US20120298758A1 - Method of implanting electronics in objects - Google Patents

Method of implanting electronics in objects Download PDF

Info

Publication number
US20120298758A1
US20120298758A1 US12/551,164 US55116409A US2012298758A1 US 20120298758 A1 US20120298758 A1 US 20120298758A1 US 55116409 A US55116409 A US 55116409A US 2012298758 A1 US2012298758 A1 US 2012298758A1
Authority
US
United States
Prior art keywords
electronics
metal
heat
encapsulated
rfid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US12/551,164
Other versions
US8310367B1 (en
Inventor
Arkalgud Krishnamurthy Vishwanath
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Glitter Tech LLP
Empire Technology Development LLC
Original Assignee
Glitter Tech LLP
Empire Technology Development LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Glitter Tech LLP, Empire Technology Development LLC filed Critical Glitter Tech LLP
Assigned to GLITTER TECHNOLOGY LLP, EMPIRE TECHNOLOGY DEVELOPMENT LLC reassignment GLITTER TECHNOLOGY LLP ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VISHWANATH, ARKALGUD KRISHNAMURTHY
Priority to PCT/IB2010/001122 priority Critical patent/WO2010133935A1/en
Assigned to INTELLECTUAL VENTURES ASIA PTE. LTD. reassignment INTELLECTUAL VENTURES ASIA PTE. LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Assigned to INTELLECTUAL VENTURES ASIA PTE. LTD. reassignment INTELLECTUAL VENTURES ASIA PTE. LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GLITTER TECHNOLOGY LLP
Assigned to EMPIRE TECHNOLOGY DEVELOPMENT LLC reassignment EMPIRE TECHNOLOGY DEVELOPMENT LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTELLECTUAL VENTURES ASIA PTE. LTD.
Application granted granted Critical
Publication of US8310367B1 publication Critical patent/US8310367B1/en
Publication of US20120298758A1 publication Critical patent/US20120298758A1/en
Assigned to CRESTLINE DIRECT FINANCE, L.P. reassignment CRESTLINE DIRECT FINANCE, L.P. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: EMPIRE TECHNOLOGY DEVELOPMENT LLC
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/0772Physical layout of the record carrier
    • G06K19/0773Physical layout of the record carrier the record carrier comprising means to protect itself against external heat sources
    • AHUMAN NECESSITIES
    • A61MEDICAL OR VETERINARY SCIENCE; HYGIENE
    • A61BDIAGNOSIS; SURGERY; IDENTIFICATION
    • A61B90/00Instruments, implements or accessories specially adapted for surgery or diagnosis and not covered by any of the groups A61B1/00 - A61B50/00, e.g. for luxation treatment or for protecting wound edges
    • A61B90/90Identification means for patients or instruments, e.g. tags
    • A61B90/98Identification means for patients or instruments, e.g. tags using electromagnetic means, e.g. transponders
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T29/00Metal working
    • Y10T29/49Method of mechanical manufacture
    • Y10T29/49764Method of mechanical manufacture with testing or indicating
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10TTECHNICAL SUBJECTS COVERED BY FORMER US CLASSIFICATION
    • Y10T29/00Metal working
    • Y10T29/49Method of mechanical manufacture
    • Y10T29/49826Assembling or joining
    • Y10T29/49863Assembling or joining with prestressing of part
    • Y10T29/49865Assembling or joining with prestressing of part by temperature differential [e.g., shrink fit]

Definitions

  • Radio frequency identification (RFID) tags were first used during World War II to help the military identify whether aircraft were friend or foe.
  • RFID tags In the late 1980s, the use of RFID tags increased significantly when they became the basis for electronic toll collection along the East Coast.
  • interest in the use of RFID tags again increased significantly as corporations began investigating the use of RFID tags to track merchandise.
  • FIG. 1 is a schematic diagram of heat resistant coated RFID tag.
  • FIG. 2 is a flow diagram illustrating an embodiment of an implantation method.
  • FIG. 3 is a schematic diagram of an implantation device of an embodiment.
  • FIG. 4 is a schematic diagram of an object having an implanted RFID tag of an embodiment.
  • FIG. 5 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a screw.
  • FIG. 6 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a robot.
  • FIG. 7 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a surgical instrument.
  • FIG. 8 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a white good (refrigerator).
  • FIG. 9 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in jewelry.
  • FIG. 10 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a satellite.
  • FIG. 11 is a schematic illustration of an embodiment comprising a coated RFID tag configured to detect vibration (earthquake).
  • FIG. 12 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a firearm.
  • FIG. 13 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a vehicle.
  • FIG. 14 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in an engine.
  • FIG. 15 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a medical implant.
  • An embodiment relates to a device comprising electronics encapsulated in a heat resistant coating, the heat resistant coating configured to protect the electronics from heat surrounding the electronics during implantation of the electronics in an object by allowing less heat to be transferred to the electronics than an amount of heat to destroy the electronics ( FIG. 1 ).
  • the object comprises metal.
  • the electronics comprise a radio frequency identification (RFID) tag.
  • the heat resistant coating may comprise amorphous silicon, SiN, SiO 2 , Al 2 O 3 , SiO 2 —Al 2 O 3 , or a borosilicate or any other suitable heat resistant material.
  • the RFID tag comprises a passive, semi-passive, or active RFID tag.
  • Another embodiment relates to a method comprising encapsulating electronics in a heat resistant coating, heating an object, implanting the encapsulated electronics into the object, the heat resistant coating encapsulating the electronics configured to protect the electronics from heat surrounding the electronics during implantation of the electronics in the object by allowing less heat to be transferred to the electronics than an amount of heat to destroy the electronics ( FIG. 2 ).
  • the object comprises metal.
  • the electronics comprise a radio frequency identification (RFID) tag.
  • the heat resistant coating comprises amorphous silicon, SiN, SiO 2 , Al 2 O 3 , SiO 2 —Al 2 O 3 , or a borosilicate.
  • a portion of the object may comprise a molten metal.
  • Another aspect further comprises testing the RFID tag after implanting. Another aspect further comprises performing post implantation finishing on the object after said implanting. In another aspect, post implantation finishing includes one or more of annealing, grinding, polishing, peening, painting or varnishing. Another aspect, further comprises reforming a surface of the object.
  • the electronic circuit comprises a radio frequency identification (RFID) tag.
  • the object comprises metal.
  • the RFID tag comprises a passive, semi-passive, or active RFID tag.
  • the metal comprises an essentially pure elemental metal, a metal alloy, or a metal matrix composite.
  • the object comprises lead, aluminum, iron, steel, nickel, titanium, or carbon.
  • the heat resistant coating comprises amorphous silicon, SiN, SiO 2 , Al 2 O 3 , SiO 2 —Al 2 O 3 , or a borosilicate.
  • the embedded electronic circuit provides intelligence to the object by providing information regarding the relative motion of the object.
  • the relative motion comprises rotation or vibration.
  • the object is configured for remote surgery, manipulation of robots, manipulation of manufacturing machines, or prosthetics.
  • Another embodiment relates to an apparatus comprising a plurality of objects, at least one of the plurality of objects comprising a an electronic circuit encapsulated in a heat resistant coating, the heat resistant coating encapsulating the electronic circuit configured to protect the electronic circuit from heat surrounding the electronic circuit during implantation of the electronic circuit in the at least one of the plurality of object by allowing less heat to be transferred to the electronic circuit than an amount of heat to destroy the electronic circuit ( FIG. 3 ).
  • the electronic circuit can comprise a radio frequency identification (RFID) tag.
  • the RFID tag comprises a tag from Class I, Class II, Class III, or Class IV.
  • the apparatus comprises a plurality of electronic circuits.
  • the apparatus comprises a plurality of RFID tags.
  • the plurality of RFID tags comprises more than one class.
  • Another embodiment relates to a method comprising monitoring electronics embedded in an object of an apparatus, the electronics being encapsulated in a heat resistant coating configured to protect the electronics from heat surrounding the electronics during implantation of the electronics in an object by allowing less heat to be transferred to the electronics than an amount of heat to destroy the electronics.
  • the electronics comprise a radio frequency identification (RFID) tag.
  • the RFID tag comprises a transponder.
  • Another aspect further comprises monitoring a relative turn or location of a first part of the apparatus relative to a second part of the apparatus.
  • Another aspect further comprises monitoring parameters adapted to assist in maintenance/servicing of the apparatus.
  • Another aspect further comprises monitoring a plurality of RFID tags in the apparatus.
  • Another aspect further comprises remotely controlling the apparatus.
  • Another embodiment relates to an apparatus comprising an implantation device configured to implant an electronic circuit embedded in an object, the electronic circuit encapsulated in a heat resistant coating configured to protect the electronic circuit from heat surrounding the electronic circuit during implantation of the electronic circuit tag in the object; an injection nozzle and at least one heat source.
  • the at least one heat source is located in the nozzle.
  • the heat source comprises an electron beam, a laser, an infrared source, a plasma source, or an electric arc.
  • the implantation device comprises mechanical, pneumatic, or electric potential.
  • metal-containing refers something that at least contains that thing but could also contain other things.
  • metal-containing refers to something that at least contains a metal therein.
  • RFID tags are but one example of an electronic circuit which may be implanted.
  • Implanted circuits may include various sensors such as temperature, vibration, heat, as well as control circuitry and memory.
  • the object to be implanted comprises a metal or is metal-containing.
  • the object may be made of plastic or a carbon composite material or a composite of metal and non-metal.
  • the RFID tags can be first built into a heat resistant coating to form a RFID tag encapsulated in a heat resistant coating (also referred to herein as “RFID tag-in-shell” and “coated RFID tag”), which could be then implanted into the metal.
  • a heat resistant coating refers to a coating around the RFID tag that protects the RFID electronics from the heat surrounding the RFID tag during implantation of the RFID tag in a metal-containing object by allowing less heat to be transferred to the RFID electronics than an amount of heat to destroy the RFID electronics.
  • the metal-containing object may comprise a substantially pure elemental metal, a metal alloy, or even a metal matrix composite.
  • Metals which may be implanted include, but are not limited to, lead, aluminum, iron and steel, nickel, and titanium.
  • the RFID tag can be built-in during metal molding, that is, as the metal component could be formed or after any step of fabrication. Further, the metal-containing object may be subject to further fabrication and/or finishing steps after implantation. Typically, the RFID tag could be encapsulated in a ceramic material or heat insulating semiconductor material.
  • the thickness of the ceramic material or heat insulating semiconductor material should be of a thickness sufficient to protect the RFID tag electronics. That is, the thickness of the ceramic material or heat insulating semiconductor material should be sufficient enough to prevent the temperature of the electronics from rising to a level that would destroy them.
  • the appropriate thickness is a function of the thermal conductivity of the ceramic material or heat insulating semiconductor material and the temperature gradient. This can be computed by the following equation:
  • thermal diffusivity
  • k is the thermal conductivity
  • p is the density of the material
  • c p is the specific heat capacity of the material.
  • the coated RFID tag will be at room temperature while the melted portion metal-containing object is at its melting temperature.
  • the melting temperature of several illustrative metals is provided in Table III below.
  • cooling is applied to the surface of the metal-containing object after implantation. Cooling may be accomplished, for example, through the use of forced cool air. In other embodiments, heat sinks or fins are contacted with or affixed to the metal-containing object.
  • the shape of the coated RFID tag is designed to reduce splash during implantation.
  • the time for the molten or softened material to re-harden is a function of the material. That is, it is a function of the heat capacity of the material as well as the volume of the material.
  • the time to re-harden determines the time window for implantation.
  • the time window (t w ) may be described as a function of thermal mobility ( ⁇ th ) and diffusion constant (D) of the cooling material:
  • thermal mobility ⁇ th
  • diffusion constant D
  • the energy for implantation may be determined empirically for each material to be implanted.
  • the energy is related to the size of the gap between the injection nozzle and the surface of the object to be implanted.
  • the energy is also a function of the velocity of the injected coated RFID tag. That is, a higher velocity results in a higher implantation energy and vice versa. High energy, high velocity coated RFID tags will penetrate deeper than low energy, low velocity coated RFID tags.
  • the desired depth of penetration will vary with the material of the object to be penetrated.
  • the optimal depth for each material can be determined empirically. Parameters to consider when determining the optimal depth include having enough material to protect the implanted RFID tag and the quality of the signal received from the implanted RFID tag.
  • the maximum depth for a material is a function of the loss of fluidity as a function of time and the depth of fluidity as a function of the heat source. That is, materials which cool slowly will typically allow deeper penetration because there is more time for the coated RFID tag to penetrate. Further, higher power heat sources will make deeper pools than lower power heat sources.
  • the encapsulating material could be similar to or same as a tile material used in the Space Shuttle.
  • the RFID tag-in-shell could be impregnated into the metal object using spot-heating and ballistic implantation.
  • the heat resistant coating protects the RFID electronics from the heat of the hot metal and heat generated during implantation.
  • a small spot on a metal containing object is heated until it is molten, facilitating implantation of the RFID tag-in-shell within the molten metal. In other embodiments, it would be sufficient to heat the metal until soft. The choice of whether to melt or soften the metal may
  • the RFID tags of the various embodiments include a transponder.
  • a transponder could be a receiver-transmitter that will generate a reply signal upon proper electronic interrogation.
  • RFID tags may be passive, semi-passive, or active. Active RFID uses an internal power source, such as a battery, within the tag to continuously power the tag and its RF communication circuitry. Active RFID allows extremely low-level RF signals to be received by the tag (since the reader/interrogator does not power the tag), and the tag can generate high-level signals back to the reader/interrogator. Active RFID tags are continuously powered, whether in the reader/interrogator field or not, and are normally used when a longer tag read distance could be desired. Active RFID tags can typically be read from distances of approximately 300 feet.
  • Passive RFID relies on RF energy transferred from the reader/interrogator to the tag to power the RFID tag.
  • Passive RFID tags reflect energy from the reader/interrogator or receive and temporarily store a small amount of energy from the reader/interrogator signal in order to generate the tag response.
  • Passive RFID generally has stronger RF signals from the reader/interrogator relative to active RFID. Further, the RF signal strength returned from the tag could be constrained to relatively low levels by the limited energy.
  • Passive RFID tags are best used when the tag and interrogator will be close to one another. Passive RFID tags can typically be read from distances of approximately 30 feet.
  • Semi-passive RFID uses an internal power source to monitor environmental conditions, with RF energy transferred from the reader/interrogator similar to passive tags to power a tag response.
  • Semi-passive RFID tags use a process to generate a tag response similar to that of passive tags.
  • Semi-passive RFID tags differ from passive RFID tags in that semi passive tags possess an internal power source (battery) for the tag's circuitry which allows the tag to complete other functions such as monitoring of environmental conditions (temperature, shock) and which may extend the tag signal range.
  • Class I tags are passive. These tags generally include a unique identifier number, a “kill” function to disable the tag, and are typically memory programmable only once. Newer generation of Class I devices, however, may be rewritable and password protected. Class II tags are also passive and generally have extended identification numbers, include additional memory, are rewritable, and include password protection. Class III tags are semi-passive. Class III tags are similar to Class II tags but also include a power source and one or more sensors. Class IV tags are active. Class IV devices include a power source and are capable of initiating communications with a reader/interrogator or another RFID tag.
  • RFID tags could be as small as 0.3 mm 2 or even smaller.
  • the size of the RFID tag is not limiting. That is, the size of the RFID tag may be selected depending on the configuration of the part which is implanted and the use of the RFID tag.
  • the use of embedded electronics, especially embedded RFID tags, turns ordinary metallic objects into intelligent objects.
  • the intelligence is added to the object by providing information regarding the relative motion of the object. In this manner, the motion of the intelligent object can be precisely monitored and the intelligent object adjusted.
  • the relative motion may be rotation or vibration.
  • Uses of intelligent metal objects include, but are not limited to, remote surgery, manipulation of robots, manipulation of manufacturing machines, and prosthetics. This also helps convert passive objects into active objects that can communicate to a computer or with other active objects. In an automobile, for example, active components can communicate to a central computer.
  • FIG. 1 illustrates a heat resistant coated RFID tag 100 according to one embodiment.
  • the heat resistant coated RFID tag 100 could comprise a RFID tag 102 having RFID electronics 101 , and a heat resistant coating 104 encapsulating the RFID tag 102 .
  • the RFID tag 102 may be passive, semi-passive, or active.
  • the heat resistant coating 104 may be a ceramic or a heat insulating semiconductor material. Suitable ceramic materials include, but are not limited to, SiN, SiO 2 , Al 2 O 3 , SiO 2 —Al 2 O 3 , and borosilicates. Heat insulating semiconductor materials may include for example amorphous silicon.
  • the coating material may be selected based on the desired properties of the heat resistant coating 104 such as the temperature to be withstood, and the desired strength of the heat resistant coating 104 . It is desirable that the coating material be sufficiently stable and heat resistant to protect the encapsulated RFID tag 102 .
  • Coating the RFID tag 102 with the heat resistant coating 104 may be accomplished through a variety of processes.
  • One process could comprise encapsulation. Encapsulation may be accomplished by dip coating. In the dip coating process the RFID tag could be immersed in a tank containing the coating material, removed from the tank, and allowed to dry. The coated piece may be also be dried by force-drying or baking.
  • Another method of coating could be the spin coating process. In the spin coating process, excess amount of a coating solution could be placed on the RFID tag 102 , which could be then rotated at high speed in order to spread the fluid by centrifugal force. Another method of coating could be sputtering.
  • Sputtering is a process whereby atoms of the coating are ejected from a solid target material due to bombardment of the target by energetic ions. That is, a target which could comprise the coating material could be bombarded with high energy particles. The high energy particles erode the target, the atoms of which fly to the RFID tag 102 and stick.
  • Still another method of coating includes blow molding a shell and inserting the RFID tag within. This method could be similar to glass blowing in bulb formation.
  • the coating can be done as an extended step in RFID packaging wherein coating is grown or deposited over and/or around the RFID tag as allowed by the process technology. Many other coating processes can be used. For example, a specialized semiconductor processing packaging step to completely cover the RFID on all sides to form encapsulation may be used. A coating method fis sufficient if it can encapsulate the RFID tag without damaging the electronics.
  • FIG. 2 is a flow diagram illustrating a method of manufacturing a metal containing object containing a coated RFID tag according to one embodiment.
  • Process flow 200 includes steps of: coating the RFID tag with a heat resistant coating 210 , spot heating the surface of a metal-containing object to be implanted 220 , and implanting the coated RFID tag into the metal-containing object 230 .
  • the method also includes optional steps of testing the electrical characteristics of the implanted RFID tag 240 and post implantation finishing steps 250 .
  • the step of spot heating the surface of a metal-containing object to be implanted 220 may also be accomplished through a variety of methods.
  • the metal surface could be heated with an electron beam.
  • the metal surface could be heated with a laser, plasma, or infrared source. Indeed, any directed heat source could be used.
  • the metal surface may also be heated with an electric arc. Typically, the metal surface is heated until the surface metal is molten.
  • the surface could be heated until softened rather than melted.
  • Softening for many materials occurs at 1 ⁇ 2 the homologous temperature, T H .
  • the homologous temperature T H is defined as T/T M , where T M is the melting temperature of the alloy. In modern superalloys, softening generally occurs at temperatures approaching 0.9T M .
  • the step of implanting the coated RFID tag into the metal-containing object 230 may also be performed in a variety of methods.
  • the coated RFID tag 100 could be accelerated pneumatically and implanted into the surface.
  • the outer surface of the heat resistant coating 104 could be provided with a charge and the coated RFID tag 100 could be implanted in a manner similar to ion implantation. That is, an electric potential could be generated between the surface of the part and the implantation device which causes the charged coated RFID tag 100 to accelerate to the surface.
  • the coated RFID tag 100 could be mechanically injected into the metal-containing object with a hypodermic needle.
  • a cavity could be micro-machined into the metal-containing object, the coated RFID tag 100 deposited, and the surface of the object reformed.
  • the surface of the object may be reformed, for example, by spot melting the surface and allowing molten metal to flow into the machined cavity, covering the coated RFID tag 100 .
  • a modified gun can shoot the coated RFID tag onto the soft metal surface.
  • the step of testing the electrical characteristics of the implanted RFID tag 240 may include one or more tests.
  • the tests may include, for example, charging a passive RFID device 102 and attempting to read its identification number.
  • Optional post implantation finishing steps 250 may include annealing the surface of the implanted object, grinding, polishing, or peening the surface. Other optional steps include painting or varnishing the surface.
  • implantation produces essentially no damage to the surface. In this way, evidence of the implanted RFID tag is essentially invisible to the casual observer.
  • FIG. 3 is a schematic diagram of an implantation apparatus 300 according to one embodiment.
  • the apparatus 300 of this embodiment includes an implantation gun mechanism 310 , and a nozzle 320 having a nozzle tip 330 .
  • the nozzle 320 could comprise a ceramic material. In other aspects, however, the nozzle could comprise one or more metals.
  • the nozzle 320 includes one or more heat sources 370 .
  • the heat sources 370 may includes lasers, infrared sources, or electron beam sources.
  • the heat sources 370 may also include an electrode adapted for arc heating.
  • the apparatus 300 may also include one or more external heat sources 380 .
  • the external heat sources 380 may comprise lasers, infrared sources, plasma sources, electron beam sources, or electrodes for arc heating.
  • a gap 350 between the nozzle tip 330 and the metal object 340 could be maintained when heating and injecting the coated RFID tag 100 into the metal object 340 .
  • implantation may be accomplished through the nozzle 320 .
  • the size of the gap 350 is generally a function of several parameters. These parameters include whether the injection chamber (not shown) is sealed or open. If sealed, whether the chamber is evacuated or if the chamber includes an inert atmosphere. Further, the coated RFID tag 100 may be implanted along with other material, such as a filler. The filler may be liquid or solid. Additionally, the coated RFID tag 100 may be implanted along with a gaseous material.
  • FIG. 4 is a schematic diagram of an implanted object 400 of another embodiment.
  • the implanted object 400 could comprise one more coated RFID tags 100 implanted in a metal object 340 .
  • the metal object 340 could be a block.
  • the metal object 340 may be of any configuration and may be a component of a machine.
  • multiple coated RFID tags 100 may be implanted in the same metal object 340 . In this manner, different portions of the same metal object 340 may be independently monitored. In one aspect, monitoring may be accomplished, for example, with ultra short range RFID.
  • Embodiments include many useful methods and devices. For example, in one embodiment, implantation of a coated RFID tag in metal-containing components allows for the tracking of the individual metal-containing components of an apparatus comprising a plurality of metal-containing objects, as well as the apparatus itself. Individual metal-containing components can be inventoried prior to assembly and monitored at each stage during shipping in a manner similar to which non-metal packages are currently monitored by commercial shipping companies. Further, once an apparatus could be assembled using components containing the coated RFID tags, one, several, or all of the coated RFID tags 100 can be monitored to track the movements of the apparatus. Further, in an apparatus comprising several tagged metal-containing components, the apparatus can be monitored to determine if any of the metal-containing components were replaced.
  • a coated RFID tag 100 may be, for example, implanted in the head of a screw. An RFID monitor may then be configured to monitor the rotation of the screw in a manner similar to monitoring the rotation of a tire on a car or bicycle. In this way, passive components may be turned into intelligent components.
  • Other embodiments include, timing and sequencing in manufacturing assembly. For example, with RFID tags 100 located in moving parts and other RFID tags 100 (and/or RFID monitors) located in stationary parts, the relative motion of the moving parts can be precisely determined and monitored ( FIG. 6 ). This embodiment could be similar to the last embodiment, however, it allows for sophisticated monitoring and control of apparatuses with moving parts.
  • Still other embodiments include remote surgery with intelligent components ( FIG. 7 ). That is, the use of information from precisely located RFID tags can be used to monitor and guide remote surgical tools. Thus, rather than rely on the conventional optical techniques now in use, this embodiment allows for the use of precision RFID technology for monitoring and control of remote medical devices.
  • remote diagnostics of equipment especially consumer household white goods can be monitored ( FIG. 8 ).
  • White goods are generally major household appliances and include, but are not limited to, air conditioners, dishwashers, clothes dryers, freezers, refrigerators, ranges, stoves, ovens, water heaters, washing machines, trash compactors, and microwave ovens.
  • active RFID tags 100 with temperature sensors are embedded in a freezer or refrigerator can be used to diagnose whether coolant needs to be added.
  • embedded RFID tags 100 with vibration sensors are monitored to determine if the motor of the appliance could be going bad and needs to be replaced.
  • the service requirements may be determined before a technician could be sent to the house. This may lead to greater efficiency.
  • the technician may know in advance whether a part needs to be replaced and order the part before going to the consumer's house.
  • This embodiment may also be used for “brown goods.” Brown goods are typically small household electrical entertainment appliances such as: CD and DVD players, televisions, camcorders, still cameras, video game consoles, HiFi and home cinema, telephones, and answering machines.
  • coated RFID tags 100 with unique identification codes can be safely implanted into items such as jewelry without causing noticeable damage to the implanted object ( FIG. 9 ). Indeed, post implantation finishing can remove substantially all visible traces of the implantation process. In one example, if a consumer gives her jewelry to a jeweler for cleaning and suspects she received a substitute in return, she can have the jewelry scanned. Failure to yield the proper identification could be evidence of substitution. For greater security, encryption may be incorporated in the RFID tag 102 . In addition, it may provide a means for built-in authenticity, jeweler's stamp of originality, year of purchase, the value at a given time, etc.
  • Another embodiment could comprise a method of deploying and managing spacecraft/satellites ( FIG. 10 ).
  • unmanned missions are operated by preprogrammed instructions. Although some correction could be possible, currently there could be limited sensor data and control. With implanted coated RFID tags 100 in certain parts, however, precise monitoring and control could be possible.
  • multiple coated RFID tags 100 can communicate with each other as well as the reader/interrogator.
  • multiple communicating embedded coated RFID tags 100 are used in robots ( FIG. 6 ).
  • Multiple coated RFID tags 100 can be implanted in both the moving parts and in stationary parts of the robot. By monitoring the relative motions of the moving parts of the robot, the robots can be controlled or pre-programmed. Further, coated RFID tags 100 can be implanted in components to be acted upon by the robot. In this manner, the position of the robot relative to the part can be closely monitored. This may be advantageous for example, for a robot used to paint automobile doors. The motion of the robot can be monitored and the distance between the robot and the part can also be monitored and adjusted as desired.
  • the motion of metal-containing components due to vibration could be monitored ( FIG. 11 ).
  • sensitive motion sensors such as accelerometers
  • This embodiment may be used to monitor vibration sensitive apparatus such as airplane engines. It can also be used to measure earthquakes by monitoring the vibration of an apparatus and subtracting its normal or background vibration. Indeed, vibration monitoring from several sources in an effected area can be correlated to help determine the epicenter and the magnitude of an earthquake.
  • material handling by robots becomes easier ( FIG. 6 ).
  • routine labor oriented can be passed to robots as intelligent materials can be made available. In this manner, many building construction works can be automated.
  • Another embodiment enables measurement of stress or fatigue of a part or between parts in safety/critical environments such as aircraft. Availability of intelligent parts helps gather better data during normal operation or during abnormal conditions such as an aircraft crash. Another embodiment includes gathering better data of collisions conducted in research laboratories, that is artificial collision or impact. Another embodiment enables monitoring tools in factory floors or points of assembly such as during space walk.
  • Another embodiment could comprise an alloy material database which includes data for controlling the implantation equipment.
  • the database may include actual experimental data and interpolated data. It may also include data generated from computer models.
  • the database may include, but is not limited to, data concerning melting temperature, heat capacity, and material strength. The database can be used, for example, to manage the thermal sources, to adjust the size of the gap 250 , and the implantation velocity of the coated RFID tag 100 .
  • arms and ammunitions can be tracked ( FIG. 12 ).
  • serial numbers can be easily erased, scratched or disfigured.
  • Implanted RFID tags are harder to find and easy to track. Indeed, with implanted RFID tags, movement of arms and ammunition can be remotely monitored and even be monitored within a building. RFID readers can be placed at every door and window in the factory or warehouse if desired.
  • Another embodiment could comprise a method of vehicle service management ( FIG. 13 ).
  • the owner of the vehicle can be given parts data that can be monitored by a database maintained by the car owner. In this way, the owner can monitor the replacement and service record of various parts of the vehicle.
  • This embodiment can further be used to verify the service record of a used car.
  • the database may be incorporated in an onboard computer in the vehicle. Indeed, this technology may even solve one part of Game Theory puzzle—The Game of Incomplete Information. That is, this technology provides a means to verify & validate a transaction, especially in 2 nd car sales.
  • implanted RFID tags implanted in an automobile work in conjunction with servos in the engine, making it possible to remotely freeze the engine ( FIG. 14 ).
  • This embodiment may be advantageous, for example, in a crime scenario.
  • the vehicle may be monitored for moving violations such as speeding, passing through a red light, moving past a stop sign without stopping, or trespassing.
  • RFID tags and/or sensors are implanted in human prosthetics or implants to provide intelligent prosthetics or implants ( FIG. 15 ).
  • RFID tags and/or sensors are implanted in the tips of welding torches leading to improved precision in welding.
  • implanted RFID tags and/or sensors are used to detect power outages.
  • a signal bearing medium examples include, but are not limited to, the following: a recordable type medium such as a floppy disk, a hard disk drive, a Compact Disc (CD), a Digital Video Disk (DVD), a digital tape, a computer memory, etc.; and a transmission type medium such as a digital and/or an analog communication medium (e.g., a fiber optic cable, a waveguide, a wired communications link, a wireless communication link, etc.).
  • a typical data processing system generally includes one or more of a system unit housing, a video display device, a memory such as volatile and non-volatile memory, processors such as microprocessors and digital signal processors, computational entities such as operating systems, drivers, graphical user interfaces, and applications programs, one or more interaction devices,
  • a typical data processing system may be implemented utilizing any suitable commercially available components, such as those typically found in data computing/communication and/or network computing/communication systems.
  • any two components so associated can also be viewed as being “operably connected,” or “operably coupled,” to each other to achieve the desired functionality, and any two components capable of being so associated can also be viewed as being “operably couplable,” to each other to achieve the desired functionality.
  • operably couplable include but are not limited to optical coupling to permit transmission of optical light, for example via an optical pipe or fiber, physically interacting components and/or wirelessly interactable and/or wirelessly interacting components and/or logically interacting and/or logically interactable components.

Abstract

Systems and methods including implanting RFID tags into metal-containing objects. The RFID tags are coated in a heat resistant coating. The surface of the metal-containing object could be heated and the coated RFID tag could be injected into the metal-containing object by allowing less heat to be transferred to the RFID electronics than an amount of heat to destroy the RFID electronics. The metal-containing objects can be monitored and tracked. Apparatus with implanted metal-containing objects can be remotely monitored and controlled.

Description

    RELATED APPLICATION
  • This application claims the benefit under 35 U.S.C. §119(a) of Indian Application No. 1143/CHE12009, which was filed on May 18, 2009, and is incorporated herein by reference in its entirety.
  • BACKGROUND
  • Radio frequency identification (RFID) tags were first used during World War II to help the military identify whether aircraft were friend or foe. In the late 1980s, the use of RFID tags increased significantly when they became the basis for electronic toll collection along the East Coast. In the late 1990's, interest in the use of RFID tags again increased significantly as corporations began investigating the use of RFID tags to track merchandise.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a schematic diagram of heat resistant coated RFID tag.
  • FIG. 2 is a flow diagram illustrating an embodiment of an implantation method.
  • FIG. 3 is a schematic diagram of an implantation device of an embodiment.
  • FIG. 4 is a schematic diagram of an object having an implanted RFID tag of an embodiment.
  • FIG. 5 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a screw.
  • FIG. 6 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a robot.
  • FIG. 7 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a surgical instrument.
  • FIG. 8 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a white good (refrigerator).
  • FIG. 9 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in jewelry.
  • FIG. 10 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a satellite.
  • FIG. 11 is a schematic illustration of an embodiment comprising a coated RFID tag configured to detect vibration (earthquake).
  • FIG. 12 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a firearm.
  • FIG. 13 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a vehicle.
  • FIG. 14 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in an engine.
  • FIG. 15 is a schematic illustration of an embodiment comprising a coated RFID tag embedded in a medical implant.
  • SUMMARY
  • An embodiment relates to a device comprising electronics encapsulated in a heat resistant coating, the heat resistant coating configured to protect the electronics from heat surrounding the electronics during implantation of the electronics in an object by allowing less heat to be transferred to the electronics than an amount of heat to destroy the electronics (FIG. 1). In one aspect, the object comprises metal. In another aspect, the electronics comprise a radio frequency identification (RFID) tag. The heat resistant coating may comprise amorphous silicon, SiN, SiO2, Al2O3, SiO2—Al2O3, or a borosilicate or any other suitable heat resistant material. In one aspect, the RFID tag comprises a passive, semi-passive, or active RFID tag.
  • Another embodiment relates to a method comprising encapsulating electronics in a heat resistant coating, heating an object, implanting the encapsulated electronics into the object, the heat resistant coating encapsulating the electronics configured to protect the electronics from heat surrounding the electronics during implantation of the electronics in the object by allowing less heat to be transferred to the electronics than an amount of heat to destroy the electronics (FIG. 2). In one aspect, the object comprises metal. In another aspect, the electronics comprise a radio frequency identification (RFID) tag. In another aspect, the heat resistant coating comprises amorphous silicon, SiN, SiO2, Al2O3, SiO2—Al2O3, or a borosilicate. A portion of the object may comprise a molten metal. Another aspect further comprises testing the RFID tag after implanting. Another aspect further comprises performing post implantation finishing on the object after said implanting. In another aspect, post implantation finishing includes one or more of annealing, grinding, polishing, peening, painting or varnishing. Another aspect, further comprises reforming a surface of the object.
  • Another embodiment relates to an object comprising an embedded electronic circuit, the electronic circuit encapsulated in a heat resistant coating, the heat resistant coating configured to protect the electronic circuit from heat surrounding the electronic circuit during implantation of the electronic circuit in the object by allowing less heat to be transferred to the electronic circuit than an amount of heat to destroy the electronic circuit (FIG. 4). In an aspect, the electronic circuit comprises a radio frequency identification (RFID) tag. In another aspect, the object comprises metal. In another aspect, the RFID tag comprises a passive, semi-passive, or active RFID tag. In another aspect, the metal comprises an essentially pure elemental metal, a metal alloy, or a metal matrix composite. In another aspect, the object comprises lead, aluminum, iron, steel, nickel, titanium, or carbon. In another aspect, the heat resistant coating comprises amorphous silicon, SiN, SiO2, Al2O3, SiO2—Al2O3, or a borosilicate.
  • In another aspect, the embedded electronic circuit provides intelligence to the object by providing information regarding the relative motion of the object. In another aspect, the relative motion comprises rotation or vibration. In still another aspect, the object is configured for remote surgery, manipulation of robots, manipulation of manufacturing machines, or prosthetics.
  • Another embodiment relates to an apparatus comprising a plurality of objects, at least one of the plurality of objects comprising a an electronic circuit encapsulated in a heat resistant coating, the heat resistant coating encapsulating the electronic circuit configured to protect the electronic circuit from heat surrounding the electronic circuit during implantation of the electronic circuit in the at least one of the plurality of object by allowing less heat to be transferred to the electronic circuit than an amount of heat to destroy the electronic circuit (FIG. 3). In an aspect, the electronic circuit can comprise a radio frequency identification (RFID) tag. In another aspect, the RFID tag comprises a tag from Class I, Class II, Class III, or Class IV. In another aspect, the apparatus comprises a plurality of electronic circuits. In another aspect, the apparatus comprises a plurality of RFID tags. In another aspect, the plurality of RFID tags comprises more than one class.
  • Another embodiment relates to a method comprising monitoring electronics embedded in an object of an apparatus, the electronics being encapsulated in a heat resistant coating configured to protect the electronics from heat surrounding the electronics during implantation of the electronics in an object by allowing less heat to be transferred to the electronics than an amount of heat to destroy the electronics. In an aspect, the electronics comprise a radio frequency identification (RFID) tag. In another aspect, the RFID tag comprises a transponder. Another aspect further comprises monitoring a relative turn or location of a first part of the apparatus relative to a second part of the apparatus. Another aspect further comprises monitoring parameters adapted to assist in maintenance/servicing of the apparatus. Another aspect further comprises monitoring a plurality of RFID tags in the apparatus. Another aspect further comprises remotely controlling the apparatus.
  • Another embodiment relates to an apparatus comprising an implantation device configured to implant an electronic circuit embedded in an object, the electronic circuit encapsulated in a heat resistant coating configured to protect the electronic circuit from heat surrounding the electronic circuit during implantation of the electronic circuit tag in the object; an injection nozzle and at least one heat source. In an aspect, the at least one heat source is located in the nozzle. In another aspect, the heat source comprises an electron beam, a laser, an infrared source, a plasma source, or an electric arc. In another aspect, the implantation device comprises mechanical, pneumatic, or electric potential.
  • DETAILED DESCRIPTION
  • In the following detailed description, reference is made to the accompanying drawings, which form a part hereof. In the drawings, similar symbols typically identify similar components, unless context dictates otherwise. The illustrative embodiments described in the detailed description, drawings, and claims are not meant to be limiting. Other embodiments may be utilized, and other changes may be made, without departing from the spirit or scope of the subject matter presented herein. It will be readily understood that the aspects of the present disclosure, as generally described herein, and illustrated in the Figures, can be arranged, substituted, combined, separated, and designed in a wide variety of different configurations, all of which are explicitly contemplated herein.
  • As used in the specification and claims, the singular forms “a”, “an” and “the” include plural references unless the context clearly dictates otherwise. A thing followed by the term “containing” such as “metal-containing” refers something that at least contains that thing but could also contain other things. Thus, the term “metal-containing” refers to something that at least contains a metal therein.
  • As will be discussed in more detail below, electronics such as RFID tags can be implanted safely in a non-destructive way in an object whose surface can be softened or melted by the application of heat. In the description below, the implanted electronics are illustrated by way of RFID tags. RFID tags, however, are but one example of an electronic circuit which may be implanted. Implanted circuits may include various sensors such as temperature, vibration, heat, as well as control circuitry and memory. Further, in many of the examples below, the object to be implanted comprises a metal or is metal-containing. However, the object may be made of plastic or a carbon composite material or a composite of metal and non-metal.
  • In one embodiment, the RFID tags can be first built into a heat resistant coating to form a RFID tag encapsulated in a heat resistant coating (also referred to herein as “RFID tag-in-shell” and “coated RFID tag”), which could be then implanted into the metal. The term “heat resistant coating” refers to a coating around the RFID tag that protects the RFID electronics from the heat surrounding the RFID tag during implantation of the RFID tag in a metal-containing object by allowing less heat to be transferred to the RFID electronics than an amount of heat to destroy the RFID electronics. The metal-containing object may comprise a substantially pure elemental metal, a metal alloy, or even a metal matrix composite. Metals which may be implanted include, but are not limited to, lead, aluminum, iron and steel, nickel, and titanium. The RFID tag can be built-in during metal molding, that is, as the metal component could be formed or after any step of fabrication. Further, the metal-containing object may be subject to further fabrication and/or finishing steps after implantation. Typically, the RFID tag could be encapsulated in a ceramic material or heat insulating semiconductor material.
  • The thickness of the ceramic material or heat insulating semiconductor material should be of a thickness sufficient to protect the RFID tag electronics. That is, the thickness of the ceramic material or heat insulating semiconductor material should be sufficient enough to prevent the temperature of the electronics from rising to a level that would destroy them. The appropriate thickness is a function of the thermal conductivity of the ceramic material or heat insulating semiconductor material and the temperature gradient. This can be computed by the following equation:

  • q=−k∇T
  • Where q is the heat, k is the thermal conductivity and ΔT is the thermal gradient. The thickness may also be determined with thermal diffusivity (“α”) data. Where the thermal diffusivity is the ratio of thermal conductivity to the volumetric heat capacity:
  • α = k pc p
  • Where k is the thermal conductivity, p is the density of the material and cp is the specific heat capacity of the material. Thus, given the heat inputted (which can be predetermined or determined experimentally) to soften or melt the surface of the metal-containing object, the temperatures of the metal surface and the coated RFID tag, and the thermal conductivity or thermal diffusivity of the coating material, the thickness of the desired coating can be determined.
  • The following tables provide sample thermal conductivity and thermal diffusivity data which may be used to calculate coating thicknesses. This data is merely illustrative. References with thermal conductivity and thermal diffusivity data are widely available.
  • TABLE I
    Substance Thermal conductivity (cal/sec/cm/K)
    Brick (Common red) 0.0015
    Concrete (Stone 0.0022
    Glass (soda) 0.0017
    Sand (dry) 0.00093
  • TABLE II
    Substance Thermal diffusivity (M2/sec)
    Aluminum oxide (polycrystalline) 1.2 × 10−5
    Common brick 5.2 × 10−7
    Window glass 3.4 × 10−7
    Sandstone 1.12 × 10−6 to 1.19 × 10−6
  • Typically, the coated RFID tag will be at room temperature while the melted portion metal-containing object is at its melting temperature. The melting temperature of several illustrative metals is provided in Table III below.
  • TABLE III
    Melting Melting
    Point Point
    Elements Symbol Celsius Fahrenheit
    Aluminum AI 659 1218
    Brass (85 Cu 15 Zn) Cu + Zn 900-940 1652-1724
    Bronze (90 Cu 10 Sn) Cu + Sn  850-1000 1562-832 
    Cast Iron C + Si + Mn + Fe 1260 2300
    Carbon C 3600 6512
    Chromium Cr 1615 3034
    Copper Cu 1083 1981
    Gold Au 1063 1946
    Hydrogen H −259 −434.2
    Inconel Ni + Cr + Fe 1393 2540
    Iron Fe 1530 2786
    Lead Pb 327 621
    Magnesium Mg 670 1240
    Manganese Mn 1260 2300
    Monel Ni + Cu + Si 1301 2400
    Nickel Ni 1452 2646
    Phosphorous P 44 111
    Silicon Si 1420 2588
    Silver Ag 961 1762
    Stainless Steel Cr + Ni + Mn + C 1363 2550
    Steel-High Carbon Cr + Ni + Mn + C 1353 2500
    Medium Carbon Cr + Ni + Mn + C 1427 2600
    Low Carbon Cr + Ni + Mn + C 1464 2700
    Tin Sn 232 450
    Titanium Ti 1795 3263
    Tungsten W 3000 5432
    Zinc Zn 419 786
  • In some embodiments of the invention, to further reduce the possibility of damage to the RFID electronics, cooling is applied to the surface of the metal-containing object after implantation. Cooling may be accomplished, for example, through the use of forced cool air. In other embodiments, heat sinks or fins are contacted with or affixed to the metal-containing object.
  • The operating limits of many common electronics is about 45° C.-60° C. For some electronics, the range can be stretched to about 85° C. Beyond this, their working is not guaranteed. There are, however, special purpose electronics which have been developed to withstand higher temperatures. Indeed, electronics have been developed to operate in a range of −40° C.-300° C.
  • In some embodiments, the shape of the coated RFID tag is designed to reduce splash during implantation. The time for the molten or softened material to re-harden is a function of the material. That is, it is a function of the heat capacity of the material as well as the volume of the material. The time to re-harden determines the time window for implantation. The time window (tw) may be described as a function of thermal mobility (μth) and diffusion constant (D) of the cooling material:
  • Lim T soft -> T hard F { μ th D }
  • The relationship between thermal mobility (μth) and diffusion constant (D) may be described by the Einstein kinetic relationship:

  • D=μk B T
  • Where kB is Boltzmann's constant and T is the temperature of the material.
  • The energy for implantation may be determined empirically for each material to be implanted. The energy is related to the size of the gap between the injection nozzle and the surface of the object to be implanted. The energy is also a function of the velocity of the injected coated RFID tag. That is, a higher velocity results in a higher implantation energy and vice versa. High energy, high velocity coated RFID tags will penetrate deeper than low energy, low velocity coated RFID tags.
  • In general, the desired depth of penetration will vary with the material of the object to be penetrated. The optimal depth for each material can be determined empirically. Parameters to consider when determining the optimal depth include having enough material to protect the implanted RFID tag and the quality of the signal received from the implanted RFID tag. The maximum depth for a material is a function of the loss of fluidity as a function of time and the depth of fluidity as a function of the heat source. That is, materials which cool slowly will typically allow deeper penetration because there is more time for the coated RFID tag to penetrate. Further, higher power heat sources will make deeper pools than lower power heat sources.
  • In some embodiments, the encapsulating material could be similar to or same as a tile material used in the Space Shuttle. In one embodiment, the RFID tag-in-shell could be impregnated into the metal object using spot-heating and ballistic implantation. The heat resistant coating protects the RFID electronics from the heat of the hot metal and heat generated during implantation. In some embodiments, a small spot on a metal containing object is heated until it is molten, facilitating implantation of the RFID tag-in-shell within the molten metal. In other embodiments, it would be sufficient to heat the metal until soft. The choice of whether to melt or soften the metal may
  • depend on the desired depth of implantation, the alloy, and the final use of the metal containing object.
  • The RFID tags of the various embodiments include a transponder. A transponder could be a receiver-transmitter that will generate a reply signal upon proper electronic interrogation.
  • RFID tags may be passive, semi-passive, or active. Active RFID uses an internal power source, such as a battery, within the tag to continuously power the tag and its RF communication circuitry. Active RFID allows extremely low-level RF signals to be received by the tag (since the reader/interrogator does not power the tag), and the tag can generate high-level signals back to the reader/interrogator. Active RFID tags are continuously powered, whether in the reader/interrogator field or not, and are normally used when a longer tag read distance could be desired. Active RFID tags can typically be read from distances of approximately 300 feet.
  • Passive RFID relies on RF energy transferred from the reader/interrogator to the tag to power the RFID tag. Passive RFID tags reflect energy from the reader/interrogator or receive and temporarily store a small amount of energy from the reader/interrogator signal in order to generate the tag response. Passive RFID generally has stronger RF signals from the reader/interrogator relative to active RFID. Further, the RF signal strength returned from the tag could be constrained to relatively low levels by the limited energy. Passive RFID tags are best used when the tag and interrogator will be close to one another. Passive RFID tags can typically be read from distances of approximately 30 feet.
  • Semi-passive RFID uses an internal power source to monitor environmental conditions, with RF energy transferred from the reader/interrogator similar to passive tags to power a tag response. Semi-passive RFID tags use a process to generate a tag response similar to that of passive tags. Semi-passive RFID tags differ from passive RFID tags in that semi passive tags possess an internal power source (battery) for the tag's circuitry which allows the tag to complete other functions such as monitoring of environmental conditions (temperature, shock) and which may extend the tag signal range.
  • Currently, there are four general classes of RFID tags. The various embodiments may use RFID tags from one or more of these classes. Class I tags are passive. These tags generally include a unique identifier number, a “kill” function to disable the tag, and are typically memory programmable only once. Newer generation of Class I devices, however, may be rewritable and password protected. Class II tags are also passive and generally have extended identification numbers, include additional memory, are rewritable, and include password protection. Class III tags are semi-passive. Class III tags are similar to Class II tags but also include a power source and one or more sensors. Class IV tags are active. Class IV devices include a power source and are capable of initiating communications with a reader/interrogator or another RFID tag.
  • RFID tags could be as small as 0.3 mm2 or even smaller. The size of the RFID tag, however, is not limiting. That is, the size of the RFID tag may be selected depending on the configuration of the part which is implanted and the use of the RFID tag.
  • The use of embedded electronics, especially embedded RFID tags, turns ordinary metallic objects into intelligent objects. The intelligence is added to the object by providing information regarding the relative motion of the object. In this manner, the motion of the intelligent object can be precisely monitored and the intelligent object adjusted. The relative motion may be rotation or vibration. Uses of intelligent metal objects include, but are not limited to, remote surgery, manipulation of robots, manipulation of manufacturing machines, and prosthetics. This also helps convert passive objects into active objects that can communicate to a computer or with other active objects. In an automobile, for example, active components can communicate to a central computer. These examples and others are described in more detail below.
  • FIG. 1 illustrates a heat resistant coated RFID tag 100 according to one embodiment. The heat resistant coated RFID tag 100 could comprise a RFID tag 102 having RFID electronics 101, and a heat resistant coating 104 encapsulating the RFID tag 102.
  • The RFID tag 102 may be passive, semi-passive, or active. The heat resistant coating 104 may be a ceramic or a heat insulating semiconductor material. Suitable ceramic materials include, but are not limited to, SiN, SiO2, Al2O3, SiO2—Al2O3, and borosilicates. Heat insulating semiconductor materials may include for example amorphous silicon. The coating material may be selected based on the desired properties of the heat resistant coating 104 such as the temperature to be withstood, and the desired strength of the heat resistant coating 104. It is desirable that the coating material be sufficiently stable and heat resistant to protect the encapsulated RFID tag 102.
  • Coating the RFID tag 102 with the heat resistant coating 104 may be accomplished through a variety of processes. One process, for example, could comprise encapsulation. Encapsulation may be accomplished by dip coating. In the dip coating process the RFID tag could be immersed in a tank containing the coating material, removed from the tank, and allowed to dry. The coated piece may be also be dried by force-drying or baking. Another method of coating could be the spin coating process. In the spin coating process, excess amount of a coating solution could be placed on the RFID tag 102, which could be then rotated at high speed in order to spread the fluid by centrifugal force. Another method of coating could be sputtering. Sputtering is a process whereby atoms of the coating are ejected from a solid target material due to bombardment of the target by energetic ions. That is, a target which could comprise the coating material could be bombarded with high energy particles. The high energy particles erode the target, the atoms of which fly to the RFID tag 102 and stick. Still another method of coating includes blow molding a shell and inserting the RFID tag within. This method could be similar to glass blowing in bulb formation. Further, the coating can be done as an extended step in RFID packaging wherein coating is grown or deposited over and/or around the RFID tag as allowed by the process technology. Many other coating processes can be used. For example, a specialized semiconductor processing packaging step to completely cover the RFID on all sides to form encapsulation may be used. A coating method fis sufficient if it can encapsulate the RFID tag without damaging the electronics.
  • FIG. 2 is a flow diagram illustrating a method of manufacturing a metal containing object containing a coated RFID tag according to one embodiment. Process flow 200 includes steps of: coating the RFID tag with a heat resistant coating 210, spot heating the surface of a metal-containing object to be implanted 220, and implanting the coated RFID tag into the metal-containing object 230. The method also includes optional steps of testing the electrical characteristics of the implanted RFID tag 240 and post implantation finishing steps 250.
  • The step of spot heating the surface of a metal-containing object to be implanted 220 may also be accomplished through a variety of methods. In some embodiments, the metal surface could be heated with an electron beam. In other embodiments, the metal surface could be heated with a laser, plasma, or infrared source. Indeed, any directed heat source could be used. The metal surface may also be heated with an electric arc. Typically, the metal surface is heated until the surface metal is molten.
  • In other embodiments, the surface could be heated until softened rather than melted. Softening for many materials occurs at ½ the homologous temperature, TH. The homologous temperature TH is defined as T/TM, where TM is the melting temperature of the alloy. In modern superalloys, softening generally occurs at temperatures approaching 0.9TM.
  • The step of implanting the coated RFID tag into the metal-containing object 230 may also be performed in a variety of methods. In one embodiment, the coated RFID tag 100 could be accelerated pneumatically and implanted into the surface. In other embodiments, the outer surface of the heat resistant coating 104 could be provided with a charge and the coated RFID tag 100 could be implanted in a manner similar to ion implantation. That is, an electric potential could be generated between the surface of the part and the implantation device which causes the charged coated RFID tag 100 to accelerate to the surface. In still other embodiments, the coated RFID tag 100 could be mechanically injected into the metal-containing object with a hypodermic needle. In still anther method, a cavity could be micro-machined into the metal-containing object, the coated RFID tag 100 deposited, and the surface of the object reformed. The surface of the object may be reformed, for example, by spot melting the surface and allowing molten metal to flow into the machined cavity, covering the coated RFID tag 100. Further, in another method, a modified gun can shoot the coated RFID tag onto the soft metal surface. The choice of implantation method and/or equipment mayor may not vary depending on the material being implanted and may also be selected based on equipment availability, cost, part configuration or other parameters as desired by the user.
  • The step of testing the electrical characteristics of the implanted RFID tag 240 may include one or more tests. The tests may include, for example, charging a passive RFID device 102 and attempting to read its identification number. Optional post implantation finishing steps 250 may include annealing the surface of the implanted object, grinding, polishing, or peening the surface. Other optional steps include painting or varnishing the surface. In one aspect, implantation produces essentially no damage to the surface. In this way, evidence of the implanted RFID tag is essentially invisible to the casual observer.
  • FIG. 3 is a schematic diagram of an implantation apparatus 300 according to one embodiment. The apparatus 300 of this embodiment includes an implantation gun mechanism 310, and a nozzle 320 having a nozzle tip 330. In one aspect, the nozzle 320 could comprise a ceramic material. In other aspects, however, the nozzle could comprise one or more metals. In some embodiments, the nozzle 320 includes one or more heat sources 370. As discussed above, the heat sources 370 may includes lasers, infrared sources, or electron beam sources. The heat sources 370 may also include an electrode adapted for arc heating. The apparatus 300 may also include one or more external heat sources 380. The external heat sources 380 may comprise lasers, infrared sources, plasma sources, electron beam sources, or electrodes for arc heating. In some embodiments, a gap 350 between the nozzle tip 330 and the metal object 340 could be maintained when heating and injecting the coated RFID tag 100 into the metal object 340. In some embodiments, implantation may be accomplished through the nozzle 320.
  • The size of the gap 350 is generally a function of several parameters. These parameters include whether the injection chamber (not shown) is sealed or open. If sealed, whether the chamber is evacuated or if the chamber includes an inert atmosphere. Further, the coated RFID tag 100 may be implanted along with other material, such as a filler. The filler may be liquid or solid. Additionally, the coated RFID tag 100 may be implanted along with a gaseous material.
  • FIG. 4 is a schematic diagram of an implanted object 400 of another embodiment. The implanted object 400 could comprise one more coated RFID tags 100 implanted in a metal object 340. As illustrated, the metal object 340 could be a block. As described below in more detail, however, the metal object 340 may be of any configuration and may be a component of a machine. Further, multiple coated RFID tags 100 may be implanted in the same metal object 340. In this manner, different portions of the same metal object 340 may be independently monitored. In one aspect, monitoring may be accomplished, for example, with ultra short range RFID.
  • ILLUSTRATIVE EXAMPLES
  • Embodiments include many useful methods and devices. For example, in one embodiment, implantation of a coated RFID tag in metal-containing components allows for the tracking of the individual metal-containing components of an apparatus comprising a plurality of metal-containing objects, as well as the apparatus itself. Individual metal-containing components can be inventoried prior to assembly and monitored at each stage during shipping in a manner similar to which non-metal packages are currently monitored by commercial shipping companies. Further, once an apparatus could be assembled using components containing the coated RFID tags, one, several, or all of the coated RFID tags 100 can be monitored to track the movements of the apparatus. Further, in an apparatus comprising several tagged metal-containing components, the apparatus can be monitored to determine if any of the metal-containing components were replaced.
  • Another embodiment could comprise the monitoring of the relative tum or a location measure for fixtures such as screws, and nut and bolts (FIG. 5). A coated RFID tag 100 may be, for example, implanted in the head of a screw. An RFID monitor may then be configured to monitor the rotation of the screw in a manner similar to monitoring the rotation of a tire on a car or bicycle. In this way, passive components may be turned into intelligent components.
  • Other embodiments include, timing and sequencing in manufacturing assembly. For example, with RFID tags 100 located in moving parts and other RFID tags 100 (and/or RFID monitors) located in stationary parts, the relative motion of the moving parts can be precisely determined and monitored (FIG. 6). This embodiment could be similar to the last embodiment, however, it allows for sophisticated monitoring and control of apparatuses with moving parts.
  • Still other embodiments include remote surgery with intelligent components (FIG. 7). That is, the use of information from precisely located RFID tags can be used to monitor and guide remote surgical tools. Thus, rather than rely on the conventional optical techniques now in use, this embodiment allows for the use of precision RFID technology for monitoring and control of remote medical devices.
  • In still another embodiment, remote diagnostics of equipment, especially consumer household white goods can be monitored (FIG. 8). White goods are generally major household appliances and include, but are not limited to, air conditioners, dishwashers, clothes dryers, freezers, refrigerators, ranges, stoves, ovens, water heaters, washing machines, trash compactors, and microwave ovens. In one example, active RFID tags 100 with temperature sensors are embedded in a freezer or refrigerator can be used to diagnose whether coolant needs to be added.
  • In another embodiment, embedded RFID tags 100 with vibration sensors are monitored to determine if the motor of the appliance could be going bad and needs to be replaced. In this way, the service requirements may be determined before a technician could be sent to the house. This may lead to greater efficiency. For example, the technician may know in advance whether a part needs to be replaced and order the part before going to the consumer's house. This embodiment may also be used for “brown goods.” Brown goods are typically small household electrical entertainment appliances such as: CD and DVD players, televisions, camcorders, still cameras, video game consoles, HiFi and home cinema, telephones, and answering machines.
  • In another embodiment, the authenticity and warranty management of high value items, for example, jewelry can be improved. In this embodiment, coated RFID tags 100 with unique identification codes can be safely implanted into items such as jewelry without causing noticeable damage to the implanted object (FIG. 9). Indeed, post implantation finishing can remove substantially all visible traces of the implantation process. In one example, if a consumer gives her jewelry to a jeweler for cleaning and suspects she received a substitute in return, she can have the jewelry scanned. Failure to yield the proper identification could be evidence of substitution. For greater security, encryption may be incorporated in the RFID tag 102. In addition, it may provide a means for built-in authenticity, jeweler's stamp of originality, year of purchase, the value at a given time, etc.
  • Another embodiment could comprise a method of deploying and managing spacecraft/satellites (FIG. 10). Typically, unmanned missions are operated by preprogrammed instructions. Although some correction could be possible, currently there could be limited sensor data and control. With implanted coated RFID tags 100 in certain parts, however, precise monitoring and control could be possible. In one aspect, multiple coated RFID tags 100 can communicate with each other as well as the reader/interrogator.
  • In another embodiment, multiple communicating embedded coated RFID tags 100 are used in robots (FIG. 6). Multiple coated RFID tags 100 can be implanted in both the moving parts and in stationary parts of the robot. By monitoring the relative motions of the moving parts of the robot, the robots can be controlled or pre-programmed. Further, coated RFID tags 100 can be implanted in components to be acted upon by the robot. In this manner, the position of the robot relative to the part can be closely monitored. This may be advantageous for example, for a robot used to paint automobile doors. The motion of the robot can be monitored and the distance between the robot and the part can also be monitored and adjusted as desired.
  • In still another embodiment, the motion of metal-containing components due to vibration could be monitored (FIG. 11). In this embodiment sensitive motion sensors, such as accelerometers, can be incorporated in a coated active RFID tag 100 and embedded in a metal object 340. This embodiment may be used to monitor vibration sensitive apparatus such as airplane engines. It can also be used to measure earthquakes by monitoring the vibration of an apparatus and subtracting its normal or background vibration. Indeed, vibration monitoring from several sources in an effected area can be correlated to help determine the epicenter and the magnitude of an earthquake.
  • In another embodiment, material handling by robots becomes easier (FIG. 6). In building construction, routine labor oriented can be passed to robots as intelligent materials can be made available. In this manner, many building construction works can be automated. Another embodiment enables measurement of stress or fatigue of a part or between parts in safety/critical environments such as aircraft. Availability of intelligent parts helps gather better data during normal operation or during abnormal conditions such as an aircraft crash. Another embodiment includes gathering better data of collisions conducted in research laboratories, that is artificial collision or impact. Another embodiment enables monitoring tools in factory floors or points of assembly such as during space walk.
  • Another embodiment could comprise an alloy material database which includes data for controlling the implantation equipment. The database may include actual experimental data and interpolated data. It may also include data generated from computer models. The database may include, but is not limited to, data concerning melting temperature, heat capacity, and material strength. The database can be used, for example, to manage the thermal sources, to adjust the size of the gap 250, and the implantation velocity of the coated RFID tag 100.
  • In another embodiment, arms and ammunitions can be tracked (FIG. 12). Currently, serial numbers can be easily erased, scratched or disfigured. Implanted RFID tags, however, are harder to find and easy to track. Indeed, with implanted RFID tags, movement of arms and ammunition can be remotely monitored and even be monitored within a building. RFID readers can be placed at every door and window in the factory or warehouse if desired.
  • Another embodiment could comprise a method of vehicle service management (FIG. 13). The owner of the vehicle can be given parts data that can be monitored by a database maintained by the car owner. In this way, the owner can monitor the replacement and service record of various parts of the vehicle. This embodiment can further be used to verify the service record of a used car. In one aspect, the database may be incorporated in an onboard computer in the vehicle. Indeed, this technology may even solve one part of Game Theory puzzle—The Game of Incomplete Information. That is, this technology provides a means to verify & validate a transaction, especially in 2nd car sales.
  • In another embodiment, implanted RFID tags implanted in an automobile work in conjunction with servos in the engine, making it possible to remotely freeze the engine (FIG. 14). This embodiment may be advantageous, for example, in a crime scenario. In another aspect of this embodiment, the vehicle may be monitored for moving violations such as speeding, passing through a red light, moving past a stop sign without stopping, or trespassing.
  • In another embodiment, RFID tags and/or sensors are implanted in human prosthetics or implants to provide intelligent prosthetics or implants (FIG. 15). In another embodiment, RFID tags and/or sensors are implanted in the tips of welding torches leading to improved precision in welding. In another embodiment, implanted RFID tags and/or sensors are used to detect power outages.
  • The foregoing detailed description has set forth various embodiments of the devices and/or processes via the use of diagrams, flowcharts, and/or examples. Insofar as such diagrams, flowcharts, and/or examples contain one or more functions and/or operations, it will be understood by those within the art that each function and/or operation within such diagrams, flowcharts, or examples can be implemented, individually and/or collectively, by a wide range of hardware, software, firmware, or virtually any combination thereof. In one embodiment, several portions of the subject matter described herein may be implemented via Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), digital signal processors (DSPs), or other integrated formats. However, those skilled in the art will recognize that some aspects of the embodiments disclosed herein, in whole or in part, can be equivalently implemented in integrated circuits, as one or more computer programs running on one or more computers (e.g., as one or more programs running on one or more computer systems), as one or more programs running on one or more processors (e.g., as one or more programs running on one or more microprocessors), as firmware, or as virtually any combination thereof, and that designing the circuitry and/or writing the code for the software and or firmware would be well within the skill of one of skill in the art in light of this disclosure. In addition, those skilled in the art will appreciate that the mechanisms of the subject matter described herein are capable of being distributed as a program product in a variety of forms, and that an illustrative embodiment of the subject matter described herein applies regardless of the particular type of signal bearing medium used to actually carry out the distribution. Examples of a signal bearing medium include, but are not limited to, the following: a recordable type medium such as a floppy disk, a hard disk drive, a Compact Disc (CD), a Digital Video Disk (DVD), a digital tape, a computer memory, etc.; and a transmission type medium such as a digital and/or an analog communication medium (e.g., a fiber optic cable, a waveguide, a wired communications link, a wireless communication link, etc.).
  • Those skilled in the art will recognize that it is common within the art to describe devices and/or processes in the fashion set forth herein, and thereafter use engineering practices to integrate such described devices and/or processes into data processing systems. That is, at least a portion of the devices and/or processes described herein can be integrated into a data processing system via a reasonable amount of experimentation. Those having skill in the art will recognize that a typical data processing system generally includes one or more of a system unit housing, a video display device, a memory such as volatile and non-volatile memory, processors such as microprocessors and digital signal processors, computational entities such as operating systems, drivers, graphical user interfaces, and applications programs, one or more interaction devices,
  • such as a touch pad or screen, and/or control systems including feedback loops and control motors (e.g., feedback for sensing position and/or velocity; control motors for moving and/or adjusting components and/or quantities). A typical data processing system may be implemented utilizing any suitable commercially available components, such as those typically found in data computing/communication and/or network computing/communication systems.
  • The herein described subject matter sometimes illustrates different components contained within, or connected with, different other components. It is to be understood that such depicted architectures are merely exemplary, and that in fact many other architectures can be implemented which achieve the same functionality. In a conceptual sense, any arrangement of components to achieve the same functionality is effectively “associated” such that the desired functionality is achieved. Hence, any two components herein combined to achieve a particular functionality can be seen as “associated with” each other such that the desired functionality is achieved, irrespective of architectures or intermedial components. Likewise, any two components so associated can also be viewed as being “operably connected,” or “operably coupled,” to each other to achieve the desired functionality, and any two components capable of being so associated can also be viewed as being “operably couplable,” to each other to achieve the desired functionality. Specific examples of operably couplable include but are not limited to optical coupling to permit transmission of optical light, for example via an optical pipe or fiber, physically interacting components and/or wirelessly interactable and/or wirelessly interacting components and/or logically interacting and/or logically interactable components.
  • With respect to the use of substantially any plural and/or singular terms herein, those having skill in the art can translate from the plural to the singular and/or from the singular to the plural as is appropriate to the context and/or application. The various singular/plural permutations may be expressly set forth herein for sake of clarity.
  • It will be understood by those within the art that, in general, terms used herein, and especially in the appended claims (e.g., bodies of the appended claims) are generally intended as “open” terms (e.g., the term “including” should be interpreted as “including but not limited to,” the term “having” should be interpreted as “having at least,” the term “includes” should be interpreted as “includes but is not limited to,” etc.). It will be further understood by those within the art that if a specific number of an introduced claim recitation is intended, such an intent will be explicitly recited in the claim, and in the absence of such recitation no such intent is present. For example, as an aid to understanding, the following appended claims may contain usage of the introductory phrases “at least one” and “one or more” to introduce claim recitations. However, the use of such phrases should not be construed to imply that the introduction of a claim recitation by the indefinite articles “a” or “an” limits any particular claim containing such introduced claim recitation to embodiments containing only one such recitation, even when the same claim includes the introductory phrases “one or more” or “at least one” and indefinite articles such as “a” or “an” (e.g., “a” and/or “an” should typically be interpreted to mean “at least one” or “one or more”); the same holds true for the use of definite articles used to introduce claim recitations. In addition, even if a specific number of an introduced claim recitation is explicitly recited, those skilled in the art will recognize that such recitation should typically be interpreted to mean at least the recited number (e.g., the bare recitation of “two recitations,” without other modifiers, typically means at least two recitations, or two or more recitations). Furthermore, in those instances where a convention analogous to “at least one of A, B, and C, etc.” is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., “a system having at least one of A, B, and C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). In those instances where a convention analogous to “at least one of A, B, or C, etc.” is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., “a system having at least one of A, B, or C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). It will be further understood by those within the art that virtually any disjunctive word and/or phrase presenting two or more alternative terms, whether in the description, claims, or drawings, should be understood to contemplate the possibilities of including one of the terms, either of the terms, or both terms. For example, the phrase “A or B” will be understood to include the possibilities of “A” or “B” or “A and B.”
  • All references cited herein, including but not limited to patents, patent applications, and non-patent literature are hereby incorporated by reference herein in their entirety.
  • While various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.

Claims (28)

1-6. (canceled)
6. A method comprising:
encapsulating electronics in a heat resistant coating;
heating an object so as to cause at least a portion of a surface of the object to become softened;
implanting the encapsulated electronics into the object via the softened surface, the heat resistant coating encapsulating the electronics configured to protect the electronics from heat during implantation of the electronics in the object by allowing less heat to be transferred from the softened surface to the electronics than an amount of heat to destroy the electronics; and
performing post-implantation processing of the object, the post-implantation processing including at least one of annealing, grinding, polishing, peening, painting and varnishing.
7. The method of claim 6, wherein the object comprises metal.
8. The method of claim 6, wherein the electronics comprise a radio frequency identification (RFID) tag.
9. The method of claim 6, wherein the heat resistant coating comprises amorphous silicon, SiN, SiO2, Al2O3, SiO2—Al2O3, or a borosilicate.
10. The method of claim 7, wherein at least a portion of the softened surface comprises a molten metal.
11. The method of claim 8, further comprising testing the RFID tag after said implanting.
12. (canceled)
13. (canceled)
14. A method comprising:
encapsulating electronics in a heat resistant coating;
heating an object so as to cause at least a portion of a surface of the object to become softened;
implanting the encapsulated electronics into the object via the softened surface, the heat resistant coating encapsulating the electronics configured to protect the electronics from heat surrounding the electronics during implantation of the electronics into the object by allowing less heat to be transferred to the electronics from the softened surface than an amount of heat to destroy the electronics; and
reforming the surface of the object after implanting the encapsulated electronics into the object.
15. An object comprising:
metal; and
an electronic circuit encapsulated in a heat resistant coating and embedded in the metal, the heat resistant coating configured to protect the electronic circuit from heat surrounding the electronic circuit during implantation of the electronic circuit in the metal by allowing less heat to be transferred to the electronic circuit than an amount of heat to destroy the electronic circuit.
16. The object of claim 15, wherein the electronic circuit comprises a radio frequency identification (RFID) tag.
17. The object of claim 15, wherein the object comprises at least one of lead, aluminum, iron, titanium, or carbon.
18. The object of claim 16, wherein the RFID tag comprises a passive, semi-passive, or active RFID tag.
19. The object of claim 17, wherein the metal comprises an essentially pure metal, a metal alloy, or a metal composite.
20. (canceled)
21. The method of claim 6, wherein encapsulating the electronics comprises dip coating the electronics in the heat resistant coating.
22. The method of claim 6, wherein encapsulating the electronics comprises sputtering the heat resistant coating onto the electronics.
23. The method of claim 6, wherein heating the surface of the object comprises heating at least a portion of the object to at least one-half the homologous temperature of the object.
24. The method of claim 6, wherein heating the surface of the object comprises irradiating the surface of the object with at least one of an electron beam, a laser beam, infrared radiation, a plasma, and an electrical arc.
25. The method of claim 6, wherein implanting the encapsulated electronics comprises ejecting the encapsulated electronics from a nozzle into the object.
26. The method of claim 6, wherein implanting the encapsulated electronics comprises pneumatically accelerating the encapsulated electronics towards the softened surface of the object.
27. The method of claim 6, wherein implanting the encapsulated electronics comprises:
applying an electric charge to at least one of the encapsulated electronics and the softened surface of the object; and
generating an electric potential between the encapsulated electronic and the softened surface of the object.
28. The method of claim 6, further comprising:
determining an implantation energy required to implant the encapsulated electronics to a desired depth below the surface of the object.
29. The method of claim 6, wherein the object comprises at least one of an air conditioner, a dishwasher, a clothes dryer, a freezer, a refrigerator, a range, a stove, an oven, a water heater, a washing machine, a trash compactor, and a microwave oven.
30. The method of claim 14, wherein reforming the surface of the object comprises spot melting at least a portion of the surface of the object.
31. The object of claim 15, wherein the object is seamless.
32. The object of claim 15, wherein the object comprises at least one of an air conditioner, a dishwasher, a clothes dryer, a freezer, a refrigerator, a range, a stove, an oven, a water heater, a washing machine, a trash compactor, and a microwave oven.
US12/551,164 2009-05-18 2009-08-31 Methods of implanting electronics in objects and objects with implanted electronics Expired - Fee Related US8310367B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/IB2010/001122 WO2010133935A1 (en) 2009-05-18 2010-05-14 A method of implanting electronics in objects

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN1143CH2009 2009-05-18
IN1143/CHE/2009 2009-05-18

Publications (2)

Publication Number Publication Date
US8310367B1 US8310367B1 (en) 2012-11-13
US20120298758A1 true US20120298758A1 (en) 2012-11-29

Family

ID=47114529

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/551,164 Expired - Fee Related US8310367B1 (en) 2009-05-18 2009-08-31 Methods of implanting electronics in objects and objects with implanted electronics

Country Status (1)

Country Link
US (1) US8310367B1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130093590A1 (en) * 2011-10-18 2013-04-18 Chandra Madhavan Sivalingam Tracking location of Jewelry for theft prevention
US20140184412A1 (en) * 2012-12-27 2014-07-03 Evolution Consulting Device for detecting the theft of an object
US20150059938A1 (en) * 2013-09-04 2015-03-05 Airbus Operations S.L. Method of detection and removal of auxiliary material suitable for the manufacturing of an aircraft element
US9329009B1 (en) 2013-03-15 2016-05-03 Vista Outdoor Operations Llc Manufacturing process to produce programmed terminal performance projectiles
US20180153234A1 (en) * 2015-09-02 2018-06-07 Baby De La Baye, Inc. Fabric with embedded information beacon
US20180337154A1 (en) * 2017-05-10 2018-11-22 Nanya Technology Corporation Combing bump structure and manufacturing method thereof
US20190244071A1 (en) * 2018-01-11 2019-08-08 Geoffrey Grove Metal fastener with embedded rfid tag and method of production
US20190266457A1 (en) * 2018-02-28 2019-08-29 Paul Salsberg Rfid screw specifically for use on eyeglass frames
EP3577410A4 (en) * 2017-02-01 2020-11-25 Impact Resources, Inc. Durable asset management tag
US20210125022A1 (en) * 2019-10-24 2021-04-29 The Boeing Company Intelligent fasteners
US11176795B2 (en) 2017-02-01 2021-11-16 Impact Resources, Inc. Durable asset management tag
EP4116880A1 (en) 2021-07-10 2023-01-11 Yesitis Device comprising an rfid label for use in a microwave oven and container or package provided with such a device
US20230095691A1 (en) * 2020-03-02 2023-03-30 Osaka Rashi Hambai Co., Ltd. Mounting member with ic tag

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012129178A2 (en) * 2011-03-18 2012-09-27 Aita Llc Thermally-armored radio-frequency identification device and method of producing same
DE102012205621A1 (en) * 2012-04-05 2013-10-10 BSH Bosch und Siemens Hausgeräte GmbH Hob and method for controlling a hob
CA2848106C (en) * 2013-04-02 2021-07-13 McMole Technologies Inc. System and method for identification and authentication of precious metals and small jewelry items using radio frequency identification ("rfid") technology
WO2015149360A1 (en) * 2014-04-04 2015-10-08 Abb Technology Ltd Portable apparatus for controlling robot and method thereof
EP3190553A1 (en) * 2016-01-05 2017-07-12 Tisular Safety, S.L.U. Radio frequency based control system for preventing occupational hazards
FR3053527B1 (en) 2016-06-29 2018-08-10 Safran Electronics & Defense METHOD FOR INVIOLABLE AND TRACABLE MARKING OF AN ASSEMBLY OF TWO ELEMENTS
DE102017010612A1 (en) * 2017-11-16 2019-05-16 Kuka Systems Gmbh Method and device for applying a chip
CN110210601A (en) * 2019-07-05 2019-09-06 江瑞祥 The method of china ink stick, production china ink stick with electronic tag and black product
IT201900025825A1 (en) * 2019-12-31 2021-07-01 Inspiredring S R L METHOD OF IMPLANTING A TRACKING DEVICE IN A JEWEL AND RELATIVE TRACKING METHOD

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040238623A1 (en) * 2003-05-09 2004-12-02 Wayne Asp Component handling device having a film insert molded RFID tag
US20060267843A1 (en) * 2005-05-30 2006-11-30 Isao Sakama Radio frequency IC tag and method for manufacturing same
US20070244470A1 (en) * 2006-04-17 2007-10-18 Sdgi Holdings, Inc. Method and apparatus for embedding a transmitter into a tool, and a system for monitoring the tool

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4910417A (en) 1986-09-19 1990-03-20 Actel Corporation Universal logic module comprising multiplexers
US5194759A (en) 1990-05-18 1993-03-16 Actel Corporation Methods for preventing disturbance of antifuses during programming
US5327024A (en) 1992-07-02 1994-07-05 Quicklogic Corporation Field programmable antifuse device and programming method therefor
US5347519A (en) 1991-12-03 1994-09-13 Crosspoint Solutions Inc. Preprogramming testing in a field programmable gate array
US5304871A (en) 1992-07-24 1994-04-19 Actel Corporation Programmable interconnect architecture employing leaky programmable elements
US5294846A (en) 1992-08-17 1994-03-15 Paivinen John O Method and apparatus for programming anti-fuse devices
US5349248A (en) 1992-09-03 1994-09-20 Xilinx, Inc. Adaptive programming method for antifuse technology
FR2698222B1 (en) 1992-11-18 1994-12-16 Gemplus Card Int Method and circuit for blowing a fuse in an integrated circuit.
JPH06318864A (en) 1993-05-07 1994-11-15 Toshiba Corp Field programmable gate array
US5424655A (en) 1994-05-20 1995-06-13 Quicklogic Corporation Programmable application specific integrated circuit employing antifuses and methods therefor
US5495181A (en) 1994-12-01 1996-02-27 Quicklogic Corporation Integrated circuit facilitating simultaneous programming of multiple antifuses
US5552720A (en) 1994-12-01 1996-09-03 Quicklogic Corporation Method for simultaneous programming of multiple antifuses
US5534793A (en) 1995-01-24 1996-07-09 Texas Instruments Incorporated Parallel antifuse routing scheme (PARS) circuit and method for field programmable gate arrays
US5566107A (en) 1995-05-05 1996-10-15 Micron Technology, Inc. Programmable circuit for enabling an associated circuit
US5712577A (en) 1996-04-18 1998-01-27 Electronics And Telecommunications Research Institute Anti-fuse programming circuit for user programmable integrated
EP1052595B1 (en) 1999-05-14 2001-09-19 Sokymat Sa Transponder and injection-moulded object and method for manufacturing the same
US6716782B2 (en) 2002-08-16 2004-04-06 The Boeing Company Rigid insulation and method of producing same
JP2004240881A (en) 2003-02-07 2004-08-26 Daishowa Seiki Co Ltd Protective structure of ic data carrier

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040238623A1 (en) * 2003-05-09 2004-12-02 Wayne Asp Component handling device having a film insert molded RFID tag
US20060267843A1 (en) * 2005-05-30 2006-11-30 Isao Sakama Radio frequency IC tag and method for manufacturing same
US20070244470A1 (en) * 2006-04-17 2007-10-18 Sdgi Holdings, Inc. Method and apparatus for embedding a transmitter into a tool, and a system for monitoring the tool

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Machine translation of JP 2004-240881 A, issued 8/26/04. *

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140306825A1 (en) * 2011-10-18 2014-10-16 Chandra Madhavan Sivalingam Location tracking of jewelry for theft prevention
US20130093590A1 (en) * 2011-10-18 2013-04-18 Chandra Madhavan Sivalingam Tracking location of Jewelry for theft prevention
US9652952B2 (en) * 2012-12-27 2017-05-16 Commissariat à l'Energie Atomique et aux Energies Alternatives Device for detecting the theft of an object
US20140184412A1 (en) * 2012-12-27 2014-07-03 Evolution Consulting Device for detecting the theft of an object
US9329009B1 (en) 2013-03-15 2016-05-03 Vista Outdoor Operations Llc Manufacturing process to produce programmed terminal performance projectiles
US9360284B1 (en) 2013-03-15 2016-06-07 Vista Outdoor Operations Llc Manufacturing process to produce metalurgically programmed terminal performance projectiles
US20150059938A1 (en) * 2013-09-04 2015-03-05 Airbus Operations S.L. Method of detection and removal of auxiliary material suitable for the manufacturing of an aircraft element
US10026340B2 (en) * 2013-09-04 2018-07-17 Airbus Operations S.L. Method of detection and removal of auxiliary material suitable for the manufacturing of an aircraft element
US20180153234A1 (en) * 2015-09-02 2018-06-07 Baby De La Baye, Inc. Fabric with embedded information beacon
US10757989B2 (en) * 2015-09-02 2020-09-01 Kiyeon Nam Fabric with embedded information beacon
US11176795B2 (en) 2017-02-01 2021-11-16 Impact Resources, Inc. Durable asset management tag
EP3577410A4 (en) * 2017-02-01 2020-11-25 Impact Resources, Inc. Durable asset management tag
US20180337154A1 (en) * 2017-05-10 2018-11-22 Nanya Technology Corporation Combing bump structure and manufacturing method thereof
US10446514B2 (en) * 2017-05-10 2019-10-15 Nanya Technology Corporation Combing bump structure and manufacturing method thereof
US20210357721A1 (en) * 2018-01-11 2021-11-18 Pilgrim Screw Corporation Metal fastener with embedded rfid tag and method of production
US20190244071A1 (en) * 2018-01-11 2019-08-08 Geoffrey Grove Metal fastener with embedded rfid tag and method of production
US10635963B2 (en) * 2018-01-11 2020-04-28 Pilgrim Screw Corporation Metal fastener with embedded RFID tag and method of production
US11586872B2 (en) * 2018-01-11 2023-02-21 Pilgrim Screw Corporation Metal fastener with embedded RFID tag and method of production
US11080584B2 (en) * 2018-01-11 2021-08-03 Pilgrim Screw Corporation Metal fastener with embedded RFID tag and method of production
US10719748B2 (en) * 2018-02-28 2020-07-21 Paul Salsberg RFID screw specifically for use on eyeglass frames
US20190266457A1 (en) * 2018-02-28 2019-08-29 Paul Salsberg Rfid screw specifically for use on eyeglass frames
US11074490B2 (en) * 2019-10-24 2021-07-27 The Boeing Company Intelligent fasteners
US20210125022A1 (en) * 2019-10-24 2021-04-29 The Boeing Company Intelligent fasteners
US20230095691A1 (en) * 2020-03-02 2023-03-30 Osaka Rashi Hambai Co., Ltd. Mounting member with ic tag
US11842242B2 (en) * 2020-03-02 2023-12-12 Osaka Rashi Hambai Co., Ltd. Mounting member with IC tag
EP4116880A1 (en) 2021-07-10 2023-01-11 Yesitis Device comprising an rfid label for use in a microwave oven and container or package provided with such a device
FR3125149A1 (en) * 2021-07-10 2023-01-13 Yesitis DEVICE COMPRISING AN RFID TAG USABLE AT LEAST IN A MICROWAVE OVEN AND CONTAINER OR PACKAGING PROVIDED WITH AT LEAST ONE SUCH DEVICE
US20230017472A1 (en) * 2021-07-10 2023-01-19 Yesitis Device comprising an rfid tag which can be used at least in a microwave oven, and receptacle or packaging provided with at least one such device

Also Published As

Publication number Publication date
US8310367B1 (en) 2012-11-13

Similar Documents

Publication Publication Date Title
US8310367B1 (en) Methods of implanting electronics in objects and objects with implanted electronics
Lee et al. Shape memory alloy (sma)‐based microscale actuators with 60% deformation rate and 1.6 kHz actuation speed
CN103717817B (en) Method and apparatus seal being applied on the surface of vehicle installation housing
WO2010133935A1 (en) A method of implanting electronics in objects
Quataert A thermal bremsstrahlung model for the quiescent X-ray emission from Sagittarius A
US20120114088A1 (en) Indirect Drive Targets for Fusion Power
Liu et al. Black hole mass and binary model for BL Lac object OJ 287
Anders Growth and decay of macroparticles: A feasible approach to clean vacuum arc plasmas?
Siddiq et al. Fibre embedding in aluminium alloy 3003 using ultrasonic consolidation process—thermo-mechanical analyses
Daly et al. Projectile preservation during oblique hypervelocity impacts
Steuben et al. Recent developments of the multiphysics discrete element method for additive manufacturing modeling and simulation
CN106175182B (en) A kind of Intelligent bullet cabinet of iris technology and preparation method thereof
CN106226310B (en) A kind of failure analysis test method of wiring board through-hole expanded by heating
CN206794175U (en) Bastard coal sorting unit and system
Wang et al. Competing failure or mixed failure models
Gelli Dwarf satellite galaxies at high-redshift: physical understanding and JWST predictions
Ingale et al. Automated Surveillance Robots for Harsh Climatic Conditions like Siachen
CN105793868A (en) Method for video monitoring
Dionigi et al. Exploring Deep Reinforcement Learning for Robust Target Tracking using Micro Aerial Vehicles
Koniges et al. Experiments for the validation of debris and shrapnel calculations
US20240111000A1 (en) Laser bonded glass-silicon vapor cell
JP2011021245A (en) Sealing treatment method for sintering material
Davis Catastrophic disruption in the solar system-Asteroid collisional history, origin of Hirayama families and disruption of small satellites
Singh et al. Extraterrestrial Impacts Creating Architectures for Life
Loveland Recent advances in understanding nuclear reactions

Legal Events

Date Code Title Description
AS Assignment

Owner name: GLITTER TECHNOLOGY LLP, SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VISHWANATH, ARKALGUD KRISHNAMURTHY;REEL/FRAME:023647/0442

Effective date: 20091209

Owner name: EMPIRE TECHNOLOGY DEVELOPMENT LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VISHWANATH, ARKALGUD KRISHNAMURTHY;REEL/FRAME:023647/0442

Effective date: 20091209

AS Assignment

Owner name: INTELLECTUAL VENTURES ASIA PTE. LTD., SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:GLITTER TECHNOLOGY LLP;REEL/FRAME:024412/0508

Effective date: 20090831

Owner name: INTELLECTUAL VENTURES ASIA PTE. LTD., SINGAPORE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EMPIRE TECHNOLOGY DEVELOPMENT LLC;REEL/FRAME:024412/0489

Effective date: 20100201

AS Assignment

Owner name: EMPIRE TECHNOLOGY DEVELOPMENT LLC, DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASIA PTE. LTD.;REEL/FRAME:024465/0114

Effective date: 20100204

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: CRESTLINE DIRECT FINANCE, L.P., TEXAS

Free format text: SECURITY INTEREST;ASSIGNOR:EMPIRE TECHNOLOGY DEVELOPMENT LLC;REEL/FRAME:048373/0217

Effective date: 20181228

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20201113