walk through the detection area of the RFID system without causing an alarm, and the system cannot locate the lost tag and related objects. If the RFID tag is hidden, it cannot be recognized by the known tag system or traced to 1280517. One possible approach is to combine the rfid system with a video viewing system that can instantly track people associated with this hidden or missing tag. However, this method is expensive and invasive. Therefore, there is a need for a system that can non-invasively track a product with a tag, whether or not the tag can be seen. In addition, it would be beneficial to provide a system that would be able to track moving objects without video observation rather than intrusively. The warehouse is using RF tag technology with a resonant tag located in the floor and a matrix reader on a forklift for inventory purposes. Automotive systems use an RF tag system with a total of 10 vibrating tags embedded in the road to help drive the vehicle. When the vehicle is driving down the road, the antenna on the vehicle recognizes the buried tag as a sign to approach or remain on the ~ side to assist the vehicle in staying in the lane. However, these methods do not address the need to identify and track moving objects in a non-invasive manner. [明内^1] 15 SUMMARY OF THE INVENTION The preferred embodiments of the present invention are particularly related to: security, RFID, line scale, and the field of sale. Other embodiments of the invention can be applied to a variety of applications, such as warehouse and distribution systems, manufacturing floor environments, and personnel. The present invention uses passive RFID (Radio Frequency Identification) tag technology to facilitate the identification and tracking of objects in the environment by techniques known as shadowing. One method of the present invention uses this shading technique to perform functions such as: stealing (reducing) prevention/detection; tracking moving objects through % context by monitoring shadows; labeling objects by human shadows (eg, merchandise, Correlation analysis of the product. In order to enhance the marketing and marketing effectiveness of the product. 1280517 Certain terms are used herein for convenience, but are not intended to be limiting of the invention. 5 15 The term "antenna" as used in the preferred embodiment herein generally refers to a circuit that is adapted from a device (eg, an identification sensor or tag) to itself for the purpose of transmitting energy. Receive and return data. Such an antenna includes an RFI(R) reader or interrogator that communicates with the RFID sensor by a cross-talking light that is well known in the art. Although not limited to the specifics, the RFID δ buyer and interrogator typically include a transmitter and a receiving cry, which sends an interrogation signal to the sensor and reads the response signal from the sensor along the The line of sight between the RFID reader and the RF1D sensor communicates with the RFID sensor. Of course, other antenna designs can also be used with the present invention, and the invention is not limited to the particular antennas described. In other words, as understood by those familiar with the art, the use of "antennas, this proper noun refers to: interrogators and readers, = frequency, scorpion and miscellaneous storage methods and response sensing Or standard communication. The RFm sensor described in the preferred embodiment herein includes: initial $semi-active or active (battery provides battery cans. Labels are added to the well-known identification tag type) - and typically package right (for example. A passive resonant radio frequency (RF) circuit, which is monitored by a reader or interrogator; 2 this circuit is used for detection as is well known in the art. The resonant RFt path has: a coil antenna with an LC circuit that has a duty resonance scale of 70%. This power for sensing 20 1280517 is typically derived in a conventional manner (eg, received from a coil antenna) Inquiring about the energy of the signal. Each sensor preferably has a unique identification number j sequence number for identifying individual sensors. This unique identification is sent in the 曰 and transmitted back to each other upon receipt of the interrogation signal. Read 5 is taken as a read. Of course, other label sets can also be used in conjunction with the present invention, and the description is not limited to the specific sensor described. For example, any definition of two-dimensional, alpha private roads The (ID) sensor includes: an Rfid tag, a bipolar tag, , , , and a spring can be included in the scope of the present invention. Therefore, an RFID tag, a sensory sensor, a bipolar tag, and a patch antenna are in the present invention 10 An example of a detector. ^ The term "shadow," or "electronic yin T," as defined in the preferred embodiment, means that a known RF_detector is not being prepared. Sensor network environment or with communication antennas and legs When the object or the target moves in the measuring area of the measuring device, the object or the target blocks the line of sight between the antennas 15 and the sensor, prevents the electromagnetic coupling between the sensor and the antenna, and the mouth drops the line of sight. Electromagnetic shadows. For example, people walking on the floor equipped with sensors can block the detection of RFID sensors, thus creating electronic shadows. That is, the person standing on the bribe D sensor will cause a signal. Absorbing, reflecting, and attenuating, which prevents the sequence of electron shadows (the immediate sequence of electronic shadows) from being read by the antenna from the RFID sensing to identify the vector movement of the person in the volumetric detection region. According to a preferred embodiment of the present invention The tracking system includes: an RFID sensing state, an antenna, and a processing member. The 111711) sensor has a resonant radio frequency (RF) circuit and is disposed in a first position. The antenna is disposed in the second position, and 1280517 is applied to The conversational coupling between the antenna and the leg thief detector (4) is based on the turtle's letter on the side of the antenna. The electronic component is suitable for static decision 2 = method _ to the RFID sensor, this can not detect the interpretation of three ..., Shouting the electronic shadow between the first position and the second position, and pushing the presence of the object as the cause of the electronic shadow. 10 15 Also from the following example, the preferred embodiment of this tracking system includes: , the secret transmission of the signal along the line of sight between the first position and the second position 'for the money transmitted in the second position _, used to determine that the signal cannot be transmitted __ in the second position, for explaining that this cannot be explained The shadow of the material between the first position and the second position is measured, and the reason for inferring the existence of the object as a shadow. The preferred embodiment of the present month also describes the method for using the object as a target. / 士不/, including the following steps: transmitting a signal along the line of sight between the first position and the second position, + » ~ detecting the transmitted signal at the second position, the cancer is not detected in the second position One of the transmitted signals, explaining that this cannot detect the shadow between the reset and the second position displayed in the first ^^, and the existence of the inference object as a shadow. Other ranges of the present invention using β ++ w(7) will be apparent from the following detailed description. The detailed description and specific examples are to be understood as illustrative and not restrictive, and the invention is not to be construed as limited. The instructions are obvious to those familiar with the technology. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT(S) The detailed description of the preferred embodiments will be understood by reference to the claims. 20 1280517 BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a plan view showing an antenna cover range and an overlap detection area of a sensor side network according to an embodiment of the present invention; FIG. 2 is similar to the sensor network shown in FIG. A front view of the antenna cover range 5 sensor network; and Fig. 3 is a front elevational view of another side sensor network in accordance with a preferred embodiment of the present invention. t DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The detailed description of the preferred embodiment 10 is not limited to a particular theory, and is illustrated in a system using an ultra high frequency (UHF) RFID interrogator, an antenna, and a tag (sensor). It preferably operates at a frequency between 800 MHz and 1 GHz. However, the scope of the present invention includes interrogators, antennas, and tags that operate at other frequencies (MHz, GHz, THz) that have similar electromagnetic characteristics in the fields of signal absorption, reflection, and 15 clothing reduction, while having electrical conductivity, half Conductive, and southern humidity content objects (including: humans and beasts) and include ionic and non-ionic radiation. In theory, the higher the frequency, the better the system works. As the frequency gets higher, the wavelength becomes shorter and the shadow becomes more definable. In addition, the antenna and sensor can be made smaller for higher frequency bands. 20 The electronic shadow tracking system of the present invention (hereinafter also referred to as tracking system) allows a computer program to map an area into a map (eg, a retail store, a transportation center, a conference center, a warehouse, and a floor of a distribution center): By using an RFID tag (fixed RFID sensor) placed in the geometric pattern on the floor, and by reading in the ceiling, and/or on the wall, 11 1280517 or even in the base or on the base antenna take. Fixed Rf? ID sensors can also be attached to store equipment, cargo racks, or counters at point of sale to identify and/or locate such objects. In addition to a fixed RFID sensor, there may be a mobile RFID sensor 5 mounted to move the object in the environment, which allows the tracking system to identify objects, objects, objects attached to the mobile sensor, Or personnel. For example, the mobile RF1D sensor can be attached to a product sold at a retail store or can be in the form of a staff identification to identify a worker in the store. According to a preferred embodiment, the computer program can use an RFID sensor and an antenna to draw a pattern of regions, which is also referred to as a subtractive network, a survey area, or a safe area at various locations where it can be Desirably track cargo and/or personnel, such as warehouses, airports, train stations, underground train stations, bus stops, sports fields, convention centers, and any location along the product distribution line. In general, when a communication signal (for example, an inquiry signal, a response signal) 15 is blocked by an object causing a shadow, the blocked communication signal cannot be read by each antenna or the RFID sensor, thereby displaying the object causing the shadow There is a line of sight between the antenna and the RFID sensor. When the antenna is unable to receive the desired response signal from the interrogation signal, the tracking system infers that there is a shadowed object and draws an electronic shadow along the blocked line of sight. 2〇 The computer program knows the geometric position of the fixed RFID sensor and the antenna. With a single antenna and repeated continuous cycles between the antenna and the sensor, the eMule can determine the movement of the shadow object based on the position of the shadow produced. With multiple antennas and knowledge about the position and geometry of the antenna and @sRFID, this computer program can estimate the size of the shadow object 12 1280517 inches, as will be explained in more detail below. If the tracking system of the preferred embodiment determines that the tagged object is related to the shadow (for example, if the object with the tag is moved with the shadow, the object with the tag is blocked or can be removed, The associated shadow persists, then the computer system can shade 5 pieces of the object and therefore know the location of the object. Therefore, this tracking system benefits from the lack of knowledge to provide knowledge. That is, prior to the present invention, the security system did not have the assistance and additional cost of a visual monitoring system (eg, a camera, a monitor, and a personal computer), especially if the tag was blocked and disabled. I don't know what happened 10 or where the tagged object was moved. However, in accordance with embodiments of the present invention, the tracking system is as non-invasively tracked as desired (e.g., associated with the tagged object: through the detection zone, on the train, on the action belt, via the distribution and overnight) Movement of shadow objects (personnel, vehicles, carriers, luggage, boxes, name bags, etc.). This tracking system is non-invasive, at least because the tracking system does not actually see or visually monitor personnel. Rather, this tracking system monitors the electronic shadow projected by a person or object. This tracking system does not distinguish, or distinguish from, the race, religion, doctrine, nationality, gender, or size unrelated to the standard, because the antenna does not see the external features of anyone. This tracking system can estimate the size of a shadow object (such as a person), which can be helpful, for example, if you try to find a child. - Mobile only 1? 3 [13. Examples of sensors are hard plastic labels attached to clothing. In hard plastic labels are RFID devices (antennas and RFID read-only or read-write wafers), and selective EAS sensing. Device. The fixed leg damper is structurally identical or substantially identical to the shifting 13 1280517 dynamic RFID sensor, which is well known in the art, but is distributed in the environment and can be based on the regular or periodic basis of the antenna. see. Although not limited to a particular theory, such fixed sensing people are preferably separated by at least one wavelength (e.g., approximately one foot apart). Although 5 is not limited to a particular theory, the antenna in the ceiling usually has a detection area of two square feet on the / and the lower floor. If you want to use more than one day, spring, then it is better to position this special antenna so that its estimated area is $. If you want to have a large resolution of the shadow object, the antenna's weight should be increased, that is, the antennas should be placed closer together. In other words, by setting the antenna so that an RFID sensor can be detected by more than one antenna, the shadow object can be estimated based on the shadow detected by each antenna from a specific object. The shape. Preferably, the antennas are disposed in or on the ceiling, the wall, or the base, and the parent opens into the detection area or the safety zone, and the fixed RFID sensor is disposed in the floor, the wall or some other fixed structure. . The volume detection zone is also a sensor network that can be constructed by the entire retail store or can be only the array area controlled in the store. For personnel calculations, this volume detection area can include an entry and exit area. As a preferred method for carrying out the invention, the antenna is installed in a retail 2G store by T, so that its entire content or only content that needs to be monitored is in the substantial continuous range of the detection, which is referred to herein as Measurer network. In order to construct this sensor network, the RFiD tag is placed on/in sufficient surface (floor and/or wall) so that the antenna in the sensor network can see the sensor (eg · read from Its response signal). In this sensor network, the distance between the 14 1280517 tag and the antenna can be set between the geometrical generators is based on the desired antenna I has the antenna fa1 (and the greater the geometric density of the sensor, the financial degree 4; The position of the material tag and the antenna antenna is known, and the resolution is finer. The labels and the initial environment diagram should be understood; this system has the boundary of the sensor network and the retail store - _ Ming, h Although the preferred embodiment of the present invention is generally not limited to a zero-storage shop, it is possible to apply 夂°, a variety of environments in which the grain wants to track goods and/or personnel, like For example: warehouse, , ^ .  .  Ν Ν ζ %, train station, underground train station, bus stop, playground, stadium 10 15 20 Park Center, transportation center, museum, and any place along the product distribution line. From Fig. 3 to Fig. 3, the sensation is a net (for example, a detection area) and how to form a yin~. The monthly tea test is shown in Fig. 1, and the tracking system according to the preferred embodiment is illustrated by way of example. The tracking system includes an antenna 12, an RFm sensor 14, and processor components (e.g., computer 16, computer program 17). Although not limited to a particular theory, the antenna 12 and the liver-test have the same structure as the well-known antenna and RFro tag, but are distributed in the environment to form a detection zone. That is, antenna i2 (also known as an interrogator) is preferably fixed and disposed proximate to the ceiling or another structure (e.g., wall, base, post, etc.) or disposed therein, as will be readily appreciated in the art. The RFID sensor 14 is preferably fixed under the floor in the detection zone as seen by the antenna 。. The RFID sensor 14 can also be placed in or on a wall, column, table, or other structure in the detection area. The antenna 12 is fixed to the sensor 14 so that the tracking system 1 knows where the antenna and the sensor are, which is important for determining the location of the object and the object in the detection zone. In other words, system 10 is aware of the environmental map generated by antenna 12 and tag 14 1580517 (e.g., sensor network detection zone). This map gives the system 1 environmental knowledge so that when information is lost (for example, the expected number is not detected), the system can determine the shadow and its associated location of the shadow object. 5 Position the antenna 12 and the sensor 14 regardless of its position in the detection zone to detect objects that cause electromagnetic shadows in this area. The antenna 12 can also be configured to detect mobile RFID tags and tags that are not magnetically blocked in the detection zone. Thus, the RFID tag can be attached to an item for sale, a store person, or a merchandise container, as would be appreciated by those skilled in the art. The Lu 10 computer 16 is electrically coupled to the output of each antenna 12 for interpretation and processing: a response signal received from the RFID sensor and other RFID tags in the detection zone, or an expected but not received signal. This result is interpreted by a computer program (eg, software, intermediate, scorpion, deer) integrated with the computer 16 to determine the presence of objects in the detection area. Each of the 15 sensors 14 is positioned so that it is typically in communication with at least one antenna 12. As can be seen in Figure 1, the antennas are configured to interrogate and read RF signals on a generally conical volumetric region, which region is typically defined, for example, by a topographic boundary 18 with respect to each antenna. Each antenna 12 is designed to see an RFID sensor 14 located in the communication range of the antenna, which in the second diagram can be identified as a conical volume defined by the boundary 18 of the field of view 20, assuming that the antenna can be The blocked line of sight sees the rFID sensor. It should be understood that the computer 16 and computer program 17 are shown as processing components but other processor components are designed, including: a separate computer and computer program or a combination of other computers, networks, or programs. Also with the present invention a 16 1280517 The use of i is not limited to the specific processing components described. It should also be understood that the connection between the Yucheng 1δ and the computer program η can be connected to the antenna 12 in any manner to allow the user to communicate with the computer program to access the antenna. Since the private brain 16 and the computer program 17 can be accessed to access the access antenna 12 and can be connected to the system in a wired or wireless configuration, as is known to those skilled in the art. According to Fig. 1, each of the antennas 12 can see four of the RFID sensors mounted under the floor 20. It should be understood that the present invention is not limited by the particular number of sensors per antenna, as this number can be determined by a number of factors. • The desired resolution level for causing multiple objects in the shadow scene, the antenna The distance between 12 and the RFID sensor 14, and the wavelength of the interrogator signal. As long as the sensor 14 is operational and no object blocks the line of sight between the antennas U and the sense, the antenna and sensor can communicate in a manner well known in the art. For example, antenna 12 transmits an interrogation signal 15 to RFID sensor 14 in the field of view of the antenna. This receives the sensor semaphore of the interrogation signal and transmits a response signal with the sensor identification back to the antenna 12. Since the tracking system 1 and, in particular, the computer program 17 (for example, the software for processing communication) know the detection area environment, and thus know the position of each antenna 12 and the sensing (4), the tracking system can connect the antennas and the sensors. The line of sight is set to 20 digits. If the response signal transmitted by the sensor 14 in each antenna detection area is received by the interrogating antenna 12, the tracking system 1 knows that there is no blocking object present between the respective antennas and sensors during the communication. between. However, if the antenna 12 does not receive a squeak from the sensor 14 in its detection zone, the tracking system 10 concludes that an object is blocked between the respective antennas and the sensor 17 1280517. Sight. Therefore, the tracking system 10 obtains information by losing information (e.g., the antenna does not receive a response signal) by confirming that an object blocks the communication path between the respective antennas 12 and the sensors 14. This loss of information creates an electronic shadow along the respective 5 communication lines. Each of the RFID sensors 14 is preferably disposed in a detection area of more than one antenna 12, which estimates the size of the object by analyzing the shadow projected by the object. When the antenna 12 repeatedly and continuously emits an interrogation signal and reads the corresponding response signal, the tracking system 10 can be seen according to whether the RFID sensor 14 is seen by the antenna 12 (eg, reading a response signal) or 10 not seeing (For example, the signal is blocked), tracking the movement of the blocking signal object in real time. Figure 1 illustrates an example of a shadow. Three antennas having reference numbers of 22, 24, and % are shown in Fig. 1; and four RFID sensors each having reference numbers 28, 30, 32, and 34. Antennas 22, 24, and 26 I5 are identical to antenna 12 discussed above, with each antenna having a unique identification number. Similarly, the RFID sensors 28, 30, 32, and 34 are identical to the RFID sensor 14, and each sensor has a unique identification number. Still referring to Figure 1, it is shown that the shadow object 36 is on the floor 20 and above the sensors 30 and 32. This causes the shadow object 36 to represent any object that blocks communication between the antennas 12, 22, 20 24, and 26 and the RFID sensors 14, 28, 30, 32, and 34. In the embodiment illustrated in Figure 1, the antennas, 22, 24, and 26 transmit interrogation signals in their field of view to alert the associated rFID sensors 14, 28, 30, 32, and 34. If such interrogation signals are received as expected with the corresponding 18 1280517 response signal, then no shadowing occurs. However, if the antennas 12, 22, 24, and 26 do not receive a corresponding response signal to the transmitted interrogation signal, then the tracking system infers that there is a shadow along the line of sight between the corresponding antenna and the sensor. As can be seen in Figure 1, this causes shadow object 36 to create a shadow 38 between and above RFID sensors 28, 30, 32, and 34. No shading is caused on the RFID sensor 14, since there is no shadow object between the RF1D sense 14 and the antenna 2. However, the antenna 22 is unable to receive a response signal from the sensor 3, the antenna 24 senses that 28, 30, 32, and 34 receive the response signal, and the antenna 1 cannot receive the response from the sensor 32. signal. Thus, the system 1 recognizes that shadows 38 are formed on the floor 20 between and above the RFID sensors 28, 3, 32, and 34. Preferably, the antenna is positioned with the RFID sensor such that each sensor is in the field of view of more than one antenna. This allows the tracking system to better estimate the size of the object 36. For example, still referring to the figure, the RFID sensor 28 is in the field of view of the antennas 22 and 24. To cause the shadow object 36 to be positioned as shown in Figure 1, the antenna 22 can see the sensor % (for example. The antenna 22 receives the corresponding response signal from the sensor 28. However, the antenna 24 and the thermal sensor 28 see the sensor 28 because it causes the shadow object 36 to block communication between the two. Thus, the shadow 38sRF] [D sensor 28 extends, and the tracking system 10 obtains information. This causes the shadow object 36 to be sufficiently large to block the line of sight communication between the antenna 24 sensor 28. The tracking system 1 is also provided by the singer. The shadow object 36 is not covered; the RFID sensor 28 does not block the line of sight between the antenna 24 and the sensor. Since the smart sensor 19 1280517 28 is in the field of view of the antennas 22 and 24, but can only be seen by the antenna 22, the tracking system 10 can better estimate the size of the shadow object 36 via the computer program 17 because it has It is high enough to block communication between the antenna 24 and the sensor 28, but does not extend above the sensor 28. The RFID sensor 30 5 cannot be seen by the corresponding antennas 22 and 24, thus allowing the tracking system 10 to assume that the shadow object 36 is located above the sensor 30. Similarly, the RHD sensor 32 cannot be seen by the associated antennas 24 and 26, thus allowing the tracking system 10 to assume that the shadow object 36 is also located above the sensor 32. The RFID sensor 34 cannot be seen by one of the antennas 24 of the corresponding antenna, but can be seen by the other relative antenna 26. From this information tracking system, it can be determined that the shadow 38 extends over the sensor 34, but this causes the shadow object 36 to not extend above the sensor 34 or block the line of sight between the sensor 34 and the antenna 26. Thus, tracking system 10 can cause this shadowed object 36 to be positioned and estimated by computer program 17 because its height is sufficient to block the line of sight between antenna 24 and RFID sense 15 and between 28 and 34, and also has less than its shadow. 38 footprints. In the same manner, the tracking system 1 can detect the unblocked mobile RFID sensing antennas based on the antennas 12, 22, 24, and 26 that detect the unblocked sensors, as is familiar to those skilled in the art. Known. For example, the unblocked mobile sensor detected by antennas 22 and 24 can be located in the detection area of detection antennas 22 and 24. (4) Constructing the secrets 10 periodically between the antenna detectors. This tracking system can track the movement of shadow objects as a function of time. In other words, depending on its application, the tracking system can be traced as desired: people, vehicles, inventory, and products. Similarly, the chasing 20 1280517 vertical system 1G can track the merchandise with a label (for example, a mobile active or de-sensing sensor) and, if appropriate, the merchandise associated with the shadow. Depending on the movement of the shadow object 36 and the shadow associated with the unsold item, the top view of the top view of the activity system (10), such as the 5 warning or notification manager (4), can be used. Fig. 2 is a view specifically showing a typical plan view for the tracking system shown in the phantom according to an embodiment of the present invention. Figure 2 also shows the circle of view circle 4 〇 and the area of the circle of view shows the area of the 10 boards seen by the individual antennas U. These antennas are placed on the floor, and preferably on the floor near the ceiling. At the office. For example, the Horizons Off 40 is shown in the phantom: Horizon Range Boundary 18 intersects the floor 2_. As can be seen in Figure 2,. Preferably, each antenna 12 is positioned and oriented so that a plurality of rfid sensors 14 can be seen, and the senses are configured such that it can be viewed or recognized by more than one of the 15 antennas. π Still refer to Figure 2, which causes the shadow object to interact with the sensory 28, 30, 32, and 34 to create a shadow 38. However, in the above method of class = for the first term, the tracking system can estimate the shadow object 36 by implementing the triangle 2 method on the RF_detector that the temple cannot be seen by its respective antenna. The size. Using this method, the computer program can determine that the shadow object is shaded, which is large enough to include the brush D sensing H3G and 32, and is of sufficient height to block communication between the other antennas, Μ, 42 and 44. When used over time, the tracking system can non-invasively track the movement of the shadow object 21 1280517 36 in the sensor network of the debt measurement area, which is the position and structure of the antenna and the sensing area. Defined. It will be appreciated that the antenna and sensor may be configured to be more spaced or closer together depending on the level of resolution desired for the application of tracking system 10. If a smaller resolution is desired, for example, the tracking system 10 can recognize and track the shadowed object 36 but is not overly concerned with the size of the object, the antenna 12 and the sensor can be divided even more. In addition, if a larger resolution level is desired to better identify each of the shadowed objects 36, the antenna 12 and the sensor 14 can be closely arranged such that each sensor 10 can be multiple The antenna is viewed to accurately determine the size and shape of the shadowed object. Figure 3 is a top view similar to Figure 2, but showing a tracking system 10 having an antenna and sensor that are more dispersed than those shown in the examples of Figures 1 and 2, in accordance with an embodiment of the present invention. open. As can be seen in Figure 3, one or more of the RFID sensors 14 can be seen by multiple antennas, while other sensors can only be seen by one sensor. The spacing allows the tracking system 10 to recognize and track the shadowed object, but depending on the size of the shadowed object, the tracking system may not be at the same resolution as or determined by the embodiment shown in Figures 1 and 2. Identify the shadowed objects in detail. For example, if the 20 shadow object is small enough to block communication between a sensor and the antenna, the tracking system cannot estimate the size of the shadow object in the shadow. However, when this causes the shadow object to move in the safety net, it can cause shadows on the RFID sensor and can be seen by more than one antenna to allow better estimation of the size of the shadowed object. Therefore, the tracking system can still estimate the size and shape of the shadowed object as the shadow object moves through the safety net as time passes 22 1280517. The detection of the electronic shadow vector and the active RFID sensor, as well as the movement of its individual vectors, can produce an electr〇nic mapping fingerprint. This electronic image may be the sum of the electronic shadow vectors with or without a mobile RFID sensor, as will be explained in detail herein. The computer program analyzes this electronic image as expected, and provides: security, marketing, and logistics functions. The sample usage includes the following: Example 1 · Prevent loss - Electronic graphics and electronic shadows can be used to determine 10 15 20移动 Move/direction to s (for example: exit towards the store, or towards the point of sale - = silver machine) and the speed (rate) of the customer in the retail store. By making information about the products owned by the households (for example, the exact type, quantity, and value combined), it can be determined whether the product may be stolen. Especially if it has non-mussels. Shows the theft of an attempt, especially if the shadow/tag does not pass through the point of sale. This sequence of information and events can be

At商店人貝在此客戶離開之前接近客戶,因此防止可 月b之順手偷竊之事株 & + 件本發明之較佳追蹤系統亦可在突然 失去與此陰影有關之Μ古 ★ 推束路糾嫌 °又有‘織之產品(例如:箔線帶、嬰兒 與陰影有關二貞測… 遺失標鐵有關之陰二二;佳追蹤系統可以追蹤與此 用,在該處標籤被去二=失防止之例在試衣室區域有 追縱系統可各戶縣。本發明之較佳 客戶所造成之陰參:警不,以及可以追蹤由相關 亦可設置根據較佳實施例之偵測區, 23 1280517 例如在銷售點位置(例如··付款或登出暫存器),以偵測偷竊 控制及/或監視交通。此偷竊控制之一例為:在銷售點之人 員並未將所有產品掃瞄進入用於銷售之暫存器中。即使此 在未經掃瞄產品上之標籤被去能,此追蹤系統仍可追蹤此 5產品有關之陰影。這即是,當標籤消失時,追蹤系統10仍 可追蹤與此損失標籤有關之陰影。 試衣室設有標籤商品之相關商品作廣告。 電腦程式可以對此客戶帶進試衣室之商品 例2 ·交叉行銷(Cross Marketing)(例如:互補式產品選 擇)一藉由使用如同在例i中相同資訊(例如··客戶之向量/ 移動方向、與客戶手中產品之知識),如果此客戶之向量方 1〇向疋銷售點收銀機,則可以使用此知識與資訊自動對客戶 顯示(經由所熟知之在排隊離開登出中之顯示系統),或對銷 售人員顯示螢幕以建議與客戶所選擇項目匹配之一系列互 補^品。作為交叉行銷之另一顯示方式,當一辨識為陰影 之客戶進入試衣室時,則此根據較佳實施例之追蹤系統可 b以在位於此試衣室中所熟知之顯示裝置上,將&客户帶至At the store, people close to the customer before the customer leaves, so it is possible to prevent the smoothing of the month b. The better tracking system of the present invention can also suddenly lose the shadows associated with this shadow. Correction ° There are also 'woven products (for example: foil tape, baby and shadow related to the second test... Lost standard iron related to the yin two; good tracking system can be tracked with this, where the label is gone two = Examples of failure prevention in the fitting room area are tracking systems that can be used in each household. The ginseng caused by the preferred customer of the present invention: no alarm, and can be traced by the relevant detection area according to the preferred embodiment. 23 1280517 For example, at a point of sale (eg, payment or logout register) to detect theft control and/or monitor traffic. One example of this theft control is that the person at the point of sale did not sweep all the products. Targeting into the scratchpad for sale. Even if the label on the unscanned product is disabled, the tracking system can track the shadows associated with the 5 product. That is, when the label disappears, the tracking system 10 still trackable with this loss The shadow of the label. The fitting room is advertised with the relevant item of the label product. The computer program can bring the customer into the fitting room. Example 2 · Cross Marketing (for example: complementary product selection) By using the same information as in example i (eg customer vector/moving direction, knowledge of the product in the customer's hands), this knowledge and information can be used if the customer's vector side is directed to the point of sale cash register. Automatically display to the customer (via the well-known display system that is queued to leave the logout), or display a screen to the salesperson to suggest a match with the customer's selected item. As another way of displaying cross-marketing, When a customer identified as a shadow enters the fitting room, then the tracking system according to the preferred embodiment can bring the & customer to the display device well known in the fitting room.

24 1280517 人之機器或商店人員。 子陰設計計議額行销—根據客戶之電 R他感測= 定設備上及/或在地板中之固定式 5 10 15 2〇 "°°參考圖,可以建立趨勢分析以瞭解客戶之、、六 勳。此趨勢公化△ ^ 刀析允許商品行銷將商店中客戶流動最適化。 亦可21目=之過程程序、與所記錄之貨架及/或商店行銷, 最、^趨勢分析將在零售環境中之訊息傳送與記錄位置 品之知識2 7訊與有關在在客户手中或客戶前面產 客…’可以根據下列事項建立趨勢分析:例如, 百2慮產品之時間,以及客戶購買所考慮產品所用時間 在正確位置中之正確產品可以改善銷售量。可以使用 电子方式查證正確產品與型式之能力,以監視護庫 置,以及根據所建立之銷售規則採取修正行動。 例4 :人員計算器—使灾 陰影可以接供.〜 進口/出口之電子 此人。斗/、.之人員計數、以及即時之歷史資料庫。 旦貝计數之值與即時資訊可以提供對於廣告 里。此根據較佳實施例之追#傘 八 " 訊之其他地點提供正確:=亦可在想要知道此種資 運鈐φ 確之人貝精,此等地點像是例如: 月…、會議中心、運動場所、以及貿易展覽場等。 銷售人員效率〜此追料統可以追縱在 身上之行動式RFTD感測器, 貝 以盏視在整個工作天此工作人 、之仃動。例如:在靠近客 行動式咖感測器可以顯矛·=,之勒售人貝身上之 ’、·此銷售人員與客戶間之交互 25 1280517 動作此種父互動作時間可以由追縱系統記錄, 銷售人員之#括s 4_/u ^ 助將 表現取大化。而且,此追縱祕可以追縱:在 銷售人員身上之行動^RFID感測器、與在產品上之行 RF_^ ’以監視將庫存運送至零售地板上之所用時^ 與效率。 …例6:即時庫存—其本身之電子陰影可以允許即時 追缺,因此提供人工成本節省。即時庫存亦確保在商店中 適當位置有適當產品。 δ、上木阳,本發明之追縱系統較佳以即時軟體(例 ία如:中間體'_'應用指令)實施。此追縱系統可以使用 各種方法偵測移動。例如:追縱系統可以藉由正的位置債 測移動,而目標(例如:設有標籤之物件)是由天線看到且在 感測器網中移動。此追縱系統亦可以藉由永久之不存在以 偵測私動,而目標在感測器網中消失且不具相關之陰影。 15在此情況下’此追料統可以假設下列任何情形且通知附 近之销售人S:⑷此標籤損壞;⑻此標籤造成干擾’⑷ 某物品掉下。此追縱系統可以藉由陰影不存在而進—步债 7私動,§陰$彡移開或此標籤料消失且此有關陰影移動 4 ’此標籤消失且存在-陰影阻措此標籤被看到。此追縱 2〇系統可谓測人員陰影之移動,此由人員造成之電子陰影是 由天線看到,且此人員在感測器網中移動。移動之債測可 以被阻擋妨礙,其可以由以下方式造成··將購物車在到處 推動、商純、顯示桌、行銷物體(例如:貨架)。此等障礙 可以使用多個天線而消除。 26 1280517 如同乂上。兒明,此根據較佳實施例之追縱系統可以價 測‘稿。例如·偷竊可以藉由以下方式制:追蹤標籤或 陰〜朝向非購貝物出口之移動向量,尤其如果此標鐵/陰影 =百先u銷售點。此追縱系統亦可藉由突然失去設有 丁籤之產口口(例如·線增強袋、嬰兒推車、講物袋)而偵測 偷竊、,而此標籤相對於陰影消失。此追縱系統可以非侵犯 地债測在4衣室中之偷竊,例如當人們在試衣室中將標鐵 去此以及有關之陰影離去時。此外,此追縱系統可以藉 由在銷售點之知稱控制而偵測偷竊。例如,當工作人員未 1〇將所有產品掃目苗進入用於銷售之收銀機中時,此追縱系統 可以追蹤與產品有關之陰影。 取決其使用,此追蹤系統提供各種效率之測量。例如: 此追蹤系統可以監視配帶此RFID徽章之銷售人員之表現, 因為此追蹤系統藉由將銷售人員之RFID徽章與客戶陰影整 15合而可以確認:此銷售人員是否以及多麼經常接待與服務 客戶。此外,此追蹤系統可以藉由:檢查此等貨物與產品 是否在適當位置而協助行銷。更有進者,此追蹤系統可以 監視客戶之交互動作,因為此追蹤系統可以非侵犯地確定 客戶在何處。此外,此追蹤系統可以監視客戶路徑流、交 2〇通樣式、徘徊樣式、以及接收率。此種資訊可以指導商人 將客戶導引至購物經驗。 熟習此技術之人士瞭解,可以對以上說明之實施例作 各種變化而不會偏離其廣泛新穎性之觀念。例如··可以修 正此專實施例’而使用從數赫兹頻帶經由十兆赫兹頻帶至 27 1280517 非離子頻帶之其他頻率操作。此非離子頻率作為耦合方法 運作良好,而由與非離子輻射不同之離子輻射以區別。因 此,應瞭解本發明並不受限於所揭示之特定實施例,但其 用意為包括··在本發明之精神與範圍中之各種修正。在此 5 無須進一步說明,上述之描述已完全說明本發明,而其他 人士可以藉由應用目前與將來知識,輕易地將其調整而使 用於各種服務情況中。 【圖式簡單說明】 第1圖為根據本發明實施例產生感側器網之天線含蓋 10 範圍與重豐彳貞測區之平面圖, 第2圖為類似於第1圖中所示感測器網之天線含蓋範圍 感測器網之正視圖;以及 第3圖為說明根據本發明較佳實施例之另一感側器網 之正視圖。 15 【圖式之主要元件代表符號表】 10…追蹤系統 18…視界邊界 12、22、24、26…天線 20···地板 14、28、30、32、34、42、44··· 36···物體 RFID感測器 38…電子陰影 16…電腦 40…視界範圍圓圈 2824 1280517 Human machine or store personnel. Sub-Yin Design Negotiation Marketing - According to the customer's electricity R, he senses = fixed equipment on the equipment and / or in the floor 5 10 15 2 〇 " ° ° reference map, you can establish a trend analysis to understand the customer, Six honours. This trend is publicized △ ^ knife analysis allows merchandising to optimize the flow of customers in the store. It is also possible to process the process with 21 mesh = and the recorded shelves and / or store marketing, the most, the trend analysis will be in the retail environment, the message transmission and the recording of the location of the product knowledge and related to the customer or the customer The former producer...' can build a trend analysis based on the following: For example, the time of the product and the correct time for the customer to purchase the product under consideration in the correct position can improve sales. The ability to electronically verify the correct product and type can be used to monitor the inventory and to take corrective action based on established sales rules. Example 4: Personnel Calculator - Make disaster shadows available. ~ Import/export electronics This person. Bucket/,. Personnel count, and instant historical database. The value of the bin and the instant information can be provided for the ad. This is in accordance with the preferred embodiment of the chasing # umbrella eight " other places provide the correct: = can also be known to know such a 钤 确 之 之 , , , , , , , , , , , , , , , , , , , , , , , Centers, sports venues, trade fairs, etc. Sales staff efficiency ~ This tracking system can track the mobile RFTD sensor on the body, and to despise the work person and the whole workday. For example, in the proximity of the guest mobile coffee sensor can display the spear ·=, the sale of the person's body', the interaction between the salesperson and the customer 25 1280517 action such parent interaction time can be recorded by the tracking system , Sales staff's # s 4_/u ^ help to maximize performance. Moreover, this tracking secret can be traced: the action on the salesperson ^ RFID sensor, and the RF_^ on the product to monitor the time and efficiency of shipping the inventory to the retail floor. ... Example 6: Instant Inventory - Its own electronic shadow allows for immediate tracking, thus providing labor cost savings. Instant inventory also ensures that there is a suitable product in the right place in the store. δ, Shangmuyang, the tracking system of the present invention is preferably implemented by an instant software (e.g., an intermediate '_' application instruction). This tracking system can detect movement using various methods. For example, the tracking system can be moved by a positive location, while the target (e.g., the tagged object) is seen by the antenna and moves in the sensor network. The tracking system can also detect private movements by permanent non-existence, and the target disappears in the sensor network without associated shadows. 15 In this case, the tracking system can assume any of the following situations and notify the nearby seller S: (4) the label is damaged; (8) the label causes interference. (4) Some item falls. This tracking system can enter the private debt by the absence of the shadow, the 彡$$彡 move or the label disappears and the shadow moves 4' This label disappears and exists - the shadow is blocked and this label is seen To. This tracking system can measure the movement of the person's shadow. The electronic shadow caused by the person is seen by the antenna and the person moves in the sensor network. Mobile debt testing can be blocked, which can be caused by pushing the shopping cart everywhere, selling goods, displaying tables, and selling objects (for example, shelves). These obstacles can be eliminated by using multiple antennas. 26 1280517 Like a slap. It is to be understood that the tracking system according to the preferred embodiment can measure the draft. For example, theft can be done by tracking the label or the moving vector towards the non-purchased exit, especially if the target/shadow = Baixianu point of sale. The tracking system can also detect theft by suddenly losing the mouthpiece (such as a wire reinforcement bag, a stroller, a lecture bag) with a Ding, and the label disappears relative to the shadow. This tracking system can detect theft in 4 rooms without non-infringement, for example, when people leave the standard in the fitting room and the shadow of the departure. In addition, the tracking system can detect theft by knowing the control at the point of sale. For example, this tracking system can track the shadows associated with the product when the staff does not enter all the products into the cash register for sale. Depending on its use, this tracking system provides a measure of efficiency. For example: This tracking system can monitor the performance of the salesperson with this RFID badge, because this tracking system can confirm by the salesman's RFID badge and the customer's shadow: whether and how often the salesperson receives and services client. In addition, the tracking system can assist in marketing by checking whether such goods and products are in place. Even more advanced, this tracking system can monitor customer interactions because the tracking system can non-infringely determine where the customer is. In addition, this tracking system can monitor customer path flows, cross-talk styles, 徘徊 styles, and receive rates. This information can guide the merchant to direct the customer to the shopping experience. Those skilled in the art will appreciate that various changes can be made in the above described embodiments without departing from the broad scope of the novel. For example, this specific embodiment can be modified to operate from the digital Hertz band via the ten megahertz band to the other frequencies of the 27 1280517 non-ion band. This non-ionic frequency works well as a coupling method and is distinguished by ionizing radiation that is different from non-ionic radiation. Therefore, it is understood that the invention is not limited to the specific embodiments disclosed, but is intended to include various modifications within the spirit and scope of the invention. Without further elaboration, the above description has fully described the present invention, and others can easily adapt it to various service situations by applying current and future knowledge. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a plan view showing an antenna cover 10 range and a heavy measurement area of a sensor side network according to an embodiment of the present invention, and FIG. 2 is similar to the sensing shown in FIG. The antenna of the network includes a front view of the sensor network; and FIG. 3 is a front elevational view of another sensor network in accordance with a preferred embodiment of the present invention. 15 [Main component representative symbol table of the drawing] 10... Tracking system 18... Horizon boundary 12, 22, 24, 26... Antenna 20···Floor 14, 28, 30, 32, 34, 42, 44··· 36 ··· object RFID sensor 38...electronic shadow 16...computer 40... horizon range circle 28

Claims (1)

舉8 (|5 ΐ 3修(更)正本 拾、申請專利範圍: 第93113945號申請案申請專利範圍修正本 95.07.12· 1. 一種追蹤系統,包括: 設置在第一位置之辨識感測器,該辨識感測器具有 5 響應電路; 設置在第二位置之天線,該天線藉由該天線與該辨 識感測器間之交談式耦合經由其間之通信信號,而適用 於偵測該辨識感測器;以及 處理構件,其適於確定該天線並未偵測到該辨識感 10 測器,將此未偵測到解釋為顯示介於第一位置與第二位 置間之電子陰影,以及推論此物體之存在作為電子陰影 之原因。 2. 如申請專利範圍第1項之追蹤系統,更包括多個辨識感 測器,各該多個辨識感測器設置在各別位置,用於藉由 15 介於各感測器與該天線間交談式耦合而被偵測,其中該 處理構件更適於藉由該天線未偵測到該多個辨識感測 器至少之一,將此未偵測到解釋為顯示介於該天線與該 多個辨識感測器至少之一間之電子陰影,以及推論至少 一物體之存在作為電子陰影之原因。 20 3.如申請專利範圍第2項之追蹤系統,其中該天線適於藉 由重複介於該天線與該辨識感測器間之交談式耦合,而 週期地偵測該多個辨識感測器,以及該處理構件更適用 於藉由監視電子陰影之移動,而追蹤物體之移動。 4.如申請專利範圍第2項之追蹤系統,其中各該多個辨識 29 1280517 感測器為固定。 5. 如申請專利範圍第4項之追蹤系統,其中該天線更適於 藉由該天線與行動式辨識標籤間之交談式耦合,而偵測 靠近電子陰影之行動式辨識標籤,該處理構件將行動式 5 辨識標籤與電子陰影相關。 6. 如申請專利範圍第5項之追蹤系統,其中該處理構件更 適於藉由監視有關電子陰影之移動,而追蹤行動式辨識 標籤之移動。Lift 8 (|5 ΐ 3 repair (more) original, patent application scope: No. 93113945 application patent scope revision 95.07.12 · 1. A tracking system, including: identification sensor set in the first position The identification sensor has a 5-response circuit; an antenna disposed at the second position, wherein the antenna is coupled to the communication signal between the antenna and the identification sensor, and is adapted to detect the sense of identification And a processing component adapted to determine that the antenna does not detect the identification sensor, and the undetected is interpreted as displaying an electronic shadow between the first location and the second location, and inferring The existence of the object is the cause of the electronic shadow. 2. The tracking system of claim 1 further includes a plurality of identification sensors, each of which is disposed at a respective position for 15 is detected by being coupled to the antenna and the antenna, wherein the processing component is further adapted to detect at least one of the plurality of identification sensors by the antenna, and the undetected To explain as display An electronic shadow between the antenna and at least one of the plurality of identification sensors, and a reason for inferring the presence of at least one object as an electronic shadow. 20 3. The tracking system of claim 2, wherein the antenna is suitable The plurality of identification sensors are periodically detected by repeating the conversational coupling between the antenna and the identification sensor, and the processing component is more suitable for tracking by monitoring the movement of the electronic shadow. 4. The movement of the object. 4. The tracking system of claim 2, wherein each of the plurality of identification 29 1280517 sensors is fixed. 5. The tracking system of claim 4, wherein the antenna is more suitable By detecting the conversational coupling between the antenna and the mobile identification tag, the mobile identification tag is detected near the electronic shadow, and the processing component associates the mobile 5 identification tag with the electronic shadow. 6. See Patent Application No. 5 A tracking system, wherein the processing component is more adapted to track movement of the mobile identification tag by monitoring movement of the associated electronic shadow. 7. 如申請專利範圍第4項之追蹤系統,其中該天線更適於 10 藉由該天線與行動式辨識標籤間之交談式耦合,而偵測 裝附於該產品之行動式辨識標藏,該處理構件將此產品 與電子陰影相關。 8. 如申請專利範圍第7項之追蹤系統,其中該處理構件更 適於藉由監視有關電子陰影之移動,而追蹤此產品之移 15 動。7. In the tracking system of claim 4, wherein the antenna is more suitable for detecting the mobile identification tag attached to the product by the conversational coupling between the antenna and the mobile identification tag, The processing component relates this product to electronic shading. 8. The tracking system of claim 7, wherein the processing component is adapted to track the movement of the product by monitoring movement of the electronic shadow. 9. 如申請專利範圍第7項之追蹤系統,其中該處理構件更 適於將此產品與對此產品有關之互補產品相關聯,以及 更包括與該處理構件通信之顯示裝置,用於將此互補產 品作廣告。 20 10.如申請專利範圍第1項之追蹤系統,更包括多個天線, 各該多個天線設置在各別固定位置,用於藉由該天線與 該辨識感測器間之交談式耦合經由其間之通信信號,而 偵測該辨識感測器,其中該處理構件更適於藉由該多個 天線至少之一而確定並未偵測到該辨識感測器,將此未 30 1280517 偵測到解釋為顯示介於該辨識感測器與該多個天線至 少之一間之電子陰影,以及根據該多個天線偵測到或未 偵測到該辨識感測器,而估計此物體之大小。 11. 如申請專利範圍第1項之追蹤系統,更包括多個辨識感 5 測器與多個天線,各該多個辨識感測器設置在第一位置9. The tracking system of claim 7, wherein the processing component is further adapted to associate the product with a complementary product associated with the product, and further comprising a display device in communication with the processing member for use in Complementary products are advertised. 20 10. The tracking system of claim 1, further comprising a plurality of antennas, each of the plurality of antennas being disposed at a respective fixed position for coupling by the conversation between the antenna and the identification sensor Detecting the identification sensor, wherein the processing component is further adapted to determine that the identification sensor is not detected by at least one of the plurality of antennas, and the detection is not detected by the 30 1280517 To be interpreted as displaying an electronic shadow between the identification sensor and at least one of the plurality of antennas, and estimating the size of the object based on whether the identification sensor is detected or not detected by the plurality of antennas . 11. The tracking system of claim 1 further includes a plurality of identification sensors and a plurality of antennas, each of the plurality of identification sensors being disposed at the first position 之各別固定部份,各該多個天線設置在第二位置之各別 固定部份,用於藉由該多個天線與該多個辨識感測器間 之交談式耦合且經由其間之通信信號,以偵測該多個辨 識感測器至少之一,其中該處理構件更適於藉由該多個 10 天線至少之一而確定並未偵測到任何該多個辨識感測 器,將此未偵測到該辨識感測器解釋為顯示介於該辨識 感測器與該多個天線至少之一間之電子陰影。 12. 如申請專利範圍第11項之追蹤系統,其中該處理構件更 適於估計此物體足跡之大小為小於電子陰影之大小。 15 13.如申請專利範圍第1項之追蹤系統,其中該處理構件包Each of the plurality of fixed portions is disposed at each of the fixed portions of the second position for communication between the plurality of antennas and the plurality of identification sensors and communication therebetween a signal to detect at least one of the plurality of identification sensors, wherein the processing component is further adapted to determine that the plurality of identification sensors are not detected by at least one of the plurality of 10 antennas, The undetected identification sensor is interpreted as displaying an electronic shadow between the identification sensor and at least one of the plurality of antennas. 12. The tracking system of claim 11, wherein the processing component is adapted to estimate that the size of the footprint of the object is less than the size of the electronic shadow. 15 13. The tracking system of claim 1 of the patent scope, wherein the processing component package 括電腦。 14. 如申請專利範圍第1項之追蹤系統,其中該處理構件包 括電腦程式。 15. 如申請專利範圍第1項之追蹤系統,其中第一位置是在 20 地板中,以及第二位置是在天花板中。 16. 如申請專利範圍第1項之追蹤系統,其中該辨識感測器 為射頻辨識(RF1D)感測器,以及該響應電路為射頻共振 電路。 17. —種追蹤系統,包括: 31 1280517 用於沿著第一位置與第二位置間之視線傳送信號 之裝置; 用於偵測在第二位置之傳送信號之裝置; 用於判定在該第二位置未偵測到該等傳送信號之 5 一的裝置; 用於將此未偵測到解釋為顯示介於第一位置與第 二位置間之陰影之裝置;以及 用於推論一物體之存在作為該陰影之原因之裝置。Including computers. 14. The tracking system of claim 1, wherein the processing component comprises a computer program. 15. The tracking system of claim 1 wherein the first position is in the 20 floor and the second position is in the ceiling. 16. The tracking system of claim 1, wherein the identification sensor is a radio frequency identification (RF1D) sensor, and the response circuit is a radio frequency resonance circuit. 17. A tracking system comprising: 31 1280517 means for transmitting a signal along a line of sight between a first position and a second position; means for detecting a transmitted signal at the second position; a device that does not detect the transmission of one of the two positions; a device for interpreting the undetected interpretation as a shadow between the first position and the second position; and for inferring the presence of an object A device that is the cause of this shadow. 18. 如申請專利範圍第17項之追蹤系統,更包括用於估計物 10 體大小之裝置。 19. 如申請專利範圍第17項之追蹤系統,更包括用於監視陰 影之移動以追蹤物體之裝置。 20. 如申請專利範圍第17項之追蹤系統,更包括用於偵測辨 識標籤之裝置;以及用於將辨識標籤與陰影相關聯之裝 15 置。18. The tracking system of claim 17 of the patent application also includes means for estimating the size of the object. 19. The tracking system of claim 17 further includes means for monitoring the movement of the shadow to track the object. 20. The tracking system of claim 17 further includes means for detecting the identification tag; and means for associating the identification tag with the shadow. 21. 如申請專利範圍第17項之追蹤系統,更包括用於偵測辨 識標籤之裝置;用於將辨識標籤與產品相關聯之裝置; 用於將產品以及與此產品有關之互補產品相關聯之裝 置;以及用於將此互補產品作廣告之裝置。 20 22.—種用於將物體標定之方法,包括有下列步驟: 沿著第一位置第二位置間之視線傳送信號; 偵測在第二位置之傳送信號; 確定在第二位置未偵測到所傳送信號之一; 將此未偵測到信號解釋為其顯示在第一位置第二 32 1280517 位置間之陰影;以及 將物體之存在推斷為造成陰影之原因。 23.如申請專利範圍第22項之方法,更包括估計物體之大 /J、〇 5 24.如申請專利範圍第22項之方法,更包括監視陰影之移動 以追蹤物體。 25. 如申請專利範圍第24項之方法,更包括根據陰影之移動 而發出警訊。21. The tracking system of claim 17 further includes means for detecting an identification tag; means for associating the identification tag with the product; for associating the product with a complementary product associated with the product Means; and means for advertising the complementary product. 20 22. A method for calibrating an object, comprising the steps of: transmitting a signal along a line of sight between a second position of the first position; detecting a transmitted signal at the second position; determining that the second position is not detected To one of the transmitted signals; interpret the undetected signal as a shadow between the positions of the second 32 1280517 displayed in the first position; and infer the presence of the object as the cause of the shadow. 23. The method of claim 22, further including estimating the size of the object /J, 〇 5 24. The method of claim 22, and monitoring the movement of the shadow to track the object. 25. The method of applying for the scope of patent No. 24 also includes issuing a warning based on the movement of the shadow. 26. 如申請專利範圍第22項之方法,更包括偵測辨識標籤, 10 以及將辨識標籤與陰影相關聯。 27. 如申請專利範圍第22項之方法,更包括偵測辨識標籤, 以及將辨識標籤與產品相關聯,將產品以及與此產品有 關之互補產品相關聯;以及將此互補產品作廣告。26. The method of claim 22, further includes detecting the identification tag, 10 and associating the identification tag with the shadow. 27. The method of claim 22, further comprising detecting the identification tag and associating the identification tag with the product, associating the product with the complementary product associated with the product; and advertising the complementary product. 3333
TW93113945A 2003-05-19 2004-05-18 Article identification and tracking using electronic shadows created by RFID tags TWI280517B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US47188503P 2003-05-19 2003-05-19

Publications (2)

Publication Number Publication Date
TW200515316A TW200515316A (en) 2005-05-01
TWI280517B true TWI280517B (en) 2007-05-01

Family

ID=36908208

Family Applications (1)

Application Number Title Priority Date Filing Date
TW93113945A TWI280517B (en) 2003-05-19 2004-05-18 Article identification and tracking using electronic shadows created by RFID tags

Country Status (3)

Country Link
CN (1) CN100552735C (en)
AR (1) AR044404A1 (en)
TW (1) TWI280517B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7609163B2 (en) * 2006-09-01 2009-10-27 Sensormatic Electronics Corporation Radio frequency ID Doppler motion detector
US8120488B2 (en) * 2009-02-27 2012-02-21 Rf Controls, Llc Radio frequency environment object monitoring system and methods of use
CN102194083B (en) * 2010-03-17 2014-07-23 北京亚仕同方科技有限公司 High-density ultrahigh frequency radio frequency tag detection device
EP3229071B1 (en) * 2016-04-06 2021-01-20 APPLIKAM Devices SL A fitting room comprising a portrait-like photographic system and a computer program
CN110399963B (en) * 2019-07-24 2023-03-10 江阴市浩天绮科技有限公司 RFID label composite code spraying production line
CN110399962B (en) * 2019-07-24 2023-03-10 江阴市浩天绮科技有限公司 Production process of composite code-spraying RFID (radio frequency identification) label

Also Published As

Publication number Publication date
AR044404A1 (en) 2005-09-14
TW200515316A (en) 2005-05-01
CN1816831A (en) 2006-08-09
CN100552735C (en) 2009-10-21

Similar Documents

Publication Publication Date Title
AU2004241592B2 (en) Article identification and tracking using electronic shadows created by RFID tags
US11915567B2 (en) Systems and methods for RFID-based retail management
US8477033B2 (en) Inventory control
US7239241B2 (en) Method and system for inventory control
US8810399B2 (en) Detection of groups of RFID tags
US7920063B2 (en) RFID theft prevention system
US9171442B2 (en) Item identification using video recognition to supplement bar code or RFID information
CN107004334B (en) For improving the shop intelligence sensor platform of Customer Experience and data analysis
US11995966B2 (en) Systems and methods for verifying remote purchases
US20160078264A1 (en) Real time electronic article surveillance and management
TW200820086A (en) RFID detection system for enhanced marketing
US11423751B2 (en) Validating radio frequency identification (RFID) tag alarm events
TWI280517B (en) Article identification and tracking using electronic shadows created by RFID tags
CN102105916B (en) Electronic article surveillance deactivator with multiple label detection and method thereof
CN116964606A (en) Contactless and automatic operation of retail stores
US7541928B2 (en) System and method for visibility to consumer
WO2007060637A2 (en) System and method for visibility to consumer

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees