WO2019157122A1 - Système d'exploitation d'étiquette rf avec cœur de connecteur de l'ido - Google Patents
Système d'exploitation d'étiquette rf avec cœur de connecteur de l'ido Download PDFInfo
- Publication number
- WO2019157122A1 WO2019157122A1 PCT/US2019/016957 US2019016957W WO2019157122A1 WO 2019157122 A1 WO2019157122 A1 WO 2019157122A1 US 2019016957 W US2019016957 W US 2019016957W WO 2019157122 A1 WO2019157122 A1 WO 2019157122A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- asset
- data
- tags
- tag
- user
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2462—Asset location systems combined with EAS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2414—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
- G08B13/2417—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
Definitions
- Fig. 5 illustrates an embodiment key pair generation using standard cryptographic algorithms.
- the asset intelligence platform 5802 may include a range of feature and attributes that enable rapid, effective IoT deployments, such as providing the ability for users 5804 to implement a smart asset solution for any domain rapidly, including by treating tagged physical assets 5806 in the same way that other IT assets, such as files and databases, are handled by an enterprise.
- An end user 5804 in any domain can thus use an asset deployment without acquiring extensive knowledge about tags 102 (such as RF characteristics, characteristics of readers, or the like). Because of this simplicity, deployments can be for almost any domain, such as a pharmacy, a lawyer’s office, tracking of jewelry, keeping track of laundry, or many others.
- the life cycle might include an empty or pre-filled state, where the container is waiting in inventory (such as at a bottling facility) to be filled, a sterilized state, such as after the container is sterilized, an initially filled state, where the container is filled, a sealed state, where the container is sealed or capped, and a delivered state, where the asset is delivered to a point of sale.
- the life cycle may thus define the sequence an asset is expected to experience, through a wide range of possible states. If no life cycle is defined, then the system may, at a step 6010, allow any action to be taken in any order, rather than constrain actions to follow the life cycle.
- Embodiments of the present disclosure include a tag operating system 5880 that enables the use of read/write strategies including writing to a tag 102 as a database.
- the platform may, in embodiments, define a database user interface 5841 for writing to a tag 102, such that write commands for data (including ones that extract, transform, and load data to a database), written in conventional database languages or entered in conventional database user interfaces are parsed by a database command translation component and translated into a series of write commands for writing the data on an asset tag, such as using command structures employed by asset tag readers, gateways, and the like.
- embodiments of the present disclosure include methods and systems for asset intelligence that avoid the need for a centralized database.
- an asset intelligence solution may be deployed that does not create a central database.
- the database may be distributed across many (e.g., millions) of distributed endpoints, such that even a successful hack of an asset can only uncover data on one or possibly a handful of assets, rather than uncovering data for a large number of parts, or uncovering critical enterprise data.
- the asset intelligence platform 5802 may provide chunking of large blocks of tag memory for reads and writes as a feature of distributed data management, where the capability for the asset intelligence platform 5802 to handle the chunking of large blocks of data may provide improved efficiency in the transfer of this data across network resources, storage of the data on reader devices 140 prior to writing to a tag 102, transfer of data from a reader device to a tag or number of tags, and the like. For instance, chunking may optimize data transfer between a reader 140 and a tag 102, automatically chunking data to what the reader and tag and handle. Additionally, chunking may be applied across many tags within the same operation, avoiding the overheads associated with one on one communication.
- Assets may be surrounded by other assets or supporting elements, such as gateways, sensors of all types, and the like, which may facilitate production of information about the asset or its environment (which may be stored on a tag, chip, or the like that is disposed in, on, or near the asset) and facilitate communication between the asset and remote systems, such as cloud IoT platforms, enterprise systems, or the like.
- assets or supporting elements such as gateways, sensors of all types, and the like, which may facilitate production of information about the asset or its environment (which may be stored on a tag, chip, or the like that is disposed in, on, or near the asset) and facilitate communication between the asset and remote systems, such as cloud IoT platforms, enterprise systems, or the like.
- Embodiments of the present disclosure may include a tag operating system 5880 that includes hybrid record and file interface features 5828, such as used in a file management system like ATA, for example. This may include allowing the user to select a preferred file format for interacting with tags, or a set of formats.
- the ATA standard is a file management system that is optimized for situations like asset tags that historically have small memory and require low power. Much like other standards like DOS, FAT or MTFS, there is a catalog structure and a set of records that are pointed to by a table of contents.
- JSON JSON
- a similar tree structure As a common interchange format, along with a well- developed understanding of the structure of objects that use that format (such as identifying the types of trees used, the patterns within the trees, and the like), compression of unstructured objects can be enabled, so that tags and devices may operate to enable various database techniques described herein without exceeding the memory capabilities of the high memory tags described herein and in the disclosure incorporated herein by reference.
- Compression can also be based on knowledge of classes and objects that are stored.
- the asset intelligence platform Once the asset intelligence platform has encountered a type of object, its properties can be analyzed to predict the name the order in which the various properties of the object appear, so that the system can infer the name and type of the next property.
- the system can store the name and type of the object, but it does not need to store the name and type of each property; instead, just the substantive data for the various properties can be stored (in the correct order), without storing the names and types of the property fields.
- the asset intelligence platform may maintain a map of the properties or fields and their types. Once an object class is encountered a second time, the property and field types of that object can be inferred.
- the tag operating system 5880 of the asset intelligence platform 5802 may include anti-cloning and counterfeit detection features.
- the platform may use a Public Key Encryption method, where data is encoded with the private key, and anyone with the public key can verify that the tag is authentic and that the data has not been tampered with.
- chips or tags may be provided with specific, proprietary memory organization, such that the chips or tags only work with private, proprietary control commands. By exercising such a structure, a platform can have a very reliable way to make sure it is dealing with an authentic tag or chip. That is, the signature of the processing capabilities of a chip or tag may be used as clone-detection feature. This provides additional security relative to conventional anti counterfeiting features of RFID tags, which may be relatively easy to defeat.
- hub index (Initial value of hub index for each client will be 0 (if number)).
- Each device will have last synced hub index in its database (Initially it will be -1 (if number)).
- Hub gathers all updated based on last synced hub index and send device all updated along with latest value of hub index;
- Hub index could be incremental number staring 0 or timestamp in long format; Hub index could be extra column in each related table.
Abstract
Des modes de réalisation de la présente invention se rapportent à des capacités améliorées pour un système d'exploitation d'étiquette configuré pour gérer des données d'actif échangées entre un lecteur RF et une ou plusieurs étiquettes RF d'actif, et un cœur de connecteur de l'IdO intégré au système d'exploitation d'étiquette, le cœur de connecteur de l'IdO transférant des données d'actif collectées par l'intermédiaire du lecteur RF auprès desdites étiquettes RF d'actif et délivrant les données d'actif à un système de l'IdO d'une plateforme infonuagique par le biais d'un protocole d'échange de données, et les données d'actif ayant été générées au moins en partie sur la base d'une fonction d'intelligence de point d'extrémité stockée sur lesdites étiquettes RF d'actif.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US16/934,457 US20200364525A1 (en) | 2016-09-19 | 2020-07-21 | Rf tag operating system with iot connector core |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201862627531P | 2018-02-07 | 2018-02-07 | |
US62/627,531 | 2018-02-07 |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/707,319 Continuation-In-Part US10681133B2 (en) | 2016-09-19 | 2017-09-18 | Methods and systems for endpoint device operating system in an asset intelligence platform |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/934,457 Continuation US20200364525A1 (en) | 2016-09-19 | 2020-07-21 | Rf tag operating system with iot connector core |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019157122A1 true WO2019157122A1 (fr) | 2019-08-15 |
Family
ID=67548435
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2019/016957 WO2019157122A1 (fr) | 2016-09-19 | 2019-02-07 | Système d'exploitation d'étiquette rf avec cœur de connecteur de l'ido |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2019157122A1 (fr) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20210146694A1 (en) * | 2019-11-20 | 2021-05-20 | Entrust Corporation | Remote programming of unique and secure supply tags |
CN113222485A (zh) * | 2020-01-19 | 2021-08-06 | 上海鹏航航空科技有限公司 | 一种基于区块链技术的智能航材管理方法与系统 |
US11108863B2 (en) | 2016-09-19 | 2021-08-31 | Tego, Inc. | Tag operating system |
WO2022256231A1 (fr) * | 2021-06-01 | 2022-12-08 | Micron Technology, Inc. | Authentification de réseau cellulaire à l'aide d'un jeton de sécurité mémoire |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011118972A2 (fr) * | 2010-03-24 | 2011-09-29 | Lee Sang-Sun | Système fournissant un événement du type sélection par menu et serveur et multi-étiquette rfid destinée à celui-ci |
US20160260301A1 (en) * | 2015-03-02 | 2016-09-08 | Enovate Medical, Llc | Asset management using an asset tag device |
CN106779387A (zh) * | 2016-12-08 | 2017-05-31 | 杭州电子科技大学 | 一种手术器械及其管理系统 |
-
2019
- 2019-02-07 WO PCT/US2019/016957 patent/WO2019157122A1/fr active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011118972A2 (fr) * | 2010-03-24 | 2011-09-29 | Lee Sang-Sun | Système fournissant un événement du type sélection par menu et serveur et multi-étiquette rfid destinée à celui-ci |
US20160260301A1 (en) * | 2015-03-02 | 2016-09-08 | Enovate Medical, Llc | Asset management using an asset tag device |
CN106779387A (zh) * | 2016-12-08 | 2017-05-31 | 杭州电子科技大学 | 一种手术器械及其管理系统 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11108863B2 (en) | 2016-09-19 | 2021-08-31 | Tego, Inc. | Tag operating system |
US20210146694A1 (en) * | 2019-11-20 | 2021-05-20 | Entrust Corporation | Remote programming of unique and secure supply tags |
CN113222485A (zh) * | 2020-01-19 | 2021-08-06 | 上海鹏航航空科技有限公司 | 一种基于区块链技术的智能航材管理方法与系统 |
WO2022256231A1 (fr) * | 2021-06-01 | 2022-12-08 | Micron Technology, Inc. | Authentification de réseau cellulaire à l'aide d'un jeton de sécurité mémoire |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11108863B2 (en) | Tag operating system | |
US20200364525A1 (en) | Rf tag operating system with iot connector core | |
US11431561B2 (en) | Internet of things | |
Anjum et al. | Blockchain standards for compliance and trust | |
Madhuri et al. | Challenges and issues of data analytics in emerging scenarios for big data, cloud and image mining | |
CN108846010B (zh) | 网络中产品溯源的方法、系统、计算机系统和存储介质 | |
US10147502B2 (en) | Data driven schema for patient data exchange system | |
US10713664B1 (en) | Automated evaluation and reporting of microservice regulatory compliance | |
US11874937B2 (en) | Apparatuses, methods, and computer program products for programmatically parsing, classifying, and labeling data objects | |
US20180276304A1 (en) | Advanced computer implementation for crawling and/or detecting related electronically catalogued data using improved metadata processing | |
WO2019157122A1 (fr) | Système d'exploitation d'étiquette rf avec cœur de connecteur de l'ido | |
CN109964216A (zh) | 识别未知数据对象 | |
CN110502922B (zh) | 基于区块链的物品流通环节追溯方法、装置及电子设备 | |
Schintler et al. | Encyclopedia of big data | |
US11416874B1 (en) | Compliance management system | |
US20190116036A1 (en) | System and method for building a blockchain application | |
US11188969B2 (en) | Data-analysis-based validation of product review data and linking to supply chain record data | |
US20220207429A1 (en) | Apparatuses, methods, and computer program products for programmatically parsing, classifying, and labeling data objects | |
Elkhodr et al. | Data provenance and trust establishment in the Internet of Things | |
Schapranow et al. | Costs of authentic pharmaceuticals: research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chains | |
Seenivasan | ETL (extract, transform, load) best practices | |
Stackowiak | Azure Internet of Things Revealed | |
Duzha et al. | From Data Governance by design to Data Governance as a Service: A transformative human-centric data governance framework | |
US20230367636A1 (en) | System and method for determining memory resource configuration for network nodes to operate in a distributed computing network | |
US20230367903A1 (en) | System and method for detecting and obfuscating confidential information in task logs |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19751437 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19751437 Country of ref document: EP Kind code of ref document: A1 |