US20060220853A1 - Encoding and decoding method and system - Google Patents
Encoding and decoding method and system Download PDFInfo
- Publication number
- US20060220853A1 US20060220853A1 US11/420,984 US42098406A US2006220853A1 US 20060220853 A1 US20060220853 A1 US 20060220853A1 US 42098406 A US42098406 A US 42098406A US 2006220853 A1 US2006220853 A1 US 2006220853A1
- Authority
- US
- United States
- Prior art keywords
- tag
- bit binary
- frequency
- code
- bit
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/0672—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with resonating marks
Definitions
- This invention relates to a method and system for encoding and decoding the identification of a tag.
- Automatic identification may be effected in different ways including many bar codes, identification tags and may be used to identify articles and personnel.
- Radio Frequency Identification is an automatic identification technology similar in application to bar code technology, but uses radio frequency instead of optical signals.
- An RFID system consists of two major components—a reader and a tag or card. They work together to provide the end user with a non-contact solution to uniquely identify people, animals or objects.
- the reader performs several functions, one of which is to produce a low-level radio frequency magnetic field that serves as a “carrier” of power from the reader to the RFID tag.
- a passive RFID tag contains an antenna and an integrated circuit (IC).
- the IC requires only a minimal amount of electrical power to function.
- the antenna in the tag provides a means for gathering the energy present in the magnetic field produced by the reader, and converts it to an electrical signal for use by the IC.
- the recovered energy powers the IC, and an electromagnetic signal modulated with data in the memory is transmitted by the tag's antenna.
- the electromagnetic signal transmitted from the tag is recovered by an antenna within the reader, and converted back into an electrical form.
- the reader contains a sensitive receiving system that is designed to detect and process the weak tag signal, demodulating the original data stored in the tag memory.
- active tags contain a miniature battery that provides the operating power for the IC.
- the IC When interrogated by the reader, the IC broadcasts a signal that identifies itself to sensitive reader detection and data transmission circuits. This allows the tag to begin sending its data at a considerably greater distance from the reader than its passive counterpart. Additionally, an active tag uses battery energy to produce a much stronger electromagnetic response signal. All of this results in a significantly greater read range than a passive tag.
- RFID provides this requirement to some degree and has the benefit that line-of-sight between the reader and tag is not required.
- Most optical reading techniques also require a directional decoding of the identifying code, giving rise to start and stop bits being part of the code.
- WID tags typically reflectors in the tag are used to modulate the RF signal, such that the presence or absence of reflectors affects the resulting code that is returned by the tag.
- U.S. Pat. No. 5,381,137 (“RFtagging system and RF tags and method”, assigned to Motorola, Inc., Schaumburg, Ill., published on 1995) discloses an RF tagging system that has a plurality of resonant circuits on a tag. When the tag enters a detection zone, the system determines the resonant frequency of each of the resonant circuits and produces a corresponding code. Resonant frequency detection is implemented by simultaneously radiating signals at each of the possible resonant frequencies for the tag circuits. The system is useful for coding any articles such as baggage or production inventory.
- Tags comprise a plurality of passive resonant circuits, each of which may resonate at any different frequency selected from a predetermined plurality of known resonant frequencies.
- Each of the resonant circuits is fixed at a different location on a planar surface of the tag.
- the jag is positioned between guide rails so as to fix its position with respect to the plurality of fixed location probes.
- Either the tag is moved such that various rows of tuned circuits pass directly under the probes, or the probes are otherwise positioned directly above and in registration with the tuned circuits.
- each of the probes simultaneously radiates each of the possible resonant frequency signals that may correspond to the resonant frequency of any of the circuits.
- FIG. 1 Such a system is shown schematically in FIG. 1 , showing a tag 10 that is encoded with multiple frequency sources to generate a code that is identified by a reader 11 .
- the tag 10 comprises only three different frequency sources, depicted respectively f 1 f 2 f 3 . It is seen that each of these frequency sources may be used more than once, its presence in, or absence from, the tag being depicted by “Y” and “N”, respectively. This does not cause any ambiguity since the frequency sources are spatially separated and the reader 11 is adapted to read each frequency source (which may be ambiguous) in association with its location (which is always unique).
- a frequency source transmits a signal to the reader 11 , this indicates that the frequency source is present at a known location, and the corresponding location in the resulting code construed by the reader may be set to logic “1” (or to logic “0” if negative logic is used). Since the location of each frequency source must be unique, the resulting code is likewise unique even if one or more of the transmitted frequencies is identical.
- MR magnetic resonance
- MRI Magnetic Resonance Imaging
- NMR spectroscopy Nuclear Magnetic Resonance spectroscopy
- Non-resonant frequencies such as acoustical signals
- acoustical signals are also used in the art for encoding data.
- U.S. Pat. No. 6,611,798 (“Perceptually improved encoding of acoustic signals”, assigned to Telefonaktiebolaget LM Ericsson, published 2003) discloses encoding an acoustic source signal such that a signal reconstructed from the encoded information has a perceptually high sound quality.
- the acoustic source signal is encoded into at least one basic coded signal that represents perceptually significant characteristics of the acoustic signal.
- the encoder can include at least one spectral smoothing unit that receives at least one of the signal components on which the basic coded signal is based and generates in response thereto a corresponding smoothed signal component.
- FIG. 1 shows schematically a prior art tag that is encoded with multiple frequency sources that are spatially constrained to generate a unique code
- FIG. 2 shows schematically a tag according to the invention that is encoded with multiple frequency sources that are spatially unconstrained to generate a unique code
- FIG. 3 is a schematic representation of a tag-reader combination configured to encode a 3-bit code
- FIG. 4 is a flow chart showing the principal operations carried out by an encoder according to the invention.
- FIG. 5 is a flow chart showing the principal operations carried out by a decoder according to the invention.
- FIG. 6 is a flow chart showing the principal operations carried out by a stock management system according to the invention.
- FIG. 7 is a flow chart showing the principal operations carried out by a lo surgical instrument tracking system according to the invention.
- FIG. 8 is a flow chart showing the principal operations carried out by a authorization system according to the invention.
- FIG. 9 is a block diagram showing functionally an encoder according to the invention.
- FIG. 10 is a block diagram showing functionally a decoder according to the invention.
- FIG. 2 there is shown a tag 20 according to the invention that is encoded with multiple frequency sources to generate an m-bit code that is identified by a reader 21 .
- a tag 20 is encoded with multiple frequency sources to generate an m-bit code that is identified by a reader 21 .
- the following description will relate to a 9-bit code, although the principles of the invention can readily be applied for any integer value of n greater than one.
- the reader 21 pre-assigns 9 different frequencies designated f 1 , f 2 . . . f 9 to a unique respective position in the 9-bit code.
- the first frequency source f 1 is assigned to the least significant bit (LSB)
- the frequency source f 9 is assigned to the most significant bit (MSB)
- each of the other seven bits of the 9-bit code being assigned to corresponding frequencies f 1 to f 8 .
- the tag 20 is encoded by providing only those frequency sources that are reflected in the desired code.
- to encode 110101101 only the frequency sources f 1 , f 2 , f 4 , f 6 , f 8 , and f 9 are required (assuming positive logic is used). It will be appreciated that negative logic could be employed instead, whereby the absence of a frequency gives rise to logic “1” at the corresponding location of the code.
- the frequency sources f 1 , f 2 , f 4 , f 6 , f 8 , and f 9 are spatially unconstrained. That is to say, neither the order in which they appear in the tag nor their relative spatial location is significant. Indeed, all the frequency sources could be spatially superimposed one on top of the other, so long as the reader is able to discern the presence of all those frequency sources that are present. It is thus seen that, unlike the prior art system depicted in FIG. 1 , in the invention a unique code is obtained merely by encoding the tag with a plurality of predefined frequency sources that produce known different respective characteristic frequencies, each of which is associated with a known unique position in the n-bit binary code.
- Frequency sources may be used more than once, although multiple instances of the same frequency source have no significance since the same characteristic frequency is detected by the reader and affects only a single bit of the n-bit code.
- the frequency sources composing a tag are not necessarily dispersed within a volume.
- Very small frequency sources can be, for example, mixed in ink and printed on the identified object, such as printing on paper. According to a different example, by mixing the frequency sources with pigments used to color fabrics it is possible to print a hidden tag on fabric (if the pigment used has the same color as the fabric). It should be noted that any number of frequency sources may be printed in this manner.
- a dispersion or colloid can be formed of different frequency sources, such as ferromagnetic elements and the resulting dispersion or colloid then serves as a tag that encodes a unique code depending on which frequency sources are present.
- each frequency may be realized by a frequency band provided that the range of frequencies within each band can be distinguished from those of an adjacent frequency band even if not from each other, thus allowing each frequency band to be unambiguously detected.
- a series of band-pass filters may be used so as to pass all frequencies in a given band, while blocking all other frequencies, thereby allowing each frequency band to be unambiguously detected.
- FIG. 3 is a schematic representation of a tag 30 and a reader 31 that are combined to encode and decode a 3-bit code that is characterized by the presence or absence of three different frequency sources denoted f 1 f 2 and f 3 , which encode respectively the LSB, the second bit and the MSB.
- the reader 31 detects characteristic frequencies emitted by the tag 30 and compiles a 3-bit code according to the following logic.
- the received frequencies serve to identify the tag with which it is associated.
- the corollary is also true in that on decoding an n-bit binary string corresponding to a tag, it is possible to infer if a certain frequency source is associated with the tag or not.
- the third bit from the left is 1, this means that the string encodes a tag with which the frequency source f 3 is associated.
- one or more new bits must be allocated and this implies providing one or more new frequency sources each having a respective unique characteristic resonant frequency and assigning each of the new f 1 -frequency sources to known unique positions in the binary string.
- the MSB of the 4-bit code is associated with an additional, fourth frequency source f 4 .
- the decoder can be configured to selectively receive each characteristic frequency sequentially and to assign a corresponding value to the bit associated therewith.
- the decoder may be configured to receive all the characteristic frequencies in parallel as a complex signal and to perform frequency separation on the complex signal received from the reader. In this case, the separated frequencies emitted by the tag are recorded so as to compile a list of all unique characteristic frequencies associated with the tag. Subsequent decoding may then continue as for sequential decoding.
- An example of an applicable frequency separation technique is described in above-mentioned U.S. Pat. No. 5,341,099.
- frequency sources (f 1 f 2 . . . f n ) are associated with the tag to compose the n-bit binary tag, and the reader 204 detects the corresponding characteristic resonant frequencies generated by the frequency sources.
- the frequency sources used can be active frequency sources.
- An active frequency source can be, for example, a resonant circuit such as the circuit used in WID, activated by a battery for example.
- passive frequency sources may also be used.
- a passive frequency source is a resonant circuit activated by energy transmitted to it by the reader.
- resonant circuits are well known in smart card technology and are described, for example, in U.S. Pat. No. 5,241,160 issued Aug. 31, 1993 entitled “A System and Method for the Non-Contact Transmission of Data” and assigned to On Track Innovations Ltd.
- Another approach is to use resonant elements, in a way known to those versed in fields like Nuclear Magnetic Resonance (NMR) spectroscopy or Magnetic Resonance Imaging (MRI).
- NMR Nuclear Magnetic Resonance
- MRI Magnetic Resonance Imaging
- Resonant elements such as ferromagnetic elements have characteristic resonant frequencies, induced by exposing the resonant element to a predetermined excitation frequency. Therefore, a resonant element can be used as a passive frequency source in tags according to the invention. It should be noted that resonant elements can be of any physical state, such as liquid, gas or solid.
- characteristic frequencies can apply to any frequency range within the electromagnetic spectrum, so long as they are capable of being uniquely detected by the reader.
- acoustic signals can be used too, or even a combination of different ranges.
- a tag conveying characteristic frequencies of any range can be encoded according to the invention by n-bit binary codes, as long as the characteristic frequencies are unique (forming, therefore, unique characteristic frequencies), are associated with known unique positions in the n-bit binary code and can be uniquely detected.
- Tags that can be encoded by n-bit binary codes according to the described embodiments can be utilized in many applications such as for automatic identification of objects. For example, in a clothing store it is possible to mark each product with a tag including a unique combination of frequency sources, identifying the products thereby. If there are two identical shirts in the store, for example, each
- the encoding method enables 2 n different n-bit binary codes, this means that with 30 different frequency sources, for example, it is possible to have more than ten million different tags, which is enough to uniquely tag every product in an average store. Larger numbers of frequency sources enable even much higher number of identifying tags, of course.
- FIG. 6 is a flow chart showing the principal operations carried out by a decoder according to such an embodiment when used in an anti-shoplifting system, for alerting suspected theft, where products are uniquely encoded using tags.
- the tags include passive frequency sources
- the anti-shoplifting system should include a transmitter that induces the predetermined excitation frequencies, and a reader 204 , that detects the characteristic resonant frequencies emitted by the tags.
- the tags When the tags are placed in the zone susceptible to the transmitter, they convey the resonant frequency, which is then detected by the reader.
- the reader or a processor coupled thereto) then decodes the tag so as to generate a corresponding n-bit binary code.
- the tags can include active frequency sources that do not require a transmitter in order to convey their characteristic resonant frequencies.
- Each product in the store carries a unique tag bearing a respective n-bit binary code whereby it is possible to identify the product type, and even the unique item. Therefore, purchasing a certain item, it is possible to decode the item's tag, generating its n-bit binary code.
- the n-bit binary code can be added to a list of items authorized to leave the premises of the store.
- tags with items in a store or a library, for example, allows use of the tags for automatic checkout, or for stock management.
- FIG. 7 is a flow chart showing the principal operations carried out by a decoder according to another embodiment for keeping track of surgical instruments during medical procedures for improving safety in an operating theater. It is a known problem that in operating theaters surgical instruments and materials, such as gauze pads, forceps or scalpels, are sometimes left in the patient's body, causing considerable damage to the patient. One way to overcome the risk is having a staff person count the instruments before the doctor begins sewing, making sure everything is accounted for. This procedure is liable to error and can be automated by uniquely marking each item with a tag according to the invention.
- n-bit binary code of every surgical instrument can be decoded and listed in a running list of all the surgical instruments that are in the working area.
- surgical instruments' n-bit binary codes are removed from the running list.
- the list is checked, ensuring that all surgical instruments are accounted for.
- Items can also be pre-encoded. For example, it is possible to print a tag according to the invention on each gauze pad. It is known that frequently several gauze pads are packed together in one pack. When packing the gauze pads it is possible to manage a list of n-bit binary codes associated with the packed gauze pads. The list itself can be identified by a unique n-bit binary code encoding a tag that can be printed, for example, on the package.
- FIG. 8 is a flow chart showing the principal operations carried out by a decoder according to yet another embodiment for conditionally enabling and disabling electrical appliances.
- immobilizers are commonly used to disable ignition without a predefined key.
- Tags according to the invention can be used as such predefined keys.
- a reader in the vehicle is programmed to recognize one or more n-bit binary codes.
- An authorized driver should carry a corresponding tag associated with one or more predetermined frequency sources that produce known different respective characteristic frequencies and each of which is associated with a known unique position in an n-bit binary code.
- the tag is brought to the vicinity of the decoder, it is decoded to provide the corresponding n-bit binary code.
- the immobilizer determines whether the detected n-bit binary code corresponds to any of the recognized n-bit binary codes, and if so, allows ignition of the vehicle's engine, which otherwise remains immobilized.
- the IDs of all employees who are authorized to drive the company's vehicles can be used as n-bit binary codes programmed into the readers of all the company's vehicles, thus ensuring that only authorized employees can drive them. It is also possible to compile a list monitoring parameters associated with employee use of the company's vehicle. For example, such a list enables management to track the identity of each employee driving a vehicle, the date when the vehicle was used, the distance driven, and so on.
- FIG. 9 is a block diagram showing functionally an encoder for encoding a tag 40 with an n-bit binary code stored in a code repository 41 .
- a frequency source unit 42 is coupled to the code repository 41 and is responsive to an n-bit binary code stored therein for depositing in association with the tag 40 one or more predetermined frequency sources that produce known different respective characteristic frequencies and that are associated with a known unique position in the n-bit binary code.
- FIG. 10 is a block diagram showing functionally a decoder 50 for decoding a tag 51 having an n-bit binary code.
- the decoder comprises a detector 52 for detecting one or more different characteristic frequencies each of which is associated with a known unique position in the n-bit binary code. Coupled to the detector 52 is a decoding unit 53 that substitutes at respective positions of the n-bit binary string respective binary values according to a presence or absence of the respective characteristic frequency associated with the respective position in the n-bit binary code.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Burglar Alarm Systems (AREA)
- Near-Field Transmission Systems (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
In a method and apparatus for encoding a tag with an n-bit binary code one or more predetermined frequency sources are associated with the tag that produce known different respective characteristic frequencies, each of which is associated with a known unique position in the n-bit binary code,
Description
- This invention relates to a method and system for encoding and decoding the identification of a tag.
- Automatic identification may be effected in different ways including many bar codes, identification tags and may be used to identify articles and personnel.
- Radio Frequency Identification (RFID) is an automatic identification technology similar in application to bar code technology, but uses radio frequency instead of optical signals. An RFID system consists of two major components—a reader and a tag or card. They work together to provide the end user with a non-contact solution to uniquely identify people, animals or objects. The reader performs several functions, one of which is to produce a low-level radio frequency magnetic field that serves as a “carrier” of power from the reader to the RFID tag.
- A passive RFID tag contains an antenna and an integrated circuit (IC). The IC requires only a minimal amount of electrical power to function. The antenna in the tag provides a means for gathering the energy present in the magnetic field produced by the reader, and converts it to an electrical signal for use by the IC. When a tag is brought into the magnetic field produced by the reader, the recovered energy powers the IC, and an electromagnetic signal modulated with data in the memory is transmitted by the tag's antenna. The electromagnetic signal transmitted from the tag is recovered by an antenna within the reader, and converted back into an electrical form. The reader contains a sensitive receiving system that is designed to detect and process the weak tag signal, demodulating the original data stored in the tag memory.
- As opposed to passive tags, active tags contain a miniature battery that provides the operating power for the IC. When interrogated by the reader, the IC broadcasts a signal that identifies itself to sensitive reader detection and data transmission circuits. This allows the tag to begin sending its data at a considerably greater distance from the reader than its passive counterpart. Additionally, an active tag uses battery energy to produce a much stronger electromagnetic response signal. All of this results in a significantly greater read range than a passive tag.
- Many present and upcoming applications require the ability to automatically identify objects from a distance. RFID provides this requirement to some degree and has the benefit that line-of-sight between the reader and tag is not required. This is distinct from optical recognition techniques, such as barcode, that require the optical reader to be in line of sight from the identified object. Most optical reading techniques also require a directional decoding of the identifying code, giving rise to start and stop bits being part of the code. In a conventional, linear bar code, the order in which the bars appear is critical and changing the order results in a different code. The same is applicable also to WID tags, where typically reflectors in the tag are used to modulate the RF signal, such that the presence or absence of reflectors affects the resulting code that is returned by the tag.
- U.S. Pat. No. 5,381,137 (“RFtagging system and RF tags and method”, assigned to Motorola, Inc., Schaumburg, Ill., published on 1995) discloses an RF tagging system that has a plurality of resonant circuits on a tag. When the tag enters a detection zone, the system determines the resonant frequency of each of the resonant circuits and produces a corresponding code. Resonant frequency detection is implemented by simultaneously radiating signals at each of the possible resonant frequencies for the tag circuits. The system is useful for coding any articles such as baggage or production inventory.
- The reader in U.S. Pat. No. 5,381,137 comprises an antenna array having a plurality of fixed location multiple transmitter frequency probes. Tags comprise a plurality of passive resonant circuits, each of which may resonate at any different frequency selected from a predetermined plurality of known resonant frequencies. Each of the resonant circuits is fixed at a different location on a planar surface of the tag. The jag is positioned between guide rails so as to fix its position with respect to the plurality of fixed location probes. Either the tag is moved such that various rows of tuned circuits pass directly under the probes, or the probes are otherwise positioned directly above and in registration with the tuned circuits. By such means, each of the probes simultaneously radiates each of the possible resonant frequency signals that may correspond to the resonant frequency of any of the circuits.
- Such a system is shown schematically in
FIG. 1 , showing atag 10 that is encoded with multiple frequency sources to generate a code that is identified by areader 11. Thus, as shown, thetag 10 comprises only three different frequency sources, depicted respectively f1 f2 f3. It is seen that each of these frequency sources may be used more than once, its presence in, or absence from, the tag being depicted by “Y” and “N”, respectively. This does not cause any ambiguity since the frequency sources are spatially separated and thereader 11 is adapted to read each frequency source (which may be ambiguous) in association with its location (which is always unique). Thus, when a frequency source transmits a signal to thereader 11, this indicates that the frequency source is present at a known location, and the corresponding location in the resulting code construed by the reader may be set to logic “1” (or to logic “0” if negative logic is used). Since the location of each frequency source must be unique, the resulting code is likewise unique even if one or more of the transmitted frequencies is identical. - It is also known to use magnetic resonance (MR) for identification. Such is the case, for example, in the field of Magnetic Resonance Imaging (MRI) or Nuclear Magnetic Resonance spectroscopy (NMR spectroscopy). Furthermore, it is possible to identify multiple resonant frequencies detected in parallel. For example, according to U.S. Pat. No. 5,341,099 (“Magnetic resonance imaging apparatus”, assigned to Kabushiki Kaisha Toshiba, published on 1994) data is produced from asymmetrical echo data, and an MR image is reconstructed from the data thus produced.
- Non-resonant frequencies, such as acoustical signals, are also used in the art for encoding data. For example, U.S. Pat. No. 6,611,798 (“Perceptually improved encoding of acoustic signals”, assigned to Telefonaktiebolaget LM Ericsson, published 2003) discloses encoding an acoustic source signal such that a signal reconstructed from the encoded information has a perceptually high sound quality. The acoustic source signal is encoded into at least one basic coded signal that represents perceptually significant characteristics of the acoustic signal. The encoder can include at least one spectral smoothing unit that receives at least one of the signal components on which the basic coded signal is based and generates in response thereto a corresponding smoothed signal component.
- It is an object of the invention to provide an alternative encoding method and system in which no predetermined spatial relationship between reader and tag is required.
- This object is realized in accordance with a broad aspect of the invention by a method for encoding a tag with an n-bit binary code (n→1), the method comprising:
- a. associating with the tag one or more predetermined frequency sources that produce known different respective characteristic frequencies; and
- b. associating with each of said characteristic frequencies a known unique position in the n-bit binary code.
- In order to understand the invention and to see how it may be carried out in practice, a preferred embodiment will now be described, by way of non-limiting example only, with reference to the accompanying drawings, in which:
-
FIG. 1 shows schematically a prior art tag that is encoded with multiple frequency sources that are spatially constrained to generate a unique code; -
FIG. 2 shows schematically a tag according to the invention that is encoded with multiple frequency sources that are spatially unconstrained to generate a unique code; -
FIG. 3 is a schematic representation of a tag-reader combination configured to encode a 3-bit code; -
FIG. 4 is a flow chart showing the principal operations carried out by an encoder according to the invention; -
FIG. 5 is a flow chart showing the principal operations carried out by a decoder according to the invention; -
FIG. 6 is a flow chart showing the principal operations carried out by a stock management system according to the invention; -
FIG. 7 is a flow chart showing the principal operations carried out by a lo surgical instrument tracking system according to the invention; -
FIG. 8 is a flow chart showing the principal operations carried out by a authorization system according to the invention; -
FIG. 9 is a block diagram showing functionally an encoder according to the invention; and -
FIG. 10 is a block diagram showing functionally a decoder according to the invention. - Referring to
FIG. 2 there is shown atag 20 according to the invention that is encoded with multiple frequency sources to generate an m-bit code that is identified by areader 21. By way of example only, the following description will relate to a 9-bit code, although the principles of the invention can readily be applied for any integer value of n greater than one. - Thus, for a 9-bit code the
reader 21 pre-assigns 9 different frequencies designated f1, f2 . . . f9 to a unique respective position in the 9-bit code. Thus, the first frequency source f1 is assigned to the least significant bit (LSB), while the frequency source f9 is assigned to the most significant bit (MSB), each of the other seven bits of the 9-bit code being assigned to corresponding frequencies f1 to f8. Thetag 20 is encoded by providing only those frequency sources that are reflected in the desired code. Thus, to encode 110101101 only the frequency sources f1, f2, f4, f6, f8, and f9 are required (assuming positive logic is used). It will be appreciated that negative logic could be employed instead, whereby the absence of a frequency gives rise to logic “1” at the corresponding location of the code. - In either case, the frequency sources f1, f2, f4, f6, f8, and f9 are spatially unconstrained. That is to say, neither the order in which they appear in the tag nor their relative spatial location is significant. Indeed, all the frequency sources could be spatially superimposed one on top of the other, so long as the reader is able to discern the presence of all those frequency sources that are present. It is thus seen that, unlike the prior art system depicted in
FIG. 1 , in the invention a unique code is obtained merely by encoding the tag with a plurality of predefined frequency sources that produce known different respective characteristic frequencies, each of which is associated with a known unique position in the n-bit binary code. - Frequency sources may be used more than once, although multiple instances of the same frequency source have no significance since the same characteristic frequency is detected by the reader and affects only a single bit of the n-bit code.
- It should be noted that the frequency sources composing a tag are not necessarily dispersed within a volume. Very small frequency sources can be, for example, mixed in ink and printed on the identified object, such as printing on paper. According to a different example, by mixing the frequency sources with pigments used to color fabrics it is possible to print a hidden tag on fabric (if the pigment used has the same color as the fabric). It should be noted that any number of frequency sources may be printed in this manner.
- Likewise, a dispersion or colloid can be formed of different frequency sources, such as ferromagnetic elements and the resulting dispersion or colloid then serves as a tag that encodes a unique code depending on which frequency sources are present.
- It should also be noted that the characteristic frequencies of the frequency sources need not be resonant or even particularly sharp. Thus, each frequency may be realized by a frequency band provided that the range of frequencies within each band can be distinguished from those of an adjacent frequency band even if not from each other, thus allowing each frequency band to be unambiguously detected. In this case, a series of band-pass filters may be used so as to pass all frequencies in a given band, while blocking all other frequencies, thereby allowing each frequency band to be unambiguously detected.
-
FIG. 3 is a schematic representation of atag 30 and areader 31 that are combined to encode and decode a 3-bit code that is characterized by the presence or absence of three different frequency sources denoted f1 f2 and f3, which encode respectively the LSB, the second bit and the MSB. Thereader 31 detects characteristic frequencies emitted by thetag 30 and compiles a 3-bit code according to the following logic. - If all three frequency sources are absent from the tag, the combination generated is 000;
-
- If f1 exists, and the other two frequency sources are absent, the combination generated is 001;
- If f2 exists, and the other two frequency sources are absent, the combination generated is 010;
- If f1 and f2 exist, while is f3 absent, the combination generated is 011;
- If f3 exists, and the other two frequency sources are absent, the combination generated is 100;
- If f1 and f3 exist, while f2 is absent, the combination generated is 101;
- If f2 and f3 exist, while f1 is absent, the combination generated is 110;
- When all three frequency sources exist in the tag, the combination generated is 111.
- From the foregoing, it will be appreciated that the received frequencies serve to identify the tag with which it is associated. The corollary is also true in that on decoding an n-bit binary string corresponding to a tag, it is possible to infer if a certain frequency source is associated with the tag or not. Thus, if in n-bit binary string according to the example the third bit from the left is 1, this means that the string encodes a tag with which the frequency source f3 is associated.
- When it is desired to increase the number of possible codes that can be encoded with the tag, one or more new bits must be allocated and this implies providing one or more new frequency sources each having a respective unique characteristic resonant frequency and assigning each of the new f1-frequency sources to known unique positions in the binary string. For example, to expand the 3-bit code described above with reference to
FIG. 3 of the drawings to a 4-bit code, the MSB of the 4-bit code is associated with an additional, fourth frequency source f4. - In general, to introduce a frequency source f3 there should be allocated a bit representing fn's existence or absence to a known unique position in the n-bit code.
-
FIG. 4 is a flow chart showing the principal operations carried out by an encoder according to the invention. Each bit is encoded successively starting with the LSB corresponding to M=1. If the corresponding bit is to be set to 1, then the frequency source corresponding to this bit is deposited on the tag. The value of M is then incremented and the process repeated in respect of successive bits in the n-bit code. -
FIG. 5 is a flow chart showing the principal operations carried out by a decoder according to the invention. Each bit is decoded successively starting with the LSB corresponding to M=1. If the frequency corresponding to each bit is detected, then the corresponding bit is set to 1. The value of M is then incremented and the process repeated in respect of successive bits in the n-bit code. It should be noted that any number of frequency sources may be decoded in this manner. - It should be noted that the flow charts illustrated in
FIGS. 4 and 5 represent non-limiting exemplary ways of encoding and decoding an n-bit code and variations will be apparent to those of average skill in the art. It will also be appreciated that the manner in which the decoder detects the frequency sources deposited on the tag does not affect the manner in which the n-bit code is decoded. Thus, the decoder can be configured to selectively receive each characteristic frequency sequentially and to assign a corresponding value to the bit associated therewith. Alternatively, it may be configured to receive all the characteristic frequencies in parallel as a complex signal and to perform frequency separation on the complex signal received from the reader. In this case, the separated frequencies emitted by the tag are recorded so as to compile a list of all unique characteristic frequencies associated with the tag. Subsequent decoding may then continue as for sequential decoding. An example of an applicable frequency separation technique is described in above-mentioned U.S. Pat. No. 5,341,099. - It should further be noted that in the embodiments described so far, frequency sources (f1 f2 . . . fn) are associated with the tag to compose the n-bit binary tag, and the reader 204 detects the corresponding characteristic resonant frequencies generated by the frequency sources. The frequency sources used can be active frequency sources. An active frequency source can be, for example, a resonant circuit such as the circuit used in WID, activated by a battery for example. However, passive frequency sources may also be used.
- An example of a passive frequency source is a resonant circuit activated by energy transmitted to it by the reader. Such resonant circuits are well known in smart card technology and are described, for example, in U.S. Pat. No. 5,241,160 issued Aug. 31, 1993 entitled “A System and Method for the Non-Contact Transmission of Data” and assigned to On Track Innovations Ltd. Another approach is to use resonant elements, in a way known to those versed in fields like Nuclear Magnetic Resonance (NMR) spectroscopy or Magnetic Resonance Imaging (MRI).
- Resonant elements such as ferromagnetic elements have characteristic resonant frequencies, induced by exposing the resonant element to a predetermined excitation frequency. Therefore, a resonant element can be used as a passive frequency source in tags according to the invention. It should be noted that resonant elements can be of any physical state, such as liquid, gas or solid.
- Those versed in the art will appreciate that the term “characteristic frequencies” as used above can apply to any frequency range within the electromagnetic spectrum, so long as they are capable of being uniquely detected by the reader. For example, acoustic signals can be used too, or even a combination of different ranges. A tag conveying characteristic frequencies of any range can be encoded according to the invention by n-bit binary codes, as long as the characteristic frequencies are unique (forming, therefore, unique characteristic frequencies), are associated with known unique positions in the n-bit binary code and can be uniquely detected.
- Tags that can be encoded by n-bit binary codes according to the described embodiments can be utilized in many applications such as for automatic identification of objects. For example, in a clothing store it is possible to mark each product with a tag including a unique combination of frequency sources, identifying the products thereby. If there are two identical shirts in the store, for example, each
- of them can receive a unique tag. Because the encoding method enables 2n different n-bit binary codes, this means that with 30 different frequency sources, for example, it is possible to have more than ten million different tags, which is enough to uniquely tag every product in an average store. Larger numbers of frequency sources enable even much higher number of identifying tags, of course.
-
FIG. 6 is a flow chart showing the principal operations carried out by a decoder according to such an embodiment when used in an anti-shoplifting system, for alerting suspected theft, where products are uniquely encoded using tags. If the tags include passive frequency sources, the anti-shoplifting system should include a transmitter that induces the predetermined excitation frequencies, and a reader 204, that detects the characteristic resonant frequencies emitted by the tags. When the tags are placed in the zone susceptible to the transmitter, they convey the resonant frequency, which is then detected by the reader. The reader (or a processor coupled thereto) then decodes the tag so as to generate a corresponding n-bit binary code. - Alternatively, the tags can include active frequency sources that do not require a transmitter in order to convey their characteristic resonant frequencies.
- Each product in the store carries a unique tag bearing a respective n-bit binary code whereby it is possible to identify the product type, and even the unique item. Therefore, purchasing a certain item, it is possible to decode the item's tag, generating its n-bit binary code. The n-bit binary code can be added to a list of items authorized to leave the premises of the store.
- In all exits of the premises frequency readers are positioned in a way that the exit forms at least part of the zone of the reader. That way the readers can decode tags passing in their zone. If the decoding n-bit binary string cannot be located in the list of items authorized to leave the premises, this is considered as a suspected theft.
- It should be noted that this example is non-limiting, and other embodiments will be readily apparent to those versed in the art. For example, instead of having a list of items that are authorized to leave the premises, it is possible to compile a list of all the items in the premises, removing the item from the list when authorizing to take it out (i.e., on receiving payment at the checkout). On exiting the premises the contents of the user's shopping basket are decoded, and if a code obtained therefrom corresponds to an article in the list of items, this raises a suspicion that the article is unauthorized to leave the place. Yet another approach is to shield a valid tag so that its resonating frequencies cannot be detected by the readers at the exit.
- In connection with the example above, it will be appreciated that associating such tags with items in a store or a library, for example, allows use of the tags for automatic checkout, or for stock management.
-
FIG. 7 is a flow chart showing the principal operations carried out by a decoder according to another embodiment for keeping track of surgical instruments during medical procedures for improving safety in an operating theater. It is a known problem that in operating theaters surgical instruments and materials, such as gauze pads, forceps or scalpels, are sometimes left in the patient's body, causing considerable damage to the patient. One way to overcome the risk is having a staff person count the instruments before the doctor begins sewing, making sure everything is accounted for. This procedure is liable to error and can be automated by uniquely marking each item with a tag according to the invention. On moving a surgical instrument to within a working area of the operating theatre the n-bit binary code of every surgical instrument can be decoded and listed in a running list of all the surgical instruments that are in the working area. When leaving the working area, surgical instruments' n-bit binary codes are removed from the running list. Upon termination of the surgical procedure the list is checked, ensuring that all surgical instruments are accounted for. - Items can also be pre-encoded. For example, it is possible to print a tag according to the invention on each gauze pad. It is known that frequently several gauze pads are packed together in one pack. When packing the gauze pads it is possible to manage a list of n-bit binary codes associated with the packed gauze pads. The list itself can be identified by a unique n-bit binary code encoding a tag that can be printed, for example, on the package.
- When a package marked with a tag is moved into the working area, its code is detected, inserting all the codes of the included gauze pads into the running list of all surgical instruments that are in the working area. At the same time it is possible to install a frequency reader near a trash bin, in a way that the trash bin is in the zone of the reader. Whenever a gauze pad is disposed of in the trash bin, its n-bit binary code is removed from the running list.
-
FIG. 8 is a flow chart showing the principal operations carried out by a decoder according to yet another embodiment for conditionally enabling and disabling electrical appliances. In vehicles, for example, immobilizers are commonly used to disable ignition without a predefined key. Tags according to the invention can be used as such predefined keys. A reader in the vehicle is programmed to recognize one or more n-bit binary codes. An authorized driver should carry a corresponding tag associated with one or more predetermined frequency sources that produce known different respective characteristic frequencies and each of which is associated with a known unique position in an n-bit binary code. When the tag is brought to the vicinity of the decoder, it is decoded to provide the corresponding n-bit binary code. The immobilizer then determines whether the detected n-bit binary code corresponds to any of the recognized n-bit binary codes, and if so, allows ignition of the vehicle's engine, which otherwise remains immobilized. - Furthermore, in a company having a fleet of vehicles, for example, the IDs of all employees who are authorized to drive the company's vehicles can be used as n-bit binary codes programmed into the readers of all the company's vehicles, thus ensuring that only authorized employees can drive them. It is also possible to compile a list monitoring parameters associated with employee use of the company's vehicle. For example, such a list enables management to track the identity of each employee driving a vehicle, the date when the vehicle was used, the distance driven, and so on.
-
FIG. 9 is a block diagram showing functionally an encoder for encoding atag 40 with an n-bit binary code stored in acode repository 41. Afrequency source unit 42 is coupled to thecode repository 41 and is responsive to an n-bit binary code stored therein for depositing in association with thetag 40 one or more predetermined frequency sources that produce known different respective characteristic frequencies and that are associated with a known unique position in the n-bit binary code. -
FIG. 10 is a block diagram showing functionally adecoder 50 for decoding atag 51 having an n-bit binary code. The decoder comprises adetector 52 for detecting one or more different characteristic frequencies each of which is associated with a known unique position in the n-bit binary code. Coupled to thedetector 52 is adecoding unit 53 that substitutes at respective positions of the n-bit binary string respective binary values according to a presence or absence of the respective characteristic frequency associated with the respective position in the n-bit binary code.
Claims (6)
1. A method for decoding an n-bit binary code encoded by a tag having associated therewith one or more predetermined frequency sources each adapted to emit a respective characteristic frequency associated with a known unique position in the n-bit binary code, the method comprising:
(a) detecting characteristic frequencies emitted by the tag; and
(b) substituting at respective positions of said n-bit binary string respective binary values according to a presence or absence of the respective characteristic frequency associated with the respective position in the n-bit binary code.
2. The method of claim 1 , wherein at least some of the characteristic frequencies are resonant frequencies.
3. The method of claim 1 , wherein at least some of the characteristic frequencies constitute acoustic signals.
4. The method of claim 1 , including detecting at least some of the characteristic frequencies in parallel.
5. The method of claim 1 , including detecting at least some of the characteristic frequencies sequentially.
6. A decoder for decoding a tag having an n-bit binary code, said decoder comprising:
a decoding unit responsive to one or more different characteristic frequencies each of which is associated with a known unique position in the n-bit binary code and for substituting at respective positions of said n-bit binary code respective binary values according to a presence or absence of the respective characteristic frequency associated with the respective position in the n-bit binary code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/420,984 US20060220853A1 (en) | 2003-09-22 | 2006-05-30 | Encoding and decoding method and system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/665,214 US7075434B2 (en) | 2003-09-22 | 2003-09-22 | Encoding and decoding method and system |
US11/420,984 US20060220853A1 (en) | 2003-09-22 | 2006-05-30 | Encoding and decoding method and system |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/665,214 Continuation US7075434B2 (en) | 2003-09-22 | 2003-09-22 | Encoding and decoding method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060220853A1 true US20060220853A1 (en) | 2006-10-05 |
Family
ID=34375835
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/665,214 Expired - Fee Related US7075434B2 (en) | 2003-09-22 | 2003-09-22 | Encoding and decoding method and system |
US11/420,984 Abandoned US20060220853A1 (en) | 2003-09-22 | 2006-05-30 | Encoding and decoding method and system |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/665,214 Expired - Fee Related US7075434B2 (en) | 2003-09-22 | 2003-09-22 | Encoding and decoding method and system |
Country Status (3)
Country | Link |
---|---|
US (2) | US7075434B2 (en) |
JP (1) | JP2007506204A (en) |
WO (1) | WO2005029401A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090160654A1 (en) * | 2007-12-19 | 2009-06-25 | Abbott Laboratories | Articles containing chipless radio frequency identification elements |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4077442B2 (en) * | 2004-11-09 | 2008-04-16 | 東芝テック株式会社 | Wireless tag holding structure |
US7482925B2 (en) * | 2005-06-24 | 2009-01-27 | Visa U.S.A. | Apparatus and method to electromagnetically shield portable consumer devices |
US9498647B2 (en) * | 2005-09-23 | 2016-11-22 | Allen B. Kantrowitz | Fiducial marker system for subject movement compensation during medical treatment |
US7791478B2 (en) * | 2005-12-01 | 2010-09-07 | Intel Corporation | Dual bit encoding / decoding of RFID signal |
US8313028B2 (en) | 2010-02-17 | 2012-11-20 | On Track Innovations Ltd. | Multiple antenna reading system suitable for use with contactless transaction devices |
US8195236B2 (en) | 2010-06-16 | 2012-06-05 | On Track Innovations Ltd. | Retrofit contactless smart SIM functionality in mobile communicators |
US8424757B2 (en) | 2010-12-06 | 2013-04-23 | On Track Innovations Ltd. | Contactless smart SIM functionality retrofit for mobile communication device |
US10769562B2 (en) * | 2016-03-16 | 2020-09-08 | Triax Technologies, Inc. | Sensor based system and method for authorizing operation of worksite equipment using a locally stored access control list |
US20170270462A1 (en) | 2016-03-16 | 2017-09-21 | Triax Technologies, Inc. | System and interfaces for managing workplace events |
US11170616B2 (en) | 2016-03-16 | 2021-11-09 | Triax Technologies, Inc. | System and interfaces for managing workplace events |
US11810032B2 (en) | 2016-03-16 | 2023-11-07 | Triax Technologies, Inc. | Systems and methods for low-energy wireless applications using networked wearable sensors |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5218189A (en) * | 1991-09-09 | 1993-06-08 | Checkpoint Systems, Inc. | Binary encoded multiple frequency rf indentification tag |
US5241160A (en) * | 1990-12-28 | 1993-08-31 | On Track Innovations Ltd. | System and method for the non-contact transmission of data |
US5341099A (en) * | 1992-03-31 | 1994-08-23 | Kabushiki Kaisha Toshiba | Magnetic resonance imaging apparatus |
US5381137A (en) * | 1992-10-26 | 1995-01-10 | Motorola, Inc. | RF tagging system and RF tags and method |
US5444223A (en) * | 1994-01-11 | 1995-08-22 | Blama; Michael J. | Radio frequency identification tag and method |
US6611798B2 (en) * | 2000-10-20 | 2003-08-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Perceptually improved encoding of acoustic signals |
US6669094B2 (en) * | 2002-02-04 | 2003-12-30 | Jan N. Hodges | Method of embedding and recovering encoded item identification information in an emulsion by means of radiant energy |
US6714120B2 (en) * | 1997-01-02 | 2004-03-30 | C. W. Over Solutions, Inc. | Inductor-capacitor resonant circuits and improved methods of using same |
US6775323B1 (en) * | 2000-02-25 | 2004-08-10 | National University Of Singapore | Data coding system |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4968626A (en) * | 1985-08-15 | 1990-11-06 | Board Of Reagents Of The University Of Washington | DNA sequence coding for protein C |
DE10052689A1 (en) | 2000-10-24 | 2002-05-02 | Metronom Indvermessung Gmbh | Coding component for use in logic system associated with e.g. traffic or goods, comprises resonant circuits signaling when excited at resonant frequency |
-
2003
- 2003-09-22 US US10/665,214 patent/US7075434B2/en not_active Expired - Fee Related
-
2004
- 2004-09-22 JP JP2006527570A patent/JP2007506204A/en active Pending
- 2004-09-22 WO PCT/IL2004/000879 patent/WO2005029401A1/en active Application Filing
-
2006
- 2006-05-30 US US11/420,984 patent/US20060220853A1/en not_active Abandoned
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5241160A (en) * | 1990-12-28 | 1993-08-31 | On Track Innovations Ltd. | System and method for the non-contact transmission of data |
US5218189A (en) * | 1991-09-09 | 1993-06-08 | Checkpoint Systems, Inc. | Binary encoded multiple frequency rf indentification tag |
US5341099A (en) * | 1992-03-31 | 1994-08-23 | Kabushiki Kaisha Toshiba | Magnetic resonance imaging apparatus |
US5381137A (en) * | 1992-10-26 | 1995-01-10 | Motorola, Inc. | RF tagging system and RF tags and method |
US5444223A (en) * | 1994-01-11 | 1995-08-22 | Blama; Michael J. | Radio frequency identification tag and method |
USRE37956E1 (en) * | 1994-01-11 | 2003-01-07 | C. W. Over Solutions, Inc. | Radio frequency identification tag and method |
US6714120B2 (en) * | 1997-01-02 | 2004-03-30 | C. W. Over Solutions, Inc. | Inductor-capacitor resonant circuits and improved methods of using same |
US6775323B1 (en) * | 2000-02-25 | 2004-08-10 | National University Of Singapore | Data coding system |
US6611798B2 (en) * | 2000-10-20 | 2003-08-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Perceptually improved encoding of acoustic signals |
US6669094B2 (en) * | 2002-02-04 | 2003-12-30 | Jan N. Hodges | Method of embedding and recovering encoded item identification information in an emulsion by means of radiant energy |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090160654A1 (en) * | 2007-12-19 | 2009-06-25 | Abbott Laboratories | Articles containing chipless radio frequency identification elements |
US8120485B2 (en) | 2007-12-19 | 2012-02-21 | Abbott Laboratories | Articles containing chipless radio frequency identification elements |
US8643491B2 (en) | 2007-12-19 | 2014-02-04 | Abbott Laboratories | Articles containing chipless radio frequency identification elements |
Also Published As
Publication number | Publication date |
---|---|
WO2005029401A1 (en) | 2005-03-31 |
JP2007506204A (en) | 2007-03-15 |
US20050073415A1 (en) | 2005-04-07 |
US7075434B2 (en) | 2006-07-11 |
WO2005029401B1 (en) | 2005-05-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20060220853A1 (en) | Encoding and decoding method and system | |
US7900837B2 (en) | Optical fiber paper reader | |
FI110036B (en) | Device for integrated data collection and electronic monitoring of articles | |
US6393045B1 (en) | Spread spectrum baseband modulation of magnetic fields for communications and proximity sensing | |
US9390602B2 (en) | Systems and methods for verification of security tag detachment | |
Glover et al. | RFID essentials | |
CA2126874C (en) | Improved transponder for proximity identification system | |
US5099226A (en) | Intelligent security system | |
US6471878B1 (en) | Method for forming a radio frequency responsive target and apparatus for verifying the authenticity of same | |
KR100649284B1 (en) | Identification tag | |
WO2005052846A2 (en) | Jammer for jamming the readout of contactless data carriers | |
US7175093B2 (en) | Range extension for RFID hand-held mobile computers | |
US20010024157A1 (en) | Easy check-out with enhanced security | |
JPH07500704A (en) | Binary coded multi-frequency high frequency identification tag | |
US7014103B2 (en) | Differential radio frequency identification reader | |
KR20130108346A (en) | An integrated unit for reading identification information based on inherent disorder | |
EP2634731A2 (en) | Re-printable RFID hard tags | |
CN108174613B (en) | Photoluminescence verification device, system and method | |
US20060091220A1 (en) | Material containing coding information method of identification thereof and identification system therefor | |
GB2268369A (en) | Security tag and automated goods handling | |
GB2322049A (en) | Magnetic Tags | |
EP1451769B1 (en) | Wireless data carrier for transmitting different stored status information with different transmission parameters | |
JP2000335712A (en) | Book management device, book management method, and recording medium with record of control program of book management device | |
CA2499869C (en) | Method for forming a radio frequency responsive target and apparatus for verifying the authenticity of same | |
EP1145049B1 (en) | Object and document control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |