US20190019139A1 - Probabilistic inventory rfid method and system - Google Patents

Probabilistic inventory rfid method and system Download PDF

Info

Publication number
US20190019139A1
US20190019139A1 US16/123,889 US201816123889A US2019019139A1 US 20190019139 A1 US20190019139 A1 US 20190019139A1 US 201816123889 A US201816123889 A US 201816123889A US 2019019139 A1 US2019019139 A1 US 2019019139A1
Authority
US
United States
Prior art keywords
rfid
processors
contra
rfid tags
store
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/123,889
Inventor
John Belstner
Adam Blair
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tahoe Research Ltd
Original Assignee
Intel Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intel Corp filed Critical Intel Corp
Priority to US16/123,889 priority Critical patent/US20190019139A1/en
Assigned to INTEL CORPORATION reassignment INTEL CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Encinitas Laboratories, Inc.
Assigned to Encinitas Laboratories, Inc. reassignment Encinitas Laboratories, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BELSTNER, John
Assigned to ENCINITAS LABORATORIES, INC reassignment ENCINITAS LABORATORIES, INC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLAIR, Adam
Publication of US20190019139A1 publication Critical patent/US20190019139A1/en
Assigned to TAHOE RESEARCH, LTD. reassignment TAHOE RESEARCH, LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: INTEL CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10118Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the sensing being preceded by at least one preliminary step
    • G06K7/10128Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the sensing being preceded by at least one preliminary step the step consisting of detection of the presence of one or more record carriers in the vicinity of the interrogation device
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10366Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves the interrogation device being adapted for miscellaneous applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/20Point-of-sale [POS] network systems
    • G06Q20/203Inventory monitoring

Definitions

  • This disclosure relates to a radio frequency identification (RFID) systems. More particularly, the disclosure relates to a method to improve the performance of RFID systems and to more refine inventory prediction models for such systems.
  • RFID radio frequency identification
  • Radio-frequency identification is a ubiquitous technology that employs electromagnetic fields to automatically identify and track tags that contain electronically stored information.
  • Passive RFID tags collect energy from a nearby RFID reader's interrogating radio-frequency (RF) signal to report the electronic data stored within the tag.
  • the data may include a unique electronic product code (EPC) that can be associated with the characteristics of the object to which the tag is connected.
  • EPC electronic product code
  • RFID tags use radio-frequency (RF) signals they need not be within the line of sight of the RFID reader, an advantage over optical barcode technology. RFID tags may thus be embedded in the tracked object or object packaging.
  • RF radio-frequency
  • RFID tags are used throughout many industries, including retail, equipment manufacturing, and equipment rental facilities to name a few.
  • a manufacturing plant may embed an RFID tag on a component, and can track that component throughout the manufacturing process, and the distribution and sale process thereafter.
  • Banks use RFID tags attached to cash to track the flow money, and such tags are incorporated into the uniform product code (UPC) labels on clothing.
  • Ranchers may implant RFID tags into their animals to track the movement of their herds.
  • UPC uniform product code
  • RFID may also be used as part of an inventory management system.
  • a reader may send out an interrogation RF signal, then for each tag that reports back, the system can flag the associated item as remaining in inventory. Those tags that do not report back are flagged as not in inventory.
  • RFID tags When several RFID tags are located within a confined volume, it can be difficult or impossible to interrogate them all. For example, a warehouse may have thousands of tagged items, some of which may be on the fringe of the RFID reading area, while others may be blocked from the interrogating RF signal, preventing their successful interrogation by the RFID reader.
  • Conventional RFID inventory technology will incorrectly flag these non-interrogated tags (and their associated objects) as not in inventory. This false reporting leads to costly lost sales, over-ordering, and over-stocking, frustrating the purposes of RFID inventory management. Accordingly, improvements to existing RFID systems are needed to more accurately detect and report tagged inventory.
  • the present invention(s) elegantly overcome many of the drawbacks of prior systems and provide numerous additional improvements and benefits as will be apparent to persons of skill in the art.
  • a probabilistic inventory application for an RFID system that provides a more accurate prediction of a facility's inventory. Additional structures, systems, and methods are also provided for improved deep scanning of RFID tags throughout a facility to improve the accuracy of inventory reporting.
  • RFID radio frequency identification
  • Such systems may include one or more controllers each connected to one or more RFID readers, where each reader can detect data signals from a plurality of RFID tags attached with objects.
  • the objects may be part of an object category.
  • Example systems may also have a database connected to the controller, which may record, for example: (1) a time when the data signal is received from each tag in the plurality; and (2) the data contained in the data signal from each tag in the plurality.
  • Example systems may include a processor that can perform an inventory analysis of the objects based on a confidence probability curve. For example, in one embodiment this curve may be a decaying function that is based on various probabilities.
  • the system may also create a contra-EPC.
  • at least one of the plurality of RFID readers may comprise an exit RFID reader used in a point-of-sale (POS) system that records the sale of an object in a database.
  • a processor may be connected to the POS system to perform the following steps, for example: (1) when sales information is received from the POS system, monitoring the exit RFID reader for detection of data signal from a RFID tag in the plurality, and if an RFID tag is so detected, matching the sales information to the RFID tag and updating the database; and (2) if an RFID tag is not so detected, creating a contra-EPC associated with the object and updating the database.
  • the inventory analysis may include the steps of: (1) calculating an in-store probability for each RFID tag in the plurality based on the confidence probability curve and the time for each RFID tag; and (2) summing the in-store probabilities.
  • the system may calculate a probability for each contra-EPC based on the confidence probability curve where the contra-EPC probabilities are subtracted from the summation.
  • the summation total may be configured to not include probabilities for RFID tags detected by the exit RFID reader.
  • the confidence probability curve may be based on a variety of parameters, such as the following four parameters for example: (1) P S —the probability of an RFID tag from the plurality being read in a day; (2) P D —the probability of an RFID tag from the plurality that is unreadable becoming readable within a day; (3) P E —the probability of an RFID tag from the plurality exiting the space monitored by the RFID system without being detected by the RFID system; and (4) I D —the percentage of objects exiting the space monitored by the RFID system. As the system encounters and records more information these probabilities may be refined and changed.
  • a specific confidence probability curve may be based on the following equation, for example, where D is the number of days elapsed since the data signal from the RFID tag was received by the RFID system:
  • a radio frequency identification (RFID) reader may contain a motion detection sensor, a radio frequency transceiver configured to transmit RF energy at a first and second RFID profile, and a processor.
  • the processor may perform the following steps, for example: (1) when motion is detected by the sensor, commanding the transceiver to transmit RF energy at the first RFID profile; and (2) when motion has not been detect for a predetermined time period, commanding the transceiver to transmit RF energy at the second RFID profile.
  • the motion sensor may be an optical, acoustic, infrared, sonar, or LIDAR sensor, for example. Such unique RFID readers may facilitate selective deep scans of RFID tags.
  • each such RFID reader may independently and selectively enter into a deep scan of the RFID tags.
  • the RFID readers may be merged with a point-of-sale (POS) system that records sales information.
  • POS point-of-sale
  • the system may perform an inventory analysis of objects connected to the plurality of RFID tags based on the information detected by the RFID system, and optionally in conjunction with data from the POS system.
  • POS point-of-sale
  • FIG. 1 illustrates a facility with a Responsive Retail Sensor (RRS) system and point-of-sale (POS) system for managing inventory.
  • RRS Responsive Retail Sensor
  • POS point-of-sale
  • FIG. 2 illustrates a confidence probability curve with the parameters set to example default values.
  • FIG. 3A illustrates a confidence probability curve with P S set at 0.99, and the other parameters set to the example default values of FIG. 2 .
  • FIG. 3B illustrates a confidence probability curve with P S set at 0.01, and the other parameters set to the example default values of FIG. 2 .
  • FIG. 4A illustrates a confidence probability curve with P D set at 0.8, and the other parameters set to the example default values of FIG. 2 .
  • FIG. 4B illustrates a confidence probability curve with P D set at 0.01, and the other parameters set to the example default values of FIG. 2 .
  • FIG. 5A illustrates a confidence probability curve with P E set at 0.99, and the other parameters set to the example default values of FIG. 2 .
  • FIG. 5B illustrates a confidence probability curve with P E set at 0.01, and the other parameters set to the example default values of FIG. 2 .
  • FIG. 6A illustrates a confidence probability curve with I D set at 0.6, and the other parameters set to the example default values of FIG. 2 .
  • FIG. 6B illustrates a confidence probability curve with I D set at 0.1, and the other parameters set to the example default values of FIG. 2 .
  • FIG. 7 is a flow chart depicting example steps that may be used to create a contra-electronic product code (EPC).
  • EPC contra-electronic product code
  • FIG. 8 is a flow chart depicting example steps that may be used to arrive at an inventory count for a particular uniform product code (UPC).
  • UPC uniform product code
  • FIG. 9 illustrates an example RFID reader with an example motion sensor.
  • FIG. 10 is a flow chart depicting the examples steps that may be used to operate the RFID reader with a motion sensor of FIG. 9 .
  • connection, relationship or communication between two or more entities does not necessarily mean a direct, unimpeded connection, as a variety of other entities or processes may reside or occur between any two entities. Consequently, an indicated connection does not necessarily mean a direct, unimpeded connection unless otherwise noted.
  • FIGS. 1-10 The following list of example features corresponds with FIGS. 1-10 and is provided for ease of reference, where like reference numerals designate corresponding features throughout the specification and figures:
  • Described herein is a probabilistic inventory application for an RFID system that provides a more accurate prediction of a facility's inventory. Also described herein is an improved system and method for the deep scan of RFID tags throughout a facility, providing a more accurate inventory of the tagged items in the facility.
  • FIG. 1 illustrates a Responsive Retail Sensor (RRS) system that may be used within a facility 10 .
  • the RRS system may include a number of RFID readers 15 (also known as interrogators) placed throughout the facility 10 .
  • these readers 15 can be overhead and can also be handheld and mobile.
  • a set of RFID exit readers 20 may be placed at an exit to the facility.
  • Merchandise in the facility has physically connected with it a passive RFID tag 25 .
  • the facility may also have a point-of-sale (POS) system, for example at a check-out register, with an optical scanner 30 that may read optical codes attached with the merchandise.
  • POS point-of-sale
  • the RRS and POS systems may coordinate via a controller 35 , which may manage the various components to either improve the ability of reading a tag or tags, or to avoid interference between the RFID readers, for example.
  • the readers 15 , 20 can pulse a radio-frequency (RF) signal at the RFID tag 25 .
  • the RF signal powers the RFID tag 25 and causes it to transmit stored data, which the readers 15 , 20 can detect and read.
  • the data in this example embodiment is in the form of a unique electronic product code (EPC).
  • EPC electronic product code
  • An RRS system can thereby yield a database of RFID tag reads containing at least the following two pieces of information: (1) an EPC; and (2) when the EPC was last read.
  • An information table may be provided that associates each EPC to a particular product.
  • the EPC may be associated with a particular universal product code (UPC).
  • UPCs are ubiquitous and are found on most consumer items.
  • a UPC may be in the form of a bar code that an optical reader 30 may read.
  • a UPC differs from an EPC in that a UPC is a category of product, while an EPC is a particular product.
  • the UPC associated with Levi's® Men's 501 Shrink To Fit Jeans is 052177361880.
  • a particular store may have thirty pair of these jeans each with the same UPC, whereas those jeans would have thirty different EPCs unique to each pair.
  • the tag 25 When an RFID tag 25 is interrogated by a reader 15 , 20 , the tag 25 will ideally report its EPC, which is then read by the reader 15 , 20 . Then by cross reference to the UPC/EPC table, the inventory management system for the facility will know the status of that merchandise—i.e., it is still in the facility if it reported, or it presumably has left the facility if it did not report.
  • a simple RRS system often misses several RFID tags and therefore cannot be relied on to form an accurate accounting of the inventory within a facility. And without an accurate accounting of the inventory, the facility would likely not run as efficiently as possible.
  • a retail store for example, would like to have a real-time accounting of its entire inventory so that it can order new merchandise as necessary. Additionally, knowing minute-by-minute inventory allows a retailer to predict trends for its merchandise and stock accordingly. A retailer can stock a larger variety of merchandise if it knows what sells when. Alternatively, the retailer may maintain a smaller inventory if it chooses to focus its merchandising efforts on only a few products. Ultimately, having an ongoing accurate picture of current inventory increases business efficiency, and simple RRS systems fails to meet this objective.
  • one example system and method disclosed herein uses data created by an RRS system and other data sources (e.g., point-of-sale (POS) data from optical systems at the register) to determine when items enter or exit the space.
  • POS point-of-sale
  • the system can statistically determine the likelihood of the item being in the facility. For example, the system can statistically determine the likelihood of the item being in the facility based on the last time it was read and whether it triggered an entrance or exit detection.
  • the system can optionally learn the statistical trends of entrance and exit detections to improve the accuracy of the calculation of the likelihood the item is in the store.
  • the present system and method can use existing RRS systems, along with the information from the POS system, to provide a predictive model of the current inventory of merchandise in a facility.
  • This allows users to have more accurate cumulative metrics. For instance, if there are three items of the same type reported to be in a retail store, and it is calculated that each has a two-thirds likelihood of actually being in the store, the best guess is that there are two items actually in the store.
  • a traditional approach would conclude that there are three items in the store.
  • the merchandiser may also extrapolate product merchandising trends using data and statistical analysis from this system.
  • the system may provide a confidence that a particular RFID tag (and thus the merchandise connected with it) is in the facility.
  • the confidence is a probability (a value between 0.0 and 1.0) that an item is in the facility.
  • the predicted total number of items in the facility is the sum of their probabilities.
  • the probability for that EPC is set to 1.0. If an exit event is recorded (i.e., read by the exit RFID reader after a sale or consciously removed from inventory) then the probability for that EPC is set to 0. It is between these two extremes that the probabilistic methods described herein may be used. As time passes without another confirmation of the item within the store, the probability that it is still in the store decreases according to a confidence probability curve that may be unique to the facility. In various example embodiments the confidence probability curve may be based on at least the following five parameters:
  • Pr [in_store] (1 ⁇ I D ) D (Eq. 1)
  • Pr [not_read] (1 ⁇ P S )(1 ⁇ P D ) D (Eq. 2)
  • a tag that has been unread for D days is either in the store and unread for D days (State A), or it left the store without triggering an exit event (State B). So the likelihood that it is in the store is A/(A+B), which is the confidence probability curve:
  • not_read & ⁇ no_exit ⁇ _event ] ( 1 - I D ) D ⁇ ( 1 - P S ) ⁇ ( 1 - P D ) D ( 1 - I D ) D ⁇ ( 1 - P S ) ⁇ ( 1 - P D ) D + P E ⁇ ( 1 - ( 1 - I D ) D ) ( Eq . ⁇ 5 )
  • FIGS. 4A and 4B illustrate the effect on the confidence probability curve with the P D parameter changed from 0.8 to 0.1, with all other variable remaining constant at the default values.
  • the following actions may increase the P D parameter: moving items from one display to the next; taking an item into the fitting room; retagging a known bad tag; and refolding and stacking merchandise (fluffing).
  • a record for UPC 5656 could comprise the data shown in Table 1:
  • Table 2 lists the in-store probabilities for the EPC's listed in Table 1:
  • EPC 0005 was detected at the exit RFID reader or departed (i.e., it was sold or otherwise removed from inventory) the value is set to 0 because it has left the store, regardless of the number of days it was scanned by the in-store RFID readers. Summing the in-store probabilities yields a value of 2.64. Thus, the number of items with the UPC code of 5656 in this example is predicted to be three. It is noteworthy that a prior art system would have reported an inventory of four because the RFID readers did read four EPCs with this associated UPC.
  • the POS system uses an optical bar code reader to read the UPC, the POS system alone cannot determine which of the unique EPCs has been sold at any particular time.
  • the facility can deduce which unique EPCs have actually been sold and are no longer part of the inventory. For example, the POS system may detect that an item with a UPC of 5656 was sold, and within a defined period the RRS system may detect an EPC with an associated UPC of 5656 at an exit RFID reader.
  • the unified POS/RRS system can then deduce that the detected EPC was linked to the sold UPC, and the table for the unified POS/RRS system can be updated.
  • the time between the POS scan and the RRS detection can vary.
  • the time may be a few minutes at an establishment where the registers are near the exit, such that a purchaser would not normally loiter in the store after consummating a purchase. Or it may be longer at an establishment that has several registers that are not located near the store exits, such that a user may purchase an item at one store register and then travel to a different department within the same store to purchase another item.
  • the time period may be set to have the highest confidence that a large percentage of customer would have exited the store thus encountering the exit RFID reader, while simultaneously short enough to provide up-to-date calculation of the current inventory.
  • the unified POS/RRS system may assume that the item has indeed left the store. However, that assumption would decay over a period of days; i.e., the inverse of the confidence probability curve.
  • the POS/RRS system may therefore assign a contra-EPC to the particular UPC that was detected as sold by the POS but not detected as exiting the store by the RRS.
  • the contra-EPC is simply another probability that must be summed to arrive at a final probability that represents the number of a particular UPC that remains in inventory. The difference, however, is that the contra-EPC has a negative probability. So taking the same example provided above with reference to tables 1 and 2, a UPC without a corresponding EPC could comprise the data shown in Tables 4 and 5, with the last entry being a contra-EPC:
  • the contra-EPC indicates that an item was scanned at the POS two days ago, but not detected by the RRS exit RFID sensor. This results in a summed probability of 1.66, so two items with this UPC are predicted to be in inventory. As time passes the contra-EPC will have less and less effect on the overall probability.
  • the POS system does not use an optical scanner and instead scans the RFID tags to determine what has been sold at the register. If the POS system employs an RFID reader, then it would effectively be similar to the exit RFID reader and once the EPC is read (and cross-referenced to the UPC and the sales price) that EPC can be marked as sold and the tag database updated. In this scenario, it would not be necessary to have a time interval from the POS reading to the exit RFID detection because there would be no need to associate an UPC with an EPC, and therefore a contra-EPC would not be necessary.
  • FIG. 7 Shown in FIG. 7 is a flow chart depicting a method 700 for creating a contra-EPC.
  • the sales record from the POS is queried and a list of departed EPCs with the allotted time is also queried from the RRS system. That information is distilled into a list, attempting to match a UPC to the EPCs at step 710 . If the list is not empty at step 715 , then the first in the list of EPCs is marked as sold in steps 720 and 725 , and the tag database for the RRS is updated. If there are further entries on the list, then the system may mark those EPCs as sold and update the tag database at steps 730 and 735 .
  • the system then creates a contra-EPC that is associated with the same UPC at step 745 , and the tag database is updated with the contra-EPC (step 750 ). This method is repeated for each UPC in the sales record.
  • the method 700 is intended to discover and account for a mismatch between the POS system recording a sale of a particular UPC and the RRS system detecting an EPC with the particular UPC.
  • FIG. 8 Shown in FIG. 8 is a flow chart depicting a method 800 for arriving at an inventory count for a particular UPC.
  • a particular UPC is selected at step 805 , and the tag database is queried to generate a list of EPCs that are associated with the same UPC (step 810 ).
  • the confidence probability curve is consulted to calculate a probability based on the length of time from the last RFID reading (step 815 ). If the item in the list is a contra-EPC then the calculated confidence probability is subtracted from the running summation (step 830 ). If it is not a contra-EPC then the calculated confidence probability is added to the summation (step 825 ). This is performed for every item in the list (step 840 ), and the final summation is rounded to the nearest integer and outputted (steps 845 and 850 ).
  • the parameters used in the confidence probability curve can be refined by using past events. For example, P S (the probability of item in store being read in a day) may begin at 0.75 but over several days the system may determine that more than 75% of the known inventory has a last read date of a single day. In this case, the P S should be increased to more accurately match the data found in the system's database. Likewise P D (the probability of an unreadable tag becoming readable each day) can be refined by looking at the last read dates for blocks of EPCs. If, for example, a representative block of EPCs remains unreadable for a maximum of five days but on average the EPCs in the block are read every three days, then the default of 0.2 should be increased. Finally, if the system is creating several contra-EPCs at a rate of more than the currently set P E (the probability of exit error), then the P E should be increased. Making these refinements increases the accuracy of the system.
  • P E the probability of exit error
  • a high contra-EPC count may indicate that the exit RFID sensors are misaligned or misconfigured, or the tags have other issues that place them out of range. Correcting this issue would tend to reduce the P E .
  • facilities often perform a hand RFID count and or a physical hand count.
  • a high and continued discrepancy between the hand RFID or physical hand count and the inventory count may indicate that the overhead RFID readers are misaligned or misconfigured, or that the existing number of RFID readers is unable to cover the entire facility, resulting in “hidden” merchandise. Correcting this issue would tend to increase the P S and P D .
  • the system can provide ever more accurate predictions of the current inventory within the facility. Not only does this assist in more efficient merchandising as discussed herein, it also can significantly reduce the need for periodic RFID scanning by hand.
  • RRS system may use an RFID tag that has different response times based on the RF signal that is interrogating it. This type of RRS system allows for a deep scan of the inventory, yielding more accurate readings.
  • the topmost item will likely be the most detectable to a ceiling mounted RFID reader, while the bottommost item may not be heard over the noise of all the items above it.
  • the RFID reader sends a continuous signal at a particular RFID profile for a period of time (e.g., for ten minutes) that attempts to elicit responses from all tags corresponding to that signal. But the tags are designed to go silent for a period of time after each sends their response (for instance for a period of one minute).
  • the topmost items might report first and then go quiet (e.g., for a minute), allowing other items, such as the bottommost items, to be interrogated and detected by the readers. While the above discussion is simplified, in general this process is known as a deep scan.
  • an effective mobility scan profile will allow any one particular tag to be read as often as possible. Reading a tag more frequently facilitates better tracking of the tag as it moves throughout the store.
  • an effective deep scan profile will read each tag capable of hearing the interrogator to respond only once. Suppressing multiple responses from a single tag facilitates a deeper read by allowing those tags with weaker responses to be heard by the interrogator.
  • a sample value matrix for a mobility scan profile and a deep scan profile is provided in the Appendix.
  • FIG. 9 depicts an RFID reader 900 with a processor 905 connected to a motion sensor 910 and the RFID transceiver 915 .
  • the motion sensor 910 detects movement it reports this to the processor 905 , which then sends instruction to the RFID transceiver 915 to emit RF energy to the tags at an RFID profile that will elicit responses from the tags at the higher rate (i.e., the mobility scan mode).
  • the processor 905 directs the RFID transceiver to emit RF energy to the tags at an RFID profile that will elicit responses from the tags at the lower but more robust rate (i.e., the deep scan mode).
  • the system may use a predefined period between detected movement and no movement before activating the deep scan mode.
  • the motion sensor may be, for example, an optical, an acoustic, an infrared, a sonar, or a LIDAR sensor, or any other suitable type of sensor.
  • FIG. 10 is a flow chart depicting a method 1000 for method for changing RFID profiles based on detected motion.
  • the motion sensor data is collected and then assessed at step 1010 . If motion is detected the RFID profile is set to mobility scan (step 1015 ) and the time counter is reset. The system then returns to collecting and assessing the motion sensor data. If however, no motion is detected then the time counter is increased at step 1025 . If no motion has been detected for a long enough period (i.e., the time counter exceeds a predetermined threshold, step 1030 ) then the RFID profile is set to deep scan at step 1035 .
  • the motion detecting RFID readers may be part of larger RRS and POS systems, for instance like those described herein. Permitting deep scanning during operational hours of the facility conveniently provides an overall more accurate reading of the RFID tags within the facility. This yields a more accurate probabilistic inventory model because more of the RFID tags are engaged by the process.
  • the foregoing disclosure may use various RFID profiles.
  • the following is the value matrix for a Mobility and Deep Scan Profiles:
  • MOBILITY DEEP SCAN PROFILE PROFILE LINK_PROFILE 2 or 3 0 or 1 SESSION_FLAG S0 or S1 S2 or S3 TARGET_STATE Any Any Q_ALGORITHM Dynamic Fixed FIXED_Q_VALUE N/A 12 START_Q_VALUE 4 N/A MIN_Q_VALUE 4 N/A MAX_Q_VALUE 15 N/A TOGGLE_TARGET_FLAG true false REPEAT_UNTIL_NO_TAGS false true The values are defined as follows:

Abstract

An example apparatus to monitor a space is disclosed. The example apparatus includes a database to record a time when a first data signal is received from a first RFID tag of a plurality of RFID tags and record data contained in the first data signal from the first RFID tag. The example apparatus further includes one or more processors to attempt to match the first RFID tag to sales information based on the time and the data contained within the first data signal.

Description

    1.0 CLAIM OF PRIORITY
  • This patent arises from a continuation of U.S. patent application Ser. No. 15/443,500, entitled “PROBABILISTIC INVENTORY RDIF METHOD AND SYSTEM” filed on Feb. 27, 2017, which claims priority to U.S. Provisional Patent Application Ser. No. 62/300,637, entitled “MOTION SENSOR CO-LOCATED WITH RFID READER/PROBABILISTIC INVENTORY APPLICATION FOR RFID READER”, which was filed on Feb. 26, 2016, and also claims the benefit of U.S. Provisional Patent Application Ser. No. 62/369,488, entitled “AUTONOMOUS ALGORITHMS TO CONTROL A NETWORK OR RFID READERS FOR OPTIMIZED ASSET TRACKING AND INVENTORY MANAGEMENT”, which was filed on Aug. 1, 2016. Priority to U.S. patent application Ser. No. 15/443,500, U.S. Provisional Patent Application Ser. No. 62/300,637, and U.S. Provisional Patent Application Ser. No. 62/369,488 is hereby claimed. U.S. patent application Ser. No. 15/443,500, U.S. Provisional Patent Application Ser. No. 62/300,637, and U.S. Provisional Patent Application Ser. No. 62/369,488 are hereby incorporated herein by reference in their respective entireties.
  • 2.0 TECHNICAL FIELD
  • This disclosure relates to a radio frequency identification (RFID) systems. More particularly, the disclosure relates to a method to improve the performance of RFID systems and to more refine inventory prediction models for such systems.
  • 3.0 BACKGROUND
  • Radio-frequency identification (RFID) is a ubiquitous technology that employs electromagnetic fields to automatically identify and track tags that contain electronically stored information. Passive RFID tags collect energy from a nearby RFID reader's interrogating radio-frequency (RF) signal to report the electronic data stored within the tag. The data may include a unique electronic product code (EPC) that can be associated with the characteristics of the object to which the tag is connected.
  • Because RFID tags use radio-frequency (RF) signals they need not be within the line of sight of the RFID reader, an advantage over optical barcode technology. RFID tags may thus be embedded in the tracked object or object packaging.
  • RFID tags are used throughout many industries, including retail, equipment manufacturing, and equipment rental facilities to name a few. For example, a manufacturing plant may embed an RFID tag on a component, and can track that component throughout the manufacturing process, and the distribution and sale process thereafter. Banks use RFID tags attached to cash to track the flow money, and such tags are incorporated into the uniform product code (UPC) labels on clothing. Ranchers may implant RFID tags into their animals to track the movement of their herds.
  • RFID may also be used as part of an inventory management system. A reader may send out an interrogation RF signal, then for each tag that reports back, the system can flag the associated item as remaining in inventory. Those tags that do not report back are flagged as not in inventory.
  • When several RFID tags are located within a confined volume, it can be difficult or impossible to interrogate them all. For example, a warehouse may have thousands of tagged items, some of which may be on the fringe of the RFID reading area, while others may be blocked from the interrogating RF signal, preventing their successful interrogation by the RFID reader. Conventional RFID inventory technology will incorrectly flag these non-interrogated tags (and their associated objects) as not in inventory. This false reporting leads to costly lost sales, over-ordering, and over-stocking, frustrating the purposes of RFID inventory management. Accordingly, improvements to existing RFID systems are needed to more accurately detect and report tagged inventory.
  • 4.0 SUMMARY
  • The present invention(s) elegantly overcome many of the drawbacks of prior systems and provide numerous additional improvements and benefits as will be apparent to persons of skill in the art. Provided in various example embodiments is a probabilistic inventory application for an RFID system that provides a more accurate prediction of a facility's inventory. Additional structures, systems, and methods are also provided for improved deep scanning of RFID tags throughout a facility to improve the accuracy of inventory reporting.
  • Turning first to probabilistic inventory applications for RFID readers, provided in various example embodiments is a radio frequency identification (RFID) system for monitoring a space. Such systems may include one or more controllers each connected to one or more RFID readers, where each reader can detect data signals from a plurality of RFID tags attached with objects. The objects may be part of an object category. Example systems may also have a database connected to the controller, which may record, for example: (1) a time when the data signal is received from each tag in the plurality; and (2) the data contained in the data signal from each tag in the plurality. Example systems may include a processor that can perform an inventory analysis of the objects based on a confidence probability curve. For example, in one embodiment this curve may be a decaying function that is based on various probabilities.
  • In various example embodiments the system may also create a contra-EPC. For example, at least one of the plurality of RFID readers may comprise an exit RFID reader used in a point-of-sale (POS) system that records the sale of an object in a database. A processor may be connected to the POS system to perform the following steps, for example: (1) when sales information is received from the POS system, monitoring the exit RFID reader for detection of data signal from a RFID tag in the plurality, and if an RFID tag is so detected, matching the sales information to the RFID tag and updating the database; and (2) if an RFID tag is not so detected, creating a contra-EPC associated with the object and updating the database.
  • In various example embodiments the inventory analysis may include the steps of: (1) calculating an in-store probability for each RFID tag in the plurality based on the confidence probability curve and the time for each RFID tag; and (2) summing the in-store probabilities. When a contra-EPC is encountered, however, the system may calculate a probability for each contra-EPC based on the confidence probability curve where the contra-EPC probabilities are subtracted from the summation. In certain example embodiments where an exit RFID reader is used, the summation total may be configured to not include probabilities for RFID tags detected by the exit RFID reader.
  • In various example embodiments the confidence probability curve may be based on a variety of parameters, such as the following four parameters for example: (1) PS—the probability of an RFID tag from the plurality being read in a day; (2) PD—the probability of an RFID tag from the plurality that is unreadable becoming readable within a day; (3) PE—the probability of an RFID tag from the plurality exiting the space monitored by the RFID system without being detected by the RFID system; and (4) ID—the percentage of objects exiting the space monitored by the RFID system. As the system encounters and records more information these probabilities may be refined and changed. A specific confidence probability curve may be based on the following equation, for example, where D is the number of days elapsed since the data signal from the RFID tag was received by the RFID system:
  • ( 1 - I D ) D ( 1 - P S ) ( 1 - P D ) D ( 1 - I D ) D ( 1 - P S ) ( 1 - P D ) D + P E ( 1 - ( 1 - I D ) D )
  • Various example methods of using confidence probability curves are disclosed herein.
  • Further provided in various example embodiments are motion sensors co-located with RFID readers. For example, a radio frequency identification (RFID) reader is disclosed that may contain a motion detection sensor, a radio frequency transceiver configured to transmit RF energy at a first and second RFID profile, and a processor. The processor may perform the following steps, for example: (1) when motion is detected by the sensor, commanding the transceiver to transmit RF energy at the first RFID profile; and (2) when motion has not been detect for a predetermined time period, commanding the transceiver to transmit RF energy at the second RFID profile. The motion sensor may be an optical, acoustic, infrared, sonar, or LIDAR sensor, for example. Such unique RFID readers may facilitate selective deep scans of RFID tags.
  • For example, such unique readers may be deployed as part of larger multi-reader systems connected with a central controller. In various example embodiments, each such RFID reader may independently and selectively enter into a deep scan of the RFID tags. The RFID readers may be merged with a point-of-sale (POS) system that records sales information. For example, the system may perform an inventory analysis of objects connected to the plurality of RFID tags based on the information detected by the RFID system, and optionally in conjunction with data from the POS system. Various example methods of employing such selective deep scanning are disclosed herein.
  • Additional aspects, alternatives and variations as would be apparent to persons of skill in the art are also disclosed herein and are specifically contemplated as included as part of the invention, including but not limited to all the embodiments shown or discussed in the '637 Application. The invention is set forth only in the claims as allowed by the patent office in this or related applications, and the following summary descriptions of certain examples are not in any way to limit, define or otherwise establish the scope of legal protection.
  • 5.0 BRIEF DESCRIPTION OF THE DRAWINGS
  • Various embodiments are depicted in the accompanying drawings for illustrative purposes, and should in no way be interpreted as limiting the scope of the embodiments. Furthermore, various features of different disclosed embodiments can be combined to form additional embodiments, which are part of this disclosure. It will be understood that certain components and details may not appear in the Figure(s) to assist in more clearly describing example aspects of the invention.
  • FIG. 1 illustrates a facility with a Responsive Retail Sensor (RRS) system and point-of-sale (POS) system for managing inventory.
  • FIG. 2 illustrates a confidence probability curve with the parameters set to example default values.
  • FIG. 3A illustrates a confidence probability curve with PS set at 0.99, and the other parameters set to the example default values of FIG. 2.
  • FIG. 3B illustrates a confidence probability curve with PS set at 0.01, and the other parameters set to the example default values of FIG. 2.
  • FIG. 4A illustrates a confidence probability curve with PD set at 0.8, and the other parameters set to the example default values of FIG. 2.
  • FIG. 4B illustrates a confidence probability curve with PD set at 0.01, and the other parameters set to the example default values of FIG. 2.
  • FIG. 5A illustrates a confidence probability curve with PE set at 0.99, and the other parameters set to the example default values of FIG. 2.
  • FIG. 5B illustrates a confidence probability curve with PE set at 0.01, and the other parameters set to the example default values of FIG. 2.
  • FIG. 6A illustrates a confidence probability curve with ID set at 0.6, and the other parameters set to the example default values of FIG. 2.
  • FIG. 6B illustrates a confidence probability curve with ID set at 0.1, and the other parameters set to the example default values of FIG. 2.
  • FIG. 7 is a flow chart depicting example steps that may be used to create a contra-electronic product code (EPC).
  • FIG. 8 is a flow chart depicting example steps that may be used to arrive at an inventory count for a particular uniform product code (UPC).
  • FIG. 9 illustrates an example RFID reader with an example motion sensor.
  • FIG. 10 is a flow chart depicting the examples steps that may be used to operate the RFID reader with a motion sensor of FIG. 9.
  • 6.0 DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS
  • Reference is made herein to some specific examples of the present invention, including any best modes contemplated by the inventor(s) for carrying out the invention. Examples of these specific embodiments are illustrated in the accompanying figures. While the invention is described in conjunction with these specific embodiments, it will be understood that it is not intended to limit the invention to the described or illustrated embodiments. To the contrary, it is intended to cover alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims.
  • In the following description, numerous specific details are set forth in order to provide a thorough understanding of various aspects of the present invention. Particular example embodiments of the present invention may be implemented without some or all of these specific details. In other instances, process operations well known to persons of skill in the art have not been described in detail in order not to obscure unnecessarily the present invention. Various techniques and mechanisms of the present invention will sometimes be described in singular form for clarity. However, it should be noted that some embodiments include multiple iterations of a technique or multiple mechanisms unless noted otherwise. Similarly, various steps of the methods shown and described herein are not necessarily performed in the order indicated, or performed at all in certain embodiments. Accordingly, some implementations of the methods discussed herein may include more or fewer steps than those shown or described. Further, the techniques and mechanisms of the present invention will sometimes describe a connection, relationship or communication between two or more entities. It should be noted that a connection or relationship between entities does not necessarily mean a direct, unimpeded connection, as a variety of other entities or processes may reside or occur between any two entities. Consequently, an indicated connection does not necessarily mean a direct, unimpeded connection unless otherwise noted.
  • The following list of example features corresponds with FIGS. 1-10 and is provided for ease of reference, where like reference numerals designate corresponding features throughout the specification and figures:
  • Facility—10;
  • RFID Readers—15;
  • RFID Exit Readers—20;
  • RFID Tag—25;
  • Point-of-sale (POS) optical scanner/register—30;
  • Controller—35;
  • Method for creating a contra-electronic product code (EPC)—700-750;
  • Method for arriving at an inventory count for a particular uniform product code (UPC)—800-850;
  • RFID reader with motion sensor—900;
  • Processor—905;
  • Motion Sensor—910;
  • RFID Transceiver—915; and
  • Method for changing RFID profiles based on detected motion—1000-1035.
  • Described herein is a probabilistic inventory application for an RFID system that provides a more accurate prediction of a facility's inventory. Also described herein is an improved system and method for the deep scan of RFID tags throughout a facility, providing a more accurate inventory of the tagged items in the facility.
  • A. Probabilistic Inventory RFID Method and System
  • FIG. 1 illustrates a Responsive Retail Sensor (RRS) system that may be used within a facility 10. The RRS system may include a number of RFID readers 15 (also known as interrogators) placed throughout the facility 10. By non-limiting example, these readers 15 can be overhead and can also be handheld and mobile. A set of RFID exit readers 20 may be placed at an exit to the facility. Merchandise in the facility has physically connected with it a passive RFID tag 25. The facility may also have a point-of-sale (POS) system, for example at a check-out register, with an optical scanner 30 that may read optical codes attached with the merchandise. The RRS and POS systems may coordinate via a controller 35, which may manage the various components to either improve the ability of reading a tag or tags, or to avoid interference between the RFID readers, for example.
  • The readers 15, 20 can pulse a radio-frequency (RF) signal at the RFID tag 25. The RF signal powers the RFID tag 25 and causes it to transmit stored data, which the readers 15, 20 can detect and read. The data in this example embodiment is in the form of a unique electronic product code (EPC). An RRS system can thereby yield a database of RFID tag reads containing at least the following two pieces of information: (1) an EPC; and (2) when the EPC was last read.
  • An information table may be provided that associates each EPC to a particular product. For example, the EPC may be associated with a particular universal product code (UPC). UPCs are ubiquitous and are found on most consumer items. A UPC may be in the form of a bar code that an optical reader 30 may read. A UPC differs from an EPC in that a UPC is a category of product, while an EPC is a particular product. For example, the UPC associated with Levi's® Men's 501 Shrink To Fit Jeans is 052177361880. A particular store may have thirty pair of these jeans each with the same UPC, whereas those jeans would have thirty different EPCs unique to each pair.
  • When an RFID tag 25 is interrogated by a reader 15, 20, the tag 25 will ideally report its EPC, which is then read by the reader 15, 20. Then by cross reference to the UPC/EPC table, the inventory management system for the facility will know the status of that merchandise—i.e., it is still in the facility if it reported, or it presumably has left the facility if it did not report.
  • While it is desirable to have all RFID tags associated with every item readable at all times, this is often impractical. The physics involved with the wireless link between the reader and tag, combined with competing needs for positioning the tags or items a particular way, as well as the physical environment, often reduce the ability of the readers to read tags as regularly as would be desired. Problems exist when, for example, several RFID tags are present within the facility. Sending out an interrogation would likely result in several RFID tags reporting simultaneously. It is common for some of those tags to be lost in the noise and not detected. The location of the tag can also cause detection problems. For example, the tag may be at the bottom of a pile of other merchandise and the tag may not receive the interrogation signal. Or the tag may be under a metal shelf, forming a sort of Faraday cage that degrades the RF signal.
  • For any or all of the above reasons, a simple RRS system often misses several RFID tags and therefore cannot be relied on to form an accurate accounting of the inventory within a facility. And without an accurate accounting of the inventory, the facility would likely not run as efficiently as possible. A retail store, for example, would like to have a real-time accounting of its entire inventory so that it can order new merchandise as necessary. Additionally, knowing minute-by-minute inventory allows a retailer to predict trends for its merchandise and stock accordingly. A retailer can stock a larger variety of merchandise if it knows what sells when. Alternatively, the retailer may maintain a smaller inventory if it chooses to focus its merchandising efforts on only a few products. Ultimately, having an ongoing accurate picture of current inventory increases business efficiency, and simple RRS systems fails to meet this objective.
  • Rather than focusing on the ability of a system to read all items in the store, one example system and method disclosed herein uses data created by an RRS system and other data sources (e.g., point-of-sale (POS) data from optical systems at the register) to determine when items enter or exit the space. Using data regarding entry detection and data regarding exit detection, the system can statistically determine the likelihood of the item being in the facility. For example, the system can statistically determine the likelihood of the item being in the facility based on the last time it was read and whether it triggered an entrance or exit detection. Furthermore, the system can optionally learn the statistical trends of entrance and exit detections to improve the accuracy of the calculation of the likelihood the item is in the store.
  • Whereas traditional RRS systems provide a present or not-present flag for the tag, the present system and method can use existing RRS systems, along with the information from the POS system, to provide a predictive model of the current inventory of merchandise in a facility. This allows users to have more accurate cumulative metrics. For instance, if there are three items of the same type reported to be in a retail store, and it is calculated that each has a two-thirds likelihood of actually being in the store, the best guess is that there are two items actually in the store. A traditional approach would conclude that there are three items in the store. By allowing that retailer to make stock assessments based on the statistically more accurate estimate of two versus the less accurate literal measurement of three can increase efficiency in store operations. The merchandiser may also extrapolate product merchandising trends using data and statistical analysis from this system.
  • In various example embodiments the system may provide a confidence that a particular RFID tag (and thus the merchandise connected with it) is in the facility. The confidence is a probability (a value between 0.0 and 1.0) that an item is in the facility. The predicted total number of items in the facility is the sum of their probabilities.
  • Each time something happens that can confirm an item is actually present (i.e. read by RFID reader within the store) the probability for that EPC is set to 1.0. If an exit event is recorded (i.e., read by the exit RFID reader after a sale or consciously removed from inventory) then the probability for that EPC is set to 0. It is between these two extremes that the probabilistic methods described herein may be used. As time passes without another confirmation of the item within the store, the probability that it is still in the store decreases according to a confidence probability curve that may be unique to the facility. In various example embodiments the confidence probability curve may be based on at least the following five parameters:
  • PS—Probability of item in store being read
      • May be determined from the daily read percentage, and be updated continuously from day to day.
      • Range 0-1
  • PD—Probability of an unreadable tag becoming readable each day
      • What % of the items in the store are picked up and moved, either by customers or store employees?
      • Can be learned continuously from look-backs
      • Range 0-1
  • PE—Probability of exit error
      • What is the % of missed “departed” events
      • Can be learned from items that go unread for 30(TBR) days
      • Range 0-1
  • ID—Daily inventory turn percentage
      • What % of the stores total items get sold each day?
      • Can be learned by netting out exit events
        • Total exit events+items unread for 30(TBR) days−return events
      • Range 0-1
  • D—days since last read
  • For each item, the following equation may be used to define the probability that the item is in inventory:

  • Pr[in_store]=(1−I D)D   (Eq. 1)

  • Pr[not_read]=(1−P S)(1−P D)D   (Eq. 2)

  • Pr[out_of_store]=1−(1−I D)D   (Eq. 3)

  • Pr[left_undetected]=P E   (Eq. 4)
  • A tag that has been unread for D days is either in the store and unread for D days (State A), or it left the store without triggering an exit event (State B). So the likelihood that it is in the store is A/(A+B), which is the confidence probability curve:
  • Pr [ in_store | not_read & no_exit _event ] = ( 1 - I D ) D ( 1 - P S ) ( 1 - P D ) D ( 1 - I D ) D ( 1 - P S ) ( 1 - P D ) D + P E ( 1 - ( 1 - I D ) D ) ( Eq . 5 )
  • While this creates a robust confidence probability curve, a more elementary curve may be constructed with some by not all of the parameters discussed above. Testing demonstrates that use of these probabilities provides a system that that is much more effective than the current present or not-present flag methodology.
  • The following example default values may be used to start the system: PS=0.75; PD=0.2; PE=0.1; and ID=0.01. Shown in FIG. 2 is a graphical representation of the confidence probability curve for a store with these default variables. Considering the following conditions for the parameters demonstrates and confirms the efficacy of Eq. 5.
  • If the overhead RFID readers could read 100% of the store every day, one would expect the confidence to drop rapidly after not reading a tag for a couple days. If only 50% of the store's items are read by the overhead RFID readers each day, one would expect the confidence to not drop off nearly as fast. The effect on the confidence probability curve with the PS parameter changed from 0.99 to 0.01, with all other variable remaining constant at the default values is shown in FIGS. 3A and 3B.
  • There are certain store activities that would make an otherwise unreadable tag readable again. The more of a store's items that are involved in one of these activities each day, the more readable those tags are. The confidence probability curve is affected in the same way as with the PS parameter. FIGS. 4A and 4B illustrate the effect on the confidence probability curve with the PD parameter changed from 0.8 to 0.1, with all other variable remaining constant at the default values. The following actions may increase the PD parameter: moving items from one display to the next; taking an item into the fitting room; retagging a known bad tag; and refolding and stacking merchandise (fluffing).
  • The number of missed departed events would have nearly the opposite effect. If there were never any missed departed events (i.e. 0%), then you would expect the confidence to remain high, even if you rarely read a tag. The effect on the confidence probability curve with the PE parameter changed from 0.99 to 0.01, with all other variable remaining constant at the default values is shown in FIGS. 5A and 5B.
  • When the daily inventory turn is high, then the consequence of not reading a tag for a few days is also high. It is reasonable to assume that the tag has left the facility so one would expect the confidence to drop off more rapidly as time goes by. The effect on the confidence probability curve with the ID parameter changed from 0.6 to 0.1, with all other variable remaining constant at the default values is shown in FIGS. 6A and 6B.
  • To determine the inventory of a particular UPC, the system would pull the RRS records for the EPCs that are associated with the UPC. For example, a record for UPC 5656 could comprise the data shown in Table 1:
  • TABLE 1
    DAYS SINCE LAST DETECTED AT EXIT
    READ FOR INSTORE RFID READER OR
    EPC UPC RFID READER DEPARTED
    00001 5656 1 N
    00002 5656 11 N
    00003 5656 29 N
    00004 5656 2 N
    00005 5656 3 Y
  • Using the confidence probability curve shown in FIG. 2, Table 2 lists the in-store probabilities for the EPC's listed in Table 1:
  • TABLE 2
    EPC PROBABILITY IN STORE
    00001 1
    00002 .65
    00003 .01
    00004 .98
    00005 0
  • Since EPC 0005 was detected at the exit RFID reader or departed (i.e., it was sold or otherwise removed from inventory) the value is set to 0 because it has left the store, regardless of the number of days it was scanned by the in-store RFID readers. Summing the in-store probabilities yields a value of 2.64. Thus, the number of items with the UPC code of 5656 in this example is predicted to be three. It is noteworthy that a prior art system would have reported an inventory of four because the RFID readers did read four EPCs with this associated UPC.
  • If instead of the default confidence probability curve, a facility had an extremely high probability of reading all of the tags each day (i.e., PS is 0.99) such that the facility confidence probability curve actually followed FIG. 3A, then the individual in-store probabilities would be as shown in Table 3:
  • TABLE 3
    EPC PROBABILITY IN STORE
    00001 1
    00002 .0685
    00003 .0005
    00004 .98
    00005 .75
  • Summing the in-store probabilities yields a value of 1.819. Thus the number of items with the UPC code of 5656 in this example is predicted to be two. It is noteworthy that the confidence probability curve decays rapidly which is why the EPCs 00002 and 00003 with read days of 11 and 29 are severely discounted in the system and do not affect in any noticeably way the summed probability. This makes intuitive sense because the confidence probability curve is constructed with the assumption that 99% of the tags are read each day, so if the tags are not read more than a few days, then the system has confidence that the tag is no longer in the facility.
  • Because the POS system uses an optical bar code reader to read the UPC, the POS system alone cannot determine which of the unique EPCs has been sold at any particular time. By merging the data from the POS system and the RRS system, the facility can deduce which unique EPCs have actually been sold and are no longer part of the inventory. For example, the POS system may detect that an item with a UPC of 5656 was sold, and within a defined period the RRS system may detect an EPC with an associated UPC of 5656 at an exit RFID reader. The unified POS/RRS system can then deduce that the detected EPC was linked to the sold UPC, and the table for the unified POS/RRS system can be updated. The time between the POS scan and the RRS detection can vary. For example, the time may be a few minutes at an establishment where the registers are near the exit, such that a purchaser would not normally loiter in the store after consummating a purchase. Or it may be longer at an establishment that has several registers that are not located near the store exits, such that a user may purchase an item at one store register and then travel to a different department within the same store to purchase another item. The time period may be set to have the highest confidence that a large percentage of customer would have exited the store thus encountering the exit RFID reader, while simultaneously short enough to provide up-to-date calculation of the current inventory.
  • When an item is not detected at the store exit within the defined period of time, the unified POS/RRS system may assume that the item has indeed left the store. However, that assumption would decay over a period of days; i.e., the inverse of the confidence probability curve. The POS/RRS system may therefore assign a contra-EPC to the particular UPC that was detected as sold by the POS but not detected as exiting the store by the RRS.
  • The contra-EPC is simply another probability that must be summed to arrive at a final probability that represents the number of a particular UPC that remains in inventory. The difference, however, is that the contra-EPC has a negative probability. So taking the same example provided above with reference to tables 1 and 2, a UPC without a corresponding EPC could comprise the data shown in Tables 4 and 5, with the last entry being a contra-EPC:
  • TABLE 4
    DAYS SINCE LAST DETECTED AT EXIT
    READ FOR INSTORE RFID READER OR
    EPC UPC RFID READER DEPARTED
    00001 5656 1 N
    00002 5656 11 N
    00003 5656 29 N
    00004 5656 2 N
    00005 5656 3 Y
    *** 5656 2 N
  • TABLE 5
    EPC PROBABILITY IN STORE
    00001 1
    00002 .65
    00003 .01
    00004 .98
    00005 0
    *** −.98
  • The contra-EPC indicates that an item was scanned at the POS two days ago, but not detected by the RRS exit RFID sensor. This results in a summed probability of 1.66, so two items with this UPC are predicted to be in inventory. As time passes the contra-EPC will have less and less effect on the overall probability.
  • In alternative embodiments the POS system does not use an optical scanner and instead scans the RFID tags to determine what has been sold at the register. If the POS system employs an RFID reader, then it would effectively be similar to the exit RFID reader and once the EPC is read (and cross-referenced to the UPC and the sales price) that EPC can be marked as sold and the tag database updated. In this scenario, it would not be necessary to have a time interval from the POS reading to the exit RFID detection because there would be no need to associate an UPC with an EPC, and therefore a contra-EPC would not be necessary.
  • Shown in FIG. 7 is a flow chart depicting a method 700 for creating a contra-EPC. At step 705 the sales record from the POS is queried and a list of departed EPCs with the allotted time is also queried from the RRS system. That information is distilled into a list, attempting to match a UPC to the EPCs at step 710. If the list is not empty at step 715, then the first in the list of EPCs is marked as sold in steps 720 and 725, and the tag database for the RRS is updated. If there are further entries on the list, then the system may mark those EPCs as sold and update the tag database at steps 730 and 735. This may occur, for example, when a customer purchases multiple identical items, thus there would be a POS record evidencing multiple sales of a particular UPC and also multiple EPCs that have the same UPC associated with them. If however, the list is empty at step 715, the system then creates a contra-EPC that is associated with the same UPC at step 745, and the tag database is updated with the contra-EPC (step 750). This method is repeated for each UPC in the sales record. The method 700 is intended to discover and account for a mismatch between the POS system recording a sale of a particular UPC and the RRS system detecting an EPC with the particular UPC.
  • Shown in FIG. 8 is a flow chart depicting a method 800 for arriving at an inventory count for a particular UPC. First a particular UPC is selected at step 805, and the tag database is queried to generate a list of EPCs that are associated with the same UPC (step 810). For each item in the list, the confidence probability curve is consulted to calculate a probability based on the length of time from the last RFID reading (step 815). If the item in the list is a contra-EPC then the calculated confidence probability is subtracted from the running summation (step 830). If it is not a contra-EPC then the calculated confidence probability is added to the summation (step 825). This is performed for every item in the list (step 840), and the final summation is rounded to the nearest integer and outputted (steps 845 and 850).
  • The parameters used in the confidence probability curve can be refined by using past events. For example, PS (the probability of item in store being read in a day) may begin at 0.75 but over several days the system may determine that more than 75% of the known inventory has a last read date of a single day. In this case, the PS should be increased to more accurately match the data found in the system's database. Likewise PD (the probability of an unreadable tag becoming readable each day) can be refined by looking at the last read dates for blocks of EPCs. If, for example, a representative block of EPCs remains unreadable for a maximum of five days but on average the EPCs in the block are read every three days, then the default of 0.2 should be increased. Finally, if the system is creating several contra-EPCs at a rate of more than the currently set PE (the probability of exit error), then the PE should be increased. Making these refinements increases the accuracy of the system.
  • Utilizing the disclosed method and system has the added benefit of potentially identifying deficiencies in the existing RRS system. For example, a high contra-EPC count may indicate that the exit RFID sensors are misaligned or misconfigured, or the tags have other issues that place them out of range. Correcting this issue would tend to reduce the PE. As a matter of practice, facilities often perform a hand RFID count and or a physical hand count. A high and continued discrepancy between the hand RFID or physical hand count and the inventory count may indicate that the overhead RFID readers are misaligned or misconfigured, or that the existing number of RFID readers is unable to cover the entire facility, resulting in “hidden” merchandise. Correcting this issue would tend to increase the PS and PD.
  • By refining the parameters used in the confidence probability curve and correcting any deficiencies in the existing RRS system, the system can provide ever more accurate predictions of the current inventory within the facility. Not only does this assist in more efficient merchandising as discussed herein, it also can significantly reduce the need for periodic RFID scanning by hand.
  • B. Method and Apparatus for Selective Deep Scan Using a Motion Sensor Co-Located with RFID Reader
  • RRS system may use an RFID tag that has different response times based on the RF signal that is interrogating it. This type of RRS system allows for a deep scan of the inventory, yielding more accurate readings.
  • Consider for example a stack of clothing that is being interrogated by RFID. The topmost item will likely be the most detectable to a ceiling mounted RFID reader, while the bottommost item may not be heard over the noise of all the items above it. In a deep scan, the RFID reader sends a continuous signal at a particular RFID profile for a period of time (e.g., for ten minutes) that attempts to elicit responses from all tags corresponding to that signal. But the tags are designed to go silent for a period of time after each sends their response (for instance for a period of one minute). Thus, the topmost items might report first and then go quiet (e.g., for a minute), allowing other items, such as the bottommost items, to be interrogated and detected by the readers. While the above discussion is simplified, in general this process is known as a deep scan.
  • Most facilities will perform a deep scan when the facility is closed because the inventory is not moving, such that the long response time will not adversely affect the readings with missed tags. But when the facility is operational, and items are moving, the RFID readers will change to an RFID profile that elicits a response from the tags at a much higher rate (e.g. 1 second, 0.5 seconds). When items are moving they are easier to detect. Nevertheless, at this higher rate the topmost tags may drown out the reporting signal from the bottommost tags. This is an example of a mobility scan.
  • In general, an effective mobility scan profile will allow any one particular tag to be read as often as possible. Reading a tag more frequently facilitates better tracking of the tag as it moves throughout the store. Some of the parameters that can be adjusted to support this are:
      • 1. A modulation that supports a higher data transfer rate. In general, this is less robust. However, an RFID tag in motion is easier to read. Also, more frequent reads means that some of them can be dropped due to errors without adversely affecting the data collection process.
      • 2. Using a session with a short persistence value. Querying the state of a session flag that has a short (or no) persistence value will that cause the tag to respond more frequently than querying the state of a session flag that has a long persistence value.
      • 3. Using as small of a “Q” value as possible. Tags respond to the interrogator in a time-slotted fashion. The more time slots there are in a time epoch, the longer the period of time between opportunities for a tag to respond. The use of dynamic “Q” automatically chooses the smallest “Q” value possible.
      • 4. Toggle the state of the session flag after each interrogation round. This allows all tags to participate in every interrogation round.
  • In general, an effective deep scan profile will read each tag capable of hearing the interrogator to respond only once. Suppressing multiple responses from a single tag facilitates a deeper read by allowing those tags with weaker responses to be heard by the interrogator. Some of the parameters that can be adjusted to support this are:
      • 1. A modulation that supports a slower data transfer rate. In general, this is more robust. Since each tag is not read very often, it is important for that data transfer to be as robust as possible.
      • 2. Using a session with a long persistence value. Querying the state of a session flag that has a long persistence value will cause the tag to respond once and suppress further responses.
      • 3. Using as large of a “Q” value as possible. Tags respond to the interrogator in a time-slotted fashion. The more time slots there are in a time epoch, the fewer collisions there are between tags and the higher likelihood of the interrogator receiving the response. The use of fixed “Q” assures the “Q” value does not change.
      • 4. Do not toggle the state of the session flag after each interrogation round. Once a tag responds to its interrogator, it will remains silent for as long as a tag is energized with RF (i.e. the end of the interrogation round). This allows all possible tags to respond at least once during interrogation round.
  • A sample value matrix for a mobility scan profile and a deep scan profile is provided in the Appendix.
  • FIG. 9 depicts an RFID reader 900 with a processor 905 connected to a motion sensor 910 and the RFID transceiver 915. When the motion sensor 910 detects movement it reports this to the processor 905, which then sends instruction to the RFID transceiver 915 to emit RF energy to the tags at an RFID profile that will elicit responses from the tags at the higher rate (i.e., the mobility scan mode). Conversely, when no movement is detected, the processor 905 directs the RFID transceiver to emit RF energy to the tags at an RFID profile that will elicit responses from the tags at the lower but more robust rate (i.e., the deep scan mode). The system may use a predefined period between detected movement and no movement before activating the deep scan mode. If the facility has multiple RFID readers, some may be in deep scan mode while others are in non-deep scan mode, depending on the movement detected by the particular RFID reader. The motion sensor may be, for example, an optical, an acoustic, an infrared, a sonar, or a LIDAR sensor, or any other suitable type of sensor.
  • FIG. 10 is a flow chart depicting a method 1000 for method for changing RFID profiles based on detected motion. First at step 1005 the motion sensor data is collected and then assessed at step 1010. If motion is detected the RFID profile is set to mobility scan (step 1015) and the time counter is reset. The system then returns to collecting and assessing the motion sensor data. If however, no motion is detected then the time counter is increased at step 1025. If no motion has been detected for a long enough period (i.e., the time counter exceeds a predetermined threshold, step 1030) then the RFID profile is set to deep scan at step 1035.
  • The motion detecting RFID readers may be part of larger RRS and POS systems, for instance like those described herein. Permitting deep scanning during operational hours of the facility conveniently provides an overall more accurate reading of the RFID tags within the facility. This yields a more accurate probabilistic inventory model because more of the RFID tags are engaged by the process.
  • The above description of the disclosed example embodiments is provided to enable persons skilled in the art to make and use the invention. Various modifications to these example embodiments will be readily apparent to those skilled in the art, and the generic principles described herein can be applied to other example embodiments without departing from the spirit or scope of the invention. Thus, it is to be understood that the description and drawings presented herein represent a presently preferred example embodiment of the invention and are therefore representative of the subject matter which is broadly contemplated by the present invention. It is further understood that the scope of the present invention fully encompasses other example embodiments that may become apparent to those skilled in the art. The scope of the present invention is accordingly limited by nothing other than the appended claims.
  • APPENDIX
  • The foregoing disclosure may use various RFID profiles. The following is the value matrix for a Mobility and Deep Scan Profiles:
  • MOBILITY DEEP SCAN
    PROFILE PROFILE
    LINK_PROFILE
    2 or 3 0 or 1
    SESSION_FLAG S0 or S1 S2 or S3
    TARGET_STATE Any Any
    Q_ALGORITHM Dynamic Fixed
    FIXED_Q_VALUE N/A 12
    START_Q_VALUE  4 N/A
    MIN_Q_VALUE  4 N/A
    MAX_Q_VALUE 15 N/A
    TOGGLE_TARGET_FLAG true false
    REPEAT_UNTIL_NO_TAGS false true

    The values are defined as follows:
      • LINK_PROFILE specifies the RF physical layer parameters used for the next tag protocol operation. In general, the higher the Rate, the less robust. Definitions for the valid profiles are shown in the following chart:
  • Link Profile 0 1 2 3
    Modulation DSB-ASK PR-ASK PR-ASK DSB-ASK
    Tari (US) 25 25 25 6.25
    Data 1 .05 0.5 0.5
    Width (US) 12.5 12.5 12.5 3.13
    R-T Calc (US) 75 62.5 62.5 15.63
    T-R Calc (US) 200 85.33 71.11 20
    Divide Ratio 8 21.33 21.33 8
    Encoding FM0 Miller-4 Miller-4 FM0
    Pilot Tone 1 1 1 1
    Link F (kHz) 40 250 300 400
    Rate (kbps) 40 62.5 75 400
      • SESSION_FLAG specifies which inventory session flag is matched against the inventory state specified by TARGET_STATE. Valid values are: S0, S1, S2, S3
      • TARGET_STATE specifies the state of the inventory session flag specified by SESSION_FLAG, for tags that are to have the operation applied to them. Valid values are: A, B, Any
      • The Q (Query) value used to specify the number of time slots that a tag can respond in. Slots=2Q−1. There are several Q values specified: FIXED_Q_VALUE, START_Q_VALUE (used with Dynamic Q Algorithm), MIN_Q_VALUE (used with Dynamic Q Algorithm), MAX_Q_VALUE (used with Dynamic Q Algorithm). Valid values are: 0-15
      • TOGGLE_TARGET_FLAG specifies whether or not, after performing the inventory cycle for the specified target (i.e. A or B), the target should be toggled (i.e. A to B or B to A) and another inventory cycle should be run. Valid values are: false, true
      • REPEAT_UNTIL_NO_TAGS specifies whether or not the singulation algorithm should continue performing inventory rounds until no tags are singulated. Valid values are: false, true
        For further disclosure regarding these values, the reader may reference the EPC™ Radio-Frequency Identity Protocols Generation-2 UHF RFID; Specification for RFID Air Interface; Protocol for Communications at 860 MHz-960 MHz; Version 2.0.0 Ratified, which is incorporated herein by reference. As of the date of the filing of this application, this reference could be downloaded from http://www.gsl.org/sites/default/files/docs/epc/uhfc1g2_2_0_0_standard_20131101.pdf.

Claims (20)

What is claimed is:
1. An apparatus to monitor a space, the apparatus comprising:
a database to:
record a time when a first data signal is received from a first RFID tag of a plurality of RFID tags;
record data contained in the first data signal from the first RFID tag; and
one or more processors to attempt to match the first RFID tag to sales information based on the time and the data contained within the first data signal.
2. The apparatus of claim 1, wherein the one or more processors are to perform an inventory analysis of objects carrying the RFID tags based on a confidence probability curve.
3. The apparatus of claim 2, wherein the one or more processors are to:
calculate in-store probabilities for the RFID tags based on the confidence probability curve; and
sum the in-store probabilities.
4. The apparatus of claim 3, wherein the one or more processors are to calculate the in-store probabilities for the RFID tags based on the time when the first data signal of the data signals was received.
5. The apparatus of claim 3, wherein the one or more processors are to not sum probabilities for RFID tags detected by an exit RFID reader.
6. The apparatus of claim 3, wherein one or more processors are to:
calculate probabilities for contra-electronic product codes (contra-EPCs) based on the confidence probability curve; and
subtract the contra-EPCs based on the sum of the in-store probabilities.
7. The apparatus of claim 1, wherein objects carrying the RFID tags correspond to one or more object categories, the one or more objects including a uniform product code (UPC) and the data contained in the data signals includes an electronic product code (EPC).
8. The apparatus of claim 1, wherein the one or more processors are to generate a contra-EPC when the first RFID tag is not detected within a threshold period of time.
9. A computer readable storage disc or storage device comprising instructions which, when executed, cause one or more processors to at least:
record a time when a first data signal is received from a first RFID tag of a plurality of RFID tags;
record data contained in the first data signal from the first RFID tag; and
attempt to match the first RFID tag to sales information based on the time and the data contained within the first data signal.
10. The computer readable storage disc or storage device of claim 9, wherein the instructions cause the one or more processors to perform an inventory analysis of objects carrying the RFID tags based on a confidence probability curve.
11. The computer readable storage disc or storage device of claim 10, wherein the instructions cause the one or more processors to:
calculate in-store probabilities for the RFID tags based on the confidence probability curve; and
sum the in-store probabilities.
12. The computer readable storage disc or storage device of claim 11, wherein the instructions cause the one or more processors to calculate the in-store probabilities for the RFID tags based on the time when the first data signal of the data signals was received.
13. The computer readable storage disc or storage device of claim 11, wherein the instructions cause the one or more processors to not sum probabilities for RFID tags detected by an exit RFID reader.
14. The computer readable storage disc or storage device of claim 11, wherein the instructions cause the one or more processors to:
calculate probabilities for contra-electronic product codes (contra-EPCs) based on the confidence probability curve; and
subtract the contra-EPCs based on the sum of the in-store probabilities.
15. The computer readable storage disc or storage device of claim 10, wherein the objects correspond to one or more object categories, the one or more objects including a uniform product code (UPC) and the data contained in the data signals includes an electronic product code (EPC).
16. The computer readable storage disc or storage device of claim 9, wherein the instructions cause the one or more processors to generate a contra-EPC when the first RFID tag is not detected within a threshold period of time.
17. A computer readable storage disc or storage device comprising instructions which, when executed, cause one or more processors to at least:
record (a) times when data signals are received from corresponding ones of a plurality of RFID tags carried by objects;
record data contained in the data signals;
record sales information in a database for sales of the objects;
monitor an exit RFID reader a data signal from a first RFID tag in the plurality of RFID tags;
if the first RFID tag is detected, match the sales information to the RFID tag; and
if the first RFID tag is not detected, create a contra-EPC associated with an object corresponding to the first RFID tag.
18. The computer readable storage disc or storage device of claim 17, wherein the instructions cause the one or more processors to:
calculate in-store probabilities for the plurality of RFID tags based on (a) a confidence probability curve and (b) the recorded times.
19. The computer readable storage disc or storage device of claim 18, wherein the instructions cause the one or more processors to:
calculate an in-store probability for respective RFID tags of the plurality of RFID tags based on the confidence probability curve;
calculate a probability for respective contra-EPCs based on the confidence probability curve;
sum the in-store probabilities; and
subtract the contra-EPCs from the sum.
20. The computer readable storage disc or storage device of claim 19, wherein the instructions cause the one or more processors to not sum probabilities for RFID tags detected by the exit RFID reader.
US16/123,889 2016-02-26 2018-09-06 Probabilistic inventory rfid method and system Abandoned US20190019139A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/123,889 US20190019139A1 (en) 2016-02-26 2018-09-06 Probabilistic inventory rfid method and system

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201662300637P 2016-02-26 2016-02-26
US201662369488P 2016-08-01 2016-08-01
US15/443,500 US10095996B2 (en) 2016-02-26 2017-02-27 Probabilistic inventory RFID method and system
US16/123,889 US20190019139A1 (en) 2016-02-26 2018-09-06 Probabilistic inventory rfid method and system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US15/443,500 Continuation US10095996B2 (en) 2016-02-26 2017-02-27 Probabilistic inventory RFID method and system

Publications (1)

Publication Number Publication Date
US20190019139A1 true US20190019139A1 (en) 2019-01-17

Family

ID=59679663

Family Applications (3)

Application Number Title Priority Date Filing Date
US15/443,526 Active US10115072B2 (en) 2016-02-26 2017-02-27 Method and apparatus for selective deep scan using a motion sensor co-located with RFID reader
US15/443,500 Active US10095996B2 (en) 2016-02-26 2017-02-27 Probabilistic inventory RFID method and system
US16/123,889 Abandoned US20190019139A1 (en) 2016-02-26 2018-09-06 Probabilistic inventory rfid method and system

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US15/443,526 Active US10115072B2 (en) 2016-02-26 2017-02-27 Method and apparatus for selective deep scan using a motion sensor co-located with RFID reader
US15/443,500 Active US10095996B2 (en) 2016-02-26 2017-02-27 Probabilistic inventory RFID method and system

Country Status (2)

Country Link
US (3) US10115072B2 (en)
WO (1) WO2017147606A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023147585A3 (en) * 2022-01-31 2023-09-21 Automaton, Inc. DBA RADAR Stateful inventory for monitoring rfid tags

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11010712B2 (en) * 2015-05-19 2021-05-18 Craig E. Milum System and method for fractional RFID inventory tracking and management
MX2019005573A (en) * 2016-11-15 2020-02-07 Walmart Apollo Llc System and method for managing retail product inventory.
US11232396B2 (en) * 2018-03-02 2022-01-25 Walmart Apollo, Llc Dynamic termination zone detection system
WO2019204410A1 (en) * 2018-04-17 2019-10-24 Deroyal Industries, Inc. Inventory management system with statistical learning
US11698440B2 (en) 2019-04-02 2023-07-11 Universal City Studios Llc Tracking aggregation and alignment
US11467129B2 (en) * 2020-03-23 2022-10-11 Olympus NDT Canada Inc. NDT data referencing system
US11645427B2 (en) 2020-11-29 2023-05-09 Bank Of America Corporation Detecting unauthorized activity related to a device by monitoring signals transmitted by the device
GB2623513A (en) * 2022-10-17 2024-04-24 Three Smith Group Ltd Warehouse infrastructure

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090045955A1 (en) * 2007-08-13 2009-02-19 Wal-Mart Stores, Inc. Rfid theft prevention system
US20140253293A1 (en) * 2013-03-11 2014-09-11 Mojix, Inc. Systems and Methods for Estimation of a Population of Passive RFID Sensors

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6590834B1 (en) * 1998-07-24 2003-07-08 Robert R. Highfill Local positioning system using acoustic time-of-flight and a fixed array of receivers and method for use
US8321302B2 (en) * 2002-01-23 2012-11-27 Sensormatic Electronics, LLC Inventory management system
US8542717B2 (en) 2003-03-03 2013-09-24 Veroscan, Inc. Interrogator and interrogation system employing the same
US20050071215A1 (en) * 2003-09-30 2005-03-31 Armbruster Chris A. Process and apparatus for generating a product-specific statistical inventory buffer
US8154385B2 (en) * 2005-08-31 2012-04-10 Impinj, Inc. Local processing of received RFID tag responses
US8179257B2 (en) 2006-03-30 2012-05-15 International Business Machines Corporation Warning of hazardous conditions in monitored spaces using RFID technology
US8321303B1 (en) * 2007-04-02 2012-11-27 Checkpoint Systems, Inc. Retail product out-of-stock detection and dynamic scripting
KR100876668B1 (en) * 2007-09-21 2009-01-07 인하대학교 산학협력단 Apparatus for allocating a time slot for anti-collision of time slots in rfid network based on time division multiple access and method thereof
US9007264B2 (en) * 2008-02-29 2015-04-14 Robert Bosch Gmbh Methods and systems for tracking objects or people within a desired area
CN101783944B (en) 2009-01-14 2012-05-23 鸿富锦精密工业(深圳)有限公司 Wireless image and electric power transmission device and wireless image and electric power transmission method
US9311799B2 (en) * 2014-03-18 2016-04-12 Symbol Technologies, Llc Modifying RFID system operation using movement detection
US9672396B1 (en) * 2016-01-22 2017-06-06 Google Inc. RFID-enabled light bulb

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090045955A1 (en) * 2007-08-13 2009-02-19 Wal-Mart Stores, Inc. Rfid theft prevention system
US20140253293A1 (en) * 2013-03-11 2014-09-11 Mojix, Inc. Systems and Methods for Estimation of a Population of Passive RFID Sensors

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023147585A3 (en) * 2022-01-31 2023-09-21 Automaton, Inc. DBA RADAR Stateful inventory for monitoring rfid tags

Also Published As

Publication number Publication date
US10095996B2 (en) 2018-10-09
WO2017147606A1 (en) 2017-08-31
US20170249589A1 (en) 2017-08-31
US20170249588A1 (en) 2017-08-31
US10115072B2 (en) 2018-10-30

Similar Documents

Publication Publication Date Title
US10095996B2 (en) Probabilistic inventory RFID method and system
JP5457353B2 (en) RFID sales promotion compliance
US20190069054A1 (en) Systems and Methods for Detecting Patterns in Spatio-Temporal Data Collected Using an RFID System
US9171442B2 (en) Item identification using video recognition to supplement bar code or RFID information
US9311799B2 (en) Modifying RFID system operation using movement detection
US20170228688A1 (en) System and method for strategic rfid tag reading using physically dispersed barcodes and supplemental automated inventory management through mobile rfid readers
US20160078264A1 (en) Real time electronic article surveillance and management
US20050043857A1 (en) System for inventory control and capturing and analyzing consumer buying decisions
US20090231135A1 (en) Enhanced item tracking using selective querying
KR20060053214A (en) Shopping pattern analysis system and method based on rfid
Moorthy et al. On-shelf availability in retailing
EP3716172A1 (en) Inventory tracking system
US20200372449A1 (en) Inventory event based movement of rfid tagged items
US20210103708A1 (en) Probabilistic contextual inference using rfid tag-interactions
US20210287506A1 (en) Transition zone rfid tag management
US20180053145A1 (en) Systems and methods for determining stocking locations of products having more than one stocking location on a sales floor
EP4026108A1 (en) Methods and systems for classifying tag status in a retail environment
KR100814152B1 (en) Process for managing a commodity and system therefor
Dai Implementation of RFID technology in library systems: case study: Turku City Library
CN111295682B (en) Predictive analysis of data from multiple test scenarios for improved read accuracy
Venkatesh RFID technology: Standardisation and maturity of the technology enabled by the growth trends and economic benefits of the retail industry
Parada Medina RFID based people-object interaction detection

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: ENCINITAS LABORATORIES, INC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLAIR, ADAM;REEL/FRAME:047433/0962

Effective date: 20170226

Owner name: INTEL CORPORATION, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ENCINITAS LABORATORIES, INC.;REEL/FRAME:047434/0015

Effective date: 20170623

Owner name: ENCINITAS LABORATORIES, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BELSTNER, JOHN;REEL/FRAME:047433/0995

Effective date: 20170227

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: TAHOE RESEARCH, LTD., IRELAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTEL CORPORATION;REEL/FRAME:061175/0176

Effective date: 20220718