US20080197980A1 - Methods and devices for providing scalable RFID networks - Google Patents
Methods and devices for providing scalable RFID networks Download PDFInfo
- Publication number
- US20080197980A1 US20080197980A1 US12/082,635 US8263508A US2008197980A1 US 20080197980 A1 US20080197980 A1 US 20080197980A1 US 8263508 A US8263508 A US 8263508A US 2008197980 A1 US2008197980 A1 US 2008197980A1
- Authority
- US
- United States
- Prior art keywords
- devices
- rfid
- network
- middleware server
- middleware
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0806—Configuration setting for initial configuration or provisioning, e.g. plug-and-play
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/084—Configuration by using pre-existing information, e.g. using templates or copying from other elements
- H04L41/0843—Configuration by using pre-existing information, e.g. using templates or copying from other elements based on generic templates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4505—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
- H04L61/4511—Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5007—Internet protocol [IP] addresses
- H04L61/5014—Internet protocol [IP] addresses using dynamic host configuration protocol [DHCP] or bootstrap protocol [BOOTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/08—Load balancing or load distribution
- H04W28/088—Load balancing or load distribution among core entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/604—Address structures or formats
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/618—Details of network addresses
- H04L2101/663—Transport layer addresses, e.g. aspects of transmission control protocol [TCP] or user datagram protocol [UDP] ports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0876—Aspects of the degree of configuration automation
- H04L41/0883—Semiautomatic configuration, e.g. proposals from system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/1021—Server selection for load balancing based on client or server locations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
Definitions
- the present invention relates to radio frequency identification (“RFID”) technology. More particularly, the present invention relates to networks that include RFID devices.
- RFID radio frequency identification
- an RFID tag 100 includes microprocessor 105 and antenna 110 .
- RFID tag 100 is powered by a magnetic field 145 generated by an RFID reader 125 .
- the tag's antenna 110 picks up the magnetic signal 145 .
- RFID tag 100 modulates the signal 145 according to information coded in the tag and transmits the modulated signal 155 to the RFID reader 125 .
- RFID tags use the Electronic Product Code (“EPC” or “ePC”) format for encoding information.
- An EPC code includes a variable number of bits of information (common formats are 64, 96 and 128 bits), which allows for identification of individual products as well as associated information.
- EPC 120 includes header 130 , EPC Manager field 140 , Object class field 150 and serial number field 160 .
- EPC Manager field 140 contains manufacturer information.
- Object class field 150 includes a product's stock-keeping unit (“SKU”) number.
- Serial number field 160 is normally a 40-bit field that can uniquely identify the specific instance of an individual product i.e., not just a make or model, but also down to a specific “serial number” of a make and model.
- RFID tags and associated RFID devices could form part of a network for tracking a product (or a group of products) and its history.
- various difficulties have prevented this theory from being realized.
- One problem that has required considerable time and energy from RF engineers is the development of lower-cost RFID tags with acceptable performance levels.
- Inductively-coupled RFID tags have acceptable performance levels. These tags include a microprocessor, a metal coil and glass or polymer encapsulating material. Unfortunately, the materials used in inductively-coupled RFID tags make them too expensive for widespread use: a passive button tag costs approximately $1 and a battery-powered read/write tag may cost $100 or more.
- Capacitively-coupled RFID tags use conductive ink instead of the metal coil used in inductive RFID tags.
- the ink is printed on a paper label by an RFID printer, creating a lower-cost, disposable RFID tag.
- conventional capacitively-coupled RFID tags have a very limited range. In recent years, RF engineers have been striving to extend the range of capacitively-coupled RFID tags beyond approximately one centimeter.
- a typical RFID device may have approximately 0.5 Mb of flash memory and a total of 1 Mb of overall memory.
- the small memories of RFID devices place restrictions on the range of possible solutions to the problems noted herein.
- an RFID device typically uses a proprietary operating system, e.g., of the manufacturer of the microprocessor(s) used in the RFID device.
- RFID devices are being deployed with “static” knowledge of where the device was deployed at original time of deployment.
- RFID devices are statically configured to a single RFID middleware server (formerly known as a “Savant”).
- Current implementations require each RFID middleware server to contact RFID devices that have been manually associated with that server.
- RFID middleware server redundancy does not provide for RFID middleware server redundancy.
- RFID devices and middleware servers are automatically provisioned with network addresses and with instructions for sending a request for a middleware server to a middleware server assigner.
- the middleware server assigner is a load balancer.
- a plurality of RFID devices at or near a given location may be dynamically “virtualized” or aggregated.
- Such a dynamic virtualization may be implemented, for example, by including location data in, or associating location data with, a network address of each RFID device and assigning the same location data to each of the virtualized devices.
- the location data are included in a domain name of each RFID device and stored in a DNS table.
- a middleware server is associated with a plurality of RFID devices by associating a middleware server network address with the network addresses of the RFID devices.
- the process of associating a middleware server with RFID devices may involve updating a DNS table entry of an RFID device to add a TXT field indicating the middleware server to which each RFID device is assigned.
- the TXT field may indicate a middleware server name, fully qualified domain name and perhaps site data.
- Preferred methods also provide for redundancy of middleware servers and dynamic re-assignment of RFID devices from an unavailable middleware server to an available middleware server.
- a DNS entry may be created for the site.
- the DNS entry for the site allows application software to use DNS resolution to determine the device(s) from which to obtain the required data (e.g., a middleware server associated with the RFID devices).
- Some implementations of the invention provide a method of dynamically managing a network.
- the method includes the following steps: provisioning each of a plurality of radio frequency identification (“RFID”) devices in the network; associating each RFID device with one of a plurality of locations; transmitting a middleware server request from provisioned RFID devices; assigning one of a plurality of middleware servers to each of the requesting RFID devices; and associating each of the requesting RFID devices with an assigned middleware server.
- RFID radio frequency identification
- the middleware server request may be transmitted to a load balancer.
- the provisioning step can involve assigning an RFID device network address and a load balancer network address. If so, the method may also include these steps: receiving a request from an application program regarding RFID devices associated with a location; and providing RFID device network addresses for RFID devices associated with the location.
- the step of associating each RFID device with one of a plurality of locations may involve forming domain name server (“DNS”) entries that include location information for the RFID devices.
- DNS domain name server
- the location information can include site information, information identifying a portion of a site and/or site access area information.
- the provisioning step may include these steps: receiving a provisioning request; automatically identifying an RFID device according to a media access control (“MAC”) address and an electronic product code (“EPC”) included in the provisioning request; automatically locating the RFID device according to location information included in the provisioning request; and automatically providing the RFID device with a desired functionality according to an identity and a location of the RFID device.
- MAC media access control
- EPC electronic product code
- the provisioning step can also include these steps: forming a DHCPDISCOVER request that includes an EPC of an RFID device and location information indicating a location of the RFID device; sending the DHCPDISCOVER request to a Dynamic Host Configuration Protocol (“DHCP”) server; and receiving provisioning information from the DHCP server that is specifically intended for the RFID device.
- the provisioning information can enable a desired functionality according to an identity and a location of the RFID device.
- the step of associating the RFID device network address of each of the requesting RFID devices with an address of an assigned middleware server can involve forming DNS TXT entries that indicate middleware server information, each of the TXT entries being associated with a DNS entry for an RFID device.
- the method may include the step of providing RFID data to the application program from RFID devices associated with the location.
- the RFID data can include RFID tag data.
- the RFID tag data can include product information and/or information about a person.
- the method may include the step of using the RFID tag data to automatically update a database, to cause a financial account to be debited and/or to update a business plan.
- the business plan may be, for example, a marketing plan, a manufacturing plan, a distribution plan or a sales plan.
- the network includes the following elements: a plurality of RFID devices in various locations of a site; a plurality of middleware servers associated with the site; and an assigner, wherein the RFID devices are provisioned with an RFID device network address, an assigner network address and instructions to send a request to the assigner for a middleware server, and wherein the assigner is configured to assign an RFID device to a middleware server in response to the request.
- the assigner may be a type of a load balancer.
- the network may include a DNS server configured to maintain RFID device network addresses and corresponding location and site information for the RFID devices.
- the DNS server may be configured to maintain middleware server network addresses and corresponding site information for the middleware servers.
- a middleware server may update RFID device information in the DNS server to indicate assigned middleware servers.
- the network may also include an application server configured to create an entry in the DNS server corresponding to all registered devices of a site.
- the application server may be further configured to request network addresses for all RFID devices associated with a location and/or to send requests to a middleware server. If so, the middleware server can retrieve RFID device location information and provide the RFID device location information to the application server in response to the application server's request.
- Alternative implementations of the invention provide a method of dynamically managing a network.
- the method includes the following steps: provisioning each of a plurality of RFID devices in the network, wherein the provisioning step comprises providing an RFID device with a designated load balancer; associating each RFID device network address with one of a plurality of locations; causing RFID devices to send a first middleware server request to a designated load balancer; assigning a first middleware server of a plurality of available middleware servers to a first plurality of the requesting RFID devices; associating the RFID device of each of the first plurality of RFID devices with the first middleware server; receiving an indication that the first middleware server is no longer an available middleware server; causing each of the first plurality of RFID devices to send a second middleware server request to the load balancer; assigning a second middleware server of a plurality of available middleware servers to N RFID devices of the first plurality of RFID devices; and associating each of the N RFID devices with the second middleware server.
- the indication may be, for example, a loss of communication with the first middleware server or information from a network administrator.
- the associating steps may include forming DNS TXT entries that indicate middleware server information, each of the TXT entries being associated with a DNS entry for an RFID device.
- Some embodiments of the invention provide a computer program for dynamically managing a network.
- the computer program may be embodied in a machine-readable medium and contains instructions for controlling devices in the network to perform the following steps: provisioning each of a plurality of RFID devices in the network; associating each RFID device with one of a plurality of locations; transmitting a middleware server request from provisioned RFID devices; assigning one of a plurality of middleware servers to each of the requesting RFID devices; and associating each of the requesting RFID devices with an assigned middleware server.
- FIG. 1 is a diagram illustrating an RFID tag.
- FIG. 2 is a block diagram illustrating a simplified portion of an RFID network of the present invention.
- FIG. 3A is a flow chart that provides an overview of a method of the present invention.
- FIGS. 3B-3E illustrate a DNS table at various stages of the method illustrated in FIG. 3A .
- FIG. 4 is a flow chart that provides an overview of another method of the present invention.
- FIG. 5 is a flow chart that provides an overview of still another method of the present invention.
- FIG. 6 illustrates an exemplary RFID network according to the present invention.
- FIG. 7 is a block diagram of an exemplary RFID reader that may be configured to perform some methods of the present invention.
- FIG. 8 is a block diagram of an exemplary RFID printer that may be configured to perform some methods of the present invention.
- FIG. 9 is a block diagram of an exemplary RFID system that may be configured to perform some methods of the present invention.
- FIG. 10 is a flow chart that provides an overview of some implementations of the present invention.
- FIG. 11 illustrates an example of a network device that may be configured to implement some methods of the present invention.
- the Cross-Referenced Applications describe methods and devices that allow for the dynamic location and provisioning of individual RFID devices in a network.
- RFID devices perform different functions and may interface to the upstream systems differently depending on where they are located.
- the functions they perform, as well as the unique settings to perform those functions, will be referred to herein as the device “personality.”
- provisioning a device can include, but is not limited to, providing network configuration, providing personality configuration, incorporating the device into a network database and enabling the device with software (e.g., business process software).
- the “location” of a device may be stationary or mobile: for example, the location may be a station of an assembly line in a factory or a door of a delivery truck.
- a plurality of RFID devices at or near a given location may be “virtualized” or aggregated.
- the location may be a door, a loading dock, an area of an assembly line, etc.
- the virtualization may be implemented, for example, by including location data in, or associating location data with, a network address of each RFID device and assigning the same location data to each of the virtualized devices.
- each RFID device that is deployed near a door (one example of a “location”) of a warehouse one example of a “site” may be virtualized by having a network address that includes location data corresponding with the door and site data corresponding with the warehouse.
- the location and site data are included in a domain name of each RFID device and stored in a DNS table as part of a provisioning process.
- RFID devices are also provisioned with instructions for sending a request for a middleware server to a middleware server assigner.
- the assigner determines to what middleware server a requesting RFID device will be assigned.
- the middleware server assigner is a type of load balancer.
- an assigned middleware server is associated with an RFID device by dynamically associating the middleware server's network address(es) with the network address of the RFID device.
- the middleware server network address may include site data and/or a fully qualified domain name.
- the process of associating a middleware server with an RFID device may involve updating an entry of a DNS table corresponding to the RFID device to add, remove or modify a TXT field indicating the middleware server to which the RFID device is assigned.
- the TXT field may include a middleware server name and site data and/or a fully qualified domain name.
- a DNS entry may be created for the site. For example, some such implementations provide a two-level lookup process for, e.g., determining all RFID devices deployed at a particular location.
- the DNS entry for the site allows application software to use DNS resolution to determine the device(s) from which to obtain the required data (e.g., a middleware server associated with the RFID devices).
- a DNS resolver for the application server would resolve the IP address of the middleware server.
- the middleware server returns the IP addresses of the relevant RFID devices.
- FIG. 2 illustrates a portion of a simplified RFID network 200 that will be used to describe some implementations of the invention.
- the details of network 200 are purely illustrative.
- Application server 205 operates according to instructions from application software 210 that resides in a memory device of, or accessible to, application server 205 .
- Application server 205 is in communication with middleware servers 215 and 220 of site 225 , via a virtual local area network (“VLAN”) 230 in this example.
- VLAN virtual local area network
- Site 225 which is “Warehouse 14 ” in this example, includes numerous locations at which RFID devices are deployed. One such location is door 235 , where a plurality of RFID devices 240 are positioned. RFID devices 240 are in communication with middleware server assigner 245 via VLAN 242 . Middleware servers 215 and 220 communicate with assigner 245 and registrar 260 via VLAN 250 . As will be discussed in more detail below, in some preferred implementations assigner 245 is a type of load balancer.
- FIG. 3A is a flow chart that provides an overview of method 300 according to the present invention. Those of skill in the art will appreciate that the steps of the methods discussed herein, including method 300 , need not be performed (and in some implementations are not performed) in the order shown. Moreover, some implementations of the methods discussed herein may include more or fewer steps than those shown, e.g., in FIG. 3A .
- RFID devices in a network boot up and are provisioned are provisioned.
- the RFID devices may be dynamically provisioned, for example, according to the methods described in the Cross-Referenced Applications.
- the RFID devices are also provided with the network address of a middleware server assigner and instructions for sending a request for a middleware server to the assigner.
- the DHCP protocol is used in some preferred implementations of the present invention because it offers various convenient features.
- the DHCP protocol allows pools or “scopes” of TCP/IP addresses to be defined.
- a DHCP server can temporarily allocate or “lease” these TCP/IP addresses to host devices.
- An IP address that is not used for the duration of the lease is returned to the pool of unallocated IP addresses.
- the DHCP server will provide all related configuration settings, such as the default router, Domain Name Service (“DNS”) servers, subnet mask, etc., that are required for the proper functioning of TCP/IP.
- DNS Domain Name Service
- DHCP Options may be used to pass provisioning information.
- the DHCP protocol is defined in RFC 2131 and DHCP Options are set forth in, for example, RFCs 2132, 3004 and 3046. RFCs 2131, 2132, 3004 and 3046 are hereby incorporated by reference for all purposes.
- an EPC corresponding to an RFID device is put inside a DHCP request sent from the RFID device to a DHCP server. The EPC uniquely identifies the RFID device.
- RFC 1034 and RFC 1035 are hereby incorporated by reference and for all purposes.
- FIG. 3B illustrates one format for DNS entries in a DNS table 350 for RFID devices 240 .
- DNS Table 350 is stored in 260 , but DNS Table 350 could be stored elsewhere in network 200 .
- the DNS entries have the following format:
- entry 355 for RFID device A of FIG. 2 includes domain name “A.Door235.W14.RFID.cisco.com” and the associated IP address.
- Corresponding entries 360 and 365 are formed for RFID devices B and C.
- this format is merely one example and that many other suitable formats could be used for this purpose.
- middleware servers in the network boot up and are provisioned This process could be a manual process or an automated process, e.g., similar to that described in the Cross-Referenced Applications.
- middleware servers 215 and 220 are provided with network addresses, including domain names and IP addresses. Accordingly, entries 370 and 375 are added to DNS table 350 , as shown in FIG. 3C .
- a site DNS is created for Warehouse 14 .
- This entry could be created by application server 205 , by another device or manually.
- Entry 380 of FIG. 3D illustrates such a DNS entry, in the format ⁇ site>.RFID. ⁇ domain>.
- RFID devices request middleware servers.
- the RFID devices transmit requests for middleware servers to assigner 245 .
- Assigner 245 determines that RFID devices A and C will be associated with middleware server 220 and RFID device B will be associated with middleware server 215 (step 325 ).
- middleware servers update the DNS entry for each RFID device with identification information for the middleware server.
- the DNS entry for each RFID device is updated with a TXT record that states the domain name of the associated middleware server.
- TXT record 385 (“TXT mw-srv-1.W14.RFID.cisco.com”) is added to DNS entry 355 for RFID device A.
- TXT record 390 (“TXT mw-srv-2.W14.RFID.cisco.com”) is added to DNS entry 360 for RFID device B
- TXT record 395 (“TXT mw-srv-1.W14.RFID.cisco.com”) is added to DNS entry 365 for RFID device C.
- the same procedure applies if an RFID device is added/replaced after other RFID devices in the network have been initialized, provisioned, etc., as described above.
- Assigner 245 could be implemented in various ways, e.g., as a stand-alone device, as hardware and/or software incorporated into a module of another network device, etc.
- the network device could be, for example, a switch (e.g., a Catalyst 6500 switch provided by Cisco) or a middleware server.
- assigner 245 is a type of load balancer. However, assigner 245 preferably does not re-allocate RFID devices to other middleware servers as frequently as a normal TCP load balancer would re-route network traffic. Instead, assigner 245 preferably re-allocates RFID devices to other middleware servers only when certain conditions exist, e.g., when devices boot up, during a maintenance cycle, when middleware servers are added to the network, etc. Otherwise, the associations between middleware servers and RFID devices would frequently change and the new associations would need to be communicated to other parts of network 200 (e.g., to application server 205 ).
- the protocol used for the query/response between the RFID device and the assigner differs from the protocol used in routine communications on the RFID network.
- the protocol is one used by conventional TCP load balancers.
- the RFID device may or may not know about the separate existence of the load balancer.
- the RFID device treats the load balancer as the RFID middleware server.
- FIG. 4 is a flowchart that outlines method 400 for obtaining RFID data from a location according to some implementations of the present invention.
- application software 210 requests RFID data from a location.
- the location is location 235 , which is a door of Warehouse 14 .
- the DNS entry 380 for this site is resolved (step 410 ) and an application request is made for the IP address for W 14 , Door 235 (step 415 ).
- application server 205 queries for the network addresses of all RFID devices deployed at door 235 , e.g., “*.Door235.W14.RFID.cisco.com.”
- Step 420 . (The asterisk here signifies a search for all entries that match or have entries related to Door 235 .)
- Network addresses for these RFID devices are returned to application server 205 (step 425 ).
- the application server now knows the middleware server associated with each RFID device deployed at door 235 of Warehouse 14 .
- the application server can then poll these middleware servers (step 430 ) in order to obtain RFID data for door 235 and complete the application request.
- Step 435 is the middleware servers deployed at door 235 .
- Some methods of the present invention provide for redundancy of middleware servers and dynamic re-assignment of RFID devices from an unavailable middleware server to one or more available middleware servers.
- the flow chart of FIG. 5 outlines one such method 500 according to the present invention.
- Method 500 begins after RFID devices and associated middleware servers have previously been initialized, provisioned according to the present invention. For example, such devices may be in the condition that would exist upon completion of step 330 of method 300 .
- one or more RFID devices receive an indication that a middleware server with which they had been associated will no longer be available.
- This indication could manifest in many ways. For example, before taking a middleware server off line for maintenance and/or a software upgrade, a network administrator could send a signal to the RFID devices indicating that the middleware server is no longer available. Alternatively, the RFID devices may simply determine that a previously-established connection with the middleware server has gone down. In this example, middleware server 220 has been taken off line and RFID devices A and C determine that their connection with middleware server 220 has gone down. Similarly, RFID devices at other locations of site 225 also determine that their connection with middleware server 220 has gone down.
- the RFID devices request another middleware server (step 510 ).
- RFID devices A and C may, for example, send a second middleware server request to assigner 245 .
- assigner 245 assigns an available middleware server to each of the RFID devices that have sent a second middleware server request.
- middleware servers 270 and 280 are both available.
- Assigner 245 assigns middleware servers in an appropriate fashion, e.g., taking into account the current demands of middleware servers 270 and 280 .
- middleware server 270 is assigned to RFID device A and middleware server 280 is assigned to RFID device C.
- TXT entries 385 and 395 in DNS table 350 are updated to indicate the new middleware server/RFID device associations.
- entries 385 and 395 are revised to read “TXT mw-srv-3.W14.RFID.cisco.com.”
- Other RFID devices of site 225 that were previously assigned to middleware server 220 are assigned either to middleware server 270 or 280 and their corresponding TXT entries are also updated.
- Other components of network 200 need to be made aware of the new RFID device/middleware server associations.
- the cached DNS resolves of application server 205 corresponding to the prior RFID device/middleware server associations need to be purged and the caches need to be refreshed with the new RFID device/middleware server associations (step 525 ).
- the application server when an application server can no longer communicate with a middleware server and/or an RFID device, the application server will make a query for the device and use the results of this query to refresh its cache of DNS entries.
- purging and refreshing of cashed DNS resolves is controlled by a time to live (“TTL”) indication received from a middleware server with the RFID device/middleware server associations.
- TTL time to live
- the application server makes a query for RFID device/middleware server associations and uses the results of this query to refresh its cache of DNS entries.
- middleware server 220 If middleware server 220 is later brought back on line, it could be initialized, provisioned, etc. (e.g., as described above). In some implementations, middleware server 220 notifies assigner 245 that it is back online and assigner 245 updates a table/database of available middleware servers for site 225 . RFID devices could subsequently be assigned to middleware server 220 , e.g., as described above.
- RFID devices that are networked according to the present invention can provide necessary information for allowing enterprises to track equipment and products (or groups of products). The information that will be provided by RFID devices that are networked according to the present invention will be of great benefit for enterprise resource planning, including the planning of manufacturing, distribution, sales and marketing.
- RFID tags and associated RFID devices can form part of a network for tracking a product and its history. For example, instead of waiting in a checkout line to purchase selected products, a shopper who wishes to purchase products bearing RFID tags can transport the products through a door that has multiple RFID readers deployed nearby.
- the readers may be virtualized and data from the virtualized readers may be obtained by application software.
- the application software may obtain EPC information regarding the products and can use this information to update a store inventory, cause a financial account to be debited, update manufacturers', distributors' and retailers' product sales databases, etc.
- Read/write RFID tags can capture information regarding the history of products or groups of products, e.g., temperature and other environmental changes, stresses, accelerations and/or vibrations that have acted upon the product. It will be particularly useful to record such information for products that are relatively more subject to spoilage or other damage, such as perishable foods and fragile items. By using the methods of the present invention, this information will be used to update databases maintained by various entities (e.g., manufacturers, wholesalers, retailers, transportation companies and financial institutions). The information will be used not only to resolve disputes (for example, regarding responsibility for product damage) but also to increase customer satisfaction, to avoid health risks, etc.
- RFID network 600 includes warehouse 601 , factory 605 , retail outlet 610 , financial institution 615 and headquarters 620 .
- network 600 could include many other elements and/or multiple instances of the elements shown in FIG. 6 .
- network 600 could include a plurality of warehouses, factories, etc.
- products 627 are being delivered to warehouse 601 by truck 675 .
- Products 627 which already include RFID tags, are delivered through door 625 .
- RFID reader 652 is connected to port 662 of switch 660 .
- switches 630 and 660 are connected to the rest of RFID network 600 via gateway 650 and network 625 .
- Network 625 could be any convenient network, but in this example network 625 is the Internet.
- RFID reader 652 reads each product that passes through door 625 and transmits the EPC code corresponding to each product on RFID network 600 .
- RFID tags may be used for different levels of a product distribution system. For example, there may be an RFID tag for a pallet of cases, an RFID tag for each case in the pallet and an RFID tag for each product. Accordingly, after products 627 enter warehouse 601 , they are assembled into cases 646 .
- RFID printer 656 makes an RFID tag for each of cases 646 .
- RFID printer 656 is connected to port 666 of switch 660 .
- RFID printer 656 could operate under the control of PC 647 in warehouse 601 , one of PCs 667 in headquarters 620 , or some other device.
- RFID reader 624 which is connected to port 614 , reads the EPC code of each case 646 and product 627 on conveyor belt 644 and transmits this information on network 600 .
- RFID reader 626 which is connected to port 616 , reads the EPC code of each case 646 and product 627 that exits door 604 and transmits this information on network 600 .
- Cases 646 are loaded onto truck 685 for distribution to another part of the product chain, e.g., to retail outlet 610 .
- Each of the RFID devices in network 600 preferably has a “personality” suitable for its intended use.
- device 652 could cause reassuring tone to sound and/or a green light to flash if an authorized person or object enters door 625 .
- device 652 might cause an alarm to sound and/or an alert to be sent to an administrator on network 600 if a product exits door 625 or an unauthorized person enters or exits door 625 .
- FIG. 7 illustrates an RFID reader that can be configured to perform methods of the present invention.
- RFID reader 700 includes one or more RF radios 705 for transmitting RF waves to, and receiving modulated RF waves from, RFID tags.
- RF radios 705 provide raw RF data that is converted by an analog-to-digital converter (not shown) and conveyed to other elements of RFID reader 700 .
- these data are stored, at least temporarily, by CPU 710 in memory 715 before being transmitted to other parts of RFID network 600 via network interface 725 .
- Network interface 725 may be any convenient type of interface, such as an Ethernet interface.
- Flash memory 720 is used to store a program (a “bootloader”) for booting/initializing RFID reader 700 .
- the bootloader which is usually stored in a separate, partitioned area of flash memory 720 , also allows RFID reader 700 to recover from a power loss, etc.
- flash memory 720 includes instructions for controlling CPU 710 to form “DHCPDISCOVER” requests, as described below with reference to FIG. 6 , to initiate a provisioning/configuration cycle.
- flash memory 720 is used to store personality information and other configuration information obtained from, e.g., a DHCP server during such a cycle.
- such information is only stored in volatile memory 415 after being received from, e.g. a DHCP server.
- a network of dumb RFID devices allows much of the processing load to be centralized (e.g., performed by server 270 of network 200 ), instead of being performed by the RFID devices.
- the processing load can be decentralized, but only to trusted devices (such as PC 247 of network 200 ).
- Configuration information is downloaded from, e.g., a central server to memory 715 . Updates may be instigated by the central server or selected, trusted devices. New versions of the image file (e.g., the running, base image necessary to operate the RFID device) are copied into flash memory 720 . Alternative embodiments of RFID devices implement the methods of the present invention yet lack flash memory.
- Newer RFID devices also include dry contact input/output leads to connect to signal lights, industrial networks or the equivalent. These newer RFID devices typically have evolved in the amount of memory, flash, CPU capacity and methods of determination of the number, type and content of RFID tags in their field of view.
- FIG. 8 is a block diagram illustrating an exemplary RFID printer 800 that may be configured to perform some methods of the present invention.
- RFID printer 800 has many of the same components as RFID reader 700 and can be configured in the same general manner as RFID reader 700 .
- RFID printer also includes printer interface 830 , which may be a standard printer interface.
- Printer interface prints a label for each RFID tag, e.g. according to instructions received from network 200 via network interface 825 .
- RF Radio 805 is an outbound radio that is used to send RF signals to the antenna of an RFID tag under the control of CPU 810 , thereby encoding information (e.g. an EPC) on the tag's microprocessor. Preferably, RF Radio 805 then checks the encoded information for accuracy.
- the RFID tag is sandwiched within the label produced by printer interface 830 .
- FIG. 9 illustrates RFID system 900 that includes control portion 901 and RF radio portion 902 .
- the components of control portion 901 are substantially similar to those described above with reference to FIGS. 7 and 8 .
- Interconnect 930 of control portion 901 is configured for communication with interconnect 935 of RF radio portion 902 .
- the communication may be via any convenient medium and format, such as wireless, serial, point-to-point serial, etc.
- each control portion 901 may control a plurality of RF radio portions 902 .
- RFID system 900 may be deployed on a single framework or chassis (e.g., on a forklift) or in multiple chassis.
- FIG. 10 is a flow chart that illustrates an exemplary business application of the present invention. Those of skill in the art will appreciate that the example described below with reference to FIG. 10 is but one of many applications of the invention.
- step 1005 a plurality of RFID devices have been provisioned according to one of the previously-described methods.
- the condition of the RFID network is comparable to that of step 330 in method 300 , shown in FIG. 3A and described above.
- the RFID devices are RFID readers that are positioned near an exit door of a retail store. Therefore, in the previous steps, the devices have been provisioned with a personality that is appropriate for their role.
- a shopper exits the door with a number of selected products.
- the RFID readers read the RFID tags of each product and extracts the EPC codes and related product information (e.g., the price of each product). Redundant RFID data may be filtered at any convenient part of the network, e.g., by middleware or by application software.
- the RFID readers also read an RFID tag that identifies the shopper and the shopper's preferred account(s) that should be debited in order to purchase the products.
- the shopper may have an RFID tag embedded in a card, a key chain, or any other convenient place in which this information is encoded.
- the accounts may be various types of accounts maintained by one or more financial institutions.
- the accounts may be one or more of a checking account, savings account, a line of credit, a credit card account, etc.
- Biometric data e.g., voice, fingerprint, retinal scan, etc.
- from the shopper may also be obtained and compared with stored biometric data in order to verify the shopper's identity.
- the RFID readers transmit the product information, including the EPC codes, on the RFID network.
- the information is sent (e.g., according to instructions in application software) to a financial institution indicated by the shopper's RFID tag.
- step 1025 the financial institution that maintains the shopper's selected account determines whether there are sufficient funds (or whether there is sufficient credit) for the shopper to purchase the selected products. If so, the shopper's account is debited and the transaction is consummated (step 1030 ).
- the shopper has the option of designating one or more alternative accounts. Accordingly, if the first account has insufficient funds or credit, it is determined (e.g., by a server on the RFID network) whether the shopper has indicated any alternative accounts for making purchases (step 1035 ). If so, the next account is evaluated in step 1025 . If it is determined in step 1035 that there are no additional accounts designated by the shopper, in this example some form of human intervention takes place. For example, a cashier of the retail store could assist the shopper in making the purchases in a conventional manner.
- information regarding the purchased products are transmitted on the RFID network. For example, this information is preferably forwarded to one or more devices on the RFID network that are configured to update one or more databases maintained by the retail store or the manufacturers/producers, distributors, wholesalers, etc., of the purchased products (step 1040 ).
- information regarding the shopper is also transmitted on the RFID network (e.g., if the shopper has authorized such information to be released).
- This product information (and optionally shopper information) may be used for a variety of purposes, e.g., in the formation of various types of business plans (e.g., inventory re-stocking, marketing, sales, distribution and manufacturing/production plans).
- FIG. 11 illustrates an example of a network device that may be configured to implement some methods of the present invention.
- Network device 1160 includes a master central processing unit (CPU) 1162 , interfaces 1168 , and a bus 1167 (e.g., a PCI bus).
- interfaces 1168 include ports 1169 appropriate for communication with the appropriate media.
- one or more of interfaces 1168 includes at least one independent processor 1174 and, in some instances, volatile RAM.
- Independent processors 1174 may be, for example ASICs or any other appropriate processors. According to some such embodiments, these independent processors 1174 perform at least some of the functions of the logic described herein.
- one or more of interfaces 1168 control such communications-intensive tasks as media control and management. By providing separate processors for the communications-intensive tasks, interfaces 1168 allow the master microprocessor 1162 efficiently to perform other functions such as routing computations, network diagnostics, security functions, etc.
- the interfaces 1168 are typically provided as interface cards (sometimes referred to as “line cards”). Generally, interfaces 1168 control the sending and receiving of data packets over the network and sometimes support other peripherals used with the network device 1160 .
- interfaces that may be provided are Fibre Channel (“FC”) interfaces, Ethernet interfaces, frame relay interfaces, cable interfaces, DSL interfaces, token ring interfaces, and the like.
- FC Fibre Channel
- Ethernet interfaces Ethernet interfaces
- frame relay interfaces cable interfaces
- DSL interfaces DSL interfaces
- token ring interfaces and the like.
- various very high-speed interfaces may be provided, such as fast Ethernet interfaces, Gigabit Ethernet interfaces, ATM interfaces, HSSI interfaces, POS interfaces, FDDI interfaces, ASI interfaces, DHEI interfaces and the like.
- CPU 1162 may be responsible for implementing specific functions associated with the functions of a desired network device. According to some embodiments, CPU 1162 accomplishes all these functions under the control of software including an operating system (e.g. Linux, VxWorks, etc.), and any appropriate applications software.
- an operating system e.g. Linux, VxWorks, etc.
- CPU 1162 may include one or more processors 1163 such as a processor from the Motorola family of microprocessors or the MIPS family of microprocessors. In an alternative embodiment, processor 1163 is specially designed hardware for controlling the operations of network device 1160 . In a specific embodiment, a memory 1161 (such as non-volatile RAM and/or ROM) also forms part of CPU 1162 . However, there are many different ways in which memory could be coupled to the system. Memory block 1161 may be used for a variety of purposes such as, for example, caching and/or storing data, programming instructions, etc.
- network device may employ one or more memories or memory modules (such as, for example, memory block 1165 ) configured to store data, program instructions for the general-purpose network operations and/or other information relating to the functionality of the techniques described herein.
- the program instructions may control the operation of an operating system and/or one or more applications, for example.
- the present invention relates to machine-readable media that include program instructions, state information, etc. for performing various operations described herein.
- machine-readable media include, but are not limited to, magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROM disks; magneto-optical media; and hardware devices that are specially configured to store and perform program instructions, such as read-only memory devices (ROM) and random access memory (RAM).
- ROM read-only memory devices
- RAM random access memory
- the invention may also be embodied in a carrier wave traveling over an appropriate medium such as airwaves, optical lines, electric lines, etc.
- program instructions include both machine code, such as produced by a compiler, and files containing higher level code that may be executed by the computer using an interpreter.
- FIG. 11 illustrates one specific network device of the present invention
- it is by no means the only network device architecture on which the present invention can be implemented.
- an architecture having a single processor that handles communications as well as routing computations, etc. is often used.
- other types of interfaces and media could also be used with the network device.
- the communication path between interfaces/line cards may be bus based (as shown in FIG. 11 ) or switch fabric based (such as a cross-bar).
- the present invention involves methods and devices for identifying and provisioning individual RFID devices in a network
- many aspects of the present invention can be applied to identifying and provisioning other types of devices in a network.
- the present invention is not protocol-specific and may be used, for example, in implementations using UPNP, 802.1ab or similar discovery protocols.
- the implementations described herein refer to exemplary DHCP Options, other DHCP Options may advantageously be used to implement the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Automation & Control Theory (AREA)
- Computer Security & Cryptography (AREA)
- Electromagnetism (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
According to some implementations of the present invention, RFID devices and middleware servers are automatically provisioned with a network address and with instructions for sending a request for a middleware server to a middleware server assigner. In some implementations, the middleware server assigner is a load balancer. In some implementations, a middleware server is associated with a plurality of RFID devices by associating a middleware server network address or names with the network addresses of the RFID devices. Preferred methods also provide for redundancy of middleware servers and dynamic reassignment of RFID devices from an unavailable middleware server to an available middleware server.
Description
- This application claims priority to U.S. Provisional Patent Application No. 60/570,999, (attorney docket number CISCP378P), entitled “Methods and Devices for Uniquely Provisioning RFID Devices” and filed on May 13, 2004, and to U.S. patent application Ser. No. 11/010,089, (attorney docket number CISCP393/493521), entitled “Methods and Devices for Providing Scalable RFID Networks” and filed on Dec. 9, 2004, both of which are hereby incorporated by reference and for all purposes.
- 1. Field of the Invention
- The present invention relates to radio frequency identification (“RFID”) technology. More particularly, the present invention relates to networks that include RFID devices.
- 2. Description of the Related Art
- “Smart labels,” generally implemented by RFID tags, have been developed in an effort to address the shortcomings of bar codes and add greater functionality. RFID tags have been used to keep track of items such as airline baggage, items of clothing in a retail environment, cows and highway tolls. As shown in
FIG. 1 , anRFID tag 100 includesmicroprocessor 105 andantenna 110. In this example,RFID tag 100 is powered by amagnetic field 145 generated by anRFID reader 125. The tag'santenna 110 picks up themagnetic signal 145.RFID tag 100 modulates thesignal 145 according to information coded in the tag and transmits the modulatedsignal 155 to theRFID reader 125. - RFID tags use the Electronic Product Code (“EPC” or “ePC”) format for encoding information. An EPC code includes a variable number of bits of information (common formats are 64, 96 and 128 bits), which allows for identification of individual products as well as associated information. As shown in
FIG. 1 ,EPC 120 includesheader 130,EPC Manager field 140,Object class field 150 andserial number field 160. EPCManager field 140 contains manufacturer information.Object class field 150 includes a product's stock-keeping unit (“SKU”) number.Serial number field 160 is normally a 40-bit field that can uniquely identify the specific instance of an individual product i.e., not just a make or model, but also down to a specific “serial number” of a make and model. - In theory, RFID tags and associated RFID devices (such as RFID readers and printers) could form part of a network for tracking a product (or a group of products) and its history. However, various difficulties have prevented this theory from being realized. One problem that has required considerable time and energy from RF engineers is the development of lower-cost RFID tags with acceptable performance levels. Inductively-coupled RFID tags have acceptable performance levels. These tags include a microprocessor, a metal coil and glass or polymer encapsulating material. Unfortunately, the materials used in inductively-coupled RFID tags make them too expensive for widespread use: a passive button tag costs approximately $1 and a battery-powered read/write tag may cost $100 or more.
- Capacitively-coupled RFID tags use conductive ink instead of the metal coil used in inductive RFID tags. The ink is printed on a paper label by an RFID printer, creating a lower-cost, disposable RFID tag. However, conventional capacitively-coupled RFID tags have a very limited range. In recent years, RF engineers have been striving to extend the range of capacitively-coupled RFID tags beyond approximately one centimeter.
- In part because of the significant efforts that have been expended in solving the foregoing problems, prior art systems and methods for networking RFID devices are rather primitive. RFID devices have only recently been deployed with standard network interfaces such as Ethernet. Device provisioning for prior art RFID networks is not automatic, but instead requires a time-consuming process for configuring each individual device.
- Conventional RFID devices also have a small amount of available memory. A typical RFID device may have approximately 0.5 Mb of flash memory and a total of 1 Mb of overall memory. The small memories of RFID devices place restrictions on the range of possible solutions to the problems noted herein. In addition, an RFID device typically uses a proprietary operating system, e.g., of the manufacturer of the microprocessor(s) used in the RFID device.
- Prototype RFID network deployments to date require large human/support intervention to be implemented. RFID devices are being deployed with “static” knowledge of where the device was deployed at original time of deployment. RFID devices are statically configured to a single RFID middleware server (formerly known as a “Savant”). Current implementations require each RFID middleware server to contact RFID devices that have been manually associated with that server. Moreover, such networks do not provide for RFID middleware server redundancy.
- For these and other reasons, prior art devices and methods are not suitable for the large-scale deployment of RFID devices, middleware servers and other devices in a network. Methods and devices are needed for migrating first generation RFID systems to scalable RFID networks.
- The Cross-Referenced Applications describe methods and devices that allow for the dynamic location and provisioning of individual RFID devices in a network. According to some implementations of the present invention, RFID devices and middleware servers are automatically provisioned with network addresses and with instructions for sending a request for a middleware server to a middleware server assigner. In some implementations, the middleware server assigner is a load balancer.
- A plurality of RFID devices at or near a given location may be dynamically “virtualized” or aggregated. Such a dynamic virtualization may be implemented, for example, by including location data in, or associating location data with, a network address of each RFID device and assigning the same location data to each of the virtualized devices. In some such implementations, the location data are included in a domain name of each RFID device and stored in a DNS table.
- In some implementations, a middleware server is associated with a plurality of RFID devices by associating a middleware server network address with the network addresses of the RFID devices. The process of associating a middleware server with RFID devices may involve updating a DNS table entry of an RFID device to add a TXT field indicating the middleware server to which each RFID device is assigned. The TXT field may indicate a middleware server name, fully qualified domain name and perhaps site data. Preferred methods also provide for redundancy of middleware servers and dynamic re-assignment of RFID devices from an unavailable middleware server to an available middleware server.
- In some implementations, a DNS entry may be created for the site. The DNS entry for the site allows application software to use DNS resolution to determine the device(s) from which to obtain the required data (e.g., a middleware server associated with the RFID devices).
- Some implementations of the invention provide a method of dynamically managing a network. The method includes the following steps: provisioning each of a plurality of radio frequency identification (“RFID”) devices in the network; associating each RFID device with one of a plurality of locations; transmitting a middleware server request from provisioned RFID devices; assigning one of a plurality of middleware servers to each of the requesting RFID devices; and associating each of the requesting RFID devices with an assigned middleware server.
- The middleware server request may be transmitted to a load balancer. The provisioning step can involve assigning an RFID device network address and a load balancer network address. If so, the method may also include these steps: receiving a request from an application program regarding RFID devices associated with a location; and providing RFID device network addresses for RFID devices associated with the location.
- The step of associating each RFID device with one of a plurality of locations may involve forming domain name server (“DNS”) entries that include location information for the RFID devices. The location information can include site information, information identifying a portion of a site and/or site access area information.
- The provisioning step may include these steps: receiving a provisioning request; automatically identifying an RFID device according to a media access control (“MAC”) address and an electronic product code (“EPC”) included in the provisioning request; automatically locating the RFID device according to location information included in the provisioning request; and automatically providing the RFID device with a desired functionality according to an identity and a location of the RFID device.
- The provisioning step can also include these steps: forming a DHCPDISCOVER request that includes an EPC of an RFID device and location information indicating a location of the RFID device; sending the DHCPDISCOVER request to a Dynamic Host Configuration Protocol (“DHCP”) server; and receiving provisioning information from the DHCP server that is specifically intended for the RFID device. The provisioning information can enable a desired functionality according to an identity and a location of the RFID device.
- The step of associating the RFID device network address of each of the requesting RFID devices with an address of an assigned middleware server can involve forming DNS TXT entries that indicate middleware server information, each of the TXT entries being associated with a DNS entry for an RFID device.
- The method may include the step of providing RFID data to the application program from RFID devices associated with the location. The RFID data can include RFID tag data. The RFID tag data can include product information and/or information about a person. The method may include the step of using the RFID tag data to automatically update a database, to cause a financial account to be debited and/or to update a business plan. The business plan may be, for example, a marketing plan, a manufacturing plan, a distribution plan or a sales plan.
- Some embodiments of the invention provide a network. The network includes the following elements: a plurality of RFID devices in various locations of a site; a plurality of middleware servers associated with the site; and an assigner, wherein the RFID devices are provisioned with an RFID device network address, an assigner network address and instructions to send a request to the assigner for a middleware server, and wherein the assigner is configured to assign an RFID device to a middleware server in response to the request.
- The assigner may be a type of a load balancer. The network may include a DNS server configured to maintain RFID device network addresses and corresponding location and site information for the RFID devices. The DNS server may be configured to maintain middleware server network addresses and corresponding site information for the middleware servers. A middleware server may update RFID device information in the DNS server to indicate assigned middleware servers.
- The network may also include an application server configured to create an entry in the DNS server corresponding to all registered devices of a site. The application server may be further configured to request network addresses for all RFID devices associated with a location and/or to send requests to a middleware server. If so, the middleware server can retrieve RFID device location information and provide the RFID device location information to the application server in response to the application server's request.
- Alternative implementations of the invention provide a method of dynamically managing a network. The method includes the following steps: provisioning each of a plurality of RFID devices in the network, wherein the provisioning step comprises providing an RFID device with a designated load balancer; associating each RFID device network address with one of a plurality of locations; causing RFID devices to send a first middleware server request to a designated load balancer; assigning a first middleware server of a plurality of available middleware servers to a first plurality of the requesting RFID devices; associating the RFID device of each of the first plurality of RFID devices with the first middleware server; receiving an indication that the first middleware server is no longer an available middleware server; causing each of the first plurality of RFID devices to send a second middleware server request to the load balancer; assigning a second middleware server of a plurality of available middleware servers to N RFID devices of the first plurality of RFID devices; and associating each of the N RFID devices with the second middleware server.
- The indication may be, for example, a loss of communication with the first middleware server or information from a network administrator. The associating steps may include forming DNS TXT entries that indicate middleware server information, each of the TXT entries being associated with a DNS entry for an RFID device.
- Some embodiments of the invention provide a computer program for dynamically managing a network. The computer program may be embodied in a machine-readable medium and contains instructions for controlling devices in the network to perform the following steps: provisioning each of a plurality of RFID devices in the network; associating each RFID device with one of a plurality of locations; transmitting a middleware server request from provisioned RFID devices; assigning one of a plurality of middleware servers to each of the requesting RFID devices; and associating each of the requesting RFID devices with an assigned middleware server.
-
FIG. 1 is a diagram illustrating an RFID tag. -
FIG. 2 is a block diagram illustrating a simplified portion of an RFID network of the present invention. -
FIG. 3A is a flow chart that provides an overview of a method of the present invention. -
FIGS. 3B-3E illustrate a DNS table at various stages of the method illustrated inFIG. 3A . -
FIG. 4 is a flow chart that provides an overview of another method of the present invention. -
FIG. 5 is a flow chart that provides an overview of still another method of the present invention. -
FIG. 6 illustrates an exemplary RFID network according to the present invention. -
FIG. 7 is a block diagram of an exemplary RFID reader that may be configured to perform some methods of the present invention. -
FIG. 8 is a block diagram of an exemplary RFID printer that may be configured to perform some methods of the present invention. -
FIG. 9 is a block diagram of an exemplary RFID system that may be configured to perform some methods of the present invention. -
FIG. 10 is a flow chart that provides an overview of some implementations of the present invention. -
FIG. 11 illustrates an example of a network device that may be configured to implement some methods of the present invention. - In this application, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be obvious, however, to one skilled in the art, that the present invention may be practiced without some or all of these specific details. In other instances, well known process steps have not been described in detail in order not to obscure the present invention.
- The following applications are hereby incorporated by reference for all purposes: U.S. patent application Ser. No. 10/866,506, (attorney docket number CISCP376), entitled “Methods and Devices for Uniquely Provisioning RFID Devices” and filed on Jun. 9, 2004, to U.S. patent application Ser. No. 10/866,507, (attorney docket number CISCP377), entitled “Methods and Devices for Locating and Uniquely Provisioning RFID Devices” and filed on Jun. 9, 2004, and to U.S. patent application Ser. No. 10/866,285, (attorney docket number CISCP378), entitled “Methods and Devices for Assigning RFID Device Personality” and filed on Jun. 9, 2004 (collectively, the “Cross-Referenced Applications”).
- The Cross-Referenced Applications describe methods and devices that allow for the dynamic location and provisioning of individual RFID devices in a network. RFID devices perform different functions and may interface to the upstream systems differently depending on where they are located. The functions they perform, as well as the unique settings to perform those functions, will be referred to herein as the device “personality.” As used herein, “provisioning” a device can include, but is not limited to, providing network configuration, providing personality configuration, incorporating the device into a network database and enabling the device with software (e.g., business process software). The “location” of a device may be stationary or mobile: for example, the location may be a station of an assembly line in a factory or a door of a delivery truck.
- A plurality of RFID devices at or near a given location may be “virtualized” or aggregated. For example, the location may be a door, a loading dock, an area of an assembly line, etc. The virtualization may be implemented, for example, by including location data in, or associating location data with, a network address of each RFID device and assigning the same location data to each of the virtualized devices. For example, each RFID device that is deployed near a door (one example of a “location”) of a warehouse (one example of a “site”) may be virtualized by having a network address that includes location data corresponding with the door and site data corresponding with the warehouse. In some such implementations, the location and site data are included in a domain name of each RFID device and stored in a DNS table as part of a provisioning process.
- According to some implementations of the present invention, RFID devices are also provisioned with instructions for sending a request for a middleware server to a middleware server assigner. The assigner determines to what middleware server a requesting RFID device will be assigned. In some implementations, the middleware server assigner is a type of load balancer.
- In some implementations, an assigned middleware server is associated with an RFID device by dynamically associating the middleware server's network address(es) with the network address of the RFID device. The middleware server network address may include site data and/or a fully qualified domain name. The process of associating a middleware server with an RFID device may involve updating an entry of a DNS table corresponding to the RFID device to add, remove or modify a TXT field indicating the middleware server to which the RFID device is assigned. The TXT field may include a middleware server name and site data and/or a fully qualified domain name.
- In some implementations, a DNS entry may be created for the site. For example, some such implementations provide a two-level lookup process for, e.g., determining all RFID devices deployed at a particular location. The DNS entry for the site allows application software to use DNS resolution to determine the device(s) from which to obtain the required data (e.g., a middleware server associated with the RFID devices). In this example, a DNS resolver for the application server would resolve the IP address of the middleware server. The middleware server returns the IP addresses of the relevant RFID devices.
-
FIG. 2 illustrates a portion of asimplified RFID network 200 that will be used to describe some implementations of the invention. The details ofnetwork 200 are purely illustrative.Application server 205 operates according to instructions fromapplication software 210 that resides in a memory device of, or accessible to,application server 205.Application server 205 is in communication withmiddleware servers site 225, via a virtual local area network (“VLAN”) 230 in this example. -
Site 225, which is “Warehouse 14” in this example, includes numerous locations at which RFID devices are deployed. One such location isdoor 235, where a plurality ofRFID devices 240 are positioned.RFID devices 240 are in communication withmiddleware server assigner 245 viaVLAN 242.Middleware servers assigner 245 andregistrar 260 viaVLAN 250. As will be discussed in more detail below, in some preferred implementations assigner 245 is a type of load balancer. -
FIG. 3A is a flow chart that provides an overview ofmethod 300 according to the present invention. Those of skill in the art will appreciate that the steps of the methods discussed herein, includingmethod 300, need not be performed (and in some implementations are not performed) in the order shown. Moreover, some implementations of the methods discussed herein may include more or fewer steps than those shown, e.g., inFIG. 3A . - In
step 305, RFID devices in a network boot up and are provisioned. The RFID devices may be dynamically provisioned, for example, according to the methods described in the Cross-Referenced Applications. In addition to the types of provisioning described in the Cross-Referenced Applications, the RFID devices are also provided with the network address of a middleware server assigner and instructions for sending a request for a middleware server to the assigner. - The DHCP protocol is used in some preferred implementations of the present invention because it offers various convenient features. For example, the DHCP protocol allows pools or “scopes” of TCP/IP addresses to be defined. A DHCP server can temporarily allocate or “lease” these TCP/IP addresses to host devices. An IP address that is not used for the duration of the lease is returned to the pool of unallocated IP addresses. In addition, the DHCP server will provide all related configuration settings, such as the default router, Domain Name Service (“DNS”) servers, subnet mask, etc., that are required for the proper functioning of TCP/IP.
- For implementations using the DHCP protocol, DHCP Options may be used to pass provisioning information. The DHCP protocol is defined in RFC 2131 and DHCP Options are set forth in, for example, RFCs 2132, 3004 and 3046. RFCs 2131, 2132, 3004 and 3046 are hereby incorporated by reference for all purposes. In some preferred implementations, an EPC corresponding to an RFID device is put inside a DHCP request sent from the RFID device to a DHCP server. The EPC uniquely identifies the RFID device.
- Some implementations employ Domain Name Service (“DNS”) and dynamic DNS (“DDNS”) to allow yet easier identification of RFID devices. RFC 1034 and
RFC 1035 are hereby incorporated by reference and for all purposes. -
FIG. 3B illustrates one format for DNS entries in a DNS table 350 forRFID devices 240. In this example, DNS Table 350 is stored in 260, but DNS Table 350 could be stored elsewhere innetwork 200. In DNS table 350, the DNS entries have the following format: -
- <Device>.<Location>.<Site>.RFID.<Domain>
- Accordingly,
entry 355 for RFID device A ofFIG. 2 includes domain name “A.Door235.W14.RFID.cisco.com” and the associated IP address. Correspondingentries - Referring again to
FIG. 3A , instep 310 middleware servers in the network boot up and are provisioned. This process could be a manual process or an automated process, e.g., similar to that described in the Cross-Referenced Applications. As part of the provisioning process,middleware servers entries FIG. 3C . - In
step 315, a site DNS is created for Warehouse 14. This entry could be created byapplication server 205, by another device or manually. Entry 380 ofFIG. 3D illustrates such a DNS entry, in the format <site>.RFID.<domain>. Instep 320, RFID devices request middleware servers. Here, the RFID devices transmit requests for middleware servers toassigner 245.Assigner 245 determines that RFID devices A and C will be associated withmiddleware server 220 and RFID device B will be associated with middleware server 215 (step 325). - In
step 330, middleware servers update the DNS entry for each RFID device with identification information for the middleware server. In this example, the DNS entry for each RFID device is updated with a TXT record that states the domain name of the associated middleware server. Accordingly, TXT record 385 (“TXT mw-srv-1.W14.RFID.cisco.com”) is added toDNS entry 355 for RFID device A. Similarly, TXT record 390 (“TXT mw-srv-2.W14.RFID.cisco.com”) is added toDNS entry 360 for RFID device B and TXT record 395 (“TXT mw-srv-1.W14.RFID.cisco.com”) is added toDNS entry 365 for RFID device C. Preferably, the same procedure applies if an RFID device is added/replaced after other RFID devices in the network have been initialized, provisioned, etc., as described above. -
Assigner 245 could be implemented in various ways, e.g., as a stand-alone device, as hardware and/or software incorporated into a module of another network device, etc. The network device could be, for example, a switch (e.g., a Catalyst 6500 switch provided by Cisco) or a middleware server. - In this example,
assigner 245 is a type of load balancer. However,assigner 245 preferably does not re-allocate RFID devices to other middleware servers as frequently as a normal TCP load balancer would re-route network traffic. Instead,assigner 245 preferably re-allocates RFID devices to other middleware servers only when certain conditions exist, e.g., when devices boot up, during a maintenance cycle, when middleware servers are added to the network, etc. Otherwise, the associations between middleware servers and RFID devices would frequently change and the new associations would need to be communicated to other parts of network 200 (e.g., to application server 205). - According to some implementations, the protocol used for the query/response between the RFID device and the assigner differs from the protocol used in routine communications on the RFID network. In some such implementations of the load balancer described herein, the protocol is one used by conventional TCP load balancers. The RFID device may or may not know about the separate existence of the load balancer. In some preferred implementations, the RFID device treats the load balancer as the RFID middleware server.
-
FIG. 4 is a flowchart that outlinesmethod 400 for obtaining RFID data from a location according to some implementations of the present invention. Instep 405,application software 210 requests RFID data from a location. In this example, the location islocation 235, which is a door of Warehouse 14. The DNS entry 380 for this site is resolved (step 410) and an application request is made for the IP address for W14, Door 235 (step 415). - In response,
application server 205 queries for the network addresses of all RFID devices deployed atdoor 235, e.g., “*.Door235.W14.RFID.cisco.com.” (Step 420.) (The asterisk here signifies a search for all entries that match or have entries related toDoor 235.) Network addresses for these RFID devices (including the TXT records that indicate associated middleware servers) are returned to application server 205 (step 425). Accordingly, the application server now knows the middleware server associated with each RFID device deployed atdoor 235 of Warehouse 14. The application server can then poll these middleware servers (step 430) in order to obtain RFID data fordoor 235 and complete the application request. (Step 435.) - Some methods of the present invention provide for redundancy of middleware servers and dynamic re-assignment of RFID devices from an unavailable middleware server to one or more available middleware servers. The flow chart of
FIG. 5 outlines onesuch method 500 according to the present invention.Method 500 begins after RFID devices and associated middleware servers have previously been initialized, provisioned according to the present invention. For example, such devices may be in the condition that would exist upon completion ofstep 330 ofmethod 300. - In
step 505, one or more RFID devices receive an indication that a middleware server with which they had been associated will no longer be available. This indication could manifest in many ways. For example, before taking a middleware server off line for maintenance and/or a software upgrade, a network administrator could send a signal to the RFID devices indicating that the middleware server is no longer available. Alternatively, the RFID devices may simply determine that a previously-established connection with the middleware server has gone down. In this example,middleware server 220 has been taken off line and RFID devices A and C determine that their connection withmiddleware server 220 has gone down. Similarly, RFID devices at other locations ofsite 225 also determine that their connection withmiddleware server 220 has gone down. - In response, the RFID devices request another middleware server (step 510). RFID devices A and C may, for example, send a second middleware server request to
assigner 245. Instep 515,assigner 245 assigns an available middleware server to each of the RFID devices that have sent a second middleware server request. In this example,middleware servers Assigner 245 assigns middleware servers in an appropriate fashion, e.g., taking into account the current demands ofmiddleware servers - In this example,
middleware server 270 is assigned to RFID device A andmiddleware server 280 is assigned to RFID device C. Accordingly,TXT entries Step 520.) Here,entries site 225 that were previously assigned tomiddleware server 220 are assigned either tomiddleware server - Other components of
network 200 need to be made aware of the new RFID device/middleware server associations. For example, the cached DNS resolves ofapplication server 205 corresponding to the prior RFID device/middleware server associations need to be purged and the caches need to be refreshed with the new RFID device/middleware server associations (step 525). In some implementations, when an application server can no longer communicate with a middleware server and/or an RFID device, the application server will make a query for the device and use the results of this query to refresh its cache of DNS entries. - Alternatively (or additionally), purging and refreshing of cashed DNS resolves is controlled by a time to live (“TTL”) indication received from a middleware server with the RFID device/middleware server associations. According to some such alternative implementations, after the TTL has run the application server makes a query for RFID device/middleware server associations and uses the results of this query to refresh its cache of DNS entries.
- If
middleware server 220 is later brought back on line, it could be initialized, provisioned, etc. (e.g., as described above). In some implementations,middleware server 220 notifiesassigner 245 that it is back online andassigner 245 updates a table/database of available middleware servers forsite 225. RFID devices could subsequently be assigned tomiddleware server 220, e.g., as described above. - The methods and devices of the present invention have very broad utility, both in the public and private sectors. Any enterprise needs to keep track of how its equipment is being deployed, whether that equipment is used for commercial purposes, for military purposes, etc. RFID devices that are networked according to the present invention can provide necessary information for allowing enterprises to track equipment and products (or groups of products). The information that will be provided by RFID devices that are networked according to the present invention will be of great benefit for enterprise resource planning, including the planning of manufacturing, distribution, sales and marketing.
- Using the devices and methods of the present invention, RFID tags and associated RFID devices (such as RFID readers and printers) can form part of a network for tracking a product and its history. For example, instead of waiting in a checkout line to purchase selected products, a shopper who wishes to purchase products bearing RFID tags can transport the products through a door that has multiple RFID readers deployed nearby. The readers may be virtualized and data from the virtualized readers may be obtained by application software. For example, the application software may obtain EPC information regarding the products and can use this information to update a store inventory, cause a financial account to be debited, update manufacturers', distributors' and retailers' product sales databases, etc.
- Read/write RFID tags can capture information regarding the history of products or groups of products, e.g., temperature and other environmental changes, stresses, accelerations and/or vibrations that have acted upon the product. It will be particularly useful to record such information for products that are relatively more subject to spoilage or other damage, such as perishable foods and fragile items. By using the methods of the present invention, this information will be used to update databases maintained by various entities (e.g., manufacturers, wholesalers, retailers, transportation companies and financial institutions). The information will be used not only to resolve disputes (for example, regarding responsibility for product damage) but also to increase customer satisfaction, to avoid health risks, etc.
- Some aspects of the invention use a combination of EPC code information and combine them with versions of existing networking standards for identifying, locating and provisioning RFID devices, such as RFID readers and RFID printers, that are located in a network. An example of such a network is depicted in
FIG. 6 . Here,RFID network 600 includeswarehouse 601,factory 605,retail outlet 610,financial institution 615 andheadquarters 620. As will be appreciated by those of skill in the art,network 600 could include many other elements and/or multiple instances of the elements shown inFIG. 6 . For example,network 600 could include a plurality of warehouses, factories, etc. - In this illustration,
products 627 are being delivered towarehouse 601 bytruck 675.Products 627, which already include RFID tags, are delivered throughdoor 625. In this example,RFID reader 652 is connected to port 662 ofswitch 660. Here, switches 630 and 660 are connected to the rest ofRFID network 600 viagateway 650 andnetwork 625.Network 625 could be any convenient network, but in thisexample network 625 is the Internet.RFID reader 652 reads each product that passes throughdoor 625 and transmits the EPC code corresponding to each product onRFID network 600. - RFID tags may be used for different levels of a product distribution system. For example, there may be an RFID tag for a pallet of cases, an RFID tag for each case in the pallet and an RFID tag for each product. Accordingly, after
products 627enter warehouse 601, they are assembled intocases 646.RFID printer 656 makes an RFID tag for each ofcases 646. In this example,RFID printer 656 is connected to port 666 ofswitch 660.RFID printer 656 could operate under the control ofPC 647 inwarehouse 601, one ofPCs 667 inheadquarters 620, or some other device. -
RFID reader 624, which is connected toport 614, reads the EPC code of eachcase 646 andproduct 627 onconveyor belt 644 and transmits this information onnetwork 600. Similarly,RFID reader 626, which is connected toport 616, reads the EPC code of eachcase 646 andproduct 627 that exitsdoor 604 and transmits this information onnetwork 600.Cases 646 are loaded ontotruck 685 for distribution to another part of the product chain, e.g., toretail outlet 610. - Each of the RFID devices in
network 600 preferably has a “personality” suitable for its intended use. For example,device 652 could cause reassuring tone to sound and/or a green light to flash if an authorized person or object entersdoor 625. However,device 652 might cause an alarm to sound and/or an alert to be sent to an administrator onnetwork 600 if a product exitsdoor 625 or an unauthorized person enters or exitsdoor 625. -
FIG. 7 illustrates an RFID reader that can be configured to perform methods of the present invention.RFID reader 700 includes one ormore RF radios 705 for transmitting RF waves to, and receiving modulated RF waves from, RFID tags.RF radios 705 provide raw RF data that is converted by an analog-to-digital converter (not shown) and conveyed to other elements ofRFID reader 700. In some embodiments, these data are stored, at least temporarily, byCPU 710 inmemory 715 before being transmitted to other parts ofRFID network 600 vianetwork interface 725.Network interface 725 may be any convenient type of interface, such as an Ethernet interface. -
Flash memory 720 is used to store a program (a “bootloader”) for booting/initializingRFID reader 700. The bootloader, which is usually stored in a separate, partitioned area offlash memory 720, also allowsRFID reader 700 to recover from a power loss, etc. In some embodiments of the invention,flash memory 720 includes instructions for controllingCPU 710 to form “DHCPDISCOVER” requests, as described below with reference toFIG. 6 , to initiate a provisioning/configuration cycle. In some implementations,flash memory 720 is used to store personality information and other configuration information obtained from, e.g., a DHCP server during such a cycle. - However, in preferred implementations, such information is only stored in
volatile memory 415 after being received from, e.g. a DHCP server. There are advantages to keeping RFID devices “dumb.” For example, a network of dumb RFID devices allows much of the processing load to be centralized (e.g., performed byserver 270 of network 200), instead of being performed by the RFID devices. Alternatively, the processing load can be decentralized, but only to trusted devices (such as PC 247 of network 200). - Configuration information is downloaded from, e.g., a central server to
memory 715. Updates may be instigated by the central server or selected, trusted devices. New versions of the image file (e.g., the running, base image necessary to operate the RFID device) are copied intoflash memory 720. Alternative embodiments of RFID devices implement the methods of the present invention yet lack flash memory. - Newer RFID devices also include dry contact input/output leads to connect to signal lights, industrial networks or the equivalent. These newer RFID devices typically have evolved in the amount of memory, flash, CPU capacity and methods of determination of the number, type and content of RFID tags in their field of view.
-
FIG. 8 is a block diagram illustrating anexemplary RFID printer 800 that may be configured to perform some methods of the present invention.RFID printer 800 has many of the same components asRFID reader 700 and can be configured in the same general manner asRFID reader 700. - RFID printer also includes
printer interface 830, which may be a standard printer interface. Printer interface prints a label for each RFID tag, e.g. according to instructions received fromnetwork 200 vianetwork interface 825. -
RF Radio 805 is an outbound radio that is used to send RF signals to the antenna of an RFID tag under the control ofCPU 810, thereby encoding information (e.g. an EPC) on the tag's microprocessor. Preferably,RF Radio 805 then checks the encoded information for accuracy. The RFID tag is sandwiched within the label produced byprinter interface 830. Those of skill in the art will realize that the generalized diagram ofFIG. 8 will also apply to RFID writers, which are typically high-speed devices that encode the RFID tags on manufacturing lines. -
FIG. 9 illustratesRFID system 900 that includescontrol portion 901 andRF radio portion 902. The components ofcontrol portion 901 are substantially similar to those described above with reference toFIGS. 7 and 8 . Interconnect 930 ofcontrol portion 901 is configured for communication withinterconnect 935 ofRF radio portion 902. The communication may be via any convenient medium and format, such as wireless, serial, point-to-point serial, etc. Although only oneRF radio portion 902 is depicted inFIG. 9 , eachcontrol portion 901 may control a plurality ofRF radio portions 902.RFID system 900 may be deployed on a single framework or chassis (e.g., on a forklift) or in multiple chassis. -
FIG. 10 is a flow chart that illustrates an exemplary business application of the present invention. Those of skill in the art will appreciate that the example described below with reference toFIG. 10 is but one of many applications of the invention. - In
step 1005, a plurality of RFID devices have been provisioned according to one of the previously-described methods. The condition of the RFID network is comparable to that ofstep 330 inmethod 300, shown inFIG. 3A and described above. In this example, the RFID devices are RFID readers that are positioned near an exit door of a retail store. Therefore, in the previous steps, the devices have been provisioned with a personality that is appropriate for their role. - In
step 1010, a shopper exits the door with a number of selected products. Instep 1015, the RFID readers read the RFID tags of each product and extracts the EPC codes and related product information (e.g., the price of each product). Redundant RFID data may be filtered at any convenient part of the network, e.g., by middleware or by application software. - In this example, the RFID readers also read an RFID tag that identifies the shopper and the shopper's preferred account(s) that should be debited in order to purchase the products. For example, the shopper may have an RFID tag embedded in a card, a key chain, or any other convenient place in which this information is encoded. The accounts may be various types of accounts maintained by one or more financial institutions. For example, the accounts may be one or more of a checking account, savings account, a line of credit, a credit card account, etc. Biometric data (e.g., voice, fingerprint, retinal scan, etc.) from the shopper may also be obtained and compared with stored biometric data in order to verify the shopper's identity.
- In
step 1020, the RFID readers transmit the product information, including the EPC codes, on the RFID network. In this example, the information is sent (e.g., according to instructions in application software) to a financial institution indicated by the shopper's RFID tag. - In
step 1025, the financial institution that maintains the shopper's selected account determines whether there are sufficient funds (or whether there is sufficient credit) for the shopper to purchase the selected products. If so, the shopper's account is debited and the transaction is consummated (step 1030). - In this example, the shopper has the option of designating one or more alternative accounts. Accordingly, if the first account has insufficient funds or credit, it is determined (e.g., by a server on the RFID network) whether the shopper has indicated any alternative accounts for making purchases (step 1035). If so, the next account is evaluated in
step 1025. If it is determined instep 1035 that there are no additional accounts designated by the shopper, in this example some form of human intervention takes place. For example, a cashier of the retail store could assist the shopper in making the purchases in a conventional manner. - If some or all of the products are purchased, information regarding the purchased products (including the EPC codes) are transmitted on the RFID network. For example, this information is preferably forwarded to one or more devices on the RFID network that are configured to update one or more databases maintained by the retail store or the manufacturers/producers, distributors, wholesalers, etc., of the purchased products (step 1040). In some implementations, information regarding the shopper is also transmitted on the RFID network (e.g., if the shopper has authorized such information to be released). This product information (and optionally shopper information) may be used for a variety of purposes, e.g., in the formation of various types of business plans (e.g., inventory re-stocking, marketing, sales, distribution and manufacturing/production plans).
-
FIG. 11 illustrates an example of a network device that may be configured to implement some methods of the present invention.Network device 1160 includes a master central processing unit (CPU) 1162,interfaces 1168, and a bus 1167 (e.g., a PCI bus). Generally, interfaces 1168 includeports 1169 appropriate for communication with the appropriate media. In some embodiments, one or more ofinterfaces 1168 includes at least oneindependent processor 1174 and, in some instances, volatile RAM.Independent processors 1174 may be, for example ASICs or any other appropriate processors. According to some such embodiments, theseindependent processors 1174 perform at least some of the functions of the logic described herein. In some embodiments, one or more ofinterfaces 1168 control such communications-intensive tasks as media control and management. By providing separate processors for the communications-intensive tasks,interfaces 1168 allow themaster microprocessor 1162 efficiently to perform other functions such as routing computations, network diagnostics, security functions, etc. - The
interfaces 1168 are typically provided as interface cards (sometimes referred to as “line cards”). Generally, interfaces 1168 control the sending and receiving of data packets over the network and sometimes support other peripherals used with thenetwork device 1160. Among the interfaces that may be provided are Fibre Channel (“FC”) interfaces, Ethernet interfaces, frame relay interfaces, cable interfaces, DSL interfaces, token ring interfaces, and the like. In addition, various very high-speed interfaces may be provided, such as fast Ethernet interfaces, Gigabit Ethernet interfaces, ATM interfaces, HSSI interfaces, POS interfaces, FDDI interfaces, ASI interfaces, DHEI interfaces and the like. - When acting under the control of appropriate software or firmware, in some implementations of the
invention CPU 1162 may be responsible for implementing specific functions associated with the functions of a desired network device. According to some embodiments,CPU 1162 accomplishes all these functions under the control of software including an operating system (e.g. Linux, VxWorks, etc.), and any appropriate applications software. -
CPU 1162 may include one ormore processors 1163 such as a processor from the Motorola family of microprocessors or the MIPS family of microprocessors. In an alternative embodiment,processor 1163 is specially designed hardware for controlling the operations ofnetwork device 1160. In a specific embodiment, a memory 1161 (such as non-volatile RAM and/or ROM) also forms part ofCPU 1162. However, there are many different ways in which memory could be coupled to the system.Memory block 1161 may be used for a variety of purposes such as, for example, caching and/or storing data, programming instructions, etc. - Regardless of network device's configuration, it may employ one or more memories or memory modules (such as, for example, memory block 1165) configured to store data, program instructions for the general-purpose network operations and/or other information relating to the functionality of the techniques described herein. The program instructions may control the operation of an operating system and/or one or more applications, for example.
- Because such information and program instructions may be employed to implement the systems/methods described herein, the present invention relates to machine-readable media that include program instructions, state information, etc. for performing various operations described herein. Examples of machine-readable media include, but are not limited to, magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROM disks; magneto-optical media; and hardware devices that are specially configured to store and perform program instructions, such as read-only memory devices (ROM) and random access memory (RAM). The invention may also be embodied in a carrier wave traveling over an appropriate medium such as airwaves, optical lines, electric lines, etc. Examples of program instructions include both machine code, such as produced by a compiler, and files containing higher level code that may be executed by the computer using an interpreter.
- Although the system shown in
FIG. 11 illustrates one specific network device of the present invention, it is by no means the only network device architecture on which the present invention can be implemented. For example, an architecture having a single processor that handles communications as well as routing computations, etc. is often used. Further, other types of interfaces and media could also be used with the network device. The communication path between interfaces/line cards may be bus based (as shown inFIG. 11 ) or switch fabric based (such as a cross-bar). - Although illustrative embodiments and applications of this invention are shown and described herein, many variations and modifications are possible which remain within the concept, scope, and spirit of the invention, and these variations would become clear to those of ordinary skill in the art after perusal of this application.
- For example, while the present invention involves methods and devices for identifying and provisioning individual RFID devices in a network, many aspects of the present invention can be applied to identifying and provisioning other types of devices in a network. Similarly, although much of the discussion herein applies to implementations using the DHCP protocol, the present invention is not protocol-specific and may be used, for example, in implementations using UPNP, 802.1ab or similar discovery protocols. Likewise, while the implementations described herein refer to exemplary DHCP Options, other DHCP Options may advantageously be used to implement the present invention.
- Accordingly, the present embodiments are to be considered as illustrative and not restrictive, and the invention is not to be limited to the details given herein, but may be modified within the scope and equivalents of the appended claims.
Claims (20)
1. A method, comprising:
provisioning a plurality of devices in a network, each of the devices configured to capture information regarding one or more of temperature or other environmental changes, stresses, accelerations or vibrations;
associating each device with one of a plurality of locations;
transmitting a middleware server request from provisioned devices;
assigning one of a plurality of middleware servers to each of the requesting devices; and
associating each of the requesting devices with an assigned middleware server.
2. The method of claim 1 , wherein the transmitting comprises transmitting the middleware server request to a load balancer.
3. The method of claim 1 , wherein the provisioning comprises assigning an device network address and a load balancer network address, further comprising:
receiving a request from an application program regarding devices associated with a location; and
providing device network addresses for devices associated with the location.
4. The method of claim 1 , wherein associating each device with one of a plurality of locations comprises forming domain name server (“DNS”) entries that include location information for the devices.
5. The method of claim 1 , wherein the provisioning comprises:
receiving a provisioning request;
automatically identifying an device according to at least one of a media access control (“MAC”) address or an electronic product code (“EPC”) included in the provisioning request;
automatically locating the device according to location information included in the provisioning request; and
automatically providing the device with a desired functionality according to an identity and a location of the device.
6. The method of claim 1 , wherein the provisioning comprises:
forming a DHCPDISCOVER request that includes an electronic product code (“EPC”) of an device and location information indicating a location of the device;
sending the DHCPDISCOVER request to a Dynamic Host Configuration Protocol (“DHCP”) server; and
receiving provisioning information from the DHCP server that is specifically intended for the device, the provisioning information enabling a desired functionality according to an identity and a location of the device.
7. The method of claim 1 , wherein the provisioning comprises assigning an device network address and a load balancer network address and wherein associating each of the requesting devices with an assigned middleware server comprises forming domain name server (“DNS”) TXT entries that indicate middleware server information, each of the TXT entries being associated with a DNS entry for an device.
8. The method of claim 3 , further comprising virtualizing a plurality of devices at or near a given location.
9. The method of claim 3 , further comprising:
aggregating data from a plurality of devices at or near a given location; and
providing aggregated data from the plurality of devices to an application program.
10. A network, comprising:
a plurality of devices in various locations of a site;
a plurality of middleware servers associated with the site; and
an assigner, wherein the devices are provisioned with a device network address, an assigner network address and instructions to send a request to the assigner for a middleware server, and wherein the assigner is configured to assign a device to a middleware server in response to the request.
11. The network of claim 10 , wherein the assigner comprises a load balancer.
12. The network of claim 10 , further comprising a DNS (“domain name server”) configured to maintain device network addresses and corresponding location and site information.
13. A method, comprising:
provisioning each of a plurality of devices in the network, each of the devices configured to capture information regarding one or more of temperature or other environmental changes, stresses, accelerations or vibrations, wherein the provisioning comprises providing a device with a device network address and a designated load balancer;
associating each device network address with one of a plurality of locations;
causing devices to send a first middleware server request to a designated load balancer;
assigning a first middleware server of a plurality of available middleware servers to a first plurality of the requesting devices; and
making a correspondence between each of the first plurality of devices and the first middleware server.
14. The method of claim 13 , further comprising:
receiving an indication that the first middleware server is no longer an available middleware server;
causing each of the first plurality of devices to send a second middleware server request to the load balancer;
assigning a second middleware server of a plurality of available middleware servers to N devices of the first plurality of devices; and
associating each of the N devices with the second middleware server.
15. The method of claim 13 , further comprising virtualizing a plurality of devices at or near a given location.
16. The method of claim 14 , wherein the associating steps comprise forming domain name server (“DNS”) TXT entries that indicate middleware server information, each of the TXT entries being associated with a DNS entry for an device.
17. The method of claim 14 , wherein the indication comprises at least one of a loss of communication with the first middleware server or information from a network administrator.
18. The method of claim 15 , wherein the virtualizing comprises associating location data corresponding to the given location with each virtualized device.
19. A network, comprising:
means for provisioning a plurality of devices in a network, each of the devices configured to capture information regarding one or more of temperature or other environmental changes, stresses, accelerations or vibrations;
means for associating each device with one of a plurality of locations;
means for transmitting a middleware server request from provisioned devices;
means for assigning one of a plurality of middleware servers to each of the requesting devices; and
means for associating each of the requesting devices with an assigned middleware server.
20. The network of claim 20 , wherein the associating means comprises means for associating a plurality of devices with a single location.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/082,635 US20080197980A1 (en) | 2004-05-13 | 2008-04-11 | Methods and devices for providing scalable RFID networks |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US57099904P | 2004-05-13 | 2004-05-13 | |
US11/010,089 US7422152B2 (en) | 2004-05-13 | 2004-12-09 | Methods and devices for providing scalable RFID networks |
US12/082,635 US20080197980A1 (en) | 2004-05-13 | 2008-04-11 | Methods and devices for providing scalable RFID networks |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/010,089 Continuation US7422152B2 (en) | 2004-05-13 | 2004-12-09 | Methods and devices for providing scalable RFID networks |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080197980A1 true US20080197980A1 (en) | 2008-08-21 |
Family
ID=38059752
Family Applications (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/010,089 Active 2026-05-16 US7422152B2 (en) | 2004-05-13 | 2004-12-09 | Methods and devices for providing scalable RFID networks |
US11/104,140 Active 2027-11-03 US8060623B2 (en) | 2004-05-13 | 2005-04-11 | Automated configuration of network device ports |
US11/129,709 Active 2027-03-10 US7648070B2 (en) | 2004-05-13 | 2005-05-12 | Locating, provisioning and identifying devices in a network |
US12/082,635 Abandoned US20080197980A1 (en) | 2004-05-13 | 2008-04-11 | Methods and devices for providing scalable RFID networks |
US13/246,642 Expired - Fee Related US8601143B2 (en) | 2004-05-13 | 2011-09-27 | Automated configuration of network device ports |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/010,089 Active 2026-05-16 US7422152B2 (en) | 2004-05-13 | 2004-12-09 | Methods and devices for providing scalable RFID networks |
US11/104,140 Active 2027-11-03 US8060623B2 (en) | 2004-05-13 | 2005-04-11 | Automated configuration of network device ports |
US11/129,709 Active 2027-03-10 US7648070B2 (en) | 2004-05-13 | 2005-05-12 | Locating, provisioning and identifying devices in a network |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/246,642 Expired - Fee Related US8601143B2 (en) | 2004-05-13 | 2011-09-27 | Automated configuration of network device ports |
Country Status (2)
Country | Link |
---|---|
US (5) | US7422152B2 (en) |
CN (4) | CN100531083C (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060033606A1 (en) * | 2004-05-13 | 2006-02-16 | Cisco Technology, Inc. A Corporation Of California | Methods and apparatus for determining the status of a device |
US20060091999A1 (en) * | 2004-07-13 | 2006-05-04 | Cisco Technology, Inc., A Corporation Of California | Using syslog and SNMP for scalable monitoring of networked devices |
US20060266832A1 (en) * | 2004-05-13 | 2006-11-30 | Cisco Technology, Inc. | Virtual readers for scalable RFID infrastructures |
US20080087730A1 (en) * | 2004-05-13 | 2008-04-17 | Cioco Technology, Inc. | Methods and devices for assigning rfid device personality |
US20090189743A1 (en) * | 2008-01-24 | 2009-07-30 | Alcatel-Lucent | Radio-Frequency Identification Enabled Inventory Management and Network Operations System and Method |
US7789308B2 (en) | 2004-05-13 | 2010-09-07 | Cisco Technology, Inc. | Locating and provisioning devices in a network |
US7953826B2 (en) | 2005-07-14 | 2011-05-31 | Cisco Technology, Inc. | Provisioning and redundancy for RFID middleware servers |
US20130098988A1 (en) * | 2011-10-20 | 2013-04-25 | Goji Ltd. | System, Apparatus, and Method for Utilizing a Reading of a Machine Readable Element Associated with a Consumable Product |
US8601143B2 (en) | 2004-05-13 | 2013-12-03 | Cisco Technology, Inc. | Automated configuration of network device ports |
US8698603B2 (en) | 2005-11-15 | 2014-04-15 | Cisco Technology, Inc. | Methods and systems for automatic device provisioning in an RFID network using IP multicast |
US20150195323A1 (en) * | 2010-01-20 | 2015-07-09 | Samsung Electronics Co., Ltd. | Method and apparatus for reproducing content in multimedia data providing system |
Families Citing this family (179)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8260896B2 (en) | 2007-02-02 | 2012-09-04 | Mwa Intelligence, Inc. | Monitoring business machines using a mesh network on field nodes |
US7879111B2 (en) * | 2006-11-02 | 2011-02-01 | Sony Corporation | System and method for RFID transfer of MAC, keys |
US8321534B1 (en) * | 2003-10-15 | 2012-11-27 | Radix Holdings, Llc | System and method for synchronization based on preferences |
US7322523B2 (en) * | 2004-05-13 | 2008-01-29 | Cisco Technology, Inc. | Methods and devices for uniquely provisioning RFID devices |
US7336175B2 (en) * | 2004-05-13 | 2008-02-26 | Cisco Technology, Inc. | Methods and devices for locating and uniquely provisioning RFID devices |
US7987272B2 (en) | 2004-12-06 | 2011-07-26 | Cisco Technology, Inc. | Performing message payload processing functions in a network element on behalf of an application |
TW200622915A (en) * | 2004-12-20 | 2006-07-01 | Ind Tech Res Inst | Assembly matching service method for user to judge component and module |
US7295114B1 (en) * | 2005-01-21 | 2007-11-13 | Alien Technology Corporation | Location management for radio frequency identification readers |
US7213768B2 (en) | 2005-03-16 | 2007-05-08 | Cisco Technology, Inc. | Multiple device and/or user association |
US8442433B2 (en) * | 2005-03-30 | 2013-05-14 | At&T Intellectual Property I, Lp | Method and apparatus for provisioning a device |
US7830256B2 (en) * | 2005-04-07 | 2010-11-09 | Microsoft Corporation | Method and system for setup of, and communication with, an RFID middleware server from an enterprise resource planning system server |
GB2425681A (en) * | 2005-04-27 | 2006-11-01 | 3Com Corporaton | Access control by Dynamic Host Configuration Protocol snooping |
US8751649B2 (en) * | 2005-06-07 | 2014-06-10 | Extreme Networks | Port management system |
US8775571B2 (en) * | 2005-06-07 | 2014-07-08 | Extreme Networks, Inc. | Methods, systems, and computer program products for dynamic network access device port and user device configuration for implementing device-based and user-based policies |
TWI420428B (en) * | 2005-06-16 | 2013-12-21 | Koninkl Philips Electronics Nv | A wireless system, an rfid objects, and a method of tracking objects |
US8056800B2 (en) * | 2005-06-30 | 2011-11-15 | The Boeing Company | Systems and methods for configuration management |
US7345585B2 (en) | 2005-08-01 | 2008-03-18 | Cisco Technology, Inc. | Network based device for providing RFID middleware functionality |
US20070044090A1 (en) * | 2005-08-22 | 2007-02-22 | Bea Systems, Inc. | Packaging of EPCIS software |
US7394377B2 (en) * | 2005-08-22 | 2008-07-01 | Bea Systems, Inc. | RFID edge server with security plug-ins |
US7495568B2 (en) * | 2005-08-22 | 2009-02-24 | Bea Systems, Inc. | JMX administration of RFID edge server |
US7805499B2 (en) * | 2005-08-22 | 2010-09-28 | Bea Systems, Inc. | RFID edge server with security WSRM |
US20070044089A1 (en) * | 2005-08-22 | 2007-02-22 | Bea Systems, Inc. | Packaging of RFID software at edge server |
US7835954B2 (en) * | 2005-08-22 | 2010-11-16 | Bea Systems, Inc. | Event boxcarring of RFID information sent from RFID edge server |
US20070044091A1 (en) * | 2005-08-22 | 2007-02-22 | Bea Systems, Inc. | RFID edge server with in process JAVA connector to connect to legacy systems |
US20070043834A1 (en) * | 2005-08-22 | 2007-02-22 | Bea Systems, Inc. | Store and forward messaging from RFID edge server |
US7660890B2 (en) * | 2005-08-22 | 2010-02-09 | Bea Systems, Inc. | RFID edge server with socket multiplexing |
US7937494B2 (en) * | 2005-09-01 | 2011-05-03 | Cisco Technology, Inc. | Methods and apparatus for processing a DHCP request using rule-based classification |
US7937297B2 (en) * | 2005-09-27 | 2011-05-03 | Bea Systems, Inc. | RFID system using SOA |
KR100733986B1 (en) * | 2005-12-08 | 2007-06-29 | 한국전자통신연구원 | RFID Tag for RFID service based IP address, and RFID service Method based IP address using it |
US7934660B2 (en) | 2006-01-05 | 2011-05-03 | Hand Held Products, Inc. | Data collection system having reconfigurable data collection terminal |
US7801061B2 (en) * | 2006-01-10 | 2010-09-21 | Cisco Technology, Inc. | Seamless spanning tree upgrade of a linecard |
US7756066B2 (en) * | 2006-01-10 | 2010-07-13 | Cisco Technology, Inc. | Seamless spanning tree restart of a single supervisor |
US20070250603A1 (en) * | 2006-04-20 | 2007-10-25 | Dell Products L.P. | System and method for enhancing DHCP and SNMP messages with RFID EPC ID |
US7495560B2 (en) * | 2006-05-08 | 2009-02-24 | Corning Cable Systems Llc | Wireless picocellular RFID systems and methods |
US20080001751A1 (en) * | 2006-06-09 | 2008-01-03 | Bea Systems, Inc. | Rfid enterprise server improvements |
US8120489B2 (en) * | 2006-06-09 | 2012-02-21 | Oracle International Corporation | Workflow improvements |
US7528697B2 (en) * | 2006-06-09 | 2009-05-05 | Bea Systems, Inc. | Edge server failover |
US20070288482A1 (en) * | 2006-06-09 | 2007-12-13 | Bea Systems, Inc. | RFID Workflow Client |
US8000698B2 (en) * | 2006-06-26 | 2011-08-16 | Microsoft Corporation | Detection and management of rogue wireless network connections |
US20080016215A1 (en) * | 2006-07-13 | 2008-01-17 | Ford Daniel E | IP address pools for device configuration |
US7827200B2 (en) * | 2006-07-14 | 2010-11-02 | International Business Machines Corporation | Solution for managing serialization of EPC identifiers for use with RFID tags |
US7725577B2 (en) * | 2006-07-31 | 2010-05-25 | Sap Ag | Method and system to adaptively manage the quality of service of interactions between smart item networks and enterprise applications |
US7738456B2 (en) * | 2006-08-07 | 2010-06-15 | Cisco Technology, Inc. | Techniques to map switch and router ports to physical locations |
US20080036601A1 (en) * | 2006-08-11 | 2008-02-14 | Thompson Louis H | Radio frequency integration platform and network therefor |
US8207851B2 (en) * | 2006-08-16 | 2012-06-26 | James Christopher | System and method for tracking shopping behavior |
US9111157B2 (en) * | 2006-08-16 | 2015-08-18 | Insight Holding Group, Inc. | System and method for tracking shopping behavior |
US8681779B2 (en) * | 2006-09-01 | 2014-03-25 | Alcatel Lucent | Triple play subscriber and policy management system and method of providing same |
US7787823B2 (en) | 2006-09-15 | 2010-08-31 | Corning Cable Systems Llc | Radio-over-fiber (RoF) optical fiber cable system with transponder diversity and RoF wireless picocellular system using same |
US7848654B2 (en) | 2006-09-28 | 2010-12-07 | Corning Cable Systems Llc | Radio-over-fiber (RoF) wireless picocellular system with combined picocells |
EP1912411B1 (en) * | 2006-10-12 | 2010-03-31 | Koninklijke KPN N.V. | Method and system for service preparation of a residential network access device |
US7761540B2 (en) * | 2006-10-17 | 2010-07-20 | Dell Products L.P. | System and method for automated remote booting in a serial attached SCSI environment |
US7898986B2 (en) * | 2006-10-31 | 2011-03-01 | Hewlett-Packard Development Company, L.P. | Port configuration |
US7821941B2 (en) * | 2006-11-03 | 2010-10-26 | Cisco Technology, Inc. | Automatically controlling operation of a BRAS device based on encapsulation information |
US8552839B2 (en) * | 2006-11-29 | 2013-10-08 | Verizon Patent And Licensing Inc. | Method and apparatus for managing radio frequency identification (RFID) tags |
US8873585B2 (en) | 2006-12-19 | 2014-10-28 | Corning Optical Communications Wireless Ltd | Distributed antenna system for MIMO technologies |
US20080150698A1 (en) * | 2006-12-26 | 2008-06-26 | G2 Microsystems, Inc. | Radio frequency identification tag with passive and active features |
US20080177868A1 (en) * | 2007-01-23 | 2008-07-24 | Itai Ephraim Zilbershtein | Address Provisioning |
US8111998B2 (en) | 2007-02-06 | 2012-02-07 | Corning Cable Systems Llc | Transponder systems and methods for radio-over-fiber (RoF) wireless picocellular systems |
US8279874B1 (en) * | 2007-03-30 | 2012-10-02 | Extreme Networks, Inc. | Self-configuring network |
US20080247379A1 (en) * | 2007-04-05 | 2008-10-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and Network for Managing an Interface for Session-Based Synchronization |
US20100137024A1 (en) * | 2007-04-13 | 2010-06-03 | Thingmagic, Inc. | Multi-Mode Radio Frequency Communications |
US20080300951A1 (en) * | 2007-06-04 | 2008-12-04 | Cisco Technology, Inc. | Dynamic staffing using population count |
JP2009025936A (en) * | 2007-07-18 | 2009-02-05 | Seiko Epson Corp | Intermediary server, control method therefor and program therefor |
US20100054746A1 (en) | 2007-07-24 | 2010-03-04 | Eric Raymond Logan | Multi-port accumulator for radio-over-fiber (RoF) wireless picocellular systems |
DE102007036962A1 (en) * | 2007-08-04 | 2009-02-05 | Hirschmann Automation And Control Gmbh | DHCP Server Configuration Procedure Using DHCP Option 82 |
US7957528B2 (en) * | 2007-08-21 | 2011-06-07 | Sony Corporation | Near field registration of home system audio-video device |
KR101217632B1 (en) * | 2007-10-10 | 2013-01-02 | 삼성전자주식회사 | A device and method for setting an environment of the device |
US8175459B2 (en) | 2007-10-12 | 2012-05-08 | Corning Cable Systems Llc | Hybrid wireless/wired RoF transponder and hybrid RoF communication system using same |
US8198988B2 (en) * | 2007-11-16 | 2012-06-12 | Sony Corporation | Secure link between controller and device |
US8514712B1 (en) * | 2007-12-06 | 2013-08-20 | Force10 Networks, Inc. | Non-stop VoIP support |
WO2009081376A2 (en) | 2007-12-20 | 2009-07-02 | Mobileaccess Networks Ltd. | Extending outdoor location based services and applications into enclosed areas |
US7778203B2 (en) * | 2008-02-01 | 2010-08-17 | Microsoft Corporation | On-demand MAC address lookup |
US20100077429A1 (en) * | 2008-09-19 | 2010-03-25 | Electronics And Telecommunications Research Institute | System and method for providing multimedia service |
US20100103910A1 (en) * | 2008-10-28 | 2010-04-29 | Mohan Verma | Smart device profiling |
CN102160400B (en) * | 2009-01-09 | 2014-06-04 | 上海贝尔股份有限公司 | Method, equipment for acquiring information needed to locate mobile terminal |
US8285875B2 (en) * | 2009-01-28 | 2012-10-09 | Juniper Networks, Inc. | Synchronizing resource bindings within computer network |
US8086713B2 (en) * | 2009-01-28 | 2011-12-27 | Juniper Networks, Inc. | Determining a subscriber device has failed gracelessly without issuing a DHCP release message and automatically releasing resources reserved for the subscriber device within a broadband network upon determining that another subscriber device requesting the reservation of a network address has the same context information as the failed subscriber device |
AU2010210771B2 (en) | 2009-02-03 | 2015-09-17 | Corning Cable Systems Llc | Optical fiber-based distributed antenna systems, components, and related methods for calibration thereof |
WO2010090999A1 (en) | 2009-02-03 | 2010-08-12 | Corning Cable Systems Llc | Optical fiber-based distributed antenna systems, components, and related methods for monitoring and configuring thereof |
US9673904B2 (en) | 2009-02-03 | 2017-06-06 | Corning Optical Communications LLC | Optical fiber-based distributed antenna systems, components, and related methods for calibration thereof |
KR101041988B1 (en) * | 2009-02-24 | 2011-06-16 | 부산대학교 산학협력단 | RFID Middleware system and method to support real-time balancing load of reader connections |
US8918531B2 (en) * | 2009-05-07 | 2014-12-23 | Cisco Technology, Inc. | Automated network device provisioning using dynamic host configuration protocol |
CN101616029B (en) * | 2009-07-28 | 2011-10-26 | 中兴通讯股份有限公司 | Method and system for realizing network topology discovery |
US8548330B2 (en) | 2009-07-31 | 2013-10-01 | Corning Cable Systems Llc | Sectorization in distributed antenna systems, and related components and methods |
JP4802269B2 (en) * | 2009-09-17 | 2011-10-26 | 東芝テック株式会社 | Wireless tag reader |
US8280259B2 (en) | 2009-11-13 | 2012-10-02 | Corning Cable Systems Llc | Radio-over-fiber (RoF) system for protocol-independent wired and/or wireless communication |
US9007181B2 (en) * | 2010-01-08 | 2015-04-14 | Tyco Fire & Security Gmbh | Method and system for discovery and transparent status reporting for sensor networks |
US8565914B2 (en) * | 2010-01-18 | 2013-10-22 | Vistaprint Technologies Limited | Method and system for automatically tracking packages in automated packaging system |
US8260902B1 (en) | 2010-01-26 | 2012-09-04 | Juniper Networks, Inc. | Tunneling DHCP options in authentication messages |
US9823342B2 (en) * | 2010-02-09 | 2017-11-21 | Aeroscout, Ltd. | System and method for mobile monitoring of non-associated tags |
US8275265B2 (en) | 2010-02-15 | 2012-09-25 | Corning Cable Systems Llc | Dynamic cell bonding (DCB) for radio-over-fiber (RoF)-based networks and communication systems and related methods |
US8560658B2 (en) * | 2010-03-23 | 2013-10-15 | Juniper Networks, Inc. | Managing distributed address pools within network devices |
US20110268446A1 (en) | 2010-05-02 | 2011-11-03 | Cune William P | Providing digital data services in optical fiber-based distributed radio frequency (rf) communications systems, and related components and methods |
US9525488B2 (en) | 2010-05-02 | 2016-12-20 | Corning Optical Communications LLC | Digital data services and/or power distribution in optical fiber-based distributed communications systems providing digital data and radio frequency (RF) communications services, and related components and methods |
US8725855B2 (en) * | 2010-06-11 | 2014-05-13 | Schneider Electric USA, Inc. | Device commissioning and replacement |
US8631100B2 (en) | 2010-07-20 | 2014-01-14 | Juniper Networks, Inc. | Automatic assignment of hardware addresses within computer networks |
US8963691B1 (en) | 2010-07-27 | 2015-02-24 | The Boeing Company | Sensor association system using wireless device information |
US9113234B2 (en) * | 2010-07-27 | 2015-08-18 | The Boeing Company | Wireless device association system |
EP2413648A1 (en) * | 2010-07-30 | 2012-02-01 | Deutsche Telekom AG | Localisation of information and communication terminals for generating a local work and network environment in an extended virtuality with a computer system |
EP2606707A1 (en) | 2010-08-16 | 2013-06-26 | Corning Cable Systems LLC | Remote antenna clusters and related systems, components, and methods supporting digital data signal propagation between remote antenna units |
US8566460B1 (en) * | 2010-09-15 | 2013-10-22 | Tellabs Operations, Inc. | Method and apparatus for initiating temporary configuration allowing remote accessing via a network device |
US9252874B2 (en) | 2010-10-13 | 2016-02-02 | Ccs Technology, Inc | Power management for remote antenna units in distributed antenna systems |
CN102457907B (en) * | 2010-10-25 | 2015-07-29 | 上海贝尔股份有限公司 | The method and apparatus of identify customer end type in Centralized Wireless LAN |
US9130835B1 (en) | 2010-12-01 | 2015-09-08 | Juniper Networks, Inc. | Methods and apparatus for configuration binding in a distributed switch |
US8782211B1 (en) | 2010-12-21 | 2014-07-15 | Juniper Networks, Inc. | Dynamically scheduling tasks to manage system load |
EP2678972B1 (en) | 2011-02-21 | 2018-09-05 | Corning Optical Communications LLC | Providing digital data services as electrical signals and radio-frequency (rf) communications over optical fiber in distributed communications systems, and related components and methods |
CN102651709A (en) * | 2011-02-28 | 2012-08-29 | 鸿富锦精密工业(深圳)有限公司 | Power-saving exchanger and power-saving method thereof |
JP5729063B2 (en) * | 2011-03-22 | 2015-06-03 | 富士通株式会社 | COMMUNICATION SETTING METHOD, COMMUNICATION SETTING SERVER, RELAY DEVICE, AND COMMUNICATION SETTING PROGRAM |
WO2012148940A1 (en) | 2011-04-29 | 2012-11-01 | Corning Cable Systems Llc | Systems, methods, and devices for increasing radio frequency (rf) power in distributed antenna systems |
CN103548290B (en) | 2011-04-29 | 2016-08-31 | 康宁光缆系统有限责任公司 | Judge the communication propagation delays in distributing antenna system and associated component, System and method for |
US20120303762A1 (en) * | 2011-05-23 | 2012-11-29 | Devon It, Inc. | Zero Configuration Set-Up for Thin Client Computers |
US9813503B2 (en) * | 2011-06-30 | 2017-11-07 | Mitsubishi Electric Corporation | IP-address distribution system utilizing a plurality of switching devices grouped into two or more groups |
US20130023280A1 (en) * | 2011-07-20 | 2013-01-24 | Qualcomm Incorporated | Wireless Device Secure Tracking |
US9407506B2 (en) * | 2011-09-12 | 2016-08-02 | Microsoft Technology Licensing, Llc | Multi-entity management |
CN104081723A (en) * | 2012-01-17 | 2014-10-01 | 爱立信(中国)通信有限公司 | Methods and apparatus for network protection |
EP2832012A1 (en) | 2012-03-30 | 2015-02-04 | Corning Optical Communications LLC | Reducing location-dependent interference in distributed antenna systems operating in multiple-input, multiple-output (mimo) configuration, and related components, systems, and methods |
EP2842245A1 (en) | 2012-04-25 | 2015-03-04 | Corning Optical Communications LLC | Distributed antenna system architectures |
US8824297B2 (en) | 2012-04-26 | 2014-09-02 | Cisco Technology, Inc. | Adaptive storm control |
US9055050B2 (en) * | 2012-06-27 | 2015-06-09 | Facebook, Inc. | User authentication of applications on third-party devices via user devices |
EP2883416A1 (en) | 2012-08-07 | 2015-06-17 | Corning Optical Communications Wireless Ltd. | Distribution of time-division multiplexed (tdm) management services in a distributed antenna system, and related components, systems, and methods |
CN102841047B (en) * | 2012-08-31 | 2015-07-01 | 深圳市华星光电技术有限公司 | Cleanness monitoring system and cassette |
US9083650B2 (en) | 2012-10-16 | 2015-07-14 | Cable Television Laboratories, Inc. | Overlay network |
US9455784B2 (en) | 2012-10-31 | 2016-09-27 | Corning Optical Communications Wireless Ltd | Deployable wireless infrastructures and methods of deploying wireless infrastructures |
CN105308876B (en) | 2012-11-29 | 2018-06-22 | 康宁光电通信有限责任公司 | Remote unit antennas in distributing antenna system combines |
US9647758B2 (en) | 2012-11-30 | 2017-05-09 | Corning Optical Communications Wireless Ltd | Cabling connectivity monitoring and verification |
US9881132B2 (en) * | 2012-12-03 | 2018-01-30 | Change Healthcare Llc | Method and apparatus for remote workstation synchronization |
US20140266612A1 (en) * | 2013-03-12 | 2014-09-18 | Novatel Wireless, Inc. | Passive near field id for correlating asset with mobile tracker |
EP3008828B1 (en) | 2013-06-12 | 2017-08-09 | Corning Optical Communications Wireless Ltd. | Time-division duplexing (tdd) in distributed communications systems, including distributed antenna systems (dass) |
EP3008515A1 (en) | 2013-06-12 | 2016-04-20 | Corning Optical Communications Wireless, Ltd | Voltage controlled optical directional coupler |
US9247543B2 (en) | 2013-07-23 | 2016-01-26 | Corning Optical Communications Wireless Ltd | Monitoring non-supported wireless spectrum within coverage areas of distributed antenna systems (DASs) |
US9661781B2 (en) | 2013-07-31 | 2017-05-23 | Corning Optical Communications Wireless Ltd | Remote units for distributed communication systems and related installation methods and apparatuses |
US9887960B2 (en) | 2013-08-14 | 2018-02-06 | Nicira, Inc. | Providing services for logical networks |
DE102013216501A1 (en) * | 2013-08-20 | 2015-02-26 | Vega Grieshaber Kg | Instrument access device, field device and method for controlling access to a meter |
US9385810B2 (en) | 2013-09-30 | 2016-07-05 | Corning Optical Communications Wireless Ltd | Connection mapping in distributed communication systems |
US9614614B2 (en) | 2013-11-03 | 2017-04-04 | Ixia | Locating a physical connector module |
CN103714309A (en) * | 2013-12-12 | 2014-04-09 | 苏州斯普锐智能系统有限公司 | Integrated wireless barcode and radio frequency reading device |
US9178635B2 (en) | 2014-01-03 | 2015-11-03 | Corning Optical Communications Wireless Ltd | Separation of communication signal sub-bands in distributed antenna systems (DASs) to reduce interference |
US9775123B2 (en) | 2014-03-28 | 2017-09-26 | Corning Optical Communications Wireless Ltd. | Individualized gain control of uplink paths in remote units in a distributed antenna system (DAS) based on individual remote unit contribution to combined uplink power |
US9357551B2 (en) | 2014-05-30 | 2016-05-31 | Corning Optical Communications Wireless Ltd | Systems and methods for simultaneous sampling of serial digital data streams from multiple analog-to-digital converters (ADCS), including in distributed antenna systems |
US9525472B2 (en) | 2014-07-30 | 2016-12-20 | Corning Incorporated | Reducing location-dependent destructive interference in distributed antenna systems (DASS) operating in multiple-input, multiple-output (MIMO) configuration, and related components, systems, and methods |
JP6413495B2 (en) * | 2014-08-29 | 2018-10-31 | セイコーエプソン株式会社 | Information processing method and recording system |
US9730228B2 (en) | 2014-08-29 | 2017-08-08 | Corning Optical Communications Wireless Ltd | Individualized gain control of remote uplink band paths in a remote unit in a distributed antenna system (DAS), based on combined uplink power level in the remote unit |
US9602210B2 (en) | 2014-09-24 | 2017-03-21 | Corning Optical Communications Wireless Ltd | Flexible head-end chassis supporting automatic identification and interconnection of radio interface modules and optical interface modules in an optical fiber-based distributed antenna system (DAS) |
WO2016046446A1 (en) | 2014-09-24 | 2016-03-31 | Nokia Technologies Oy | Controlling a device |
US10659163B2 (en) | 2014-09-25 | 2020-05-19 | Corning Optical Communications LLC | Supporting analog remote antenna units (RAUs) in digital distributed antenna systems (DASs) using analog RAU digital adaptors |
US9420542B2 (en) | 2014-09-25 | 2016-08-16 | Corning Optical Communications Wireless Ltd | System-wide uplink band gain control in a distributed antenna system (DAS), based on per band gain control of remote uplink paths in remote units |
WO2016071902A1 (en) | 2014-11-03 | 2016-05-12 | Corning Optical Communications Wireless Ltd. | Multi-band monopole planar antennas configured to facilitate improved radio frequency (rf) isolation in multiple-input multiple-output (mimo) antenna arrangement |
WO2016075696A1 (en) | 2014-11-13 | 2016-05-19 | Corning Optical Communications Wireless Ltd. | Analog distributed antenna systems (dass) supporting distribution of digital communications signals interfaced from a digital signal source and analog radio frequency (rf) communications signals |
US9729267B2 (en) | 2014-12-11 | 2017-08-08 | Corning Optical Communications Wireless Ltd | Multiplexing two separate optical links with the same wavelength using asymmetric combining and splitting |
WO2016098109A1 (en) | 2014-12-18 | 2016-06-23 | Corning Optical Communications Wireless Ltd. | Digital interface modules (dims) for flexibly distributing digital and/or analog communications signals in wide-area analog distributed antenna systems (dass) |
WO2016098111A1 (en) | 2014-12-18 | 2016-06-23 | Corning Optical Communications Wireless Ltd. | Digital- analog interface modules (da!ms) for flexibly.distributing digital and/or analog communications signals in wide-area analog distributed antenna systems (dass) |
US9819748B2 (en) * | 2015-01-15 | 2017-11-14 | Cisco Technology, Inc. | Network device identification in an industrial control network |
US20160249365A1 (en) | 2015-02-19 | 2016-08-25 | Corning Optical Communications Wireless Ltd. | Offsetting unwanted downlink interference signals in an uplink path in a distributed antenna system (das) |
US9681313B2 (en) | 2015-04-15 | 2017-06-13 | Corning Optical Communications Wireless Ltd | Optimizing remote antenna unit performance using an alternative data channel |
EP3091458B1 (en) | 2015-05-02 | 2021-02-24 | F. Hoffmann-La Roche AG | Point-of-care testing system |
EP3457409B1 (en) | 2015-05-02 | 2023-06-07 | F. Hoffmann-La Roche AG | Point-of-care testing system |
US9887882B2 (en) | 2015-06-12 | 2018-02-06 | At&T Intellectual Property I, L.P. | Referent system for devices of an NFV network |
US20170193124A1 (en) * | 2015-06-23 | 2017-07-06 | Redbite Solutions Ltd. | Cloud-Based Universal Tagging System |
US9930707B2 (en) * | 2015-07-10 | 2018-03-27 | Thales Avionics, Inc. | In-flight entertainment system that identifies wireless access point locations within cabin |
US9948349B2 (en) | 2015-07-17 | 2018-04-17 | Corning Optical Communications Wireless Ltd | IOT automation and data collection system |
US10560214B2 (en) | 2015-09-28 | 2020-02-11 | Corning Optical Communications LLC | Downlink and uplink communication path switching in a time-division duplex (TDD) distributed antenna system (DAS) |
US10165390B2 (en) | 2016-03-10 | 2018-12-25 | Keysight Technologies Singapore (Holdlngs) Pte. Ltd. | Methods, systems, and computer readable media for management of passive network taps using radio frequency identification (RFID) |
US10236924B2 (en) | 2016-03-31 | 2019-03-19 | Corning Optical Communications Wireless Ltd | Reducing out-of-channel noise in a wireless distribution system (WDS) |
US10841273B2 (en) * | 2016-04-29 | 2020-11-17 | Nicira, Inc. | Implementing logical DHCP servers in logical networks |
US10230685B2 (en) * | 2016-05-20 | 2019-03-12 | At&T Intellectual Property I, L.P. | Subscriber session director |
US10650384B2 (en) | 2016-05-31 | 2020-05-12 | Mastercard International Incorporated | Systems and methods for using network data in an automated delivery system |
CN108093092A (en) * | 2016-11-22 | 2018-05-29 | 鸿富锦精密电子(天津)有限公司 | The distribution system and method for server ip address |
DE112018000705T5 (en) | 2017-03-06 | 2019-11-14 | Cummins Filtration Ip, Inc. | DETECTION OF REAL FILTERS WITH A FILTER MONITORING SYSTEM |
EP3619911A4 (en) * | 2017-05-03 | 2021-01-13 | Ndustrial.Io, Inc. | Device, system, and method for sensor provisioning |
US10678745B2 (en) | 2017-05-08 | 2020-06-09 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Providing computing device configuration information via a light transmission |
KR102016468B1 (en) * | 2017-09-27 | 2019-09-02 | 주식회사 포에스텍 | Middleware server and data processing method of the same |
CN108563884B (en) * | 2018-04-20 | 2021-08-13 | 南京航空航天大学 | Maximum value estimation method for large-scale RFID system |
US10992637B2 (en) | 2018-07-31 | 2021-04-27 | Juniper Networks, Inc. | Detecting hardware address conflicts in computer networks |
US10942731B2 (en) * | 2018-12-18 | 2021-03-09 | Uber Technologies, Inc. | Scalable code repository with green master |
US10931628B2 (en) | 2018-12-27 | 2021-02-23 | Juniper Networks, Inc. | Duplicate address detection for global IP address or range of link local IP addresses |
US11165744B2 (en) | 2018-12-27 | 2021-11-02 | Juniper Networks, Inc. | Faster duplicate address detection for ranges of link local addresses |
US11356330B2 (en) * | 2019-02-27 | 2022-06-07 | Oki Electric Industry Co., Ltd. | Communication device and communication method |
US10965637B1 (en) | 2019-04-03 | 2021-03-30 | Juniper Networks, Inc. | Duplicate address detection for ranges of global IP addresses |
US11848756B1 (en) | 2023-03-20 | 2023-12-19 | International Business Machines Corporation | Automatic detection of optimal networking stack and protocol |
Citations (91)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2011A (en) * | 1841-03-18 | Appabatxts for piling saws | ||
US4688026A (en) * | 1984-05-15 | 1987-08-18 | Scribner James R | Method of collecting and using data associated with tagged objects |
US5339073A (en) * | 1987-03-31 | 1994-08-16 | Identec Limited | Access control equipment and method for using the same |
US5646616A (en) * | 1994-07-01 | 1997-07-08 | Murata Kikai Kabushiki Kaisha | Picking system |
US5887176A (en) * | 1996-06-28 | 1999-03-23 | Randtec, Inc. | Method and system for remote monitoring and tracking of inventory |
US6070187A (en) * | 1998-03-26 | 2000-05-30 | Hewlett-Packard Company | Method and apparatus for configuring a network node to be its own gateway |
US6111517A (en) * | 1996-12-30 | 2000-08-29 | Visionics Corporation | Continuous video monitoring using face recognition for access control |
US6115079A (en) * | 1998-02-14 | 2000-09-05 | Mcrae; Michael W. | Programmable video channel controller |
US6212563B1 (en) * | 1998-10-01 | 2001-04-03 | 3Com Corporation | Method and system for setting and managing externally provided internet protocol addresses using the dynamic host configuration protocol |
US6272113B1 (en) * | 1998-09-11 | 2001-08-07 | Compaq Computer Corporation | Network controller system that uses multicast heartbeat packets |
US20010012292A1 (en) * | 1997-01-17 | 2001-08-09 | Todd A. Merrill | Router for use with a link that has a set of concurrent channels |
US6300903B1 (en) * | 1998-03-23 | 2001-10-09 | Time Domain Corporation | System and method for person or object position location utilizing impulse radio |
US20010028308A1 (en) * | 1997-03-28 | 2001-10-11 | Carlos De La Huerga | Interactive medication container |
US20020001307A1 (en) * | 2000-05-20 | 2002-01-03 | Equipe Communications Corporation | VPI/VCI availability index |
US20020016739A1 (en) * | 1999-09-21 | 2002-02-07 | Fujitsu Limited | System and method for managing expiration-dated products utilizing an electronic receipt |
US20020046263A1 (en) * | 2000-10-12 | 2002-04-18 | Jacques Camerini | Method of configuring an automation module on a TCP/IP network |
US6381465B1 (en) * | 1999-08-27 | 2002-04-30 | Leap Wireless International, Inc. | System and method for attaching an advertisement to an SMS message for wireless transmission |
US6393458B1 (en) * | 1999-01-28 | 2002-05-21 | Genrad, Inc. | Method and apparatus for load balancing in a distributed object architecture |
US20020075805A1 (en) * | 2000-09-22 | 2002-06-20 | Narad Networks, Inc. | Broadband system with QOS based packet handling |
US6473858B1 (en) * | 1999-04-16 | 2002-10-29 | Digeo, Inc. | Method and apparatus for broadcasting data with access control |
US20020161907A1 (en) * | 2001-04-25 | 2002-10-31 | Avery Moon | Adaptive multi-protocol communications system |
US20030046339A1 (en) * | 2001-09-05 | 2003-03-06 | Ip Johnny Chong Ching | System and method for determining location and status of computer system server |
US6539281B2 (en) * | 2001-04-23 | 2003-03-25 | Accenture Global Services Gmbh | Online medicine cabinet |
US20030065784A1 (en) * | 2001-09-28 | 2003-04-03 | Allan Herrod | Software method for maintaining connectivity between applications during communications by mobile computer terminals operable in wireless networks |
US6553489B1 (en) * | 2000-01-12 | 2003-04-22 | Cisco Technology, Inc. | System and method for secure and efficient universal port configuration |
US20030095032A1 (en) * | 2001-11-19 | 2003-05-22 | Takeshi Hoshino | Tag management server |
US20030126248A1 (en) * | 2001-12-28 | 2003-07-03 | Chambers Paul S. | Method to automatically configure network routing device |
US20030177374A1 (en) * | 2002-03-16 | 2003-09-18 | Yung Marcel Mordechay | Secure logic interlocking |
US20030174714A1 (en) * | 2002-03-01 | 2003-09-18 | Globespan Virata, Inc. | Zero-installation PPP-Bridge setup for lan-to-wan connectivity |
US6677852B1 (en) * | 1999-09-22 | 2004-01-13 | Intermec Ip Corp. | System and method for automatically controlling or configuring a device, such as an RFID reader |
US20040010594A1 (en) * | 2002-07-11 | 2004-01-15 | International Business Machines Corporation | Virtualizing the security parameter index, marker key, frame key, and verification tag |
US20040021569A1 (en) * | 2001-11-21 | 2004-02-05 | Robert Lepkofker | Personnel and resource tracking method and system for enclosed spaces |
US20040064577A1 (en) * | 2002-07-25 | 2004-04-01 | Dahlin Michael D. | Method and system for background replication of data objects |
US20040061646A1 (en) * | 2002-09-30 | 2004-04-01 | Lucent Technologies, Inc. | Methods and apparatus for location determination based on dispersed radio frequency tags |
US20040069852A1 (en) * | 2002-06-26 | 2004-04-15 | Nokia Corporation | Bluetooth RF based RF-tag read/write station |
US20040073600A1 (en) * | 2002-07-08 | 2004-04-15 | Anders Elo | Dynamic port configuration of network equipment |
US20040100383A1 (en) * | 2002-11-21 | 2004-05-27 | Kimberly-Clark Worldwide, Inc. | RFID system and method for ensuring safety of hazardous or dangerous substances |
US20040108795A1 (en) * | 2002-12-06 | 2004-06-10 | Meek Robert B. | High capacity drawer with mechanical indicator for a dispensing device |
US20040128389A1 (en) * | 2002-12-31 | 2004-07-01 | Kurt Kopchik | Method and apparatus for wirelessly establishing user preference settings on a computer |
US20040145474A1 (en) * | 2002-11-15 | 2004-07-29 | Schmidtberg Rupert A. | RF identification reader for communicating condition information associated with the reader |
US6843121B1 (en) * | 2003-08-25 | 2005-01-18 | Eastman Kodak Company | Measuring absolute static pressure at one or more positions along a microfluidic device |
US20050021626A1 (en) * | 2003-05-22 | 2005-01-27 | Cisco Technology, Inc. | Peer-to-peer dynamic web page sharing |
US20050027778A1 (en) * | 2003-07-29 | 2005-02-03 | Arthur Dimitrelis | Automatic configuration of an address allocation mechanism in a computer network |
US20050080881A1 (en) * | 2003-09-26 | 2005-04-14 | William Voorhees | Systems and methods for configuring ports of an SAS domain |
US20050093679A1 (en) * | 2003-10-31 | 2005-05-05 | Zai Li-Cheng R. | Method and system of using active RFID tags to provide a reliable and secure RFID system |
US20050102406A1 (en) * | 2003-11-07 | 2005-05-12 | Cisco Technology, Inc. | Automated configuration of a gateway |
US20050099270A1 (en) * | 2003-11-10 | 2005-05-12 | Impinj, Inc. | RFID tags adjusting to different regulatory environments, and RFID readers to so adjust them and methods |
US6912213B2 (en) * | 2000-03-06 | 2005-06-28 | Lg Electronics Inc. | Reverse power control method of data transmission for wireless local loop |
US6931574B1 (en) * | 2001-10-24 | 2005-08-16 | Finisar Corporation | Systems and methods for interpreting communications packets |
US20050199716A1 (en) * | 2004-03-10 | 2005-09-15 | Microsoft Corporation | Method and system for communicating with identification tags |
US20050209947A1 (en) * | 2004-03-10 | 2005-09-22 | Microsoft Corporation | Method and identification tag for asset management |
US20050228887A1 (en) * | 2004-04-07 | 2005-10-13 | Ynjiun Wang | Routing device and method for use with a HTTP enabled computer peripheral |
US20060005035A1 (en) * | 2004-06-22 | 2006-01-05 | Coughlin Michael E | Keystroke input device for use with an RFID tag and user verification system |
US20060010086A1 (en) * | 2004-07-10 | 2006-01-12 | Klein Elliot S | Data append method for sent postal mail |
US20060022801A1 (en) * | 2004-07-30 | 2006-02-02 | Reva Systems Corporation | RFID tag data acquisition system |
US6995655B2 (en) * | 2002-10-02 | 2006-02-07 | Battelle Memorial Institute | Method of simultaneously reading multiple radio frequency tags, RF tags, and RF reader |
US20060031374A1 (en) * | 2001-06-18 | 2006-02-09 | Transtech Networks Usa, Inc. | Packet switch and method thereof dependent on application content |
US20060033606A1 (en) * | 2004-05-13 | 2006-02-16 | Cisco Technology, Inc. A Corporation Of California | Methods and apparatus for determining the status of a device |
US20060044111A1 (en) * | 2002-02-22 | 2006-03-02 | Jafa Technologies., Inc., | Real-time data reporting using radio frequency identification |
US20060047464A1 (en) * | 2004-09-01 | 2006-03-02 | Microsoft Corporation | RFID server internals design |
US20060053234A1 (en) * | 2004-09-01 | 2006-03-09 | Microsoft Corporation | Device service provider interface |
US20060091999A1 (en) * | 2004-07-13 | 2006-05-04 | Cisco Technology, Inc., A Corporation Of California | Using syslog and SNMP for scalable monitoring of networked devices |
US7057511B2 (en) * | 2001-02-12 | 2006-06-06 | Symbol Technologies, Inc. | Method, system, and apparatus for communicating with a RFID tag population |
US20060123467A1 (en) * | 2004-12-06 | 2006-06-08 | Sandeep Kumar | Performing message payload processing functions in a network element on behalf of an application |
US7064660B2 (en) * | 2002-05-14 | 2006-06-20 | Motorola, Inc. | System and method for inferring an electronic rendering of an environment |
US20060132304A1 (en) * | 2004-12-06 | 2006-06-22 | Cabell Dennis J | Rule-based management of objects |
US20060143318A1 (en) * | 2004-12-29 | 2006-06-29 | Cisco Technology, Inc., A Corporation Of California | Agnostic peripheral control for media communication appliances |
US20060146879A1 (en) * | 2005-01-05 | 2006-07-06 | Tefcros Anthias | Interpreting an application message at a network element using sampling and heuristics |
US7075412B1 (en) * | 2002-05-30 | 2006-07-11 | Thingmagic L.L.C. | Methods and apparatus for operating a radio device |
US7081819B2 (en) * | 2002-07-09 | 2006-07-25 | Neology, Inc. | System and method for providing secure identification solutions |
US7103886B2 (en) * | 2000-12-07 | 2006-09-05 | Sap Ag | System, method, computer program product for communicating data for objects that are transported from first location to second location |
US7103040B2 (en) * | 2001-11-19 | 2006-09-05 | Telefonaktieboaget Lm Ericsson (Publ) | Method and apparatus for identifying a node for data communications using its geographical location |
US20060208885A1 (en) * | 2005-03-01 | 2006-09-21 | Tao Lin | Product flow based auto-ID infrastructure |
US7117364B1 (en) * | 1999-10-05 | 2006-10-03 | International Busienss Machines Corporation | System and method for downloading application components to a chipcard |
US20070013518A1 (en) * | 2005-07-14 | 2007-01-18 | Cisco Technology, Inc. | Provisioning and redundancy for RFID middleware servers |
US20070027966A1 (en) * | 2005-08-01 | 2007-02-01 | Cisco Technology, Inc. | Network based device for providing RFID middleware functionality |
US20070080784A1 (en) * | 2005-10-10 | 2007-04-12 | Electronics And Telecommunications Research Institute | Mobile RFID service providing apparatus and method thereof |
US20070109100A1 (en) * | 2005-11-15 | 2007-05-17 | Cisco Technology, Inc. | Methods and systems for automatic device provisioning in an RFID network using IP multicast |
US20070112574A1 (en) * | 2003-08-05 | 2007-05-17 | Greene William S | System and method for use of mobile policy agents and local services, within a geographically distributed service grid, to provide greater security via local intelligence and life-cycle management for RFlD tagged items |
US7221660B1 (en) * | 2000-08-08 | 2007-05-22 | E.F. Johnson Company | System and method for multicast communications using real time transport protocol (RTP) |
US7260115B1 (en) * | 2001-02-28 | 2007-08-21 | Symbol Technologies, Inc. | System and method of ordering the transmission of data packets in a radio system |
US7322523B2 (en) * | 2004-05-13 | 2008-01-29 | Cisco Technology, Inc. | Methods and devices for uniquely provisioning RFID devices |
US7325734B2 (en) * | 2004-05-13 | 2008-02-05 | Cisco Technology, Inc. | Methods and devices for assigning RFID device personality |
US7333001B2 (en) * | 2002-11-23 | 2008-02-19 | Kathleen Lane | Secure personal RFID documents and method of use |
US7333479B2 (en) * | 2003-06-30 | 2008-02-19 | Nokia Corporation | RFID system with packetized data storage in a mobile environment: methods, systems and program products |
US7336175B2 (en) * | 2004-05-13 | 2008-02-26 | Cisco Technology, Inc. | Methods and devices for locating and uniquely provisioning RFID devices |
US20080136599A1 (en) * | 2006-12-06 | 2008-06-12 | Fujitsu Limited | Reader/writer apparatus, data access system, data access control method, and computer product |
US7394381B2 (en) * | 2004-05-06 | 2008-07-01 | Ut-Battelle, Llc | Marine asset security and tracking (MAST) system |
US7422152B2 (en) * | 2004-05-13 | 2008-09-09 | Cisco Technology, Inc. | Methods and devices for providing scalable RFID networks |
US20090049191A1 (en) * | 2007-08-15 | 2009-02-19 | Alcatel Lucent | Automatic route setup via snooping dynamic addresses |
US7596427B1 (en) * | 2000-05-05 | 2009-09-29 | Automed Technologies, Inc. | Medical item storage cabinet and method |
Family Cites Families (215)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4625081A (en) | 1982-11-30 | 1986-11-25 | Lotito Lawrence A | Automated telephone voice service system |
ES2171447T3 (en) | 1993-11-30 | 2002-09-16 | Gen Electric | DATA WORD INDICATOR IN A SYSTEM FOR THE ASSEMBLY OF DATA PACKAGES FOR TRANSPORTATION. |
US5588009A (en) | 1994-02-03 | 1996-12-24 | Will; Craig A. | Personal paging, communications, and locating system |
US5832503A (en) | 1995-02-24 | 1998-11-03 | Cabletron Systems, Inc. | Method and apparatus for configuration management in communications networks |
US5574722A (en) | 1995-03-21 | 1996-11-12 | Bay Networks, Inc. | Protocol independent switch |
KR100198065B1 (en) | 1995-06-28 | 1999-06-15 | 김영환 | Destination address detecting device of hardware packet router |
US5819042A (en) | 1996-02-20 | 1998-10-06 | Compaq Computer Corporation | Method and apparatus for guided configuration of unconfigured network and internetwork devices |
US5850187A (en) * | 1996-03-27 | 1998-12-15 | Amtech Corporation | Integrated electronic tag reader and wireless communication link |
US6073178A (en) * | 1996-12-09 | 2000-06-06 | Sun Microsystems, Inc. | Method and apparatus for assignment of IP addresses |
JP3434994B2 (en) | 1996-12-12 | 2003-08-11 | 富士通株式会社 | Cell assembly multiplexer |
US6012090A (en) | 1997-03-14 | 2000-01-04 | At&T Corp. | Client-side parallel requests for network services using group name association |
US6430286B1 (en) | 1997-04-22 | 2002-08-06 | At&T Corp | Service and information management system for a telecommunications network |
US6115378A (en) | 1997-06-30 | 2000-09-05 | Sun Microsystems, Inc. | Multi-layer distributed network element |
US7162738B2 (en) | 1998-11-03 | 2007-01-09 | Tumbleweed Communications Corp. | E-mail firewall with stored key encryption/decryption |
US6810040B1 (en) | 1997-12-22 | 2004-10-26 | Cisco Technology, Inc. | Method and apparatus for configuring network devices |
US6341130B1 (en) | 1998-02-09 | 2002-01-22 | Lucent Technologies, Inc. | Packet classification method and apparatus employing two fields |
US6330597B2 (en) * | 1998-03-04 | 2001-12-11 | Conexant Systems, Inc. | Method and apparatus for monitoring, controlling, and configuring remote communication devices |
US6145079A (en) | 1998-03-06 | 2000-11-07 | Deloitte & Touche Usa Llp | Secure electronic transactions using a trusted intermediary to perform electronic services |
US6337856B1 (en) | 1998-05-20 | 2002-01-08 | Steelcase Development Corporation | Multimedia data communications system |
ID29288A (en) * | 1998-06-08 | 2001-08-16 | St Logitrack Pte Ltd Cs | SUPERVISION SYSTEM |
US6363477B1 (en) | 1998-08-28 | 2002-03-26 | 3Com Corporation | Method for analyzing network application flows in an encrypted environment |
US6321264B1 (en) | 1998-08-28 | 2001-11-20 | 3Com Corporation | Network-performance statistics using end-node computer systems |
US6226675B1 (en) | 1998-10-16 | 2001-05-01 | Commerce One, Inc. | Participant server which process documents for commerce in trading partner networks |
US6125391A (en) | 1998-10-16 | 2000-09-26 | Commerce One, Inc. | Market makers using documents for commerce in trading partner networks |
CN1700657A (en) | 1998-11-24 | 2005-11-23 | 尼克桑公司 | Apparatus and method for collecting and analyzing communications data |
US6587431B1 (en) | 1998-12-18 | 2003-07-01 | Nortel Networks Limited | Supertrunking for packet switching |
US7215641B1 (en) | 1999-01-27 | 2007-05-08 | Cisco Technology, Inc. | Per-flow dynamic buffer management |
US6324575B1 (en) * | 1999-01-29 | 2001-11-27 | 3Com Corporation | Intelligent selection of multicast filtering modes for switch ports |
US6567408B1 (en) | 1999-02-01 | 2003-05-20 | Redback Networks Inc. | Methods and apparatus for packet classification with multi-level data structure |
US6356951B1 (en) | 1999-03-01 | 2002-03-12 | Sun Microsystems, Inc. | System for parsing a packet for conformity with a predetermined protocol using mask and comparison values included in a parsing instruction |
US6678827B1 (en) | 1999-05-06 | 2004-01-13 | Watchguard Technologies, Inc. | Managing multiple network security devices from a manager device |
US6683881B1 (en) | 1999-05-28 | 2004-01-27 | Ericsson Inc. | Interface between an SS7 gateway and an IP network |
JP3440881B2 (en) | 1999-06-08 | 2003-08-25 | 日本電気株式会社 | Topology information automatic construction method and apparatus, and machine-readable recording medium recording a program |
US6587874B1 (en) | 1999-06-29 | 2003-07-01 | Cisco Technology, Inc. | Directory assisted autoinstall of network devices |
US6868426B1 (en) | 1999-07-07 | 2005-03-15 | Jeffrey W. Mankoff | Virtual document organizer system and method |
KR100532274B1 (en) | 1999-09-08 | 2005-11-29 | 삼성전자주식회사 | Apparatus for transfering long message in portable terminal and method therefor |
JP2001287809A (en) | 2000-04-04 | 2001-10-16 | Leading Information Technology Institute | Stock control system |
JP3619411B2 (en) | 1999-12-03 | 2005-02-09 | 富士通株式会社 | Packet relay device |
US6510464B1 (en) | 1999-12-14 | 2003-01-21 | Verizon Corporate Services Group Inc. | Secure gateway having routing feature |
US7149222B2 (en) | 1999-12-21 | 2006-12-12 | Converged Access, Inc. | Integrated access point network device |
US6510434B1 (en) | 1999-12-29 | 2003-01-21 | Bellsouth Intellectual Property Corporation | System and method for retrieving information from a database using an index of XML tags and metafiles |
US7120139B1 (en) | 1999-12-30 | 2006-10-10 | At&T Corp. | Broadband cable telephony network architecture IP ITN network architecture reference model |
US6701440B1 (en) | 2000-01-06 | 2004-03-02 | Networks Associates Technology, Inc. | Method and system for protecting a computer using a remote e-mail scanning device |
US20010029523A1 (en) | 2000-01-21 | 2001-10-11 | Mcternan Brennan J. | System and method for accounting for variations in client capabilities in the distribution of a media presentation |
KR100454513B1 (en) | 2000-02-09 | 2004-11-03 | 인터내셔널 비지네스 머신즈 코포레이션 | Method and apparatus for providing automatic configuration of a computer system based on its physical location using an electronic unit |
JP3730471B2 (en) | 2000-02-14 | 2006-01-05 | 富士通株式会社 | Packet transfer device |
US7058973B1 (en) | 2000-03-03 | 2006-06-06 | Symantec Corporation | Network address translation gateway for local area networks using local IP addresses and non-translatable port addresses |
US6772223B1 (en) | 2000-04-10 | 2004-08-03 | International Business Machines Corporation | Configurable classification interface for networking devices supporting multiple action packet handling rules |
US7111076B2 (en) | 2000-04-13 | 2006-09-19 | Intel Corporation | System using transform template and XML document type definition for transforming message and its reply |
US7215637B1 (en) | 2000-04-17 | 2007-05-08 | Juniper Networks, Inc. | Systems and methods for processing packets |
US6611526B1 (en) | 2000-05-08 | 2003-08-26 | Adc Broadband Access Systems, Inc. | System having a meshed backplane and process for transferring data therethrough |
US7032031B2 (en) | 2000-06-23 | 2006-04-18 | Cloudshield Technologies, Inc. | Edge adapter apparatus and method |
US7114008B2 (en) | 2000-06-23 | 2006-09-26 | Cloudshield Technologies, Inc. | Edge adapter architecture apparatus and method |
US7111163B1 (en) | 2000-07-10 | 2006-09-19 | Alterwan, Inc. | Wide area network using internet with quality of service |
US6804222B1 (en) | 2000-07-14 | 2004-10-12 | At&T Corp. | In-band Qos signaling reference model for QoS-driven wireless LANs |
US6862270B1 (en) | 2000-07-14 | 2005-03-01 | At&T Corp. | Architectural reference model for QoS-driven wireless LANs |
US6718326B2 (en) | 2000-08-17 | 2004-04-06 | Nippon Telegraph And Telephone Corporation | Packet classification search device and method |
US6785732B1 (en) | 2000-09-11 | 2004-08-31 | International Business Machines Corporation | Web server apparatus and method for virus checking |
US20020107951A1 (en) | 2000-09-11 | 2002-08-08 | William Teague | Report group management |
US6533489B1 (en) * | 2000-09-15 | 2003-03-18 | Edward Zheng | 180-degree folding support joint |
US7054924B1 (en) | 2000-09-29 | 2006-05-30 | Cisco Technology, Inc. | Method and apparatus for provisioning network devices using instructions in extensible markup language |
WO2002037754A2 (en) | 2000-11-03 | 2002-05-10 | At & T Corp. | Tiered contention multiple access (tcma): a method for priority-based shared channel access |
US6636780B1 (en) | 2000-11-07 | 2003-10-21 | Mdg Medical Inc. | Medication dispensing system including medicine cabinet and tray therefor |
US20030026268A1 (en) | 2000-11-28 | 2003-02-06 | Siemens Technology-To-Business Center, Llc | Characteristic routing |
US7046680B1 (en) | 2000-11-28 | 2006-05-16 | Mci, Inc. | Network access system including a programmable access device having distributed service control |
US7249170B2 (en) | 2000-12-06 | 2007-07-24 | Intelliden | System and method for configuration, management and monitoring of network resources |
CA2328633C (en) | 2000-12-15 | 2005-05-17 | James S. Lau | Apparatus and method for serving data |
US7296268B2 (en) | 2000-12-18 | 2007-11-13 | Microsoft Corporation | Dynamic monitor and controller of availability of a load-balancing cluster |
US20020069279A1 (en) | 2000-12-29 | 2002-06-06 | Romero Francisco J. | Apparatus and method for routing a transaction based on a requested level of service |
US20020126672A1 (en) | 2001-01-10 | 2002-09-12 | Nelson Chow | Method and apparatus for a flexible and reconfigurable packet classifier using content addressable memory |
US6996842B2 (en) | 2001-01-30 | 2006-02-07 | Intel Corporation | Processing internet protocol security traffic |
US6996234B2 (en) | 2001-02-02 | 2006-02-07 | Asier Technology Corporation | Data decryption methodology |
US7882555B2 (en) | 2001-03-16 | 2011-02-01 | Kavado, Inc. | Application layer security method and system |
US7213071B2 (en) | 2001-04-03 | 2007-05-01 | International Business Machines Corporation | Quality of service improvements for network transactions |
US7134075B2 (en) | 2001-04-26 | 2006-11-07 | International Business Machines Corporation | Conversion of documents between XML and processor efficient MXML in content based routing networks |
US20020159458A1 (en) | 2001-04-27 | 2002-10-31 | Foster Michael S. | Method and system for reserved addressing in a communications network |
AUPR459901A0 (en) | 2001-04-27 | 2001-05-24 | Sharinga Networks Inc. | Instant messaging |
US7363374B2 (en) * | 2001-04-27 | 2008-04-22 | International Business Machines Corporation | Method and system for fault-tolerant remote boot in the presence of boot server overload/failure with self-throttling boot servers |
US7089586B2 (en) | 2001-05-02 | 2006-08-08 | Ipr Licensing, Inc. | Firewall protection for wireless users |
US20020165957A1 (en) | 2001-05-02 | 2002-11-07 | Devoe Jiva Gandhara | Intelligent dynamic route selection based on active probing of network operational characteristics |
US6934702B2 (en) | 2001-05-04 | 2005-08-23 | Sun Microsystems, Inc. | Method and system of routing messages in a distributed search network |
US6816455B2 (en) | 2001-05-09 | 2004-11-09 | Telecom Italia S.P.A. | Dynamic packet filter utilizing session tracking |
US7415512B1 (en) | 2001-05-24 | 2008-08-19 | Cisco Technology, Inc. | Method and apparatus for providing a general purpose computing platform at a router on a network |
US6813690B1 (en) | 2001-06-12 | 2004-11-02 | Network Appliance, Inc. | Caching media data using content-sensitive identifiers |
US7409714B2 (en) | 2001-06-13 | 2008-08-05 | Mcafee, Inc. | Virtual intrusion detection system and method of using same |
US7020143B2 (en) | 2001-06-18 | 2006-03-28 | Ericsson Inc. | System for and method of differentiated queuing in a routing system |
US20030028599A1 (en) | 2001-06-19 | 2003-02-06 | Kolsky Amir D. | Method and system for a communication scheme over heterogeneous networks |
US6745041B2 (en) | 2001-06-27 | 2004-06-01 | Tekelec | Methods and systems for communicating between subscribers of different application-layer mobile communications protocols |
JP4274710B2 (en) | 2001-06-28 | 2009-06-10 | 株式会社日立製作所 | Communication relay device |
US7117267B2 (en) | 2001-06-28 | 2006-10-03 | Sun Microsystems, Inc. | System and method for providing tunnel connections between entities in a messaging system |
US6954792B2 (en) | 2001-06-29 | 2005-10-11 | Sun Microsystems, Inc. | Pluggable authentication and access control for a messaging system |
US7363353B2 (en) | 2001-07-06 | 2008-04-22 | Juniper Networks, Inc. | Content service aggregation device for a data center |
US7002907B1 (en) | 2001-07-26 | 2006-02-21 | Ciena Corporation | System and methods for automatic equipment provisioning for SONET networks |
US7090749B2 (en) | 2001-07-31 | 2006-08-15 | International Business Machines Corporation | Method and apparatus for simulating application workloads on an e-business application server |
EP1418709B1 (en) | 2001-08-09 | 2012-02-08 | Panasonic Corporation | Apparatus and transmission method |
US20030033463A1 (en) | 2001-08-10 | 2003-02-13 | Garnett Paul J. | Computer system storage |
US6560559B2 (en) * | 2001-08-17 | 2003-05-06 | Koninklijke Philips Electronics N.V. | System and method for detecting and correcting incorrect hand position of a computer user |
WO2003019870A2 (en) | 2001-08-24 | 2003-03-06 | Peribit Networks, Inc. | Dynamic multi-point meshed overlay network |
US20030046429A1 (en) | 2001-08-30 | 2003-03-06 | Sonksen Bradley Stephen | Static data item processing |
US7126907B2 (en) | 2001-08-31 | 2006-10-24 | Tropic Networks Inc. | Label switched communication network, a method of conditioning the network and a method of data transmission |
US6535924B1 (en) | 2001-09-05 | 2003-03-18 | Pluris, Inc. | Method and apparatus for performing a software upgrade of a router while the router is online |
CA2357165A1 (en) | 2001-09-10 | 2003-03-10 | Ibm Canada Limited-Ibm Canada Limitee | Configurable connector |
US7593427B1 (en) * | 2001-09-21 | 2009-09-22 | Cisco Technology, Inc. | Method and apparatus for automatic detection and provisioning of DS3 frame formats |
US7536712B2 (en) | 2001-10-16 | 2009-05-19 | Microsoft Corporation | Flexible electronic message security mechanism |
JP2003125116A (en) | 2001-10-19 | 2003-04-25 | Fujitsu Ltd | Communication system |
US20030093530A1 (en) | 2001-10-26 | 2003-05-15 | Majid Syed | Arbitrator system and method for national and local content distribution |
US7127740B2 (en) | 2001-10-29 | 2006-10-24 | Pitney Bowes Inc. | Monitoring system for a corporate network |
AU2002363156A1 (en) | 2001-10-29 | 2003-05-12 | Omtool, Ltd | Methods and apparatus for securely communicating a message |
US7146403B2 (en) | 2001-11-02 | 2006-12-05 | Juniper Networks, Inc. | Dual authentication of a requestor using a mail server and an authentication server |
US8040873B2 (en) | 2001-11-07 | 2011-10-18 | Alcatel Lucent | Distributed integration of legacy PBX system with SIP networks |
JP3726741B2 (en) | 2001-11-16 | 2005-12-14 | 日本電気株式会社 | Packet transfer apparatus, method and program |
US20040136371A1 (en) | 2002-01-04 | 2004-07-15 | Muralidhar Rajeev D. | Distributed implementation of control protocols in routers and switches |
EP1330095B1 (en) | 2002-01-18 | 2006-04-05 | Stonesoft Corporation | Monitoring of data flow for enhancing network security |
US7120148B1 (en) | 2002-02-12 | 2006-10-10 | Cisco Technology, Inc. | System and method for providing source awareness in a wireless application protocol network environment |
US7962925B2 (en) | 2002-02-22 | 2011-06-14 | Oracle International Corporation | System and method for XML data binding |
GB2385755B (en) | 2002-02-26 | 2005-07-06 | Hewlett Packard Co | Apparatus and method for data transfer |
US7085848B2 (en) | 2002-03-15 | 2006-08-01 | Microsoft Corporation | Time-window-constrained multicast using connection scheduling |
US7245620B2 (en) | 2002-03-15 | 2007-07-17 | Broadcom Corporation | Method and apparatus for filtering packet data in a network device |
US7185365B2 (en) | 2002-03-27 | 2007-02-27 | Intel Corporation | Security enabled network access control |
US7428597B2 (en) | 2002-03-28 | 2008-09-23 | Sap Ag | Content-based routing system and method |
AU2003220679A1 (en) | 2002-04-09 | 2003-10-27 | Next Generation Systems, Inc. | Systems and methods for providing qos environment ____________ |
US7720044B1 (en) | 2002-04-19 | 2010-05-18 | Nokia Corporation | System and method for terminal configuration |
US7206862B2 (en) | 2002-04-24 | 2007-04-17 | Microsoft Corporation | Method and apparatus for efficiently matching responses to requests previously passed by a network node |
US7437451B2 (en) | 2002-05-16 | 2008-10-14 | Hewlett-Packard Development Company, L.P. | System and method for collecting desired information for network transactions at the kernel level |
US20030217171A1 (en) | 2002-05-17 | 2003-11-20 | Von Stuermer Wolfgang R. | Self-replicating and self-installing software apparatus |
JP2004013501A (en) | 2002-06-06 | 2004-01-15 | Daishowa Seiki Co Ltd | Information system and information holding body |
US20040010612A1 (en) | 2002-06-11 | 2004-01-15 | Pandya Ashish A. | High performance IP processor using RDMA |
US7239634B1 (en) | 2002-06-17 | 2007-07-03 | Signafor, Inc. | Encryption mechanism in advanced packet switching system |
DE10227581A1 (en) | 2002-06-20 | 2004-01-08 | Esg Elektroniksystem- Und Logistik-Gmbh | Device for finding objects |
JP2004029939A (en) | 2002-06-21 | 2004-01-29 | Hitachi Ltd | Communication proxy device and service providing method using the same device |
US9088494B2 (en) | 2002-06-26 | 2015-07-21 | Avaya Communication Israel Ltd. | Packet fragmentation prevention |
US6968374B2 (en) | 2002-07-03 | 2005-11-22 | Telefonaktiebolaget Lm Ericsson (Publ) | Quality of service (QOS) mechanism in an internet protocol (IP) network |
US7298750B2 (en) | 2002-07-31 | 2007-11-20 | At&T Knowledge Ventures, L.P. | Enhancement of resource reservation protocol enabling short-cut internet protocol connections over a switched network |
US7301951B2 (en) | 2002-07-31 | 2007-11-27 | At&T Knowledge Ventures, L.P. | Resource reservation protocol based guaranteed quality of service internet protocol connections over a switched network |
US7237014B2 (en) | 2002-08-01 | 2007-06-26 | Drummond Group | System and method for in situ, real-time, supply chain, interoperability verification |
US7280559B2 (en) | 2002-08-16 | 2007-10-09 | Mitsubishi Electric Research Laboratories, Inc. | Distributed application layer protocol converter for communications network |
US20040039940A1 (en) | 2002-08-23 | 2004-02-26 | Koninklijke Philips Electronics N.V. | Hardware-based packet filtering accelerator |
US7321556B1 (en) | 2002-10-28 | 2008-01-22 | Ipolicy Networks, Inc | Application prioritization policy engine |
US7051137B2 (en) | 2002-10-31 | 2006-05-23 | Intel Corporation | Event delivery |
US7475241B2 (en) | 2002-11-22 | 2009-01-06 | Cisco Technology, Inc. | Methods and apparatus for dynamic session key generation and rekeying in mobile IP |
US20040221319A1 (en) | 2002-12-06 | 2004-11-04 | Ian Zenoni | Application streamer |
AU2003280551B2 (en) | 2002-12-12 | 2008-05-01 | Huawei Technologies Co., Ltd. | Method and network for establishing or cancelling service connection between the wireless local area network and user terminal |
US20040121789A1 (en) | 2002-12-23 | 2004-06-24 | Teddy Lindsey | Method and apparatus for communicating information in a global distributed network |
US7640427B2 (en) | 2003-01-07 | 2009-12-29 | Pgp Corporation | System and method for secure electronic communication in a partially keyless environment |
US20040205770A1 (en) | 2003-02-11 | 2004-10-14 | International Business Machines Corporation | Duplicate message elimination system for a message broker |
US7774495B2 (en) | 2003-02-13 | 2010-08-10 | Oracle America, Inc, | Infrastructure for accessing a peer-to-peer network environment |
US7895589B2 (en) | 2003-02-26 | 2011-02-22 | International Business Machines Corporation | Dynamic data-driven application integration adapters |
US7590715B1 (en) | 2003-03-03 | 2009-09-15 | Emc Corporation | Method and system for automatic classification of applications and services by packet inspection |
US6898632B2 (en) | 2003-03-31 | 2005-05-24 | Finisar Corporation | Network security tap for use with intrusion detection system |
US7129837B2 (en) * | 2003-04-09 | 2006-10-31 | Savi Technology, Inc. | Continuous security state tracking for intermodal containers transported through a global supply chain |
US7398386B2 (en) | 2003-04-12 | 2008-07-08 | Cavium Networks, Inc. | Transparent IPSec processing inline between a framer and a network component |
US20050021836A1 (en) | 2003-05-01 | 2005-01-27 | Reed Carl J. | System and method for message processing and routing |
US7230519B2 (en) * | 2003-06-19 | 2007-06-12 | Scriptpro Llc | RFID tag and method of user verification |
US20040259557A1 (en) | 2003-06-20 | 2004-12-23 | Dawn-Marie Bey | Method and system for changing bandwidth based on an existing bandwidth selection |
US7590736B2 (en) | 2003-06-30 | 2009-09-15 | Microsoft Corporation | Flexible network load balancing |
US8027922B2 (en) | 2003-07-14 | 2011-09-27 | Sprint Communications Company L.P. | Integration infrastructure |
SG145736A1 (en) | 2003-08-12 | 2008-09-29 | Research In Motion Ltd | System and method for processing encoded messages |
US7769994B2 (en) | 2003-08-13 | 2010-08-03 | Radware Ltd. | Content inspection in secure networks |
US7191248B2 (en) | 2003-08-29 | 2007-03-13 | Microsoft Corporation | Communication stack for network communication and routing |
US7362763B2 (en) | 2003-09-04 | 2008-04-22 | Samsung Electronics Co., Ltd. | Apparatus and method for classifying traffic in a distributed architecture router |
US7038573B2 (en) | 2003-09-08 | 2006-05-02 | Single Chip Systems Corporation | Systems and methods for tracking the location of items within a controlled area |
US7142866B2 (en) | 2003-09-09 | 2006-11-28 | Harris Corporation | Load leveling in mobile ad-hoc networks to support end-to-end delay reduction, QoS and energy leveling |
US20050060208A1 (en) | 2003-09-17 | 2005-03-17 | Gianantoni Raymond J. | Method for optimizing insurance estimates utilizing Monte Carlo simulation |
US7483384B2 (en) | 2003-09-22 | 2009-01-27 | Hewlett-Packard Development Company, L.P. | System and method for monitoring network traffic |
US7941747B2 (en) | 2003-10-07 | 2011-05-10 | Gtech Rhode Island Corporation | Automated generation of OLTP message source code |
US8453196B2 (en) | 2003-10-14 | 2013-05-28 | Salesforce.Com, Inc. | Policy management in an interoperability network |
KR100849345B1 (en) | 2003-10-30 | 2008-07-29 | 삼성전자주식회사 | Method for Supporting QoS in High Packet Data System |
US7155305B2 (en) * | 2003-11-04 | 2006-12-26 | Universal Electronics Inc. | System and methods for home appliance identification and control in a networked environment |
US7421695B2 (en) | 2003-11-12 | 2008-09-02 | Cisco Tech Inc | System and methodology for adaptive load balancing with behavior modification hints |
US7194485B2 (en) | 2003-11-21 | 2007-03-20 | International Business Machines Corporation | Mapping XML schema components to qualified java components |
US6963282B1 (en) * | 2003-12-05 | 2005-11-08 | Microsoft Corporation | Wireless self-describing buildings |
US8165156B1 (en) | 2003-12-16 | 2012-04-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Ethernet DSL access multiplexer and method providing dynamic service selection and end-user configuration |
US20050188103A1 (en) | 2003-12-30 | 2005-08-25 | Nokia Corporation | Method or device for delivering a packet in a scatternet |
KR20080077241A (en) | 2004-02-03 | 2008-08-21 | 노키아 코포레이션 | Method and apparatus for providing endtoend quality of service(QOS) |
JP4276568B2 (en) | 2004-03-26 | 2009-06-10 | 株式会社日立コミュニケーションテクノロジー | Router and SIP server |
US20050229243A1 (en) | 2004-03-31 | 2005-10-13 | Svendsen Hugh B | Method and system for providing Web browsing through a firewall in a peer to peer network |
US9686669B2 (en) | 2004-04-08 | 2017-06-20 | Nokia Technologies Oy | Method of configuring a mobile node |
US7789308B2 (en) * | 2004-05-13 | 2010-09-07 | Cisco Technology, Inc. | Locating and provisioning devices in a network |
WO2005114604A2 (en) | 2004-05-13 | 2005-12-01 | Cisco Technology, Inc. | Locating, provisioning and identifying devices in a network |
US8113418B2 (en) | 2004-05-13 | 2012-02-14 | Cisco Technology, Inc. | Virtual readers for scalable RFID infrastructures |
EP1751687A4 (en) | 2004-05-13 | 2010-09-08 | Cisco Tech Inc | Methods and devices for locating and provisioning rfid devices and related network devices |
US7581248B2 (en) | 2004-06-28 | 2009-08-25 | International Business Machines Corporation | Federated identity brokering |
US7411915B1 (en) | 2004-07-21 | 2008-08-12 | Cisco Technology, Inc. | Automatically configuring switch ports with appropriate features |
US20070258048A1 (en) | 2004-08-11 | 2007-11-08 | Koninklijke Philips Electronics, N.V. | Monitoring Expiration Dates of Perishable Products |
EP1800235A2 (en) | 2004-09-13 | 2007-06-27 | Sandlinks Systems Ltd. | Communication and distance measurement in an addressed wide band rfid system |
US7403120B2 (en) | 2004-09-29 | 2008-07-22 | Symbol Technologies, Inc. | Reverse infrastructure location system and method |
US7159500B2 (en) | 2004-10-12 | 2007-01-09 | The Telerobotics Corporation | Public network weapon system and method |
US20060098662A1 (en) | 2004-11-09 | 2006-05-11 | Sunil Gupta | Memory and processor efficient network communications protocol |
US8458467B2 (en) | 2005-06-21 | 2013-06-04 | Cisco Technology, Inc. | Method and apparatus for adaptive application message payload content transformation in a network infrastructure element |
US7509431B2 (en) | 2004-11-17 | 2009-03-24 | Cisco Technology, Inc. | Performing message and transformation adapter functions in a network element on behalf of an application |
US7664879B2 (en) | 2004-11-23 | 2010-02-16 | Cisco Technology, Inc. | Caching content and state data at a network element |
US7496750B2 (en) | 2004-12-07 | 2009-02-24 | Cisco Technology, Inc. | Performing security functions on a message payload in a network element |
US7725934B2 (en) | 2004-12-07 | 2010-05-25 | Cisco Technology, Inc. | Network and application attack protection based on application layer message inspection |
US7411501B2 (en) | 2004-12-07 | 2008-08-12 | Intermec Ip Corp. | Method to verify or track a physical address while providing a service |
US7606267B2 (en) | 2004-12-10 | 2009-10-20 | Cisco Technology, Inc. | Reducing the sizes of application layer messages in a network element |
US8082304B2 (en) | 2004-12-10 | 2011-12-20 | Cisco Technology, Inc. | Guaranteed delivery of application layer messages by a network element |
US7323988B2 (en) | 2004-12-17 | 2008-01-29 | Alcatel Lucent | Personal item reminder |
US20060155862A1 (en) | 2005-01-06 | 2006-07-13 | Hari Kathi | Data traffic load balancing based on application layer messages |
JP4450737B2 (en) | 2005-01-11 | 2010-04-14 | 富士通株式会社 | Semiconductor integrated circuit |
US7698416B2 (en) | 2005-01-25 | 2010-04-13 | Cisco Technology, Inc. | Application layer message-based server failover management by a network element |
US7178729B2 (en) | 2005-02-25 | 2007-02-20 | Cisco Technology, Inc. | Methods and devices for providing alerts for spoilage and hazardous combinations |
US7242303B2 (en) | 2005-03-04 | 2007-07-10 | Cisco Technology, Inc. | Navigation and coordination during emergencies |
US20060208889A1 (en) | 2005-03-10 | 2006-09-21 | Cisco Technology, Inc. | Automated contacting of support centers and sharing of product information via RFID |
US7213768B2 (en) | 2005-03-16 | 2007-05-08 | Cisco Technology, Inc. | Multiple device and/or user association |
US7274291B2 (en) | 2005-04-01 | 2007-09-25 | Cisco Technology, Inc. | Dynamic and hybrid RFID |
US20060253590A1 (en) * | 2005-04-08 | 2006-11-09 | Konaware, Inc. | Platform and methods for continuous asset location tracking and monitoring in intermittently connected environments |
US7793058B2 (en) | 2005-04-19 | 2010-09-07 | International Business Machines Corporation | Method and apparatus for negotiating revised service level agreements |
US20060262721A1 (en) | 2005-04-26 | 2006-11-23 | International Business Machines Corporation | Receiving data in a sensor network |
US7590756B2 (en) | 2005-05-13 | 2009-09-15 | Itt Manufacturing Enterprises, Inc. | Method and system for transferring data in a communications network using redundant communication paths |
US20060280181A1 (en) | 2005-05-17 | 2006-12-14 | Ripcord Technologies, Inc. (A Delaware Corporation) | Systems and methods for operating and management of RFID network devices |
US20060279412A1 (en) | 2005-06-13 | 2006-12-14 | Holland Joshua H | System for using RFID tags as data storage devices |
US20070058634A1 (en) | 2005-09-09 | 2007-03-15 | Vipul Gupta | Interaction with wireless sensor devices |
US8014970B2 (en) | 2006-04-08 | 2011-09-06 | Vialogy Corporation | Software enabled video and sensor interoperability system and method |
US8065411B2 (en) | 2006-05-31 | 2011-11-22 | Sap Ag | System monitor for networks of nodes |
US7949355B2 (en) | 2007-09-04 | 2011-05-24 | Research In Motion Limited | System and method for processing attachments to messages sent to a mobile device |
-
2004
- 2004-12-09 US US11/010,089 patent/US7422152B2/en active Active
-
2005
- 2005-04-11 US US11/104,140 patent/US8060623B2/en active Active
- 2005-04-29 CN CN200580015169.3A patent/CN100531083C/en not_active Expired - Fee Related
- 2005-05-10 CN CN200580015167.4A patent/CN100561499C/en not_active Expired - Fee Related
- 2005-05-10 CN CN200580015168.9A patent/CN100531082C/en not_active Expired - Fee Related
- 2005-05-12 US US11/129,709 patent/US7648070B2/en active Active
- 2005-05-13 CN CN200580015166.XA patent/CN101263506B/en active Active
-
2008
- 2008-04-11 US US12/082,635 patent/US20080197980A1/en not_active Abandoned
-
2011
- 2011-09-27 US US13/246,642 patent/US8601143B2/en not_active Expired - Fee Related
Patent Citations (99)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2011A (en) * | 1841-03-18 | Appabatxts for piling saws | ||
US4688026A (en) * | 1984-05-15 | 1987-08-18 | Scribner James R | Method of collecting and using data associated with tagged objects |
US5339073A (en) * | 1987-03-31 | 1994-08-16 | Identec Limited | Access control equipment and method for using the same |
US5646616A (en) * | 1994-07-01 | 1997-07-08 | Murata Kikai Kabushiki Kaisha | Picking system |
US5887176A (en) * | 1996-06-28 | 1999-03-23 | Randtec, Inc. | Method and system for remote monitoring and tracking of inventory |
US6111517A (en) * | 1996-12-30 | 2000-08-29 | Visionics Corporation | Continuous video monitoring using face recognition for access control |
US20010012292A1 (en) * | 1997-01-17 | 2001-08-09 | Todd A. Merrill | Router for use with a link that has a set of concurrent channels |
US20010028308A1 (en) * | 1997-03-28 | 2001-10-11 | Carlos De La Huerga | Interactive medication container |
US6115079A (en) * | 1998-02-14 | 2000-09-05 | Mcrae; Michael W. | Programmable video channel controller |
US6300903B1 (en) * | 1998-03-23 | 2001-10-09 | Time Domain Corporation | System and method for person or object position location utilizing impulse radio |
US6070187A (en) * | 1998-03-26 | 2000-05-30 | Hewlett-Packard Company | Method and apparatus for configuring a network node to be its own gateway |
US6272113B1 (en) * | 1998-09-11 | 2001-08-07 | Compaq Computer Corporation | Network controller system that uses multicast heartbeat packets |
US6212563B1 (en) * | 1998-10-01 | 2001-04-03 | 3Com Corporation | Method and system for setting and managing externally provided internet protocol addresses using the dynamic host configuration protocol |
US6393458B1 (en) * | 1999-01-28 | 2002-05-21 | Genrad, Inc. | Method and apparatus for load balancing in a distributed object architecture |
US6473858B1 (en) * | 1999-04-16 | 2002-10-29 | Digeo, Inc. | Method and apparatus for broadcasting data with access control |
US6381465B1 (en) * | 1999-08-27 | 2002-04-30 | Leap Wireless International, Inc. | System and method for attaching an advertisement to an SMS message for wireless transmission |
US20020016739A1 (en) * | 1999-09-21 | 2002-02-07 | Fujitsu Limited | System and method for managing expiration-dated products utilizing an electronic receipt |
US6677852B1 (en) * | 1999-09-22 | 2004-01-13 | Intermec Ip Corp. | System and method for automatically controlling or configuring a device, such as an RFID reader |
US7117364B1 (en) * | 1999-10-05 | 2006-10-03 | International Busienss Machines Corporation | System and method for downloading application components to a chipcard |
US6553489B1 (en) * | 2000-01-12 | 2003-04-22 | Cisco Technology, Inc. | System and method for secure and efficient universal port configuration |
US6912213B2 (en) * | 2000-03-06 | 2005-06-28 | Lg Electronics Inc. | Reverse power control method of data transmission for wireless local loop |
US7596427B1 (en) * | 2000-05-05 | 2009-09-29 | Automed Technologies, Inc. | Medical item storage cabinet and method |
US20020001307A1 (en) * | 2000-05-20 | 2002-01-03 | Equipe Communications Corporation | VPI/VCI availability index |
US7221660B1 (en) * | 2000-08-08 | 2007-05-22 | E.F. Johnson Company | System and method for multicast communications using real time transport protocol (RTP) |
US20020075805A1 (en) * | 2000-09-22 | 2002-06-20 | Narad Networks, Inc. | Broadband system with QOS based packet handling |
US20020046263A1 (en) * | 2000-10-12 | 2002-04-18 | Jacques Camerini | Method of configuring an automation module on a TCP/IP network |
US7103886B2 (en) * | 2000-12-07 | 2006-09-05 | Sap Ag | System, method, computer program product for communicating data for objects that are transported from first location to second location |
US7057511B2 (en) * | 2001-02-12 | 2006-06-06 | Symbol Technologies, Inc. | Method, system, and apparatus for communicating with a RFID tag population |
US7260115B1 (en) * | 2001-02-28 | 2007-08-21 | Symbol Technologies, Inc. | System and method of ordering the transmission of data packets in a radio system |
US6539281B2 (en) * | 2001-04-23 | 2003-03-25 | Accenture Global Services Gmbh | Online medicine cabinet |
US20020161907A1 (en) * | 2001-04-25 | 2002-10-31 | Avery Moon | Adaptive multi-protocol communications system |
US20060031374A1 (en) * | 2001-06-18 | 2006-02-09 | Transtech Networks Usa, Inc. | Packet switch and method thereof dependent on application content |
US20030046339A1 (en) * | 2001-09-05 | 2003-03-06 | Ip Johnny Chong Ching | System and method for determining location and status of computer system server |
US20030065784A1 (en) * | 2001-09-28 | 2003-04-03 | Allan Herrod | Software method for maintaining connectivity between applications during communications by mobile computer terminals operable in wireless networks |
US6931574B1 (en) * | 2001-10-24 | 2005-08-16 | Finisar Corporation | Systems and methods for interpreting communications packets |
US7103040B2 (en) * | 2001-11-19 | 2006-09-05 | Telefonaktieboaget Lm Ericsson (Publ) | Method and apparatus for identifying a node for data communications using its geographical location |
US20030095032A1 (en) * | 2001-11-19 | 2003-05-22 | Takeshi Hoshino | Tag management server |
US20040021569A1 (en) * | 2001-11-21 | 2004-02-05 | Robert Lepkofker | Personnel and resource tracking method and system for enclosed spaces |
US20030126248A1 (en) * | 2001-12-28 | 2003-07-03 | Chambers Paul S. | Method to automatically configure network routing device |
US20060044111A1 (en) * | 2002-02-22 | 2006-03-02 | Jafa Technologies., Inc., | Real-time data reporting using radio frequency identification |
US20030174714A1 (en) * | 2002-03-01 | 2003-09-18 | Globespan Virata, Inc. | Zero-installation PPP-Bridge setup for lan-to-wan connectivity |
US20030177374A1 (en) * | 2002-03-16 | 2003-09-18 | Yung Marcel Mordechay | Secure logic interlocking |
US7064660B2 (en) * | 2002-05-14 | 2006-06-20 | Motorola, Inc. | System and method for inferring an electronic rendering of an environment |
US7075412B1 (en) * | 2002-05-30 | 2006-07-11 | Thingmagic L.L.C. | Methods and apparatus for operating a radio device |
US20040069852A1 (en) * | 2002-06-26 | 2004-04-15 | Nokia Corporation | Bluetooth RF based RF-tag read/write station |
US20040073600A1 (en) * | 2002-07-08 | 2004-04-15 | Anders Elo | Dynamic port configuration of network equipment |
US7081819B2 (en) * | 2002-07-09 | 2006-07-25 | Neology, Inc. | System and method for providing secure identification solutions |
US20040010594A1 (en) * | 2002-07-11 | 2004-01-15 | International Business Machines Corporation | Virtualizing the security parameter index, marker key, frame key, and verification tag |
US20040064577A1 (en) * | 2002-07-25 | 2004-04-01 | Dahlin Michael D. | Method and system for background replication of data objects |
US20040061646A1 (en) * | 2002-09-30 | 2004-04-01 | Lucent Technologies, Inc. | Methods and apparatus for location determination based on dispersed radio frequency tags |
US6995655B2 (en) * | 2002-10-02 | 2006-02-07 | Battelle Memorial Institute | Method of simultaneously reading multiple radio frequency tags, RF tags, and RF reader |
US20040145474A1 (en) * | 2002-11-15 | 2004-07-29 | Schmidtberg Rupert A. | RF identification reader for communicating condition information associated with the reader |
US20040100383A1 (en) * | 2002-11-21 | 2004-05-27 | Kimberly-Clark Worldwide, Inc. | RFID system and method for ensuring safety of hazardous or dangerous substances |
US7333001B2 (en) * | 2002-11-23 | 2008-02-19 | Kathleen Lane | Secure personal RFID documents and method of use |
US20040108795A1 (en) * | 2002-12-06 | 2004-06-10 | Meek Robert B. | High capacity drawer with mechanical indicator for a dispensing device |
US20040128389A1 (en) * | 2002-12-31 | 2004-07-01 | Kurt Kopchik | Method and apparatus for wirelessly establishing user preference settings on a computer |
US7177915B2 (en) * | 2002-12-31 | 2007-02-13 | Kurt Kopchik | Method and apparatus for wirelessly establishing user preference settings on a computer |
US20050021626A1 (en) * | 2003-05-22 | 2005-01-27 | Cisco Technology, Inc. | Peer-to-peer dynamic web page sharing |
US7333479B2 (en) * | 2003-06-30 | 2008-02-19 | Nokia Corporation | RFID system with packetized data storage in a mobile environment: methods, systems and program products |
US20050027778A1 (en) * | 2003-07-29 | 2005-02-03 | Arthur Dimitrelis | Automatic configuration of an address allocation mechanism in a computer network |
US20070112574A1 (en) * | 2003-08-05 | 2007-05-17 | Greene William S | System and method for use of mobile policy agents and local services, within a geographically distributed service grid, to provide greater security via local intelligence and life-cycle management for RFlD tagged items |
US6843121B1 (en) * | 2003-08-25 | 2005-01-18 | Eastman Kodak Company | Measuring absolute static pressure at one or more positions along a microfluidic device |
US20050080881A1 (en) * | 2003-09-26 | 2005-04-14 | William Voorhees | Systems and methods for configuring ports of an SAS domain |
US20050093679A1 (en) * | 2003-10-31 | 2005-05-05 | Zai Li-Cheng R. | Method and system of using active RFID tags to provide a reliable and secure RFID system |
US20050102406A1 (en) * | 2003-11-07 | 2005-05-12 | Cisco Technology, Inc. | Automated configuration of a gateway |
US20050099270A1 (en) * | 2003-11-10 | 2005-05-12 | Impinj, Inc. | RFID tags adjusting to different regulatory environments, and RFID readers to so adjust them and methods |
US7165722B2 (en) * | 2004-03-10 | 2007-01-23 | Microsoft Corporation | Method and system for communicating with identification tags |
US20050199716A1 (en) * | 2004-03-10 | 2005-09-15 | Microsoft Corporation | Method and system for communicating with identification tags |
US20050209947A1 (en) * | 2004-03-10 | 2005-09-22 | Microsoft Corporation | Method and identification tag for asset management |
US20050228887A1 (en) * | 2004-04-07 | 2005-10-13 | Ynjiun Wang | Routing device and method for use with a HTTP enabled computer peripheral |
US7568015B2 (en) * | 2004-04-07 | 2009-07-28 | Hand Held Products, Inc. | Routing device and method for use with a HTTP enabled computer peripheral |
US7394381B2 (en) * | 2004-05-06 | 2008-07-01 | Ut-Battelle, Llc | Marine asset security and tracking (MAST) system |
US20060033606A1 (en) * | 2004-05-13 | 2006-02-16 | Cisco Technology, Inc. A Corporation Of California | Methods and apparatus for determining the status of a device |
US7648070B2 (en) * | 2004-05-13 | 2010-01-19 | Cisco Technology, Inc. | Locating, provisioning and identifying devices in a network |
US7422152B2 (en) * | 2004-05-13 | 2008-09-09 | Cisco Technology, Inc. | Methods and devices for providing scalable RFID networks |
US20080087730A1 (en) * | 2004-05-13 | 2008-04-17 | Cioco Technology, Inc. | Methods and devices for assigning rfid device personality |
US7336175B2 (en) * | 2004-05-13 | 2008-02-26 | Cisco Technology, Inc. | Methods and devices for locating and uniquely provisioning RFID devices |
US7325734B2 (en) * | 2004-05-13 | 2008-02-05 | Cisco Technology, Inc. | Methods and devices for assigning RFID device personality |
US7322523B2 (en) * | 2004-05-13 | 2008-01-29 | Cisco Technology, Inc. | Methods and devices for uniquely provisioning RFID devices |
US20060005035A1 (en) * | 2004-06-22 | 2006-01-05 | Coughlin Michael E | Keystroke input device for use with an RFID tag and user verification system |
US20060010086A1 (en) * | 2004-07-10 | 2006-01-12 | Klein Elliot S | Data append method for sent postal mail |
US20060091999A1 (en) * | 2004-07-13 | 2006-05-04 | Cisco Technology, Inc., A Corporation Of California | Using syslog and SNMP for scalable monitoring of networked devices |
US20060022801A1 (en) * | 2004-07-30 | 2006-02-02 | Reva Systems Corporation | RFID tag data acquisition system |
US20060053234A1 (en) * | 2004-09-01 | 2006-03-09 | Microsoft Corporation | Device service provider interface |
US20060047464A1 (en) * | 2004-09-01 | 2006-03-02 | Microsoft Corporation | RFID server internals design |
US20060123467A1 (en) * | 2004-12-06 | 2006-06-08 | Sandeep Kumar | Performing message payload processing functions in a network element on behalf of an application |
US20060132304A1 (en) * | 2004-12-06 | 2006-06-22 | Cabell Dennis J | Rule-based management of objects |
US20060143318A1 (en) * | 2004-12-29 | 2006-06-29 | Cisco Technology, Inc., A Corporation Of California | Agnostic peripheral control for media communication appliances |
US20060146879A1 (en) * | 2005-01-05 | 2006-07-06 | Tefcros Anthias | Interpreting an application message at a network element using sampling and heuristics |
US7205897B2 (en) * | 2005-03-01 | 2007-04-17 | Sap Aktiengesellschaft | Product flow based auto-ID infrastructure |
US20060208885A1 (en) * | 2005-03-01 | 2006-09-21 | Tao Lin | Product flow based auto-ID infrastructure |
US20070013518A1 (en) * | 2005-07-14 | 2007-01-18 | Cisco Technology, Inc. | Provisioning and redundancy for RFID middleware servers |
US20080104209A1 (en) * | 2005-08-01 | 2008-05-01 | Cisco Technology, Inc. | Network based device for providing rfid middleware functionality |
US20070027966A1 (en) * | 2005-08-01 | 2007-02-01 | Cisco Technology, Inc. | Network based device for providing RFID middleware functionality |
US7345585B2 (en) * | 2005-08-01 | 2008-03-18 | Cisco Technology, Inc. | Network based device for providing RFID middleware functionality |
US20070080784A1 (en) * | 2005-10-10 | 2007-04-12 | Electronics And Telecommunications Research Institute | Mobile RFID service providing apparatus and method thereof |
US20070109100A1 (en) * | 2005-11-15 | 2007-05-17 | Cisco Technology, Inc. | Methods and systems for automatic device provisioning in an RFID network using IP multicast |
US20080136599A1 (en) * | 2006-12-06 | 2008-06-12 | Fujitsu Limited | Reader/writer apparatus, data access system, data access control method, and computer product |
US20090049191A1 (en) * | 2007-08-15 | 2009-02-19 | Alcatel Lucent | Automatic route setup via snooping dynamic addresses |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7789308B2 (en) | 2004-05-13 | 2010-09-07 | Cisco Technology, Inc. | Locating and provisioning devices in a network |
US20060266832A1 (en) * | 2004-05-13 | 2006-11-30 | Cisco Technology, Inc. | Virtual readers for scalable RFID infrastructures |
US20080087730A1 (en) * | 2004-05-13 | 2008-04-17 | Cioco Technology, Inc. | Methods and devices for assigning rfid device personality |
US20060033606A1 (en) * | 2004-05-13 | 2006-02-16 | Cisco Technology, Inc. A Corporation Of California | Methods and apparatus for determining the status of a device |
US7658319B2 (en) | 2004-05-13 | 2010-02-09 | Cisco Technology, Inc. | Methods and devices for assigning RFID device personality |
US8113418B2 (en) | 2004-05-13 | 2012-02-14 | Cisco Technology, Inc. | Virtual readers for scalable RFID infrastructures |
US8249953B2 (en) | 2004-05-13 | 2012-08-21 | Cisco Technology, Inc. | Methods and apparatus for determining the status of a device |
US8601143B2 (en) | 2004-05-13 | 2013-12-03 | Cisco Technology, Inc. | Automated configuration of network device ports |
US20060091999A1 (en) * | 2004-07-13 | 2006-05-04 | Cisco Technology, Inc., A Corporation Of California | Using syslog and SNMP for scalable monitoring of networked devices |
US8604910B2 (en) | 2004-07-13 | 2013-12-10 | Cisco Technology, Inc. | Using syslog and SNMP for scalable monitoring of networked devices |
US8700778B2 (en) | 2005-07-14 | 2014-04-15 | Cisco Technology, Inc. | Provisioning and redundancy for RFID middleware servers |
US7953826B2 (en) | 2005-07-14 | 2011-05-31 | Cisco Technology, Inc. | Provisioning and redundancy for RFID middleware servers |
US8698603B2 (en) | 2005-11-15 | 2014-04-15 | Cisco Technology, Inc. | Methods and systems for automatic device provisioning in an RFID network using IP multicast |
US9064164B2 (en) | 2006-02-03 | 2015-06-23 | Cisco Technology, Inc. | Methods and systems for automatic device provisioning in an RFID network using IP multicast |
US20090189743A1 (en) * | 2008-01-24 | 2009-07-30 | Alcatel-Lucent | Radio-Frequency Identification Enabled Inventory Management and Network Operations System and Method |
US20150195323A1 (en) * | 2010-01-20 | 2015-07-09 | Samsung Electronics Co., Ltd. | Method and apparatus for reproducing content in multimedia data providing system |
US9420025B2 (en) * | 2010-01-20 | 2016-08-16 | Samsung Electronics Co., Ltd | Method and apparatus for reproducing content in multimedia data providing system |
US20130098988A1 (en) * | 2011-10-20 | 2013-04-25 | Goji Ltd. | System, Apparatus, and Method for Utilizing a Reading of a Machine Readable Element Associated with a Consumable Product |
US9129229B2 (en) * | 2011-10-20 | 2015-09-08 | Goji Limited | System, apparatus, and method for utilizing a reading of a machine readable element associated with a consumable product |
US9342826B2 (en) | 2011-10-20 | 2016-05-17 | Goji Limited | System, apparatus, and method for utilizing a reading of a machine readable element associated with a consumable product |
Also Published As
Publication number | Publication date |
---|---|
CN1954328A (en) | 2007-04-25 |
CN101263506A (en) | 2008-09-10 |
US20050252971A1 (en) | 2005-11-17 |
CN100531083C (en) | 2009-08-19 |
CN100561499C (en) | 2009-11-18 |
US8060623B2 (en) | 2011-11-15 |
US7422152B2 (en) | 2008-09-09 |
US8601143B2 (en) | 2013-12-03 |
US20050253722A1 (en) | 2005-11-17 |
US7648070B2 (en) | 2010-01-19 |
CN1954329A (en) | 2007-04-25 |
US20050264420A1 (en) | 2005-12-01 |
US20120036243A1 (en) | 2012-02-09 |
CN1954327A (en) | 2007-04-25 |
CN101263506B (en) | 2011-05-18 |
CN100531082C (en) | 2009-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7422152B2 (en) | Methods and devices for providing scalable RFID networks | |
US8113418B2 (en) | Virtual readers for scalable RFID infrastructures | |
US7325734B2 (en) | Methods and devices for assigning RFID device personality | |
US7336175B2 (en) | Methods and devices for locating and uniquely provisioning RFID devices | |
US7789308B2 (en) | Locating and provisioning devices in a network | |
US7322523B2 (en) | Methods and devices for uniquely provisioning RFID devices | |
US7953826B2 (en) | Provisioning and redundancy for RFID middleware servers | |
CA2565451C (en) | Locating, provisioning and identifying devices in a network | |
US8249953B2 (en) | Methods and apparatus for determining the status of a device | |
CA2565099C (en) | Methods and devices for locating and provisioning rfid devices and related network devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |