WO2019157122A1 - Système d'exploitation d'étiquette rf avec cœur de connecteur de l'ido - Google Patents

Système d'exploitation d'étiquette rf avec cœur de connecteur de l'ido Download PDF

Info

Publication number
WO2019157122A1
WO2019157122A1 PCT/US2019/016957 US2019016957W WO2019157122A1 WO 2019157122 A1 WO2019157122 A1 WO 2019157122A1 US 2019016957 W US2019016957 W US 2019016957W WO 2019157122 A1 WO2019157122 A1 WO 2019157122A1
Authority
WO
WIPO (PCT)
Prior art keywords
asset
data
tags
tag
user
Prior art date
Application number
PCT/US2019/016957
Other languages
English (en)
Inventor
Leonid Mats
Timothy P. Butler
David Puleston
Original Assignee
Tego, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tego, Inc. filed Critical Tego, Inc.
Publication of WO2019157122A1 publication Critical patent/WO2019157122A1/fr
Priority to US16/934,457 priority Critical patent/US20200364525A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2451Specific applications combined with EAS
    • G08B13/2462Asset location systems combined with EAS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip

Definitions

  • Fig. 5 illustrates an embodiment key pair generation using standard cryptographic algorithms.
  • the asset intelligence platform 5802 may include a range of feature and attributes that enable rapid, effective IoT deployments, such as providing the ability for users 5804 to implement a smart asset solution for any domain rapidly, including by treating tagged physical assets 5806 in the same way that other IT assets, such as files and databases, are handled by an enterprise.
  • An end user 5804 in any domain can thus use an asset deployment without acquiring extensive knowledge about tags 102 (such as RF characteristics, characteristics of readers, or the like). Because of this simplicity, deployments can be for almost any domain, such as a pharmacy, a lawyer’s office, tracking of jewelry, keeping track of laundry, or many others.
  • the life cycle might include an empty or pre-filled state, where the container is waiting in inventory (such as at a bottling facility) to be filled, a sterilized state, such as after the container is sterilized, an initially filled state, where the container is filled, a sealed state, where the container is sealed or capped, and a delivered state, where the asset is delivered to a point of sale.
  • the life cycle may thus define the sequence an asset is expected to experience, through a wide range of possible states. If no life cycle is defined, then the system may, at a step 6010, allow any action to be taken in any order, rather than constrain actions to follow the life cycle.
  • Embodiments of the present disclosure include a tag operating system 5880 that enables the use of read/write strategies including writing to a tag 102 as a database.
  • the platform may, in embodiments, define a database user interface 5841 for writing to a tag 102, such that write commands for data (including ones that extract, transform, and load data to a database), written in conventional database languages or entered in conventional database user interfaces are parsed by a database command translation component and translated into a series of write commands for writing the data on an asset tag, such as using command structures employed by asset tag readers, gateways, and the like.
  • embodiments of the present disclosure include methods and systems for asset intelligence that avoid the need for a centralized database.
  • an asset intelligence solution may be deployed that does not create a central database.
  • the database may be distributed across many (e.g., millions) of distributed endpoints, such that even a successful hack of an asset can only uncover data on one or possibly a handful of assets, rather than uncovering data for a large number of parts, or uncovering critical enterprise data.
  • the asset intelligence platform 5802 may provide chunking of large blocks of tag memory for reads and writes as a feature of distributed data management, where the capability for the asset intelligence platform 5802 to handle the chunking of large blocks of data may provide improved efficiency in the transfer of this data across network resources, storage of the data on reader devices 140 prior to writing to a tag 102, transfer of data from a reader device to a tag or number of tags, and the like. For instance, chunking may optimize data transfer between a reader 140 and a tag 102, automatically chunking data to what the reader and tag and handle. Additionally, chunking may be applied across many tags within the same operation, avoiding the overheads associated with one on one communication.
  • Assets may be surrounded by other assets or supporting elements, such as gateways, sensors of all types, and the like, which may facilitate production of information about the asset or its environment (which may be stored on a tag, chip, or the like that is disposed in, on, or near the asset) and facilitate communication between the asset and remote systems, such as cloud IoT platforms, enterprise systems, or the like.
  • assets or supporting elements such as gateways, sensors of all types, and the like, which may facilitate production of information about the asset or its environment (which may be stored on a tag, chip, or the like that is disposed in, on, or near the asset) and facilitate communication between the asset and remote systems, such as cloud IoT platforms, enterprise systems, or the like.
  • Embodiments of the present disclosure may include a tag operating system 5880 that includes hybrid record and file interface features 5828, such as used in a file management system like ATA, for example. This may include allowing the user to select a preferred file format for interacting with tags, or a set of formats.
  • the ATA standard is a file management system that is optimized for situations like asset tags that historically have small memory and require low power. Much like other standards like DOS, FAT or MTFS, there is a catalog structure and a set of records that are pointed to by a table of contents.
  • JSON JSON
  • a similar tree structure As a common interchange format, along with a well- developed understanding of the structure of objects that use that format (such as identifying the types of trees used, the patterns within the trees, and the like), compression of unstructured objects can be enabled, so that tags and devices may operate to enable various database techniques described herein without exceeding the memory capabilities of the high memory tags described herein and in the disclosure incorporated herein by reference.
  • Compression can also be based on knowledge of classes and objects that are stored.
  • the asset intelligence platform Once the asset intelligence platform has encountered a type of object, its properties can be analyzed to predict the name the order in which the various properties of the object appear, so that the system can infer the name and type of the next property.
  • the system can store the name and type of the object, but it does not need to store the name and type of each property; instead, just the substantive data for the various properties can be stored (in the correct order), without storing the names and types of the property fields.
  • the asset intelligence platform may maintain a map of the properties or fields and their types. Once an object class is encountered a second time, the property and field types of that object can be inferred.
  • the tag operating system 5880 of the asset intelligence platform 5802 may include anti-cloning and counterfeit detection features.
  • the platform may use a Public Key Encryption method, where data is encoded with the private key, and anyone with the public key can verify that the tag is authentic and that the data has not been tampered with.
  • chips or tags may be provided with specific, proprietary memory organization, such that the chips or tags only work with private, proprietary control commands. By exercising such a structure, a platform can have a very reliable way to make sure it is dealing with an authentic tag or chip. That is, the signature of the processing capabilities of a chip or tag may be used as clone-detection feature. This provides additional security relative to conventional anti counterfeiting features of RFID tags, which may be relatively easy to defeat.
  • hub index (Initial value of hub index for each client will be 0 (if number)).
  • Each device will have last synced hub index in its database (Initially it will be -1 (if number)).
  • Hub gathers all updated based on last synced hub index and send device all updated along with latest value of hub index;
  • Hub index could be incremental number staring 0 or timestamp in long format; Hub index could be extra column in each related table.

Abstract

Des modes de réalisation de la présente invention se rapportent à des capacités améliorées pour un système d'exploitation d'étiquette configuré pour gérer des données d'actif échangées entre un lecteur RF et une ou plusieurs étiquettes RF d'actif, et un cœur de connecteur de l'IdO intégré au système d'exploitation d'étiquette, le cœur de connecteur de l'IdO transférant des données d'actif collectées par l'intermédiaire du lecteur RF auprès desdites étiquettes RF d'actif et délivrant les données d'actif à un système de l'IdO d'une plateforme infonuagique par le biais d'un protocole d'échange de données, et les données d'actif ayant été générées au moins en partie sur la base d'une fonction d'intelligence de point d'extrémité stockée sur lesdites étiquettes RF d'actif.
PCT/US2019/016957 2016-09-19 2019-02-07 Système d'exploitation d'étiquette rf avec cœur de connecteur de l'ido WO2019157122A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/934,457 US20200364525A1 (en) 2016-09-19 2020-07-21 Rf tag operating system with iot connector core

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862627531P 2018-02-07 2018-02-07
US62/627,531 2018-02-07

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US15/707,319 Continuation-In-Part US10681133B2 (en) 2016-09-19 2017-09-18 Methods and systems for endpoint device operating system in an asset intelligence platform

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/934,457 Continuation US20200364525A1 (en) 2016-09-19 2020-07-21 Rf tag operating system with iot connector core

Publications (1)

Publication Number Publication Date
WO2019157122A1 true WO2019157122A1 (fr) 2019-08-15

Family

ID=67548435

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2019/016957 WO2019157122A1 (fr) 2016-09-19 2019-02-07 Système d'exploitation d'étiquette rf avec cœur de connecteur de l'ido

Country Status (1)

Country Link
WO (1) WO2019157122A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210146694A1 (en) * 2019-11-20 2021-05-20 Entrust Corporation Remote programming of unique and secure supply tags
CN113222485A (zh) * 2020-01-19 2021-08-06 上海鹏航航空科技有限公司 一种基于区块链技术的智能航材管理方法与系统
US11108863B2 (en) 2016-09-19 2021-08-31 Tego, Inc. Tag operating system
WO2022256231A1 (fr) * 2021-06-01 2022-12-08 Micron Technology, Inc. Authentification de réseau cellulaire à l'aide d'un jeton de sécurité mémoire

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011118972A2 (fr) * 2010-03-24 2011-09-29 Lee Sang-Sun Système fournissant un événement du type sélection par menu et serveur et multi-étiquette rfid destinée à celui-ci
US20160260301A1 (en) * 2015-03-02 2016-09-08 Enovate Medical, Llc Asset management using an asset tag device
CN106779387A (zh) * 2016-12-08 2017-05-31 杭州电子科技大学 一种手术器械及其管理系统

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011118972A2 (fr) * 2010-03-24 2011-09-29 Lee Sang-Sun Système fournissant un événement du type sélection par menu et serveur et multi-étiquette rfid destinée à celui-ci
US20160260301A1 (en) * 2015-03-02 2016-09-08 Enovate Medical, Llc Asset management using an asset tag device
CN106779387A (zh) * 2016-12-08 2017-05-31 杭州电子科技大学 一种手术器械及其管理系统

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11108863B2 (en) 2016-09-19 2021-08-31 Tego, Inc. Tag operating system
US20210146694A1 (en) * 2019-11-20 2021-05-20 Entrust Corporation Remote programming of unique and secure supply tags
CN113222485A (zh) * 2020-01-19 2021-08-06 上海鹏航航空科技有限公司 一种基于区块链技术的智能航材管理方法与系统
WO2022256231A1 (fr) * 2021-06-01 2022-12-08 Micron Technology, Inc. Authentification de réseau cellulaire à l'aide d'un jeton de sécurité mémoire

Similar Documents

Publication Publication Date Title
US11108863B2 (en) Tag operating system
US20200364525A1 (en) Rf tag operating system with iot connector core
US11431561B2 (en) Internet of things
Anjum et al. Blockchain standards for compliance and trust
Madhuri et al. Challenges and issues of data analytics in emerging scenarios for big data, cloud and image mining
CN108846010B (zh) 网络中产品溯源的方法、系统、计算机系统和存储介质
US10147502B2 (en) Data driven schema for patient data exchange system
US10713664B1 (en) Automated evaluation and reporting of microservice regulatory compliance
US11874937B2 (en) Apparatuses, methods, and computer program products for programmatically parsing, classifying, and labeling data objects
US20180276304A1 (en) Advanced computer implementation for crawling and/or detecting related electronically catalogued data using improved metadata processing
WO2019157122A1 (fr) Système d'exploitation d'étiquette rf avec cœur de connecteur de l'ido
CN109964216A (zh) 识别未知数据对象
CN110502922B (zh) 基于区块链的物品流通环节追溯方法、装置及电子设备
Schintler et al. Encyclopedia of big data
US11416874B1 (en) Compliance management system
US20190116036A1 (en) System and method for building a blockchain application
US11188969B2 (en) Data-analysis-based validation of product review data and linking to supply chain record data
US20220207429A1 (en) Apparatuses, methods, and computer program products for programmatically parsing, classifying, and labeling data objects
Elkhodr et al. Data provenance and trust establishment in the Internet of Things
Schapranow et al. Costs of authentic pharmaceuticals: research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chains
Seenivasan ETL (extract, transform, load) best practices
Stackowiak Azure Internet of Things Revealed
Duzha et al. From Data Governance by design to Data Governance as a Service: A transformative human-centric data governance framework
US20230367636A1 (en) System and method for determining memory resource configuration for network nodes to operate in a distributed computing network
US20230367903A1 (en) System and method for detecting and obfuscating confidential information in task logs

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19751437

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19751437

Country of ref document: EP

Kind code of ref document: A1