WO2016109835A1 - Systèmes et procédés de gestion de chaîne d'approvisionnement - Google Patents

Systèmes et procédés de gestion de chaîne d'approvisionnement Download PDF

Info

Publication number
WO2016109835A1
WO2016109835A1 PCT/US2015/068346 US2015068346W WO2016109835A1 WO 2016109835 A1 WO2016109835 A1 WO 2016109835A1 US 2015068346 W US2015068346 W US 2015068346W WO 2016109835 A1 WO2016109835 A1 WO 2016109835A1
Authority
WO
WIPO (PCT)
Prior art keywords
nfc
tag
tags
trace data
supply chain
Prior art date
Application number
PCT/US2015/068346
Other languages
English (en)
Inventor
Clark Robert MUSSER
Lan Tu ONG
Michael Robert ZEHNDER
Elizabeth Dofredo MURAKAMI
Original Assignee
Dauntless Software Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dauntless Software Inc. filed Critical Dauntless Software Inc.
Publication of WO2016109835A1 publication Critical patent/WO2016109835A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • G06Q10/0833Tracking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds

Definitions

  • the present disclosure relates generally to supply chain management, and more particularly to automated systems and methods for managing supply chains that utilize multiple technologies in parallel to eliminate many of the common manual processes contained in typical supply chains.
  • Supply chain management is the management of the flow or transfer of goods or services in a supply chain, where a supply chain is a system that may include resources, people, activities, information,
  • Typical supply chains may involve the transformation of natural resources, raw materials, and other components into a finished product that is delivered to a customer.
  • used products may re-enter the supply chain at any point where residual value is recyclable.
  • Supply chains may be quite complex and involve multiple companies and multiple locations, such as a supply chain involving commodities like fruit, vegetables or cattle. Many such supply chains still involve many manual actions, such as manually scanning information for units of the commodity involved, in order to track and trace units of the commodity. There is a need for improved systems and methods for supply chain management of all types, particularly those involving the transfer of commodities.
  • a supply chain management system generates trace data by scanning identification tags associated with items to be traced.
  • the system includes a plurality of tags, each tag including at least one near field communication (NFC) circuit.
  • NFC near field communication
  • UHF ultrahigh frequency
  • RFID radio-frequency identification
  • the system includes a plurality of NFC-enabled devices, each NFC-enabled device having at least one NFC circuit.
  • Each NFC-enabled device has a unique identifier (UID) in the system and runs or executes a tracing application.
  • UID unique identifier
  • a cloud-based component stores and processes trace data received from the NFC-enabled devices.
  • a client administrative component initializes tags, registers NFC-enabled devices in the system using the UID of each such device, and manages the overall functionality of the cloud-based component.
  • the NFC-enabled devices and tags are wirelessly coupled so each device can read or scan a proximate tag.
  • the tracing application executing on the NFC-enabled device then generates trace data associated with the scan and the NFC-enabled device communicates this trace data to the cloud-based component through suitable wired and/or wireless communications links.
  • the client administrative component may communicate with the NFC- enabled devices through a suitable communications link such as a Universal Serial Bus (USB) port of the client administrative component.
  • the client administrative component also communicates with the cloud-based component through a suitable communications link. Communications with the cloud-based component would typically be through communication links or networks that would typically include the Internet.
  • Figure 1 is a schematic diagram illustrating a supply chain management system according to one embodiment of the present disclosure.
  • Figure 2 is a schematic diagram of a network for implementing the supply chain management system of Figure 1 according to one embodiment of the disclosure.
  • Figure 3 is a functional block diagram of a computing system suitable for use as the host system or other computing system of Figure 2, according to one illustrated embodiment of the present disclosure.
  • Figure 4 illustrates screenshots of an application running on the client administrative system of Figure 1 in an application of the supply chain management system to the legal marijuana industry according to one embodiment of the present disclosure.
  • Figure 5 illustrates screenshots utilized in an application running on the client mobile devices of Figure 1 in the application of the supply chain management system to the legal marijuana industry according to one embodiment of the present disclosure.
  • Figure 6 is a top view illustrating the relative sizes of a conventional button tag and the required size of a radio frequency identification chip for use in the supply chain management system of Figure 1.
  • Figures 7 A is a top view of a dual frequency identification tag according to one embodiment of the present disclosure.
  • Figure 7B is a side view illustrating tamper resistant and reusable embodiments of the dual frequency identification tag of Figure 7A.
  • Figure 8A is top perspective view of an enclosure for a mountable identification tag for use in the supply chain management system of Figure 1 according to another embodiment of the present disclosure.
  • Figure 8B is a cutaway view of the mountable identification tag of Figure 8A showing two stacked or layered identification chips according to one embodiment.
  • Figure 8C is a cross-sectional view of the stacked or layered identification chips of Figure 8B.
  • Figure 9 is an exploded view of a stationary NFC reader for scanning human resource related information into the supply chain
  • Embodiments of the present disclosure are directed to a supply chain management system 100 that automatically generates trace data by scanning identification tags associated with items to be traced.
  • Figure 1 is a schematic diagram illustrating a supply chain management system 100 according to one embodiment of the present disclosure.
  • the system 100 includes a cloud-based component 102, NFC-enabled reading devices 140, and a plurality of identification (ID) tags 160, each tag including at least one near field communication (NFC) circuit and at least some of the tags also include a long range wireless communication circuit as well, such as an ultrahigh frequency (UHF) radio-frequency identification (RFID) chip.
  • UHF ultrahigh frequency
  • RFID radio-frequency identification
  • Each NFC-enabled reading device has at least one NFC circuit and an associated unique identifier (UID) in the system 100, and each device runs or executes a tracing application.
  • These NFC-enabled reading devices may, for example, be smart phones or tablet computers running the tracing application or "app.”
  • the system 100 may include at least some dedicated NFC-enabled scanning devices 145, which may also include bar code scanning functionality. These dedicated NFC-enabled scanning device 145 are termed "dedicated” in that they are devices designed to provide this limited scanning functionality, as opposed to the devices 140 which, as previously mentioned, may be generic or multipurpose devices such as smart phones or tablet computers.
  • the cloud-based component 102 stores and processes trace data received from the NFC-enabled devices 140, 145 through suitable network connections such as cellular networks 104 and wireless networks that include wireless access points (WAP) interconnections, as will be discussed in more detail below.
  • a client administrative component 150 which is a program executing on a laptop computer in the embodiment of Figure 1 , initializes ID tags 160, registers NFC-enabled devices 140, 145 in the system 100 using the UID of each such device, and manages the overall functionality of the cloud- based component 102.
  • the NFC-enabled devices 140, 145 and ID tags 160 are wirelessly coupled so each device can read or scan a proximate tag.
  • the tracing application executing on the NFC-enabled device 140 then generates trace data associated with the scan and the NFC-enabled device
  • the client administrative component 150 may communicate with the NFC-enabled devices through a suitable communications link such as a Universal Serial Bus (USB) port of the client administrative component.
  • a USB NFC reader 170 for this purpose is shown coupled to the client administrative component 150 in the embodiment of Figure 1.
  • the client administrative component 150 also communicates with the cloud-based component 102 through a suitable communications link 200.
  • Communications with the cloud-based component 102 would typically be through communication links or networks that include the Internet, as will be understood by those skilled in the art.
  • the supply chain management system 100 provides an end-to- end traceability service, one embodiment of which is marked under the
  • the system 100 further includes local data storage devices 1 10 for storage of trace data from scanned ID tag 160.
  • the tags 160 may have a variety of different form factors, one of which is designated as an ID tag 165 that includes a barcode in which is scanned by the NFC-enabled reading device 145 in this scan data stored through the wireless access point WAP on the local data storage device 1 10.
  • This trace data stored on the local data storage device 1 10 is then through a local-to-cloud synchronization service 120 to the cloud-based component 102 for storage.
  • the system 100 further includes a cloud-to-remote data system validation services layer 130 that interfaces with the other components of the system 100.
  • the system 100 further includes stationary NFC-enabled reading devices (not shown in Figure 1 but one embodiment of which is discussed below with reference to Figure 9) and the mobile NFC-enabled reading devices 140, 145 to scan all types of ID tags 160 utilized in the system.
  • the ID tags 160 and 165 are shown by way of example in the embodiment of Figure 1.
  • the ID tags 160 in the example of Figure 1 include RFID circuitry or NFC circuitry, or both, while the ID tags include this circuitry in addition to a barcode.
  • the ID tags 160, 165 may include various types of tag technology or circuitry, including the RFID and NFC circuitry along with barcodes as already discussed, in addition to quick response (QR) code technology that utilizes line of sight cameras to read the QR codes, as will be appreciated by those skilled in the art.
  • QR quick response
  • the networked environment 200 includes one or more host systems 202 that host the cloud-based service or component 102 of the supply chain
  • the host system 202 is communicatively coupled through one or more networks 204 to conventional computing systems 206 and 208.
  • the computer systems 206, 208 each represent, for example, a computer system utilized to execute the client administrative component 150 and would be utilized by a user to access via the network 204 the cloud-based component 102 of the supply chain management system 100 running on the host system 202.
  • the networked environment 200 need only include one such computer system 206, 208 for running the client administrative component 150 but this component could of course be utilized on multiple computer systems, such as a desktop computer system in an office and a portable laptop computer.
  • the networked environment 200 further includes tag reading devices 210, which may take a variety of different forms such as the reading devices 140, 145 previously discussed with reference to Figure 1 . Each reading device 210 may be stationary or mobile and be any suitable type of electronic device that can run the required scanning or tracing application, such as a smart phone or tablet computer as previously mentioned.
  • the host system 202 may include one or more computing systems 212 and one or more storage devices or databases 214.
  • the computing system 212 may take any of a variety of forms, for example, personal computers, mini-computers, work stations, or main frame computers.
  • the computing system 212 may, where the network 204 includes the Internet for example, take the form of a server computer executing server software.
  • the storage or database 214 can take a variety of forms, including one or more hard disks or RAID drives, CD/ROMs, FLASH drives, or other mass storage devices.
  • the network 204 similarly can take a variety of forms, for example one or more local area networks (LANs), wide area networks (WANs), wireless LANs (WLANs), and/or wireless WANs (WWANs).
  • the network 204 may employ packet switching or any other type of transmission protocol.
  • the network 204 may, for example, take the form of the Internet or Worldwide Web portion of the Internet.
  • the network 204 may take the form of public switched telephone network (PSTN), cellular telephone network, or any combination of the above, or other networks.
  • PSTN public switched telephone network
  • the computer systems 206, 208 similarly may any of a variety of suitable types of computer system, such as the desktop or laptop computer already mentioned in addition to other types such as tablet computers.
  • Figure 3 is a functional block diagram of a computing system suitable for use as the host system 202, computer systems 206, 208 or even the tag reading devices 210 in the networked environment 200 of Figure 2, according to one embodiment of the present disclosure.
  • Figure 3 shows a conventional personal computer referred to herein as computing system 300 that may be appropriately configured to function as the computing system 212 of the host system 202, the computing systems 206, 208, or even one of the tag reading devices 210 of Figure 2.
  • the computing system 300 includes a processing unit 302, a system memory 304 and a system bus 306 that couples various system components including the system memory 304 to the
  • the processing unit 302 may be any logical processing unit, such as one or more central processing units (CPUs), digital signal processors (DSPs), application-specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), etc. Unless described otherwise, the construction and operation of the various blocks shown in Figure 3 are of conventional design. As a result, such blocks need not be described in further detail herein, as they will be understood by those skilled in the relevant art.
  • the system bus 306 can employ any known bus structures or architectures, including a memory bus with memory controller, a peripheral bus, and/or a local bus.
  • the system memory 304 includes ROM 308 and RAM 310.
  • a basic input/output system (“BIOS”) 312, which can form part of the ROM 308, contains basic routines that help transfer information between elements within the computing system 300, such as during startup.
  • the computing system 300 may also include one or more spinning media memories such as a hard disk drive 314 for reading from and writing to a hard disk 316, and an optical disk drive 322 and a magnetic disk drive 324 for reading from and writing to removable optical disks 318 and magnetic disks 320, respectively.
  • the optical disk 318 can be a CD-ROM
  • the magnetic disk 320 can be a magnetic floppy disk or diskette.
  • the hard disk drive 314, optical disk drive 322 and magnetic disk drive 324 communicate with the processing unit 302 via the bus 306.
  • the hard disk drive 314, optical disk drive 322 and magnetic disk drive 324 may include interfaces or controllers coupled between such drives and the bus 306, as is known by those skilled in the relevant art, for example via an IDE (i.e.
  • the drives 314, 322 and 324, and their associated computer-readable media 316, 318 and 320 provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for the computing system 300.
  • the depicted computing system 300 employs hard disk 316, optical disk 318 and magnetic disk 320, those skilled in the relevant art will appreciate that other types of spinning media memory computer-readable media may be employed, such as digital video disks ("DVDs"), Bernoulli cartridges, etc.
  • DVDs digital video disks
  • Those skilled in the relevant art will also appreciate that other types of computer-readable media that can store data accessible by a computer may be employed, for example, non-spinning media memories such as magnetic cassettes, flash memory cards, RAMs, ROMs, smart cards, etc.
  • Program modules can be stored in the system memory 304, such as an operating system 326, one or more application programs 328, other programs or modules 330, and program data 332.
  • the applications programs 328 may include one or more custom programs that may be utilized in providing access via the network 204 to the supply chain management system 100.
  • the system memory 304 also includes one or more communications programs 334 for permitting the computing system 300 to access and exchange data with sources such as websites of the Internet, corporate intranets, or other networks, as well as other server applications on server computers.
  • the communications program 334 may take the form of one or more server programs. Alternatively, or additionally, the communications program may take the form of one or more browser programs.
  • the communications program 334 may be markup language based, such as hypertext markup language ("HTML”), Extensible Markup Language (XML) or Wireless Markup Language (WML), and operate with markup languages that use syntactically delimited characters added to the data of a document to represent the structure of the document.
  • HTML hypertext markup language
  • XML Extensible Markup Language
  • WML Wireless Markup Language
  • a number of Web clients or browsers are commercially available such as NETSCAPE NAVIGATOR® from America Online, and INTERNET EXPLORER® available from Microsoft Corporation of Redmond Washington.
  • the operating system 326 can be stored on the hard disk 316 of the hard disk drive 314, the optical disk 318 of the optical disk drive 322 and/or the magnetic disk 320 of the magnetic disk drive 324.
  • a user of the supply chain management system 100 can enter commands and information to the computing system 300 through input devices such as a keyboard 336 and a pointing device such as a mouse 338.
  • Other input devices can include a microphone, joystick, game pad, scanner, button, key, microphone with voice recognition software, etc.
  • These and other input devices are connected to the processing unit 302 through an interface 340 such as a serial port interface that couples to the bus 306, although other interfaces such as a parallel port, a game port or a universal serial bus (“USB”) can be used.
  • a monitor 342 or other display devices may be coupled to the bus 306 via video interface 344, such as a video adapter.
  • the computing system 300 can include other output devices such as speakers, printers, etc.
  • computing system 300 various components will take different forms or be omitted entirely.
  • the computing system 300 is a smart phone or tablet computer
  • no optical disk drive 322 or magnetic disk drive 324 would be present and the monitor 342 would correspond to a touchscreen.
  • the computing system 300 can operate in a networked environment 200 ( Figure 2) using logical connections to one or more remote computers, such as the host system 202.
  • the computing system 300 may employ any known means of communication, such as through a local area network (“LAN”) 346 or a wide area network (“WAN”) or the Internet 348.
  • LAN local area network
  • WAN wide area network
  • Internet the Internet
  • the computing system 300 When used in a LAN networking environment, the computing system 300 is connected to the LAN 346 through an adapter or network interface 350 (communicatively linked to the bus 306). When used in a WAN networking environment, the computing system 300 often includes a modem 352 or other device for establishing communications over the WAN/Internet 348.
  • the modem 352 is shown in Figure 3 as communicatively linked between the interface 340 and the WAN/Internet 348.
  • program modules, application programs, or data, or portions thereof can be stored in a server computer (not shown).
  • server computer not shown.
  • the network connections shown in Figure 3 are only some examples of establishing communications links between computers, and other communications links may be used, including wireless links.
  • the computing system 300 may include one or more interfaces such as slot 354 to allow the addition of devices 356, 358 either internally or externally to the computing system 300.
  • suitable interfaces may include ISA (i.e., Industry Standard Architecture), IDE, PCI (i.e., Personal Computer Interface) and/or AGP (i.e. , Advance Graphics Processor) slot connectors for option cards, serial and/or parallel ports, USB ports (i.e., Universal Serial Bus), audio input/output (i.e., I/O) and MID l/joystick connectors, and/or slots for memory.
  • Non-volatile media includes, for example, hard, optical or magnetic disks 316, 318, 320, respectively.
  • Volatile media includes dynamic memory, such as system memory 304.
  • Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise system bus 306. Transmission media can also take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications.
  • Computer-readable media include, for example, floppy disk, flexible disk, hard disk, magnetic tape, or any other magnetic medium, CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, RAM, PROM, EPROM, EEPROM, FLASH memory, any other memory chip or cartridge, a carrier wave as described herein, or any other medium from which a computer can read.
  • Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to processing unit 302 for execution.
  • the instructions may initially be carried on a magnetic disk of a remote computer.
  • the remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem.
  • a modem 352 local to computer system 300 can receive the data on the telephone line and use an infrared transmitter to convert the data to an infrared signal.
  • An infrared detector coupled to the system bus 306 can receive the data carried in the infrared signal and place the data on system bus 306.
  • the system bus 306 carries the data to system memory 304, from which processing unit 302 retrieves and executes the instructions.
  • the instructions received by system memory 304 may optionally be stored on a storage device either before or after execution by processing unit 302.
  • the supply chain management system 100 is designed to replace many of the manual processes of managing a supply chain that exist today. This is done through modern cellular and smart phone or tablet technology for the NFC-enabled reading devices 140, NFC ID tags 160, 165, long range ultrahigh radio frequency identification (UHF RFID) technology in the ID tags, and automated, cloud-based reporting services.
  • NFC-enabled reading devices 140 NFC ID tags 160, 165, long range ultrahigh radio frequency identification (UHF RFID) technology in the ID tags, and automated, cloud-based reporting services.
  • UHF RFID ultrahigh radio frequency identification
  • the supply chain management system 100 can used anywhere in the world is the fact that operation of the system is only dependent on the NFC- enabled reading devices 140 having only a periodic cellular connection to transfer through the network 204 ( Figure 2) data to the cloud-based component 102 ( Figure 1 ) of the system.
  • This enables tracing of items being transferred by the system 100 anywhere in the world including the most remote regions where cellular towers are the only communications infrastructure available, such as in West Africa for example.
  • the tracing application running on the NFC-enabled reading devices 140 is in one embodiment designed to enable a user that cannot read or write to use the tracing application and thereby provide trace data to the supply chain management system 100.
  • the tracing application is available for multiple mobile device operating systems, such as iOS and Android.
  • a unique identifier (UID) for a mobile device forming the NFC-enable reading device 140 is registered in the supply chain management system 100 utilizing the client administrative component 150, and through the reading device an associated user/employee is granted varying degrees of rights regarding access to facilities or data modification in the system, for example.
  • the supply chain management system 100 Through the supply chain management system 100, a company is able to manage it supply chain to track and report on the status of an individual commodity from when the commodity is growing on a farm to the moment the commodity is purchased at a store. Traceability through the supply chain management system 100 can be applied to just about anything that is produced in one location and consumed in another. Accordingly, the supply chain management system 100 can be applied to commodities like cattle, swine, cocoa, cashews, coffee, apples, teak, cotton, olives, flowers, legal marijuana, automobile maintenance, human resources time tracking, and much more.
  • use of the supply chain management system 100 begins by importing data 200 through the client administrative component 150 and into a cloud-based database 210 that is part of the cloud-based component 102 as seen in Figure 1 .
  • This data 200 includes necessary data that must be available in the cloud-based component 102, such as company name, employee names, products, location, hardware, and a variety of other general and proprietary information.
  • the cloud-based component 102 may include a cloud-based client administrative tool 220 to this required functionality for a user of the supply chain management system 100.
  • the cloud-based component utilizes an automated encoding system to generate whatever ID tags 160 are required to begin tracking the supply chain.
  • PVC employee ID cards One tag component generated through this automated encoding and supplied to the client or user of the system 100 are suitable PVC employee ID cards that will need to be scanned into the system 100, and if a secured door entry component is included, the same PVC employee ID cards are used for scanning to gain access through various doors to facilities of the employer.
  • PVC employee ID cards or tags can be dual frequency NFC/RFID tags or single frequency NFC tags depending on the door entry system deployed by the employer.
  • Another tag component generated by the automated encoding system of the cloud-based component are the product and location ID tags 160 in the form of PVC cards, key fobs, stickers, mountable tags, or whatever type of form factor is required for the ID tags.
  • ID tags are deployed by the user of the system 100 as needed and scanned into the system through the USB NFC reader 170 or through an NFC-enabled reading device 140.
  • each of these ID tags 160 can have circuits that operate at one or two frequencies in them and may or may not include the ability to be printed on site if the user has a compatible printer, or the ID tags may barcodes such as the tag 165, or QR codes attached to the ID tag through printing or labeling if the user has a compatible label printer.
  • RFID circuitry in the ID tags 160 If the user is going to use RFID circuitry in the ID tags 160, then stationary RFID-enabled readers 140 and associated antennas and/or mobile RFID-enabled readers must be installed at the required locations of the user. RFID technology is utilized for area scanning and can be very effective in automated bulk scans, as will be appreciated by those skilled in the art. With the combination of NFC and RFID circuitry in ID tags 160, each item can be tracked in a variety of environments with or without the need of line-of-sight or manual scanning. Once all of the hardware, software, and ID tags forming the system 100 are installed, traceability of items begins.
  • the supply chain management system 100 tracks valuable information on each individual item being tracked and traced, where the item may be an animal, plant, tree, herd, field, or orchard as the item produces product that needs to be shipped and/or processed.
  • an ID tag 160 is attached to the item as it is "harvested,” either on a single large item like on an animal or a vehicle, or on a group of smaller items like a burlap bag of cocoa or a pallet of flower bulbs.
  • the system 100 has functionality that enables time lapsed crop health management photography, crop management training video, farm management reports for tagged items over time, growth charts, disease review, geo-positioning of stationary items like trees in an orchard, automated data gathering tools for temperature, size/weight measurements, or moisture content, and any other information needed by the supply chain.
  • Geo-positioning associated with a mobile device such as a smart phone being used as an NFC-enabled reading device 140 can be used to validate where a traced item is in the supply chain when scanned by the reading device.
  • the system 100 is able to clock these employees in and out of jobs using stationary NFC reader that functions as a time clock, as will be described below with reference to Figure 9.
  • Employees can also be tracked through the facility locations using RFID area scanning technology if so desired. This allows the employer to know which jobs an employee is working at any given time and where they have been while doing that job, and what the employee has interacted with in the facility.
  • the cloud-based component 102 and dynamic middle tier services allow the system 100 to integrate with virtually any other application programming interface (API) enabled system.
  • API application programming interface
  • any number of scans can be made against that item in the system to thereby track the item from the initialization point (i.e., where the item was first scanned into the system) all the way until the item completes its journey through the supply chain and the ID tag 160 is no longer active in the system.
  • the ID tags 160, 165 are generally reusable and automatically cycle to be made available when the tag reaches the end of the supply chain.
  • each ID tag 160, 165 can take a variety of different forms to accommodate a variety of types of commodities and each tag can include different types of functionality. As previously mentioned, this functionality of each ID tag 160, 165 can include NFC circuitry (i.e., and NFC chip)
  • the ID tag 160 may also include UHF RFID circuitry (i.e., an RFID chip) for automated scanning from up to ten (10) meters away with stationary RFID- enabled reading devices 140.
  • the ID tag 160 may also include a printed bar code and/or a QR code for additional scanning and validation options for the tag.
  • metal detectability of the ID tag 160 and connector can also be provided where needed.
  • ID tags 160 remain attached to the individual items (e.g., containers/animals) and can be scanned an unlimited number of times.
  • the ID tags 160 last or are functional for about 10,000 scans as long as the tags are active in the system 100.
  • the NFC-enabled reading devices 140 can be used to scan individual items as they are loaded and unloaded throughout this process.
  • the RFID-enabled reading devices 140 which may portable such as a hand-held wand or may be a stationary reader, can be used to scan whole shipments of the commodity without the need for line-of-sight reading.
  • Each package containing the item can be checked, scanned, and reconciled at each stop along the journey from one location to the next either through whole shipment RFID scans or individual NFC scans.
  • the convenience of the NFC circuitry in the ID tags 160 allows for easy spot inspection with a tap query to determine the contents of the package, where the package originated, and where the package is going, and additional information as well.
  • an inspector can look at the shipment, scan an item (or the whole shipment) and assign a quality "stamp" to the shipment for a processing center to review, for example.
  • Scaling up and down is a concern and a combination of NFC-enabled and RFID-enable ID tags allows for quick scanning of individual packages when the numbers are manageable while also allowing for large numbers of items to be bulk scanned down the supply chain line. This capability becomes more important as the combined flow of materials from multiple locations increases exponentially when nearing sites further down the supply chain.
  • the system 100 can combine any number of individual items into larger lots by attaching a lot tag or electronic signature with each ID tag 160, 165. This can also scale as each lot combines to become even larger lots. When the entire lot is scanned, the system 100 will pick up the lot, sub-lots, and individual items at the same time, ensuring that everything expected is present and reconciled along the supply chain.
  • the scaling capability maintains the ability to spot check individual items while still knowing which lot, farm, shipment, or other grouping it has been assigned.
  • a transition from tracing raw materials to processed goods needs to take place so as the raw material is processed, the originating ID tags 160, 165 are scanned, associated to a processing lot, and discarded along with the original packaging.
  • a new signature is created for the processed material that is assigned to the ID tags 160, 165 attached to the packaging of the processed goods along with whatever barcodes the package needs for a shipping company and retailers receiving the processed material.
  • the supply chain management system 100 can include on ID tags 160, 165 QR codes printed with a barcode to enable an end consumer with a smart phone or tablet computer with a scanning application to get Web-based information about the product and the origin of the product.
  • the NFC chip in the ID tags 160, 165 enables spot checking of packages and lots with an NFC enabled smart phone or tablet computer as a reading device 140 including consumers with an NFC- enabled smart phones or tablet computer that would be able to tap for additional information.
  • the RFID chip in ID tags 160 enable bulk scanning and lot scanning along the route of an item from factory to retailer. Additionally, since the packaging including the product and the ID tag 160 and thus the NFC and/or RFID chips embedded, a retailer can integrate the system 100 with current point-of-sale (POS) systems to benefit from the entire supply chain knowledge.
  • POS point-of-sale
  • the system 100 enables the entire supply chain to communicate with the consumer through their product in a more direct and immediate fashion and get immediate feedback from the consumer right in the store or even from their home.
  • RFID-enabled devices i.e., smart shopping carts
  • NFC- enabled phones/devices smart phone or tablet computer
  • reading a QR code the consumer is able to quickly scan products tagged with the ID tags 160 to get immediate information on its origin, the company, the processes, special deals that are available, events, or advertising and/or coupons that have been put in place for the retailer.
  • RFID or NFC technology a consumer can see where the item came from and which farms contributed along the supply chain traveled by the item.
  • Demand for high quality goods from favored farms or regions allow for expanded pricing models based supply and demand.
  • Cross promotions and exclusive deals can be created, tracked, and analyzed for success rates based on scans, shopping habits, and other uses of the automation technology.
  • the system 100 is designed to enable clients and monitoring agencies, such as regulatory agencies, to have an automated and authenticated trail of activity for any item being tracked by the system.
  • the system 100 allows for verification of the history, location, and application of goods created and sold through a well-documented and automatically recorded identification system.
  • the system 100 includes extensive secured Web service reporting interfaces that display the status of each supply chain as it stands at any given moment with live, up-to-the-minute data. This data allows clients to meet governmental regulations, fill customer demands, and improve the efficiency of the supply chain. Since items are automatically tracked along the supply chain route and reconciled at each link (i.e., stop or location) in the chain, the system 100 adds accountability to the process, and the capability to stop losses due to theft, graft, or neglect.
  • the system 100 is designed to prevent someone from "gaming the system” by using another companies ID tags 160, or trying to run the same items through the system to get double paid. Since every device 140, 145, employee or user, and ID tag 160, 165 is tracked in the system 100, we are able to flag suspect activity almost immediately which allows our customers to review the activity and roll back anything that was invalid. An example of this functionality is now provided.
  • the system 100 tracks the devices 140, 145, employee ID's, and ID tags 160, 165 in along with the geo-positioning of where ID tags are being scanned. If Bob's card and Ron's phone were both stolen, the person that used them would have to use them within the marked geo-positioning area designated for Bob's card and Ron's phone. In this case, perhaps they could only work on site, then they know the changes were made by someone with access to their building. If they have remote access, we would be able to see that the card and phone were used from Bob's house and just need to know why he had Ron's phone and why he was logging in while he was sick.
  • each ID tag 160, 165 is assigned to a specific company. Thus, a competitor cannot steal ID tags from their neighbor and use those tags within their system as we would know they had stolen those tags.
  • the system 100 uses an extensible data architecture in the back- end (i.e., in the cloud-based component 102) that allows for rapid changes in schema and data without the need to redesign the database 210.
  • This allows the system 100 to accommodate any number of customers, scenarios, data types, and data flows quickly and dynamically as they come on line.
  • Data is managed in a hub and spoke pattern with data gathered at the local device level to an offline data store on the device which is then periodically synchronized with the central database 210 in the cloud. This allows for remote systems to work offline as long as they have the storage space on their device without needing to worry about the system being connected every moment of the day.
  • the reading devices 140, 145 When connected, the reading devices 140, 145 automatically synchronize their data to the central system (i.e., the cloud-based component 102) and pull any default data they will need for the day in case they go offline.
  • Data in the cloud in the database 210 is kept for a period of time and then offloaded into an archiving system (not shown in Figure 1 ) that can be accessed from the client administrative component 150 and reporting interfaces. This keeps the cost of the cloud-based component 102 down as only pertinent data for each business is stored while this data is needed in the cloud.
  • the system 100 uses a smart middle tier cloud service architecture that allows for a single call to service to interact with any part of the data system. This simplification of the middle tier logic makes it so that there is almost never a need to make changes to the middle tier services in order to create new user interfaces or accommodate new data flows. It also allows the system 100 full control of the data coming in and out of our system as there is no other gateway to the data ensuring our data integrity remains pristine.
  • the system 100 integrates with those systems and simplifies the calls that are needed to work with them so that our customers no longer have to build complicated integration applications to interface with complex and varied APIs. Instead, customers can call a single API of the system 100 and the system does all of the conversions and integration work for the customer.
  • Figure 4 illustrates screenshots 400-406 of a reading or scanning application running on the client administrative component 150 of Figure 1 in an application of the supply chain management system 100 to the legal marijuana industry according to one embodiment of the present disclosure.
  • embodiment of the system 100 utilizes three main user interfaces to manage the end-to-end traceability of items provided by the service the system
  • the three main user interfaces are the interface through an installed client PC administrative application (i.e., the client administrative component 150), an installed client mobile application (i.e., the reading or scanning application running on a reading device 140, 145), and a Web-based client administrative application (i.e, the cloud-based client administrative tool 220).
  • an installed client PC administrative application i.e., the client administrative component 150
  • an installed client mobile application i.e., the reading or scanning application running on a reading device 140, 145
  • a Web-based client administrative application i.e, the cloud-based client administrative tool 220.
  • the installed administrative application running on the client administrative component 150 allows users to manage the base data that will be used for their company within the system 100. This also allows an administrative user to get reports of usage, monitor the supply chain, get notifications, and in general manage the supply chain needs of the business.
  • Screen shots 400-406 show sample screens that would be rendered to user of the client administrative component 150 for administrative control of the system 100 for use in the legal marijuana industry.
  • the screet 400 shows an entry screen prompting the user of the client administrative component 152 scan in his or her employee ID or badge.
  • the scree 402 provides the employee with access to various business information.
  • the screen 404 allows the employee to manage information for plants in the growth cycle, including adding and editing strains, adding and removing mother plants, tracking daily waste by weight, printing ID tags 160 for new mother and clone plants, and additional
  • the screen 406 allows the employee to manage information for plants tagged as ready for harvest, with interfaces for moving plants into inventories for drying and processing. Functionality through this screen 406 includes recording harvested weight, tracking drying and curing time, recording the dry weight of the cured product, and recording waste.
  • FIG. 5 illustrates screenshots 500-514 utilized in the reading or scanning application running on the reading devices 140 (e.g., smart phone or tablet computer) of Figure 1 in the application of the supply chain management system 100 to the legal marijuana industry according to one embodiment of the present disclosure.
  • the screen 500 once again prompts the user to scan in the employee ID or badge of the user for login to the scanning application.
  • the screen 502 is the main menu of the scanning application while screen 504 provides growing in inventory management options to the user.
  • the screen 506 allows the user to scan a mother plant tag and screen 508 allows the user to input clones of the mother plant.
  • the screen 510 allows the user to scan location of the ID tag 160 being scanned.
  • the screen 512 allows the user to select the clones of the mother plant to be tagged while the screen 514 allows the user to scan the ID tags for each of the clone plants.
  • the Web-based or cloud-based client administrative tool or application 220 in the cloud-based component 102 provides similar functionality as the client administrative component 150 but does not require an application be downloaded or otherwise installed on a device or system of the customer, but the cloud-based client administrative tool does of course require an Internet connection and cannot scan ID tags 160, 165 into the system 100.
  • Figure 6 is a top view illustrating the relative sizes of a conventional button tag 600 and the required size of a radio frequency identification chip 602 for use in the supply chain management system 100 of Figure 1.
  • the system 100 uses a variety of different tag form factors in order to meet the needs of the customer. Such needs will of course be different for different items being tracked by the the system.
  • the form factors can take the shape of PVC ID cards, stickers, key chain fobs, bracelets, mountable objects, window clings, and so on.
  • Each of these form factors for an ID tag 160 will utilize one, two, three, or four types of identification technology as follows:
  • NFC Near Field Communication
  • the form factor of the ID tags 160 includes single or dual frequency attachable button tags like the button tag 600 shown in Figure 6.
  • the ID tags 160 are ideally easily mounted to large bags of produce in remote farms or jungle areas while also allowing expansion of the system 100 from the produce industry to the livestock industry and the tracking of cattle and swine. This need led to the utilization of the form factor of the conventional button tag 600, which is a standard cattle ear tag available in both the large panel form factor and a smaller button form factor. Such conventional tags are too bulky and are easily damaged, or these tags use old low frequency (LF) RFID technology that does not have the range of usage needed for applications of the supply chain management system 100.
  • LF low frequency
  • Figure 6 shows a comparison of the sizes of the standard button tag 600 and the required size of the form factor of the button tag 602 that could contain the RFID chip needed to provide the required range. Possibilities for modifying the form factor were limited.
  • the RFID chip needed to remain flat or planar in order to be able to reliably read the tag.
  • the antenna needed to be elongated in order to generate the electromagnetic field needed to reliably communicate with the tag. As a result, there was no way to make a chip and antenna already on the market that provides the required range and in the required form factor for desired applications of the supply management system 100.
  • an RFID chip including the required antenna already on the market could be utilized to create the ID tags 160 for the system 100.
  • the standardized cattle button sized ear tag was proven to be effective and withstand the wear and tear of livestock over time, which would be invaluable to applications of the system 100 in the livestock industry as well as transporting goods thrown in stacks on trucks.
  • the ID tags 170 would be attachable with a standard tool and have a version that can be re-used, would have an RFID range of at least 10 feet, and would be capable of combining more than one frequency in the form factor to enable both area scans through UHF RFID circuitry and spot checking through NFC circuitry.
  • Figures 7A and 7B illustrate one embodiment of a dual-frequency ID tag 700 that meets all of these desired criteria and accordingly may be utilized as one type of ID tag 160 in the supply chain management system 100 of Figure 1 .
  • Figure 7A is a top view of one embodiment of the dual frequency identification tag 700 while
  • Figure 7B is a side view illustrating a tamper resistant form factor 702 and a re-usable form factor 704 of the dual frequency ID tag 700 of Figure 7A.
  • the ID tag 700 has the desired range of 12-15 feet for a UHF RFID circuit or chip 706 contained in the tag.
  • the form factor of the ID tag 700 is that of a standard cattle button ear tag and the ID tag 700 may be attached utilizing a standard cattle button ear tag clamp tool 708 as shown in Figure 7B.
  • the re-usable form factor 704 is both tamper proof and provides one time use while the re-usable form factor 702 may of course be utilized multiple times.
  • the ID tag 700 includes dual-frequency circuitry, namely the UHF RFID chip 706 along with a NFC circuit or chip 710.
  • the NFC chip 710 on the tag 700 is illustrated in the upper right portion of Figure 7A while the UHF RFID chip 706 is shown in the upper left portion of this figure.
  • the combination of these chips 706 and 710 are shown on the ID tag 700 in the center bottom of Figure 7A.
  • a standard piercing shaft 712 from the cattle tag industry is provided on an attachment housing 702a of the ID tag with the tamper proof form factor 702.
  • the shaft 712 goes into a chip housing 702b of the ID tag 700 and locks in place. If the attachment and chip housings 702a and 702b are pulled apart the ID tag 700 is damaged and not reusable.
  • the re-usable form factor 704 has the spike 712 built into the chip housing 702b and pierces a holder ring forming the attachment housing 702a that is replaceable each time the ID tag 700 is used.
  • Figure 8A is top perspective view of an enclosure 800 for a mountable ID tag 802 for use as one type of the ID tags 160 in the supply chain management system 100 of Figure 1 according to another embodiment of the present disclosure.
  • Figure 8B is a cutaway view of the mountable identification tag 802 of Figure 8A showing two stacked or layered identification chips 804 and 806 according to one embodiment.
  • Figure 8C is a cross-sectional view of the stacked or layered identification chips 804 and 806 showing the horizontal displacement of the ends of the chips that eliminate feedback electromagnetic fields as mentioned above and which allow for the proper operation of the tag 802.
  • the ID tag 802 is mountable utilizing a suitable attachment device, which is a screw or nail (not shown) placed through an attachment hole 808 in the housing 800 in the embodiment of Figure 8A.
  • the system 100 has the ability to scan a mounted tag 800 either on a wall or on some stationary or movable object as a location, or on a known moving object like a forklift so the tag may be read from a distance with RFID-enabled reading device 140 and/or scanned up close with an NFC-enabled reading device.
  • the tag 800 needs to be more durable than a sticker, and need to be large enough to stand out for scanning.
  • the housing 800 is Acrylonitrile Butadiene Styrene (ABS) plastic with one or both of the chips 804 and 806 formed in layers as shown in Figure 8B and the contained within the housing 800 and attached to the desired object through screws or nails through the holes 808 or glued to the object.
  • ABS Acrylonitrile Butadiene Styrene
  • FIG 9 is an exploded view of a stationary NFC reader 900 for scanning human resource related information into the supply chain management system 100 of Figure 1 according one embodiment of the present disclosure.
  • the system 100 uses a variety of tag reading form factors as discussed above.
  • the form factors can take the shape of mobile NFC-enabled phones and tablet computers (reading devices 140, 145 of Figure 1 ), personal computers (client administrative component 150 of Figure 1 ) with an NFC USB reader (reader 170 of Figure 1 ) 170 attached, and stationary RFID readers with one to 64 antennas attached, mobile RFID readers, and stationary or mobile barcode and QR code readers.
  • the reading component includes in the top of an outer housing 902 a slot (not shown) for sliding NFC employee ID cards into and out of in order to thereby allow the employees to check in/out of whatever job has been signed to employee for the device. This allows for customers with employees that are constantly changing roles on the shop floor to track the proper pay for each role.
  • the reading component 900 further includes an NFC-enabled device 904 that is attached to an inner housing 906 such that when the employee inserts his or her employee ID card into the top slot of the outer housing 902 the NFC-enabled device reads the employee ID card and communicates this information to the cloud-based component 102 of the system 100.
  • signal bearing media include, but are not limited to, the following: recordable type media such as floppy disks, hard disk drives, CD ROMs, digital tape, and computer memory.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Development Economics (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

L'invention concerne un système de gestion de chaîne d'approvisionnement qui utilise des données de trace générées par balayage d'étiquettes associées à des articles devant être tracés. Le système comprend des étiquettes d'identification, chaque étiquette contenant au moins un circuit de communication en champ proche (NFC). Un ou plusieurs dispositifs à fonction NFC, ayant chacun un identifiant unique, comprennent au moins un circuit NFC pour lire des informations depuis les étiquettes et exécuter une application de traçage. Un composant de données de trace en nuage stocke et traite des données de trace provenant d'étiquettes balayées. Un composant d'administration initialise des étiquettes, enregistre des dispositifs à fonction NFC en utilisant les identifiants uniques associés, et gère des fonctions du composant de données de trace en nuage. Les étiquettes et les dispositifs à fonction NFC communiquent de manière sans fil par les circuits NFC pour balayer les étiquettes. L'application de traçage s'exécutant sur chaque dispositif à fonction NFC génère des données de trace associées au balayage et ces données de trace sont communiquées au composant de données de trace en nuage.
PCT/US2015/068346 2014-12-31 2015-12-31 Systèmes et procédés de gestion de chaîne d'approvisionnement WO2016109835A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201462098938P 2014-12-31 2014-12-31
US62/098,938 2014-12-31

Publications (1)

Publication Number Publication Date
WO2016109835A1 true WO2016109835A1 (fr) 2016-07-07

Family

ID=56285088

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2015/068346 WO2016109835A1 (fr) 2014-12-31 2015-12-31 Systèmes et procédés de gestion de chaîne d'approvisionnement

Country Status (1)

Country Link
WO (1) WO2016109835A1 (fr)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019046685A1 (fr) * 2017-08-31 2019-03-07 Merial, Inc. Procédé et système de suivi d'une pluralité d'animaux à l'aide d'un dispositif informatique portable
WO2019113465A1 (fr) * 2017-12-07 2019-06-13 Mts Systems Corporation Gestion d'informations de machine intégrée avec interface utilisateur interactive d'application
US10397000B2 (en) 2017-08-14 2019-08-27 Raytheon Company Multi-level authentication for secure supply chain asset management
CN110490282A (zh) * 2019-08-21 2019-11-22 湖南道业信息科技有限公司 溯源方法、溯源装置、溯源系统和存储介质
US11019808B2 (en) 2016-03-31 2021-06-01 Boehringer Ingelheim Animal Health USA Inc. Single or dual technology animal tags and system and method of using the same
US11026402B2 (en) 2017-09-26 2021-06-08 Boeringer Ingelheim Animal Health Usa Inc. Method and system for tracking animals and alerting animal owners of lost animals
EP3913559A1 (fr) * 2020-05-20 2021-11-24 Accenture Global Solutions Limited Dispositifs de commande et de surveillance utilisant la communication en champ proche

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120254031A1 (en) * 2011-03-29 2012-10-04 Research In Motion Limited Communication system providing near field communication (nfc) transaction features and related methods
US20130222116A1 (en) * 2011-01-19 2013-08-29 Walter Richard Barry, III Event-Based Asset Tracking, Order Adherence, and Rewards Management with NFC-Enabled Electronic Devices
US20140330685A1 (en) * 2013-05-06 2014-11-06 HURU Systems Ltd. Asset Tracking and Management

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130222116A1 (en) * 2011-01-19 2013-08-29 Walter Richard Barry, III Event-Based Asset Tracking, Order Adherence, and Rewards Management with NFC-Enabled Electronic Devices
US20120254031A1 (en) * 2011-03-29 2012-10-04 Research In Motion Limited Communication system providing near field communication (nfc) transaction features and related methods
US20140330685A1 (en) * 2013-05-06 2014-11-06 HURU Systems Ltd. Asset Tracking and Management

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11019808B2 (en) 2016-03-31 2021-06-01 Boehringer Ingelheim Animal Health USA Inc. Single or dual technology animal tags and system and method of using the same
US11553695B2 (en) 2016-03-31 2023-01-17 Boehringer Ingelheim Vetmedica Gmbh Single or dual technology animal tags and system and method of using the same
US10397000B2 (en) 2017-08-14 2019-08-27 Raytheon Company Multi-level authentication for secure supply chain asset management
WO2019046685A1 (fr) * 2017-08-31 2019-03-07 Merial, Inc. Procédé et système de suivi d'une pluralité d'animaux à l'aide d'un dispositif informatique portable
US11771059B2 (en) 2017-08-31 2023-10-03 Boehringer Ingelheim Animal Health USA Inc. Method and system for tracking a plurality of animals with a portable computing device
AU2018324118B2 (en) * 2017-08-31 2023-12-21 Boehringer lngelheim Vetmedica GMBH Method and system for tracking a plurality of animals with a portable computing device
US11026402B2 (en) 2017-09-26 2021-06-08 Boeringer Ingelheim Animal Health Usa Inc. Method and system for tracking animals and alerting animal owners of lost animals
WO2019113465A1 (fr) * 2017-12-07 2019-06-13 Mts Systems Corporation Gestion d'informations de machine intégrée avec interface utilisateur interactive d'application
US10796108B2 (en) 2017-12-07 2020-10-06 Mts Systems Corporation Integrated machine information management with application interactive user interface
CN110490282A (zh) * 2019-08-21 2019-11-22 湖南道业信息科技有限公司 溯源方法、溯源装置、溯源系统和存储介质
EP3913559A1 (fr) * 2020-05-20 2021-11-24 Accenture Global Solutions Limited Dispositifs de commande et de surveillance utilisant la communication en champ proche
US12035214B2 (en) 2020-05-20 2024-07-09 Accenture Global Solutions Limited Controlling and monitoring devices using near field communication

Similar Documents

Publication Publication Date Title
WO2016109835A1 (fr) Systèmes et procédés de gestion de chaîne d'approvisionnement
CN108292387B (zh) 用于在开环供应或价值链中跟踪产品的系统和方法
Mainetti et al. An innovative and low-cost gapless traceability system of fresh vegetable products using RF technologies and EPCglobal standard
Musa et al. Supply chain product visibility: Methods, systems and impacts
Mainetti et al. An RFID‐Based Tracing and Tracking System for the Fresh Vegetables Supply Chain
Pundir et al. Improving supply chain visibility using IoT-internet of things
US7707064B2 (en) RFID receiving process for use with enterprise resource planning systems
CN103310381A (zh) 一种实现农产品安全可追溯的方法及系统
KR20060076164A (ko) 무선 주파수 식별 프로세스의 실행을 용이하게 하는 컴퓨터구현 방법 및 시스템
US20150032569A1 (en) Service access using identifiers
US20150012457A1 (en) Method and system for tracking shipped units during movement of goods within supply chain channels
Yüksel et al. RFID Technology in business systems and supply chain management.
US20160034848A1 (en) Method and apparatus for acquiring detailed delivery tracking
Ustundag et al. Digital traceability through production value chain
Owunwanne et al. Radio frequency identification (RFID) technology: Gaining a competitive value through cloud computing
WO2011092727A1 (fr) Système de traçabilité pour la mozzarella de bufflonne, du producteur au consommateur
CN204883814U (zh) 基于物联网的食品溯源系统
KR100881947B1 (ko) Rfid를 이용한 지능형 스마트쇼핑 방법
Mainetti et al. The impact of RF technologies and EPC standard on the fresh vegetables supply chain
Ahamed et al. Tracking and tracing the halal food supply chain management using blockchain, RFID, and QR code
Neustupa et al. Ensuring the security of warehouse using automatic identification by RFID
CN104933820B (zh) 区域内物品的监管系统与后台服务端监管方法
KR101560444B1 (ko) Rfid 기반 통합 물류 이력 시스템
Alexandru et al. Use of RFID technology for identification, traceability monitoring and the checking of product authenticity
Angulo et al. Towards a traceability system based on RFID technology to check the content of pallets within electronic devices supply chain

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15876381

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15876381

Country of ref document: EP

Kind code of ref document: A1