Method and apparatus for locating RFID tags

文档序号:1631601 发布日期:2020-01-14 浏览:15次 中文

阅读说明:本技术 用于定位rfid标签的方法和设备 (Method and apparatus for locating RFID tags ) 是由 S·休伊特 A·布莱尔 K·塞夫 M·墨菲 M·威依迈 T·艾德林 于 2018-03-28 设计创作,主要内容包括:射频识别(RFID)系统包括天线阵列,以区分视线(LOS)路径与非视线(NLOS)路径。天线阵列中相邻天线之间的距离小于系统的射频(RF)信号的波长的一半。天线阵列中的每个天线也被数字控制以改变天线之间的相对相位差,从而允许数字操控天线阵列通过0与π之间的到达角(AOA)。数字操控生成根据AOA的信号幅度的图形。基于图形中局部极值(例如,最大值或最小值)的形状(例如,深度、梯度等)区分LOS路径与NLOS路径。(Radio Frequency Identification (RFID) systems include antenna arrays to distinguish line-of-sight (LOS) paths from non-line-of-sight (NLOS) paths. The distance between adjacent antennas in the antenna array is less than half the wavelength of the Radio Frequency (RF) signal of the system. Each antenna in the antenna array is also digitally controlled to vary the relative phase difference between the antennas, allowing the antenna array to be digitally steered through an angle of arrival (AOA) between 0 and pi. Digital manipulation generates a pattern of signal amplitudes according to AOA. The LOS path is distinguished from the NLOS path based on the shape (e.g., depth, gradient, etc.) of local extrema (e.g., maxima or minima) in the graph.)

1. A method of locating a Radio Frequency Identification (RFID) tag, the method comprising:

receiving a plurality of first RFID signals from a first RFID tag at a first unknown location;

designating the first RFID tag as a first virtual reference tag based on the plurality of first RFID signals;

receiving at least one second RFID signal from a second RFID tag at a second unknown location; and

determining a location of the first RFID tag relative to the first virtual reference tag based on the at least one second RFID signal.

2. The method of claim 1, wherein receiving the plurality of first RFID signals comprises receiving at least one first RFID signal from each of a plurality of angles of arrival.

3. The method of claim 2, wherein:

receiving the at least one second RFID signal includes receiving the at least one second RFID signal from a first angle of arrival of the plurality of angles of arrival, an

Determining the location of the first RFID tag includes comparing the signature of the first RFID tag from the first angle of arrival to the signature of the first virtual reference tag at the first angle of arrival.

4. The method of claim 1, wherein designating the first RFID tag as a first virtual reference RFID tag comprises determining that the first RFID tag is stationary.

5. The method of claim 1, wherein determining the location of the first RFID tag comprises:

determining a multipath profile for the RFID tag, the multipath profile representing RF power received by a plurality of antennas along at least one NLOS path and a LOS path from the RFID tag to at least one RFID tag reader;

determining a multipath profile for the first virtual reference tag, the multipath profile representing the RF power received by the plurality of antennas along a LOS path and at least one NLOS path from the first virtual reference tag to the at least one RFID tag reader; and

comparing the multipath signature of the first RFID tag to the multipath signature of the first virtual reference RFID tag.

6. The method of claim 5, further comprising:

receiving a plurality of third RFID signals from a third RFID tag at a third unknown location;

designating the third RFID tag as a second virtual reference tag based on the plurality of third RFID signals; and

determining a multipath profile for the second virtual reference tag, the multipath profile representing the RF power received by the plurality of antennas along a LOS path and at least one NLOS path from the second virtual reference tag to the at least one RFID tag reader; and

determining a position of the first RFID tag relative to the second virtual reference tag according to a multi-path profile of the second virtual reference tag based on the at least one second RFID signal.

7. The method of claim 6, further comprising:

determining a first error between the multipath signature of the first RFID tag and the multipath signature of the first virtual reference RFID tag;

determining a second error between the multipath signature of the first RFID tag and the multipath signature of the second virtual reference RFID tag, the second error being greater than the first error;

based on the second error being greater than the first error, determining that the RFID tag is closer to the first virtual reference tag than the second virtual reference tag.

8. The method of claim 6, further comprising:

detecting a change in the RFID signal from the first virtual reference tag;

detecting a change in the RFID signal from the second virtual reference tag;

performing a comparison of changes in the RFID signal from the first virtual reference tag with changes in the RFID signal from the second virtual reference tag; and

determining, based on the comparison, that the first virtual reference label and the second virtual reference label are stationary.

9. The method of claim 1, further comprising:

determining a location of the first virtual reference tag relative to a reference tag at a known location based on the plurality of first RFID signals; and

determining a location of the second RFID tag relative to the reference tag based on the location of the first virtual reference tag relative to the reference tag and the location of the second RFID tag relative to the first virtual reference tag.

10. A system for locating a Radio Frequency Identification (RFID) tag, the system comprising:

a plurality of RFID tag readers to receive a plurality of first RFID signals from a first RFID tag at a first unknown location and at least one second RFID signal from a second RFID tag at a second unknown location; and

a processor operatively coupled to the plurality of RFID tag readers to designate the first RFID tag as a first virtual reference tag based on the plurality of first RFID signals and to determine a location of the first RFID tag relative to the first virtual reference tag based on the at least one second RFID signal.

11. The system of claim 10, wherein the plurality of RFID tag readers are configured to receive at least one of the plurality of first RFID signals from each of a plurality of angles of arrival.

12. The system of claim 11, wherein:

the plurality of RFID tag readers are configured to receive the at least one second RFID signal from a first angle-of-arrival of the plurality of angles-of-arrival, an

The processor is configured to determine the location of the first RFID tag by comparing the signature of the first RFID tag from the first angle of arrival with the signature of the first virtual reference tag at the first angle of arrival.

13. The system of claim 10, wherein the processor is configured to designate the first RFID tag as a first virtual reference RFID tag in response to determining that the first RFID tag is stationary.

14. The system of claim 10, wherein the processor is configured to:

determining a multipath profile for the RFID tag, the multipath profile representing RF power received by a plurality of antennas along at least one NLOS path and a LOS path from the RFID tag to at least one RFID tag reader;

determining a multipath profile for the first virtual reference tag, the multipath profile representing the RF power received by the plurality of antennas along a LOS path and at least one NLOS path from the first virtual reference tag to the at least one RFID tag reader; and

comparing the multipath signature of the first RFID tag to the multipath signature of the first virtual reference RFID tag.

15. The system of claim 14, wherein:

the plurality of RFID readers are configured to receive a plurality of third RFID signals from a third RFID tag at a third unknown location, an

The processor is configured to:

designating the third RFID tag as a second virtual reference tag based on the plurality of third RFID signals,

determining a multipath profile for the second virtual reference tag, the multipath profile representing the RF power received by the plurality of antennas along a LOS path and at least one NLOS path from the second virtual reference tag to the at least one RFID tag reader; and

determining a position of the first RFID tag relative to the second virtual reference tag according to a multi-path profile of the second virtual reference tag based on the at least one second RFID signal.

16. The system of claim 15, wherein the processor is configured to:

determining a first error between the multipath signature of the first RFID tag and the multipath signature of the first virtual reference RFID tag;

determining a second error between the multipath signature of the first RFID tag and the multipath signature of a second virtual reference RFID tag, the second error being greater than the first error; and

based on the second error being greater than the first error, determining that the RFID tag is closer to the first virtual reference tag than the second virtual reference tag.

17. The system of claim 15, wherein the processor is configured to:

detecting a change in the RFID signal from the first virtual reference tag;

detecting a change in the RFID signal from the second virtual reference tag;

performing a comparison of changes in the RFID signal from the first virtual reference tag with changes in the RFID signal from the second virtual reference tag; and

determining, based on the comparison, that the first virtual reference label and the second virtual reference label are stationary.

18. The system of claim 10, wherein the processor is configured to determine a position of the first virtual reference tag relative to a reference tag at a known position based on the plurality of first RFID signals, and determine a position of the second RFID tag relative to the reference tag based on the position of the first virtual reference tag relative to the reference tag and the position of the second RFID tag relative to the first virtual reference tag.

19. A method of locating a Radio Frequency Identification (RFID) tag, the method comprising:

receiving a first line-of-sight (LOS) signal from the RFID tag with a first antenna;

estimating a first angle of arrival, a first phase difference, and a first frequency difference of the first LOS signal;

determining a change in the first phase difference relative to the first frequency difference;

receiving a second line-of-sight (LOS) signal from the RFID tag with a second antenna;

estimating a second angle of arrival, a second phase difference, and a second frequency difference of the second LOS signal; and

determining a change in the second phase difference relative to the second frequency difference; and

estimating a location of the RFID tag based on the first angle of arrival, the change in the first phase difference relative to the first frequency difference, the second angle of arrival, and the change in the second phase difference relative to the second frequency difference.

20. A method of locating a Radio Frequency Identification (RFID) tag, the method comprising:

receiving at least one RFID signal from at least one reference RFID tag with a plurality of antennas;

determining, with a processor operatively coupled to the plurality of antennas, an estimated location of the at least one reference RFID tag based on the at least one RFID signal;

performing a comparison of the estimated location of the at least one reference RFID tag with an actual location of the at least one reference RFID tag;

calibrating the processor based on a comparison of the estimated location of the at least one reference RFID tag and the actual location of the at least one reference RFID tag;

receiving at least one RFID signal from an RFID tag at an unknown location with a plurality of antennas; and

determining, with the processor, an estimated location of the RFID tag based on the at least one RFID signal.

21. The method of claim 20, wherein receiving the at least one RFID signal from at least one reference RFID tag comprises detecting, by the plurality of antennas, Radio Frequency (RF) power propagating along a line-of-sight (LOS) path and at least one non-line-of-sight (NLOS) path from the at least one reference RFID tag to the plurality of antennas.

22. The method of claim 21, wherein determining the estimated location of the at least one reference RFID tag comprises determining a reference multipath profile, the reference multipath profile being indicative of the RF power.

23. The method of claim 22, wherein determining the estimated location of the RFID tag comprises:

determining a multipath profile for the RFID tag, the multipath profile representing RF power received by the plurality of antennas along a LOS path and at least one NLOS path from the RFID tag to the plurality of antennas; and

comparing the multipath profile of the RFID tag to the reference multipath profile.

24. The method of claim 23, wherein:

the at least one reference RFID tag comprises a plurality of reference RFID tags,

determining the reference multipath profile includes determining a multipath profile for each of the plurality of RFID tags, an

Comparing the multi-path profile of the RFID tag to the reference multi-path profile includes weighting the multi-path profiles of the plurality of RFID tags.

25. The method of claim 21, wherein the at least one reference RFID tag comprises a plurality of reference RFID tags, and wherein determining the estimated location of the at least one reference RFID tag comprises, for each of the plurality of reference RFID tags:

determining a multipath profile for the plurality of antennas at each of a plurality of angles-of-arrival associated with the reference RFID tag, the multipath profile representing Radio Frequency (RF) power received along a line-of-sight (LOS) path and at least one non-line-of-sight (NLOS) path from the reference RFID tag to the plurality of antennas; and

calculating an estimated position of the reference RFID tag based on the multi-path distribution at the plurality of angles of arrival.

26. The method of claim 20, further comprising:

displaying, by a mobile device, the estimated location of the RFID tag to a user.

27. The method of claim 26, wherein the estimated location is located in at least one of a store, a warehouse, or a warehouse, and further comprising:

determining a path from the user to the RFID tag based on the estimated location; and

displaying, by the mobile device, a path from the user to the RFID tag to a user.

28. The method of claim 27, further comprising:

determining a path of the user from the RFID tag to a target location of the RFID tag based on the estimated location; and

displaying, by the mobile device, a path from the RFID tag to a target location of the RFID tag to the user.

29. The method of claim 28, wherein the RFID tag is a first RFID tag, and further comprising:

determining a path of the user from the first RFID tag to an estimated location of a second RFID tag en route to the target location; and

displaying, by the mobile device, a path from the first RFID tag to an estimated location of the second RFID tag en route to the target location to a user.

30. The method of claim 26, further comprising:

displaying, by the mobile device, information to a user about an item associated with the RFID tag.

31. A method of locating a Radio Frequency Identification (RFID) tag, the method comprising:

receiving reference RFID signals from respective reference RFID tags with a plurality of antennas, the reference RFID tags being at respective known locations;

receiving at least one RFID signal from an RFID tag at an unknown location with a plurality of antennas; and

determining, with a processor, a location of the RFID tag based on the at least one RFID signal and the reference RFID signal.

32. The method of claim 31, wherein:

receiving the reference RFID signal comprises receiving a reference RFID signal from each of a plurality of angles of arrival for at least one reference RFID tag; and

determining the location of the RFID tag based on the at least one RFID signal and the reference RFID signal includes determining an angle of arrival of the at least one RFID signal based on an angle of arrival of the reference RFID signal.

33. A method of locating a Radio Frequency Identification (RFID) tag, the method comprising:

receiving a reference RFID signal from at least one reference RFID tag with an antenna array;

determining a reception pattern of the antenna array based on the reference RFID signal;

receiving an RFID signal with the antenna array from an RFID tag at an unknown location; and

determining a location of the RFID tag based on the RFID signal and a reception pattern of the antenna array.

34. The method of claim 33, wherein determining the location of the RFID tag comprises:

deconvolving or otherwise correcting the RFID signal and the reception pattern of the antenna array to produce a true RFID signal, the true RFID signal including a plurality of peaks;

identifying a first peak of the plurality of peaks corresponding to a line-of-sight (LOS) path between the RFID tag and the antenna array; and

estimating a location of the RFID tag based on at least one of a length or an angle of arrival associated with the LOS path.

35. The method of claim 34, wherein identifying the first peak of the plurality of peaks corresponding to the LOS path comprises distinguishing the first peak from peaks corresponding to a non-line-of-sight (NLOS) path between the RFID tag and the antenna array.

36. The method of claim 34, wherein identifying the first peak of the plurality of peaks corresponding to the LOS path comprises distinguishing the first peak from peaks corresponding to a non-line-of-sight (NLOS) path between the RFID tag and the antenna array.

37. A method of monitoring at least one Radio Frequency Identification (RFID) tag, the method comprising:

receiving a plurality of RFID signals from the at least one RFID tag over a period of time with at least one antenna;

estimating a plurality of possible trajectories of the at least one RFID tag over the time period based on the plurality of RFID signals; and

a first track of the plurality of possible tracks corresponding to a line-of-sight (LOS) path between the at least one antenna and the at least one RFID tag is identified.

38. The method of claim 37, wherein receiving the plurality of RFID signals from the at least one RFID tag occurs at a rate of at least about 0.1 Hz.

39. The method of claim 37, further comprising:

identifying a second track of the plurality of possible tracks corresponding to a non line of sight (NLOS) path between the at least one antenna and the at least one RFID tag.

40. The method of claim 39, wherein identifying the second trajectory comprises identifying a discontinuity in the second trajectory.

41. The method of claim 37, wherein the RFID tag is on an item for sale in a store, and further comprising:

determining, based on the first trajectory, that a customer is carrying the item for sale to an exit of the store; and

triggering a sale of the item at a point in time based on the first trajectory.

42. The method of claim 41, further comprising:

triggering a restock of the item for sale in response to a sale of the item.

43. The method of claim 37, further comprising:

acquiring image data of an area containing a track of the RFID tag with a camera;

identifying a person moving through an area containing a trajectory of the RFID tag; and

correlating the motion of the person moving through the area with the trajectory of the RFID tag.

44. The method of claim 37, further comprising:

determining that the at least one RFID tag includes a fixed RFID tag based on the first trajectory;

designating the fixed RFID tag as a virtual reference tag; and

calibrating the at least one RFID tag using the virtual reference tag.

45. The method of claim 37, further comprising:

displaying the first trajectory of the at least one RFID tag in real-time on a graphical user interface of the mobile device.

46. The method of claim 37, further comprising:

alerting, via the mobile device, the user that the at least one RFID tag arrived at the desired location based on the first trajectory of the at least one RFID tag.

47. A method of locating a Radio Frequency Identification (RFID) tag, the method comprising:

receiving signals from the RFID tag with a plurality of antennas;

generating a first digital representation of a response as detected by a first antenna of the plurality of antennas;

generating a second digital representation of the response as detected by a second antenna of the plurality of antennas;

generating a plurality of sums of the first digital representation and the second digital representation, each of the plurality of sums being at a relative phase difference, the relative phase difference representing a different angle of arrival of the signal from the RFID tag; and

based on the plurality of sums, a location of the RFID tag is estimated.

Background

Radio Frequency Identification (RFID) technology has applications in many commercial areas, such as access control, animal tracking, security and charging systems. A typical RFID system includes a tag (also referred to as a transponder) and a reader (also referred to as an interrogator). The reader includes an antenna to transmit Radio Frequency (RF) signals and to receive RF signals reflected or transmitted by the tags. The tag may also include an antenna and an Application Specific Integrated Circuit (ASIC) or microchip. A unique electronic product code may be assigned to a tag to distinguish it from other tags.

RFID systems may use active tags or passive tags. An active tag includes a transmitter that transmits an RF signal to a reader and a power source (e.g., a battery) that powers the transmitter. In contrast, passive tags do not have a power source, but rather draw power generated by the reader through induced currents in the tag's antenna. In a passive RFID system, a reader sends a signal using a reader antenna to energize a tag antenna. Once the tag is powered on (energized), the tag sends the stored data back to the reader.

Signals transmitted or reflected by the tag may reach the reader through more than one path. For example, a signal may travel along a straight line (referred to as a line-of-sight path or LOS path) from a tag to a reader. The signal may also be reflected or scattered from obstacles (e.g., walls and other objects distributed in the environment) before reaching the reader. These paths are referred to as non line of sight (NLOS) paths. In some cases, a given signal may arrive at a receiver via multiple paths, with several copies of the signal arriving at the receiver. The reader perceives each copy of the signal originating from a different direction or angle of arrival. This phenomenon is referred to as "multipath" in the field of RFID technology.

Multipath can lead to unwanted interference and ghosting. If different copies of a signal temporally overlap, they may interfere with each other. Destructive interference causes attenuation. If different copies of a signal do not overlap each other, subsequent copies may appear as "ghosts". These ghosts may fool the receiver into determining that additional RFID tags are present.

Disclosure of Invention

Embodiments of the present technology include methods and systems for locating Radio Frequency Identification (RFID) tags. One example includes receiving a plurality of first RFID signals from a first RFID tag at a first unknown location using a system having one or more antennas or RFID tag readers. A processor coupled to the antenna designates the first RFID tag as a first virtual reference tag based on the plurality of first RFID signals. The antenna receives at least one second RFID signal from a second RFID tag at a second unknown location. And the processor determines a location of the first RFID tag relative to the first virtual reference tag based on the at least one second RFID signal.

Another example of the present technology uses a first antenna to receive a first line-of-sight (LOS) signal from an RFID tag. A processor coupled to the first antenna estimates a first angle of arrival, a first phase difference, and a first frequency difference of the first LOS signal, and determines a change in the first phase difference relative to the first frequency difference. The second antenna receives a second line-of-sight (LOS) signal from the RFID tag. The processor estimates a second angle of arrival, a second phase difference, and a second frequency difference of the second LOS signal, and determines a change in the second phase difference relative to the second frequency difference. The processor then estimates a location of the RFID tag based on the first angle of arrival, the change in the first phase difference relative to the first frequency difference, the second angle of arrival, and the change in the second phase difference relative to the second frequency difference.

Yet another example involves receiving at least one RFID signal from at least one reference RFID tag with multiple antennas. A processor operatively coupled to the antenna determines an estimated location of the reference RFID tag based on the RFID signal. The processor performs a comparison of the estimated location of the reference RFID tag with the actual location of the reference RFID tag. The processor is calibrated based on a comparison of the estimated location of the reference RFID tag and the actual location of the reference RFID tag. The antenna receives at least one RFID signal from an RFID tag at an unknown location. And the processor determines an estimated location of the RFID tag based on the RFID signal.

Another example includes receiving, with a plurality of antennas, reference RFID signals from respective reference RFID tags at respective known locations. The antenna also receives at least one RFID signal from an RFID tag at an unknown location. A processor coupled to the antenna determines a location of the RFID tag based on the RFID signal and the reference RFID signal.

Yet another example includes receiving a reference RFID signal from at least one reference RFID tag using an antenna array. The processor determines a reception pattern of the antenna array based on the reference RFID signal. An antenna array receives RFID signals from RFID tags at unknown locations, and the processor determines the location of the RFID tags based on the RFID signals and the reception pattern of the antenna array.

Another example of the present technology includes monitoring an RFID tag by receiving a plurality of RFID signals from the RFID tag over a period of time with at least one antenna. A processor coupled to the antenna estimates a plurality of possible trajectories of the RFID tag over the time period based on the plurality of RFID signals. The processor then identifies a first track of the plurality of possible tracks corresponding to a line-of-sight (LOS) path between the antenna and the RFID tag.

Another exemplary method of locating RFID tags includes receiving signals from the RFID tags with a plurality of antennas. The processor generates a first digital representation of a response detected by a first antenna of the plurality of antennas and a second digital representation of a response detected by a second antenna of the plurality of antennas. The processor generates a plurality of sums of the first digital representation and the second digital representation. Each of these sums is at a relative phase difference representing a different angle of arrival of the signal from the RFID tag. The processor uses these sums to estimate the location of the RFID tag.

Embodiments of the present invention include devices, systems, and methods for locating Radio Frequency Identification (RFID) tags. In one example, a method of locating an RFID tag includes sensing a signal from the RFID tag to the transmitter with a plurality of antennas. One or more analog-to-digital converters (ADCs) generate a first digital representation of a response detected by a first antenna of the plurality of antennas and a second digital representation of a response detected by a second antenna of the plurality of antennas. A processor coupled to the ADC generates a plurality of sums of the first digital representation and the second digital representation. Each sum of the plurality of sums is at a relative phase difference representing a different angle of arrival of the signal from the RFID tag. The method also includes estimating a location of the RFID tag based on the plurality of sums.

All combinations of the foregoing concepts and additional concepts discussed in greater detail below (provided that these concepts are not mutually inconsistent) are contemplated as being part of the inventive subject matter disclosed herein. In particular, all combinations of claimed subject matter appearing at the end of this disclosure are contemplated as being part of the inventive subject matter disclosed herein. Terms explicitly employed herein may also appear in any disclosure incorporated by reference, which should be accorded the meanings best accorded to the specific concepts disclosed herein.

Drawings

Skilled artisans will appreciate that the figures are primarily for illustrative purposes and are not intended to limit the scope of the inventive subject matter described herein. The figures are not necessarily to scale; in some instances, various aspects of the subject matter disclosed herein may be shown exaggerated or enlarged in the drawings to facilitate an understanding of various features. In the drawings, like reference characters generally refer to like features (e.g., functionally similar and/or structurally similar elements).

FIG. 1A illustrates an exemplary system for locating a Radio Frequency Identification (RFID) tag in an environment having a line-of-sight (LOS) path and a non-line-of-sight (NLOS) path between the RFID tag and a receiver.

Fig. 1B illustrates an exemplary system for estimating an angle of arrival (AOA) of an incident signal.

Fig. 1C is a graph showing an example of the composite signal amplitude versus angle of arrival/phase difference before (solid trace) and after (ray) deconvolution or otherwise correction of the antenna patch pattern.

FIG. 1D shows a graph of RFID tag signal amplitude versus angle and elevation for four different RFID tags, each at a different AOA with respect to the antenna.

Fig. 2 is a block diagram of a transmitter and receiver suitable for use in the system of fig. 1A.

FIG. 3A is a flow chart illustrating a method of locating RFID tags using the same system as shown in FIG. 1A.

FIG. 3B illustrates locating RFID tags from measurements of different AOAs using virtual reference RFID tags, and multiple readers.

3C-3F are video frames showing the measured positions of the RFID tags indicated by circles and bounding boxes drawn around objects marked with RFID tags using neural networks or other computer vision techniques.

FIG. 3G is a flow chart illustrating a method for associating RFID tag measurements with image data.

Fig. 4 illustrates LOS and NLOS signal paths from a mobile RFID tag to a pair of antennas and corresponding real and "ghost" velocity vectors and trajectories derived from the LOS and NLOS signals.

Fig. 5A shows an RFID tag location system in a retail store and a warehouse.

Fig. 5B shows the RFID tag transmitter and receiver above the item of sale in the retail store of fig. 5A.

Fig. 6 shows a Graphical User Interface (GUI) of a smartphone or tablet that displays employee and product locations derived from RFID tag location data.

7A-7D illustrate the manner in which a GUI may be used to select an RFID tagged product or other item for a particular action.

FIG. 8 illustrates the manner in which a GUI may display real-time and/or historical movement of RFID tags in a store, warehouse, or other environment monitored by an RFID tag location system.

9A-9D illustrate the manner in which a GUI may be used to plan and track a pick path in, for example, a warehouse or warehouse to pull items from a pick list based on RFID tag location data.

FIG. 10 illustrates the manner in which the GUI may be used to identify and locate stray items with RFID tags.

FIG. 11 illustrates the manner in which a GUI may be used to satisfy an inventory request for RFID tagged items.

FIG. 12 illustrates the manner in which the GUI may be used to display the location of selected products marked with RFID tags on a sales area and/or in a warehouse.

Detailed Description

To date, RFID location technology has not met with expected expectations. In conjunction with computer vision techniques, the RFID location techniques of the present invention provide unprecedented speed and accuracy. In fact, it can be more than 300 times more accurate than conventional RFID location technology. For example, the systems and methods disclosed below may be used to locate an RFID tag within 50cm, 40cm, 30cm, 25cm, 20cm, 15cm, 10cm, 5cm, or 2.5cm of its actual location. With this speed and accuracy, it can be used to track RFID tagged items in real time, even with the slightest movement. This level of speed and accuracy enables items to be found and restocked almost immediately, and tracking interactions between RFID tags. For RFID tags on products in a store, this generates data on customer interactions with the product item by item, and enables autonomous checkout.

All of the techniques disclosed herein may be used with each other unless physically incompatible. For example, an RFID tag localization system may interrogate reference tags, virtual reference tags, and RFID tags from multiple angles of arrival using multiple RFID tag readers and create (multipath) signatures based on the received signals. Such a system can position tags in two or three dimensions relative to each other and/or absolute (known) positions. The resulting locations may be associated with video data for training a neural network or managing the operation of a store or warehouse. Location information may also be displayed on a smartphone, tablet, or other device for inventory and supply chain management, etc., as described in more detail below.

1 multipath and RFID Signal

To address multipath problems in known Radio Frequency Identification (RFID) technologies and accurately locate RFID tags, the systems, methods, and devices described herein use an antenna array to distinguish RF signals traveling along a line-of-sight (LOS) path from RF signals traveling along a non-line-of-sight (NLOS) path. The distance between adjacent antennas in an antenna array may be less than half the wavelength of the system's Radio Frequency (RF) signals. Each antenna in the antenna array is also digitally controlled to vary its relative phase difference with respect to the other antennas in the antenna array. Each different phase setting of the antenna array corresponds to a different angle of arrival (AOA) measured by the antenna array. As long as the array comprises three or more antennas, the antenna array can be steered digitally through an elevation angle AOA between 0 and pi (i.e. between 0 and 180 degrees) and an azimuth angle AOA between 0 and 2 pi (i.e. between 0 and 360 degrees).

Digital manipulation in turn allows a graphical or other representation of the signal amplitude to be generated from the AOA. The LOS path is distinguished from the NLOS path based on local extrema (e.g., maxima or minima) in the graph. For example, the highest (lower) steepest maximum (minimum) may be at the AOA corresponding to the LOS path. Triangulating the AOA for two or more different LOS paths yields a three-dimensional (3D) location of the RFID tag. In theory, the method can position the article to perfect accuracy under perfect environmental conditions. Under realistic indoor conditions, position accuracy better than 50cm can be achieved using this technique.

The LOS path estimated above can be used to determine the location of the RF tag via triangulation. A first antenna or antenna group is used to estimate a first LOS path to an RF tag and a second antenna or antenna group is used to estimate a second LOS path to the same RF tag. Triangulation in the two LOS paths then provides an estimate of the 3D location of the RF tag.

The above method makes use of digital steering of the antenna array and may be cost effective in practice. In addition, the method can be easily scaled up to multiple antenna arrays. These antenna arrays may be distributed in a given space (e.g., on the ceiling of a store or warehouse) to ensure that at least two antenna arrays have a LOS path to RFID tags in that space. This is particularly advantageous in indoor environments where multiple obstacles may be present. Examples of indoor applications for the RFID method include retail stores, libraries, warehouses, etc. (see more below).

Digital steering may also be used to locate other RF transceivers, including those found in smartphones, wearable devices, tablets, laptops, and other portable electronic devices with WiFi, bluetooth, or similar antennas. As with RFID tag location, described briefly above and in more detail below, the transmitter transmits a trigger signal to a device having a WiFi, bluetooth, or other RF transceiver. In response to this trigger signal, the device issues a response, which is detected by two or more receivers via LOS and/or NLOS paths. A processor coupled to the receivers manipulates the receive mode of the receivers by digitally manipulating the AOAs for different combinations of the receivers (e.g., pairwise combinations of receivers) and looking for the strongest signal from the AOAs.

2 System for distinguishing LOS and NLOS paths

Fig. 1A shows a system 100 for distinguishing a LOS path 11 from an NLOS path 13 to a device or item having an RF transceiver (e.g., RFID tag 10), a smartphone, a wearable computing device, a tablet, or a laptop. The system 100 includes an RFID reader (transmitter) 110 and two receivers 120a and 120b (collectively referred to as receivers 120, also referred to as receiver antennas 120). The reader 110 and the receiver 120 are coupled to a processor 130. For illustrative purposes, two receivers 120 are shown in fig. 1A. In practice, the system 100 may include more than two receivers 120. These receivers 120 may be arranged in a one-dimensional (1D) or two-dimensional (2D) array. In another example, the receivers 120 are randomly or irregularly dispersed in a given space.

The receiver 120 may form (part of) a phase-shifted antenna array. In this case, the distance d between the two receivers 120a, 120b is substantially equal to or less than half the carrier wavelength λ of the Radio Frequency (RF) signal used to interrogate the RFID tag 10, i.e., d ≦ λ/2. System 100 may be configured to operate at any of a variety of carrier wavelengths (and accordingly, a variety of carrier frequencies).

For example, the system 100 may use RF signals (e.g., about 850MHz to about 960MHz) or microwave signals (e.g., 2.45GHz) in the Ultra High Frequency (UHF) region of the electromagnetic spectrum. For UHF signals, the corresponding carrier wavelength is about 31cm to about 35cm, while for microwave signals it is about 12.2 cm. In this case, the distance d between the two receivers 120a, 120b may be substantially equal to or less than 17.5cm at UHF frequencies and less than 6.1cm at microwave frequencies. In other applications, such as outdoor applications, the system may operate at lower frequencies (e.g., 13.56MHz, 125kHz, etc.) corresponding to longer wavelengths (e.g., 22 meters, 2400 meters, etc.). To locate WiFi or bluetooth devices, the system may operate in the unlicensed industrial, scientific, and medical (ISM) band at 2.0GHz to 2.4GHz, or on any other suitable band (e.g., 5 GHz). Higher frequencies (shorter wavelengths) generally provide a more accurate position estimate than lower frequencies (longer wavelengths).

Both receivers 120a, 120b include antennas 122a, 122b, respectively (collectively receiver antennas 122), to receive the RF signals. The receiver antenna 122 may be digitally controlled to vary the phase difference of the signals it receives from the RFID tag 10. This digital control may allow convenient steering of the two antennas 122 toward different angles of arrival (AOAs).

In one example, the reader 110 and the receiver 120 may be disposed in a single housing to form an integrated device. The processor 130 may also be integrated into the device. In another example, the reader 110, the receiver 120, and the processor 130 may be distributed at different locations. For example, the receiver 120 may be located in a location (e.g., on the ceiling of a room) with a clear field of view of the space in which the tag 10 is monitored, while the processor 130 is located in a location (e.g., in a control room) that is better accessible to personnel. The reader 120 may be connected to the processor 130 via one or more wired connections or by a wireless link (e.g., a WiFi link).

In operation, the reader 110 transmits an RF signal toward the RFID tag 10. In one example, the reader 110 transmits RF signals in a given space (such as a room). In another example, the reader 110 emits RF signals with a small divergence and steers or sweeps the RF signals spatially. In either case, if the RFID tag 10 is within a given space, the RFID tag 10 may transmit a response signal as understood in the art of RFID tags.

Depending on the location of the RFID tag 10 and the receiver 120, the response signal may travel along the LOS path 11 directly from the RFID tag 10 to the receiver 120 without reflection or scattering. The response signal may also propagate in other directions. For example, the response signal may be reflected or scattered from the wall 12 (or any other obstruction distributed throughout a given space). In this case, the response signal follows one or more NLOS paths 13 to the receiver 120. As described above, this can lead to multipath problems and compromise the accuracy and reliability of the system 100.

The system 100 shown in fig. 1 can distinguish between signals along the LOS path 11 and signals along the NLOS path 13 based on the respective angles of arrival (AOAs) of the signals. Discrimination may be made by determining the angle-of-arrival corresponding to extreme values (e.g., local maxima and minima) in the antenna reception pattern. For example, the system processor 130 may coherently sum signals received by adjacent antennas 122 at each of several phase angles, each of the phase differences corresponding to a different AOA. The coherent sum that yields the maximum corresponds to the AOA from which the LOS signal and the NLOS signal arrive. Without attenuation, the highest and steepest maxima generally correspond to the LOS path 11, while the other maxima correspond to the AOA of the NLOS path 13.

Fig. 1B shows a receiver 120 for estimating AOA θ based on the phase difference of the signals received by two antennas 122a, 122B. The RF signals 125a, 125b arriving at the two antennas 122a, 122b, respectively, may be considered to be substantially parallel to each other, provided that the distance d is sufficiently small (d < λ/2) compared to the distance between the receiver 120 and the RFID tag 10. In this case, the signals 125a, 125b have the same AOA θ with respect to the antenna plane 15 defined by the two antennas 122a, 122 b. Without being bound to any particular theory or mode of operation, the phase difference Δ φ between the two signals 125a, 125b detected by the two antennas 122a, 122b, respectively, can be written as:

Figure BDA0002256389710000071

where Δ is the difference in length between the two paths taken by the two signals 125a, 125 b. After the phase difference is determined, AOA θ can be calculated according to equation (1).

Equation (1) also represents digitally steering the antenna 122 toward different AOA θ. In this case, the phase difference Δ φ between the two antennas 122a, 122b can be adjusted by, for example, applying a digital delay to one or both antennas 122a, 122 b. This digital delay cancels the propagation delay delta shown in fig. 1B. Once the phase difference Δ Φ changes, AOA θ changes accordingly, which means that the antennas 122a, 122b steer toward different AOA θ to receive the signals 125a, 125 b.

The phase difference Δ φ may vary over a range such that the corresponding AOA θ changes from 0 to π. A corresponding signal amplitude may be recorded at each AOA θ. The signal amplitude may be the coherent sum of the signals detected by the two antennas 122a, 122 b. After the scan of AOA θ is completed, a graph may be generated to show the signal amplitude according to AOA θ and find the LOS path 11 (see, e.g., FIG. 1C and description below).

In system 100, processor 130 may be used to control the scanning of AOA θ by controlling the amount of delay applied to antenna 122. The step size Δ θ of the scan may be about π/1000 to about π/10 (e.g., about π/1000, about π/500, about π/200, about π/100, about π/50, about π/20, or about π/10, including any values and subranges therebetween).

The processor 130 may also utilize estimated, known, or measured symmetries to reduce scanning and/or processing time. For example, the processor 130 may select and digitally calculate the phase difference Δ φ to steer the antenna 122 at a symmetric angle (e.g., + -45 °) rather than an asymmetric angle (e.g., -45 ° and +44 °). Because the angles are symmetric, they produce anti-symmetric results (e.g., results have only a sign difference), and thus can be calculated at about half the time of the asymmetric angle.

Additionally, knowledge of the antenna pattern can also be used to reduce the number of angles that need to be calculated for a given measurement accuracy. For example, the sensitivity of the antenna 122 may change rapidly around certain angles. At or near these angles, the step size Δ θ of the scan may be reduced to sample more AOAs and produce more accurate results. Conversely, at an angle where the sensitivity of the antenna 122 remains relatively constant, the step size Δ θ of the scan may be increased to less samples, thereby shortening the scan time and processing time.

FIG. 1C shows a graph 150 of nominal signal amplitude A versus AOA θ, i.e., A (θ), for RFID signals received by a pair of antennas 122 as shown in FIG. 1A. The upper trace 151 represents a composite signal formed by digitally incrementing the phase difference between the signals received by the antenna. In this case, the composite signal includes a first maximum 155a that is close to-3 π/8 and a second maximum 155b that is close to + π/4. The second maxima 155b are relatively high and narrow (steep), while the first maxima 155a are relatively short and wide. In this case, the high and narrow second maxima 155b correspond to signals arriving at the receiver along a LOS path (e.g., path 11), while the wide and short first maxima 155a correspond to signals arriving at the receiver along an NLOS path (e.g., path 13).

The processor 130 may further be used to correct the antenna reception pattern S (θ) from the signal amplitude a, resulting in a ray 152 shown along the horizontal axis. This correction may simplify the identification of angles of arrival corresponding to LOS and NLOS paths between the antenna and the RFID tag. Without being bound by any particular mode of operation theory, such correction may be by calibrating the antenna design and dividing the calibrated gain pattern or by subtracting the measured signal amplitude A from the calibrated gain patternMeasured(Curve 151) is effectively performed by deconvolving the calibration pattern because the measured signal is essentially the true signal A convolved with the antenna rate pattern S (θ)Reality (reality)Convolution of the amplitudes:

this deconvolution can be used to recover the true signal amplitude from AOA θ.

May be used with a known transmission pattern (e.g., a)Reality (reality)) The reference antenna of (2) measures the antenna reception pattern S (θ). Using the reference antenna as an illumination source, A can be recordedMeasured. The reception pattern S (θ) can then be calculated according to equation (2).

After deconvolution or other correction, the amplitude profile 151 is converted into two peaks 156a, 156 b. The higher peak 156b corresponds to the LOS path between the antenna and the RFID tag, while the smaller peak 156a corresponds to the NLOS path between the antenna and the RFID tag. If desired, the processor may fit a curve (e.g., Lorentzian or Gaussian) to the peak 156 in order to generate a more accurate estimate of the AOA for the LOS path and the NLOS path.

3 estimating the location of RFID tags

Based on the AOA of the LOS path, the processor 130 may use triangulation to estimate the location of the RFID tag 10. Two or more sets of antenna arrays may be used. For example, a first antenna array, for example two antennas 122, is used to identify a first LOS path between the RFID tag 10 and the first antenna array. A second antenna array (not shown) is used to identify a second LOS path between the RFID tag 10 and the second antenna array. The location where the two LOS paths cross each other (or where the error between them is minimized) is a possible location of the RFID tag 10 in the plane of the LOS path and the first and second antenna arrays.

If desired, the processor may estimate the distance between each antenna and the RFID tag based on the amplitude of each LOS signal or the Received Signal Strength Indication (RSSI) or based on the slope of the phase difference with respect to the frequency difference. With two or more range estimates, the processor may trilaterate the location of the RFID tag in addition to or instead of AOA-based triangulation. These distance estimates may be used to more accurately or more uniquely estimate the location of the RFID tag without AOA.

The slope of the phase difference with respect to the frequency difference refers to a technique commonly used in radar and radar-like systems, where the phase of the received signal is directly compared to the phase of the transmitted signal. For an item (in this case a tag) at a given distance from the reader, this phase offset should vary in a predictable manner with its carrier frequency. Thus, capturing this relative phase offset φ at multiple carrier frequencies f allows the distance from the reader to be estimated as:

Figure BDA0002256389710000092

where c is the speed of light.

4 training and operating RFID tag location system

The RFID tag positioning system may go through a training phase before beginning operation. In this training phase, the RFID tag location system estimates the location of a reference RFID tag or other transceiver at a known location. The system calibrates itself by comparing the estimated location of the reference RFID tag with its actual location. After training is complete, the system may locate unknown RFID tags, smart phones, and/or other devices. The system may repeat training periodically (e.g., at night, on weekends, etc.) or as needed (e.g., in response to user commands).

To clarify how an exemplary system (e.g., the system of fig. 1A) determines and estimates LOS and NLOS paths, consider a reader that emits a continuous wave (cw) RF interrogation signal at wavelength λ. In the first (training) phase, the reader interrogates a set of tags whose locations are known. These tags are referred to as reference tags. Each reference tag receives the interrogation signal and emits a signal in a response that is received in turn by each of K1 … K antennas, each of which is located along a line segment of length D, where xkkD/(K-1) is the lateral position of the kth antenna. (other antenna arrangements are also possible). Each antenna in the array detects the output of the tag and emits a complex baseband signal s representing the tag outputk

If there are no multipaths, at angle of arrival θ, the expected spatial response for each antenna of the tag is:

Figure BDA0002256389710000101

(since the system is not a beamforming system, gain need not be considered). The power received in the entire antenna array in the θ direction can be calculated as:

Figure BDA0002256389710000102

b (θ) is also referred to as the multipath profile of the antenna array because it (i.e., B (θ)) takes into account the incident power of the signal along both the LOS path and the NLOS path. The system measures the multipath profile of the antenna array at each of several AOAs for all reference tags and for one or more readers. Once the processor has determined the AOA of the LOS path between the antenna and the reference tag, the processor can calculate the position of the reference tag using triangulation and/or trilateration as described above.

The above described techniques may be extended to 2D (or even 3D) antenna array topologies. For example, for a simple 2D array in a 2 × 2 uniform rectangular array, assuming element isotropy in the xy plane, the steering vector is given by:

Figure BDA0002256389710000103

wherein the position vector pxAnd pyGiven by:

and

Figure BDA0002256389710000112

where d represents the element spacing between rows and columns of the array.

The power received at each 3D angle (θ, φ), and thus the 3D multipath profile, is calculated by:

Figure BDA0002256389710000113

FIG. 1D shows 3D multipath signatures of RFID tags measured at different positions and different angles of arrival relative to a common receiver (antenna). Each graph shows RFID tag signal amplitude versus azimuth and elevation. The peaks represent the LOS path and the NLOS path between the tag and the antenna, and the highest, steepest peak in each graph represents the LOS path. These multi-path signatures can be compared to each other to determine the relative AOAs and locations of the RFID tags, as described in more detail below.

After the system has completed training (it has measured the multipath profile for all desired angles of arrival), it enters a second (operational) phase that is performed in the environment (or repeating environment). During this phase of operation, the system interrogates non-reference tags (i.e., tags with unknown locations) and calculates the multipath profile for each unknown tag/reader combination. The system compares the multipath profile of each unknown tag to the multipath profile of the reference tag to determine the location of the unknown tag.

The system may estimate the location of the unknown tag by obtaining a weighted sum of the locations of three or more reference tags, where the weights depend on the distance between corresponding multipath distributions. For example, the position of a reference tag whose multipath profile more closely matches that of an unknown tag may be weighted more heavily than the position of another reference tag. The exact weighting may be determined using a suitable distance metric, such as euclidean distance, or "metric learning," that utilizes the position of the reference tag and the estimated positions of other unknown tags. Alternatively or additionally, the system may cluster the reference label and the unknown label according to an attribute (e.g., a multipath profile) and define a representative instance of the attribute for weighting.

The system may, for example, periodically repeat the training phase to account for environmental changes, such as changes in the number and location of reference tags, and changes in the number, type, and location of obstacles causing multipath effects. The system may also be tested in a third (post-training) stage, where an unknown tag is moved through a series of known locations within the environment, for example, using a drone or robot. As in the operational phase, the system measures the position of unknown tags and compares the measured position to the coordinates of the robot or drone to determine the best distance metric for weighting the reference tag positions (metric learning).

In some cases, rather than computing a solution (e.g., AOA and LOS path) from one antenna array and then superimposing it with another solution from the other antenna array, the raw data from both arrays may be acquired to produce a single composite solution. This can produce a variety of solutions for arrays that are spaced further apart than λ/2. Aliasing solutions can be excluded by checking the plausibility of the resulting position estimate.

5 transmitter and receiver for LOS and NLOS determination

FIG. 2 illustrates an RFID system 200 that includes a plurality of readers 210 a-210 n (collectively RFID readers 210) and a plurality of receivers 220 a-220 n (collectively receivers 220). RFID system 200 also includes a processor 230, a common Local Oscillator (LO)240, and analog front ends 250 a-250 n (collectively front ends 250). Each reader 210 is grouped with a corresponding receiver 220 and a corresponding front end 250, as shown in fig. 2. Other arrangements of the reader 210, receiver 220, and front end 250 are possible. For example, more than one receiver 220 and/or more than one front end 250 may share a common reader 210.

Each reader 210 includes a corresponding digital-to-analog converter (DAC) 218. The input of the DAC218 is coupled to the processor 230, and the output of the DAC218 is coupled to the low pass filter 216. In operation, the DAC218 generates an analog representation of the digital RFID tag interrogation signal generated by the processor 230. The filter 216 removes high frequency spurs and noise from the analog RFID tag interrogation signal. The output of filter 216 is coupled to an Intermediate Frequency (IF) input of mixer 214. The LO input of mixer 214 is coupled to LO 240. The mixer 214 mixes the analog RFID tag interrogation signal with a high frequency (e.g., 902-. The power amplifier 212 amplifies the RF output and couples it to a circulator 256, which passes the amplified RF output through a bandpass filter 254a to an antenna 252 a. The antenna 225a may be any suitable single antenna element. Circulator 256 substantially prevents the amplified RF output from propagating to or through receiver 220. The antenna 252 transmits the amplified RF output to the RFID tag, which responds with its own analog response signal.

The antenna 252 receives the response signal from the RFID tag and couples it to a band pass filter 254 that filters the response signal and couples it to a circulator 256. The circulator 256 then couples all or substantially all of the response signal to a Low Noise Amplifier (LNA) 222. LNA 222 boosts the amplitude of the response signal and couples it to mixer 224, which mixes the response signal with the LO to generate a down-converted RFID signal. The low pass filter 226 removes high frequency noise and glitches from the down-converted RFID signal, which is digitized by an analog-to-digital converter (ADC)228 and fed to a processor 230.

The antennas 252 shown in fig. 2 form an antenna array with a fixed or known phase difference between adjacent pairs of antennas 252. The components and connections between components in the receiver 220 and the front end 250 may be calibrated, tuned, lengthened, or tailored to provide a known and stable phase relationship between signals received by the nearest neighbor antenna 252. For example, at least one antenna of each pair of adjacent antennas may be coupled to a phase tuner (not shown) to set or adjust the phase relationship between the adjacent antennas 252. A processor (e.g., processor 230 or a different processor not shown in fig. 2) may also be used to digitally measure and calibrate the relative phase relationship between adjacent antennas 252. Maintaining a fixed phase relationship between adjacent antennas 252 allows for digital steering of the receive modes of the antennas by digitally adjusting the phase difference between the signals.

The system architecture shown in FIG. 2 may be used to locate any wireless system, including Bluetooth and WiFi; it will only operate at different frequencies. A system for locating RFID, Bluetooth, and/or WiFi devices may include multiple copies of the components shown in FIG. 2, one for each type of device, and operating in different frequency bands (e.g., 865-.

6 method of estimating RFID tag position

Fig. 3A illustrates a method 300 of estimating the location of an RFID tag, smartphone, or other device having an RF transceiver using the same system as shown in fig. 1A and 2. At step 302, a transmitter sends or transmits an RFID tag interrogation signal to one or more RFID tags within a volume of interest (such as a store, warehouse, or other environment in which RFID tags are used). (step 302 may be omitted when locating a device having an active transmitter, such as a cellular, WiFi or Bluetooth transmitter.) the RFID tag responds to the RFID tag interrogation signal by transmitting an analog RFID signal, referred to as a response signal. At step 304, two or more antennas receive the response signal. At step 306, the one or more ADCs digitize the analog response signal. In addition, electronic components coupled to the antenna may also down-convert and filter the analog response signal to facilitate subsequent processing. The resulting digital RFID signals may be stored and processed in real-time, post-processed, or both.

As described above, a processor coupled to the electronic component uses the digital RFID signal to identify the AOA of the signal relative to the antenna. For example, at step 308, the processor may electronically steer the receive pattern across the antennas of one or more AOAs. In one example, the AOA may be selected in advance. For example, a uniform step size (e.g., about π/1000 to about π/10) can be used to scan an angle between 0 and π. Alternatively or additionally, AOAs may be selected based on previous measurements to reduce processing time. For example, at corners where the sensitivity of the antenna changes rapidly, the processor may use smaller steps to acquire more samples. In addition, the processor may use information about the RFID tag and the environment (including symmetry considerations) to select AOAs that are more likely to produce results, in order to reduce processing time.

The processor may select a possible AOA based on Principal Component Analysis (PCA) of previously received signals. For example, the antenna may monitor the movement of a given RFID tag. Between successive acquisitions of response signals by the antenna, the RFID tag may move only a small amount Δ L, which may be much less than the distance between the RFID tag and the antenna. In this case, the AOAs corresponding to stronger signals in these neighboring measurements may be substantially the same, and thus, the AOAs estimated in previous measurements may be used in subsequent measurements.

Each candidate AOA corresponds to a particular phase offset (also referred to as a phase setting) measured by the antenna. Thus, the processor may determine the signal strength of each AOA by: the phase difference between the digitized RIFD signals from two or more antennas is digitally adjusted with a known phase relationship (e.g., nearest neighbor antenna), and then the digitized RFID signals are coherently summed at step 310. This steers the receive mode of the antenna through each of the respective AOAs. It also generates the amplitude and phase of the signal detected by the antenna based on AOA (phase difference between antennas). This manipulation generates a pattern of signal amplitudes from the AOA (see, e.g., fig. 1C).

At optional step 312, the processor may deconvolute or otherwise correct the antenna pattern from the signal amplitude pattern (see, e.g., peak 152 in fig. 1C). This facilitates determining the LOS path by checking the height of the peak. Typically, the highest peak corresponds to a signal traveling along the LOS path. To estimate more accurately, the processor may fit a curve to the peaks, e.g., using polynomial or nonlinear regression, and estimate the AOA based on coefficients used to reduce or minimize the error associated with the curve fit.

After deconvolving or otherwise correcting the antenna pattern based on signal amplitude and phase, the processor may look for a minimum (valley) rather than a maximum (peak). In this case, the processor may identify LOS and NLOS paths based on valley depth, valley width, valley slope, or some combination thereof. For example, the processor may identify the deepest, steepest valley in the representation of the signal amplitude relative to the AOA corresponding to an AOA having zero along the LOS path to the RFID tag. Other valleys may correspond to zero corners of other NLOS paths to the RFID tag.

At step 314, the processor compares the magnitude and phase at the AOA offset to determine the angle of arrival of the LOS channel most likely to represent an RFID tag. The processor may identify LOS and NLOS paths based on the height of the maximum, the width of the maximum, the slope (rate of change) of the signal amplitude with respect to the AOA, curve fitting coefficients, or a combination thereof. For example, the processor can look for the highest steepest maximum in the representation of the signal amplitude relative to the AOA. This maximum value represents the angle of the peak in the receive mode at the RFID tag that is directed along the LOS path to the antenna. Other maxima may represent the angle at the RFID tag that points to the peak along the NLOS path.

In some cases, the processor correlates the response signal with an expected response from the RFID tag. This may be done, for example, at step 308 in method 300. In this case, the system (e.g., of FIG. 1A) may build or use a library of expected responses from RFID tags. Each expected response corresponds to a different AOA. The processor compares the detected response signal to the expected response to find the closest expected response. The AOA closest to the expected response is considered the AOA of the response signal. This technique is similar to matched filtering and can improve the signal-to-noise ratio (SNR) by up to 20dB or more.

At optional step 316, the processor uses different angles of arrival from different antenna pairs to estimate the location of the RFID tag in the environment. For example, the processor may triangulate the location of the RFID tag in at least two dimensions (e.g., in a plane parallel to the floor) using two or more estimated angles of arrival in the same plane. If the antennas are located in different planes, the processor may estimate the location of the RFID tag in 3D space based on three or more estimated angles of arrival in the different planes.

If more than two antennas are used in step 304 and the antennas are not all co-linear, each RFID receiver may find an angle to the tag in 3D space. By this, at optional step 316, the location of the tag may be determined without constraining the antenna array on a different plane.

In another optional step 318, the processor may track changes in the position of the tag over time. More specifically, the processor may map the change in the smooth change in tag position to a path in 2D or 3D space. To this end, the system measures the position of the tag at many points in time, for example, at a rate of once per second or once every few seconds. It calculates the position of the tag at each point in time and then makes a vector distance determination between successive positions to determine the velocity of the tag. The processor may classify the speed of the tag by speed and direction and determine the likely trajectory of the tag based on the speed and direction, and who (likely) carries or moves the RFID tag. For example, if the tag is moving at a pace toward the exit, the system may determine that the customer is bringing the tagged item to a checkout or store exit. Alternatively, if the tag is moving quickly to or from the store, the system may determine that the employee is stocking or shelving the tagged item.

The system may also use measurements to distinguish LOS signals from NLOS signals at many points in time. If the system detects a LOS signal and one or more NLOS signals, each of which appears as a separate "ghost" tag, it can construct a trace of each signal. The trajectory of the LOS signal should change smoothly and the trajectory of the NLOS signal may change direction dramatically as the tag moves relative to the antenna and obstacles that scatter or reflect the NLOS signal. More specifically, the processor may generate the primary vector of the tag trace using time-varying measurements of the LOS signal and the NLOS signal. The vector solving for a smooth trajectory may be the LOS, and the vector solving for a rough trajectory or an impossible trajectory (e.g., due to some given or predetermined maximum speed of a person) is cast as a multi-path (NLOS) ray.

In a system with multiple pairs of antennas (i.e., three or more antennas), the processor may perform steps 302, 304, 306, 308, 310, 312, and 314 for different combinations of reader and antenna pairs to derive additional LOS and NLOS path information for one or more RFID tags in the environment. With a single reader and three or more antennas, for example, the processor may calculate the angle of arrival of the LOS path to each pair of adjacent antennas. If the midpoints of the line segments connecting different pairs of antennas are at different locations, each pair of antennas may have a LOS path to the RFID tag with different angles of arrival.

The processor may also perform steps 302, 304, 306, 308, 310, 312, and 314 for a combination of a single pair of antennas and multiple readers. For example, the reader may transmit signals that are synchronized in time and phase such that the reader interrogates the RFID tags in a staggered or round robin fashion. The processor uses information about the time and phase of the interrogation signal and the position of each reader relative to the antenna pair to determine the angle of arrival of the LOS path and the NLOS path.

For systems with multiple readers, the processor may resolve the angle of arrival of each principal component of the detected signal based on the location of the reader that triggered the signal. The processor may determine that those readers whose location coincidence/angle of arrival intersect share the same LOS path to the RFID tag. The processor may use this information to determine that the other rays are the result of multipath (i.e., NLOS) rather than LOS paths.

Another approach is to map the trajectory of the tag to the trajectory of the person located within the view of one or more cameras. A camera may be provided to monitor the same volume in which the RFID tag is monitored using the antenna. This method can be used in combination with the above method to provide a single trajectory as opposed to multiple trajectories with some vertical or horizontal offset. More specifically, one or more cameras may be used to detect moving pixel groups (e.g., representing a person or object tagged with an RFID tag). A processor coupled to the camera determines a trajectory of the group and assigns an RFID tag location to the group having a matching trajectory. The processor may also partition the body or perform pose estimation. For example, the processor may evaluate the difference between the trajectory of the bag swinging in the person's hand and the trajectory of the person.

One or more readers, antennas and processors may repeatedly perform steps 302, 304, 306, 308, 310, 312 and 314. In one example, steps 302 through 314 are performed at regular intervals. For example, the steps may have a repetition rate of about 0.1Hz to about 100Hz (e.g., about 0.1Hz, about 0.2Hz, about 0.5Hz, about 1Hz, about 2Hz, about 5Hz, about 10Hz, about 20Hz, about 50Hz, or about 100Hz, including any values and subranges therebetween).

In another example, steps 302 through 314 may be performed at a predetermined time, in response to a command or a triggering event, or both. For example, steps 302 through 314 may be performed periodically (e.g., hourly, daily, overnight inventory count, etc.). These steps may be performed in response to the arrival of a new shipment, inventory or replenishment inventory activity, user command, or detection of possible theft. For example, a store manager may trigger the process 300 when a store opens in the morning and closes in the evening. Or the processor may, for example, automatically trigger the process 300 at a predetermined time or in response to data from other sensors, including cameras monitoring the same space as the RFID tag positioning system.

In yet another example, steps 302 through 314 may be repeated more or less frequently in response to a change in the number or location of measured RFID tags. For example, if the location of the first RFID tag or the corresponding LOS path angle of arrival changes smoothly over time, the processor may determine that the first RFID tag is moving. The processor may associate movement of the first RFID tag with movement of the person based on video or image data of the person or information about the second RFID tag, the smartphone, or other RF transceiver carried by or attached to the person. If the processor correlates the movement of the first RFID tag with the movement of the person, the processor may determine that the person also carries the first RFID tag.

The processor may use the information about the movement of the first RFID tag along with knowledge of the location of the first RFID tag to trigger other actions. For example, if a first RFID tag reaches a particular area or volume or crosses a boundary around an area or volume, the processor may debit the person's account for a purchase of an item associated with the first RFID tag. The processor may also update the product inventory to reflect the movement or purchase of the product, or issue an alert if the movement of the first RFID tag is unauthorized.

7 virtual reference tag

The systems shown in fig. 1 and 2 and the process shown in fig. 3A may be used to identify "virtual reference RFID tags" or "virtual reference tags," which are RFID tags that may be used to generate accurate position estimates for other RFID tags. For scenarios where there are multiple tags between references, using virtual reference tags provides greater positional accuracy: the greater the density of the environment, the more precise the location. The virtual reference tags also enable the relative distance between items to be measured even in the absence of non-virtual reference tags. For example, even if the exact location of tags a and C is unknown, it may be very useful to know that tag B is between tags a and C.

A simple way to view a reference tag is shown in FIG. 3B, which shows a system having several RFID readers 320 a-320 c (collectively RFID readers 320) interrogating RFID tags in a store or other environment. The RFID tag reader measures LOS and NLOS signatures of the RFID tag at different angles of arrival (AOA). The graph for each reader shows the LOS signature for a subset of tags. A processor 328 wirelessly coupled to the RFID reader 320 compares the signatures to each other to generate information about the relative location of the RFID tags. This processor 328 may also be coupled to a remote server or computer network, such as the internet, to share and use information about the location of tags via a smartphone, tablet, or computer, as described in more detail below.

The processor 328 may determine the RFID tag location by fitting the signature to curves representing the reception pattern of the RFID reader, determining the peak (maximum) value of each curve, and interpolating between adjacent peaks to determine the euclidean distance between the peaks. This euclidean distance represents an error or deviation from the corresponding RFID tag and RFID reader AOA. For a pair of AOAs, if neither is known, the error represents a difference in AOAs (i.e., relative AOAs); if one AOA is known, the other can be evaluated. Multiple relative (or absolute) AOAs for a single RFID tag may be used to estimate the relative (or absolute) position of the RFID tag. For example, the location estimation accuracy is improved by collecting more data about the RFID tag with more measurements with more RFID readers on more AOAs, e.g., to more than 50cm, 40cm, 30cm, 25cm, 20cm, 15cm, 10cm, or 5 cm.

FIG. 3B illustrates the manner in which this may be used to position the RFID tag 322 at an unknown location relative to other RFID tags and relative to one or more known locations. There is shown a 1D view of the known locations of the reference tags 324a and 324b (collectively referred to as reference tags 324) on either end of the linear rack. Virtual reference tags 326 a-326 c and unknown RFID tags 322 are located on the rack between reference tags 324.

The graphs below the first RFID tag reader 320a and the second RFID tag reader 320b show the RFID tag signal amplitude versus angle of arrival for different RFID tags. These profiles represent multi-path signatures as described above, with the highest peak representing the LOS path 323 between the tag and the RFID tag reader 320. (the symbols above each peak match the symbols of the corresponding label on the rack.)

The first RFID tag reader 320a has two patterns: the upper graph shows the multipath signature between RFID tag reader 320a and the tag without any obstructions, and the lower graph shows the multipath signature of person 321 between RFID tag reader 320a and the left tag. Note that person 321 attenuates/alters the multipath signatures of some tags but not others and does not affect the multipath signatures received by second RFID tag reader 320b and third RFID tag reader 320 c.

Processor 328 may determine the relative position of the tags by comparing the multipath signatures of the tags to one another. In this example, the tag signature of the RFID tag closest to either reference tag 324 (e.g., RFID tags 326a, 326b) has the lowest error compared to the tag signature of the corresponding reference tag 324. The error metric used to compare multipath signatures may be Mean Square Error (MSE), Dynamic Time Warping (DTW), or any other metric that may be used to compare the similarity of signatures. Using the example of MSE, the lower the metric, the more similar the multipath signature. In comparing the multipath signature of RFID tag 322 to the multipath signatures of reference tags 324a, 324b, processor 328 determines that RFID tag 322 is closer to reference tag 324a than reference tag 324b if the error between the multipath signatures of RFID tag 322 and reference tag 324a is less than the error between the multipath signatures of RFID tag 322 and reference tag 324 b. If the error between the multipath signatures of RFID tag 322 and reference tag 324b is twice the error between the multipath signatures of RFID tag 322 and reference tag 324a, then RFID tag 322 is twice as far from reference tag 324b as reference tag 324 a. Other non-linear weightings may also be suitable.

If repeated RFID signal measurements show that RFID tags 326a, 326b are not moving, they may be added as "virtual reference tags" even if their absolute positions are unknown (at least to the same level of accuracy as the position of reference tag 324). This process may continue for other fixed RFID tags. For example, RFID tag 326c is closest to RFID tag 326a, and therefore, its RFID signature should be most similar to that of RFID tag 326 a. If repeated measurements show that RFID tag 326c is also fixed, it may also be designated as a virtual reference tag. Continuing the process, the system may determine the order of the RFID tags (and thus the items tagged with the RFID tags). The error metric may serve as a proxy for the relative distance and may establish an estimate of the absolute position based on the relative distance and the known position of the reference tag 324.

Because the above-described method relies on the relative error of the tag signature, the method can be further improved by using signatures at multiple readers, calculating the error by the readers, and summing (or otherwise combining) the errors at different readers. This is the case where a virtual reference tag can be used to reduce position measurement errors. Once the system identifies all fixed RFID tags, designates them as virtual reference tags, and locates these tags relative to at least the nearest neighbor tags, the processor 328 may locate the desired RFID tag 322 relative to one or more nearby virtual reference tags 326 based on its multipath signature. By measuring the error between different combinations of multipath signatures for the RFID tag 322 and the virtual reference tag 326, the processor 328 can improve its accuracy of the estimate of the actual location of the RFID tag by, for example, 50cm, 40cm, 30cm, 25cm, 20cm, 15cm, 10cm, or 5cm of its actual location. The accuracy becomes better as the number of virtual reference labels 326 increases and the accuracy of the location of each virtual reference label increases.

The 1D example laid out above can also be extended to 2D by laying out a reference label in a 2D space (e.g., a wall or floor) and comparing the errors of the label, the reference label, and the virtual reference label within the space. This example can be further extended to 3D by laying out reference labels in 3D space and comparing nearest neighbor labels.

This method can be further improved by any method of changing the RF communication channel between the tag and the reader. This may include moving the reader, changing the frequency at which the reader is operating, or even moving someone (or an object) within the space occupied by the reader and/or tag. For example, consider a person 321 walking between a virtual reference tag 326 and a first RFID reader 320a and a second RFID reader 320B, as shown in fig. 3B. The person attenuates or scatters RFID signals propagating from the virtual reference tag 326 (and the unknown RFID tags 322 and reference tags 324) toward the first RFID reader 320a and the second RFID reader 320 b. This creates a new signature set at the first and second RFID readers 320a and 320b that is imperfectly associated with the signature set prior to the channel change and, therefore, may be used to reduce errors in the estimated locations of the virtual reference tag 326 and the unknown RFID tag 322.

The problem of using virtual reference tags tends to surround a large amount of processing power for comparing each tag signature with every other tag signature. By comparing the signature of the RFID tag first with its last signature, the amount of processing power may be reduced. If the signature does not change, no comparison is necessary. Other ways to reduce processing power include using secondary information sources (e.g., video and existing location information for the area around the RFID tag) to limit comparisons with signatures of RFID tags that are known to be close enough to each other to be significant.

To identify or designate an RFID tag as a virtual reference tag, the system measures the location of the RFID tag multiple times over a period of time as the environment around the RFID tag changes (e.g., using the methods described above). These position estimates may be distributed over an area or volume whose size depends on noise and measurement uncertainty. As the number of measurements increases, the average position estimate may converge to a smaller area or volume whose size is limited by the fundamental measurement uncertainty. Once the size of the area or volume reaches a predetermined threshold, the processor sets the appropriate tag location (e.g., the centroid of the area or volume) and uses the tag location as a reference for similar tags. The system may repeat this process until a desired number of RFID tags or group of RFID tags have been added to the virtual reference tag pool. After setting a reference tag (whose location is known), the method of calculating the location of this reference tag proves to be reliable and can be used to estimate the location of other tags.

If the location of the RFID tag changes, the system may remove the RFID tag from the pool of virtual reference tags unless similar RFID tags exhibit similar changes (e.g., due to environmental changes, such as being blocked by a person as shown in FIG. 3B). The system may identify a change in the RFID tag queue by looking at the signature of each RFID tag in the queue relative to the signature of its queue member. The system may also look for changes (or no changes) in the signatures received from other AOAs in the queue. In fig. 3B, for example, the person 321 may change the LOS signatures received by the first and second RFID readers 320a, 320B in a relevant manner, but should not affect the LOS signature received by the third RFID reader 320 c. A combination of related changes to some AOAs and no changes to other AOAs in the queue of RFID tags may indicate that the queue is not moving.

Changes in the location of the RFID may be reduced in one or more of the following situations. For example, if there is not any relative change between different RFID tags, it is possible that all of the tags are blocked or moved together. In another example, the relative change is below a predetermined threshold (e.g., measurement uncertainty). In yet another example, the relative change is sufficiently brief (e.g., within one, two, or three measurement periods).

The information about the virtual reference tag may be combined with other information to increase the accuracy of the RFID tag location. For example, the RFID tag location system may use the (estimated) location of the virtual reference tags, product count data, and visual data from one or more cameras to determine the average density of the product between the virtual and/or real reference tags. In addition, visual data can be used to determine if someone is or was close enough to pick up or drop a product or RFID tag (a pose/reach estimate can also be made). If the visual data indicates that the virtual reference label or the product with the virtual reference label is moving or has moved, the system may remove the virtual reference label from the pool of virtual reference labels. Conversely, if the visual data shows that a particular RFID tag has not moved for a long period of time (e.g., hours or days), the system may designate that RFID tag as a virtual reference tag.

8 computer vision system and computer vision system training

The RFID technology described above may be used to train a computer vision system to locate and/or identify different objects captured by a camera in or coupled to the computer vision system. For example, the computer vision system may include or may be coupled to a plurality of cameras, which may be configured to monitor a wide angle area. In addition, light sources emitting light of different wavelengths and/or intensities may also be used to create different environments in order to enhance the training of computer vision systems. Training images are acquired by the camera under different circumstances.

A combination computer vision/RFID tag location system may cross-reference the scanned barcode/transaction's time stamp data, the items in the barcode/transaction, and the camera data corresponding to the location of the register or checkout station in order to pull frames containing those items. A processor running object detection on those frames may draw a bounding box around the image to generate additional marker images.

During training of a computer vision system, such as a processor executing an artificial neural network, the RFID technology described above is used to locate and identify objects in a training image. These objects are divided into discrete images that are fed into a training set of a computer vision system (e.g., an artificial neural network). Reinforcement learning can be used to filter multiple objects if the computer vision system does not distinguish objects that are too close together. Additionally, such training may train the computer vision system to identify objects, such as lights, doors, and shopping carts, which may be irrelevant during use of the computer vision system, for example, in a retail store. These objects may then be removed from the training dataset and the frames containing the images of these objects may be marked as closed frames. Because the above-described RFID technology can automatically identify objects with RFID tags in an efficient manner, a vast database of product images can be constructed without the need for human verification or verification of the contents of the database.

In some cases, the tag position may be in error with respect to the actual object. In these cases, the tag locations may be plotted frame by frame relative to the location of the person or object (e.g., a continuously moving group of pixels obtained via optical streaming or re-identification) and the distances from each set of continuous groups of pixels to each RFID tag over n frames averaged and then grouped based on which pairings yield the lowest error/average distance. The kalman filter will work properly to filter/group objects and/or objects. The first and second derivatives of the RFID tag and pixel blob motion functions may also be combined for weighting the matches. If the goal is to attribute the product to a person, the detection of the person may be performed in each frame to select only the pixels of the graphic that correspond to the person. If the goal is to capture the annotated image, then the human detection can be used to simply ignore pixels of the human figure that correspond to the bounding box generation/pixel segmentation.

Fig. 3C-3F show a series of video frames showing the movement of a shirt marked with an RFID tag. The small circle represents the estimated location of the RFID tag attached to the shirt. The box surrounds a blob of pixels (blob) to which the system associates RFID tag motion derived from RFID signals received by the RFID tag reader. As shown in fig. 3C-3F, there is a significant error between the system estimating, frame by frame, where the RFID tag is located relative to where the object actually came from, but the system is still able to relate the RFID location estimate to the pixel blob.

FIG. 3G illustrates a process 340 for associating RFID tag position estimates with video data. This process 340 may be used to train a neural network to identify items tagged with RFID tags or to correlate the motion of tagged and untagged objects (e.g., RFID-tagged clothing and people). The process 340 begins by identifying, partitioning, and ignoring pixel blobs representing people in the image with a trained neural network (342). The remaining pixel blobs in the image are then assigned trackers, which view the motion of the pixel blobs on a frame-by-frame basis (344). Each pixel spot is then matched with the RFID tag that most closely follows its trajectory given some threshold (346). After the pixel groups are paired with corresponding RFID tags, object detection may be run for each pixel group in each frame to discard images that apparently do not match the RFID tag description due to environmental obstructions (such as bags, carts, coats, people, and other sources of such obstructions) (348). Attributing the tag data to the pixel blobs also serves to reduce or eliminate the error between the tag location and the article location.

Stated differently, the RFID location provides constant feedback to the artificial neural network so that it always learns what it is right in every frame and what it is wrong. This extends to autonomous checkout and human/product interaction, where process 340 may be used to teach the vision system frame by frame for errors.

9 tracking moving RFID tags

FIG. 4 illustrates that the RFID system and process described above may be used to track RFID tags 402 moving in an environment full of obstacles, such as a store, warehouse, or warehouse. In this example, a pair of RFID tag readers 410a, 410b (collectively referred to as RFID tag readers 410) interrogate RFID tag 402 by transmitting RFID interrogation signals at regular (e.g., about 0.01Hz to about 1.0Hz rate) intervals. The RFID tag reader 410 may vary the interrogation rate based on the signal received from the RFID tag 410. If the response signal of the RFID tag indicates that the RFID tag is moving at a high speed, varying speed, or varying direction, the RFID tag reader 410 may increase its interrogation rate to provide a finer spatiotemporal resolution of the motion of the RFID tag. Conversely, if the response signal of the RFID tag indicates that the RFID tag is stationary or moving slowly, the RFID tag reader 410 may decrease its interrogation rate to conserve energy. The RFID tag reader 410 may increase or decrease its interrogation rate in accordance with the relative motion of the RFID tags 402 together or independently.

The RFID tag reader 410 may broadcast interrogation signals over a wide range of angles, for example, via a co-directional transmitting antenna, or scan them over different angles with an antenna array as described above. A processor (not shown) wirelessly coupled to RFID tag reader 410 uses the RFID signal from RFID tag 402 to calculate velocity vector 481 and trajectory 491 of RFID tag 402. To calculate a given velocity vector 481, the processor may determine the locations of the RFID tags at different times 471, and then determine the vector connecting those locations in 2D or 3D space. Scaling the vector by the time difference yields a velocity vector.

The processor may use the position measurements and/or velocity vectors 481 to determine the trajectory 491 of the RFID tag. This may be a historical track (i.e., the location where the RFID tag 402 was located) or a predicted track (i.e., the location where the RFID tag 402 is located based on its estimated velocity). If desired, the current speed, recent trajectory, and/or predicted trajectory of the RFID tag may be displayed on a smartphone, tablet, or other electronic device and used to trigger a transaction (e.g., sale of an item associated with the RFID tag 402), prevent misplacement or theft, or track the item as it is transferred to a warehouse, as described in more detail below. If velocity vector 481 and trace 491 indicate that RFID tag 402 is not moving, the processor may select RFID tag 402 as a virtual reference RFID tag as described above.

The processor may also use the position measurements, velocity vector 481, and trajectory 491 to distinguish between "real" RFID tags (e.g., RFID tag 410 in FIG. 4) and aliased or "ghost" RFID tags 482. In this case, the ghost RFID tag 482 is caused by a multipath effect. More specifically, fig. 4 shows that RFID signals propagating between a genuine RFID tag 402 and RFID tag readers 410a, 410b may take LOS paths 411a, 411b, resulting in accurate measurement of the location, velocity and trajectory of the RFID tag. These RFID signals may also take NLOS path 413 between the authentic RFID tag 402 and the RFID tag reader 410. In this example, a portion of the RFID energy radiated by the RFID tag 402 is reflected or scattered from the wall 412 to the first receiver 410 a. And this wall 412 prevents the RFID tag 402 from sending RFID signals to the second receiver 410b when it is in certain positions. In short, the wall 412 causes the first RFID tag reader 410a to receive spurious RFID signals and prevents the second RFID tag reader 410b from receiving any RFID signals when the RFID tag 402 is between the wall 412 and the first RFID tag reader 412 a.

In this case, processing a false RFID signal results in the appearance of the ghost RFID tag 482 shown in FIG. 4, including ghost position 473, ghost velocity vector 483, and ghost trajectory 493. The processor may distinguish ghost label 482 from the corresponding true label 402 based on discontinuities in ghost velocity vector 483 and ghost trajectory 493 and/or similarities between ghost velocity vector 483 and true velocity vector 481 and ghost trajectory 493 and true trajectory 491. In particular, the true velocities and trajectories appear mirror-symmetric to the ghost velocities and trajectories about a line or plane defined by the wall 412. The processor may use this mirror symmetry and the abrupt discontinuities at the beginning and end of the ghost trajectory 493 (where the wall 412 begins and ends) to distinguish the real RFID tag 402 from the ghost RFID tag 482.

The camera 420 may also be used to track the RFID tag 402. In fig. 4, a camera 420 takes a picture (e.g., at or about a video rate) of a person 401 carrying an RFID tag 402. The processor may use an artificial neural network to identify the person 401 (e.g., a general person, an employee, or a specific person) appearing in the image and correlate the person's motion with the motion of the RFID tag 402. If the RFID tag 402 is located on a name tag, wristband, or ID card, this may be done as part of the process of training the neural network to identify the person associated with the RFID tag 402. If the neural network has been trained, the processor may use the overlapping or coincident motion of the person and the RFID tag 402 to track or trigger another action, such as selling an item carried by the person or an item to which the RFID tag 402 is attached.

10 RFID tag location system in a store having retail space and warehouse

Fig. 5A and 5B show different views of an RFID tag location system in a store 500. The RFID tag location system includes several RFID tag readers 510 distributed throughout a store sales area 590, a warehouse 592, and a dressing room 580. RFID tag reader 510 may be placed at or near the ceiling, for example, as shown in FIG. 5B, to provide a clearer line of sight to RFID tags 502 on items in sales area 590 and in repository 592. Placing the RFID tag reader 510 over the RFID tags 502 also allows the 3D location of each tag to be measured using azimuth and elevation information derived from the RFID signals received by the RFID tag reader.

The RFID tags 502 may be distributed throughout the store 500, including on items of sale, such as clothing and other merchandise. The RFID tag 502 may be embedded in an item or attached to an item with a label, clip, or sticker. Other types of RFID tags may be present in the store 500, including reference RFID tags 504 at known locations, such as fixed or movable hangers, walls, or tables. Additionally, some of the removable RFID tags 502 may be designated as virtual reference RFID tags 506 if they remain stationary for a sufficient period of time. And some RFID tags may be attached to ID cards 508a, 508b (collectively ID cards 508), key chains, bracelets, or other items worn or carried by employees 503 a-503 c (collectively employees 503) or customers 501. These ID cards 508 may identify a particular employee and their location. Also, at the entrance 596 of the store, an RFID tag 502 may be embedded in or attached to a shopping bag, shopping basket, or cart.

The RFID tag reader 510 wirelessly communicates with the processor/controller 530 via a wireless router 540 or other suitable device. The camera shown collocated with the RFID tag reader 510 is also in communication with the processor 530. The processor 530 may then communicate with a tablet 530 and a smartphone 540 carried by the client 501 and the employee 503. The processor may also communicate with one or more servers, databases, or other remote devices that track store inventory and operations over a suitable communication network, such as the internet.

In operation, the RFID tag reader 510 measures the location, velocity, and trajectory of the RFID tag as described above. It uses this information to monitor inventory and trigger actions related to items tagged with RFID tag 502. For example, if the RFID tag reader 510 detects that the RFID tag 502 is moving toward the store's exit 598 and the camera 520 detects that the customer 501 is moving along the same trajectory, the processor 530 may trigger the customer 501 to automatically purchase the associated item. This enables customer 501 to skip checkout 582, saving time. Processor 530 may also direct customer 501 and employee 503 to a particular item based on the accurate RFID location estimate of RFID tag reader 520. This feature may be used to direct the customer 501 to a desired item, for example, a shirt of a particular size or color; control and restock inventory, such as items left in the changing room; or to determine the manner in which inventory settings affect sales. These and other applications are described in more detail below.

Application of 11RFID technology to high-precision object positioning

The above-described RFID tag location techniques provide fine spatial resolution and high accuracy, making them suitable for a wide range of applications, many of which are not achievable with other RFID tag location techniques. Some of these applications are described below and may be used with systems and environments similar to those shown in fig. 5A and 5B.

11.1 tracking RFID tag movement

In one example, RFID technology may be used in retail stores, particularly in all channel (also spelled omnichannel) stores. "full channel" refers to a multi-channel marketing approach intended to provide a seamless shopping experience for customers, whether or not the customer is shopping online over the phone from a desktop computer or mobile device, or shopping at a brick and mortar store. What distinguishes full channel customer experience from multi-channel customer experience is the true integration between the channels at the back-end. For example, when a store has adopted a full channel approach, a customer service representative in the store can immediately reference the customer's prior purchases and preferences as easily as a telephone customer service representative or a customer service web chat representative. Or the customer may use a computer, tablet or smartphone to view the store inventory on the company's website or application, and then purchase items through the online store or application and pick up the product at the customer's selected location.

One problem with retailers using full channel orders is detecting that items have been picked up through a full channel order. To address this problem, an RFID tag (referred to as a handbag tag) can be placed on a handbag, shopping bag, shopping cart, or any other suitable container. Each item for sale also includes or is attached to a separate RFID tag (referred to as an item tag). An antenna array monitors the position of each tote bag label and each item label. If the distance between an item tag and a tote bag tag is below a threshold (e.g., less than the size of the tote bag), the system determines that the item corresponding to the item tag is in the tote bag. To improve the reliability of the detection, the system may further monitor the movement of the bag label and the item label. If they move together a distance that exceeds a threshold (e.g., more than 1 meter), the system may determine that the item and tote bag are being carried by the customer.

The system may also monitor the mobile customer to determine if the customer has picked up the item. For example, if the item moves with the customer a distance that exceeds a threshold (e.g., exceeds 1 meter), the system may determine that the item is being carried by the customer. For example, a customer may install a user application on his/her smartphone, and the system may detect the presence of the customer's smartphone by communicating with the user application. The system may then track the movement of the smartphone (and hence the customer) using bluetooth, WiFi, LTE, 3G, 4G or any other wireless technology.

In some cases, the system may maintain a record of all smartphones that do not belong to the customer (e.g., the store's own device or the employee's personal device). Once the system detects a smartphone that is not in record, the system may determine that the customer entered the store and may track the customer's movements by tracking the smartphone.

The system may also use facial recognition, gait recognition, or other recognition techniques to track the movement of the customer. For example, a camera may be placed at the entrance of a store to identify a customer, and one or more cameras may be distributed within the store to monitor the entire store space. Each time a customer is captured and identified by the camera, the identified location may be recorded and edited along with the previous location to formulate the customer's movements. The resolution of this monitoring (e.g., the distance between two identifications of the same customer) may depend on the number of cameras in the store (e.g., a greater number of stores may increase the resolution). The system may then determine that the item was picked up by the customer if moved together by a distance greater than a threshold. Alternatively or additionally, the system may determine that the item was picked up by the customer if they appear together at more than 3 locations. The system may also determine that the item was picked up by the customer if the two locations where they appeared together were more than 1 meter apart.

The system may also update the inventory when it is determined that the item previously picked up by the customer was placed back and available for sale. If the item has not moved for a longer period of time (e.g., longer than 5 minutes), the system may determine that the item is being placed back. To improve reliability, the system may also check if there are any customers in the vicinity of the item while the item is not moving. When no customer is near the item, the system may determine that the item was placed back (e.g., because the customer who previously picked the item changed his mind and abandoned the item).

In another example, RFID technology may be used to determine whether an item is in the correct location in a store. In this case, one or more labels (referred to as shelf labels) may be placed on each shelf holding items for sale. Each shelf label identifies a particular location on the shelf for the corresponding item. Each item also has an item label. For example, a shelf label may indicate the location of a man's trousers and an item label may be attached to a strip of man's trousers. The system interrogates the locations of the shelf tags and item tags to estimate the distance between them. If the distance is below the threshold, the system may determine that the item is in the correct location. On the other hand, if the distance is greater than the threshold, the system may alert one or more store employee items that are in the wrong place and should be moved to the correct place. The system may also provide instructions to the employee as to the actual location of the item and its appropriate location.

The system may also use tags attached to any other retail fixtures (these tags are referred to as fixture tags) to determine if the item is in the correct place. In general, each fixture tag may provide information regarding the identification of the fixture (e.g., shelf, table, counter, display case, basket, grid, etc.), the location of the fixture, and the type and quantity of items in the fixture. In some cases, the type and quantity of items in the fixture may be determined based on industry standards. Alternatively, the type and number of items in the fixture may be customized for each store.

In addition, each employee may wear a tag (referred to as an employee tag). In one example, an employee may wear a bracelet containing an RFID tag. In another example, the RFID tag may be sewn into the employee's uniform. In yet another example, the RFID tag may be included in a badge worn by the employee. The system may use these tags to estimate and track the location of employees, for example, for managing inventory, as described below.

In some cases, the movement of the employee may be monitored by software without using an RFID tag attached to the employee. For example, the system may monitor the movement of an employee by tracking the employee's smartphone. In these cases, the employee may install a user application to facilitate communication between the smartphone and the system. The system may identify the employee from his/her account on the user application, for example.

In another example, the system can track employees' wearable devices, such as smart watches, activity trackers (e.g., Fitbit), or smart glasses (e.g., glasses with embedded electronics), among other devices. In this example, the system may maintain a record of the wearable devices belonging to each employee in order to identify the employee when a wearable device is detected. Systems with cameras may also track employees by the cameras recognizing as RFID tags on items held or carried by the employee.

For example, if the system determines that an item is misplaced, or should be taken from the back inventory to the correct shelf, the system may use employee tags to estimate the location of all employees. The employee closest to or moving toward the misplaced item may then be identified. The system may alert the employee to place the item in the correct place. The system may also estimate and/or measure the time required for the employee to complete the task (e.g., the time period from alarm to completion). This information can be used to evaluate employee performance and identify changes in store layout that can improve efficiency.

The system may use several criteria to determine the appropriate personnel to receive the alert. For example, the system may communicate alerts to employees based on the availability of the employee to receive and respond to the alerts. In this example, the employee may communicate their availability (or unavailability) to the system through their employee device, such as a smartphone with the user application installed. The employee may indicate that he is in other tasks that may not be interrupted.

In another example, the system may send an alert to the employee based on the proximity of the employee to the problem item. For misplaced items, proximity may be quantified by the distance between the employee and the misplaced item. For items to be placed, proximity may be quantified by the distance between the employee and the warehouse. In some cases, the proximity estimation takes into account the building or structure of the store. For example, the system may prefer to send an alert to employees on the same floor as the problem item, rather than sending an alert to employees on a different floor.

In yet another example, the system may send alerts to employees based on their ability to complete tasks. For example, if an item in the women's clothing department is misplaced, or an item is found to be lost in the women's fitting room, the system may preferably send an alert to employees in the women's clothing department rather than employees in the grocery department.

The ability to complete a task may also be determined based on the current task being handled by the employee. For example, if an employee is already handling some misplaced items, it may be more efficient for him to handle similar tasks. The system may also consult a quality assurance system to determine the competency of the employee. For example, the system may include an employee performance assessment database for each task previously processed by the employee. If the system determines that it is efficient for an employee to restock the misplaced items, the system may preferably send an alert to the employee.

In yet another example, the system may use a combination or weighted combination of the above criteria to determine the most appropriate employee to handle the problem. For example, the system may first look for available employees. Then, among these available employees, the system finds people within a certain distance of the problem item. Of these employees, the system may then determine the most appropriate employee based on the employee's ability to complete the task.

In some cases, the system may send an alert only to the most appropriate employee (determined by any suitable method). Alternatively, the system may send alerts to a set of appropriate employees, and each recipient may respond using his/her device (e.g., a smartphone). Once the recipient responds by indicating that he or she will process the task, the system may update the status of the question, for example, "in progress".

The system may also send an alert to the supervisor of the appropriate employee determined by the system. Alternatively or additionally, the system may also replicate alerts to quality assurance department personnel to alert them to the progress of monitoring the problem.

RFID technology can also be used to monitor the availability of store inventory in a real-time manner. In this case, the system may track the movement of items picked up by the customer. As described above, the system may determine that the customer has picked up an item as it moves with the tote bag. More specifically, the system may determine that an item is in a handbag using the motion/trajectory of the item RFID tag and the motion/trajectory of the handbag as determined from video data and/or data regarding the RFID tag on the handbag or in the handbag. Once the system determines that an item is picked, the system deducts the item from the available inventory. Alternatively, the system may deduct the item from inventory until the item passes a register at which it is checked out. In some cases, the system may also deduct items if the customer is wearing an item, such as a garment or a pair of shoes.

RFID technology may also facilitate verification of e-commerce orders, particularly after the shipping container is sealed. The RF signal can typically penetrate the shipping container and thus the RFID technology described above can be used to identify RFID tagged items in the shipping container. The identified items are then compared to the order corresponding to the shipment to determine if any items are missing or should not be in the shipping box. If the missing item is confirmed, the system may check an inventory or other database to see if the replacement item is in a Distribution Center (DC) or nearby store. The system may also prevent the shipping container from leaving the store and/or DC until the item is placed in the shipping container or in a separate shipment.

In some cases, RFID technology may be used in dressing rooms to track items that customers try on. The system may determine whether the items left in the dressing room have been in the dressing room for more than a threshold time (e.g., longer than 15 minutes). Alternatively, the system may track the location of items as well as the state of the dressing room. For example, where the system determines that an item is in a changing room and the changing room is not in use, the system may determine that the item remains in the changing room. In these cases, the system may alert employees to pick up the item and place it back on the shelf for sale.

The system may determine the status of the fitting room by tracking the movement of the customer or the presence of a wearable device in the fitting room. For example, the system may generate a map of fitting rooms and display the detected movements and wearable devices in each fitting room. If no devices are found in the fitting room, the system may indicate that the fitting room may not be in use. In this case, the employee may enter the fitting room to pick up the abandoned item.

The system may also determine the status of the fitting room using an RFID tag attached to a door of the fitting room (e.g., on a movable edge of the door). In this case, the fitting room door may be designed to move away from the frame when unlocked. Thus, the RFID tag is in a first position when the door is closed or locked (i.e., when the fitting room is occupied) and in a second position when the door is open or unlocked (i.e., when the dressing room is unoccupied). The system may then determine the status of the fitting room based on the location of the RFID tag on the door. Similarly, another option is to install several reference tags in or on the fitting room curtain and detect that the reference tags move closer together or farther apart as a result of someone opening and closing the curtain.

Alternatively, each fitting room may use two RFID tags: one placed on the moving edge of the door and the other on the frame of the door. Alternatively, the RFID tag may be placed on a different part of the lock on the fitting room door or integrated into it. The system may then determine the distance between the two tags. If they are within a threshold (e.g., about 10cm), the system may determine that the door is closed or locked; otherwise, the system may determine that the door is open or unlocked and that the fitting room is unoccupied.

In addition, the system may use a combination of position and amplitude displacement of the RFID signal to determine whether the RFID-tagged garment is on a person. For example, if a garment hangs in the air in the middle of a fitting room, it is likely to be on the body. If the RFID tag location system detects a significant drop in RSSI, accompanied by an indication (e.g., from camera data) that the RFID tag is close to the person, the user may determine that the object/clothing tagged with the RFID tag is likely to be on the person.

11.2 putting on shelf RFID tagged articles

Accurate tracking of items also allows the system to place items on shelves using autonomous vehicles (e.g., robotic devices, drones, etc.) without human intervention. For example, an RFID tag may be attached to each item, providing information about the item's desired location in the store. The autonomous vehicle may contain a tag reader to read the RFID tag and deliver the item to a desired location. The desired location (e.g., a designated shelf) may also be marked by an RFID tag (referred to as a fixture tag). In some cases, the autonomous vehicle uses its internal tag reader to locate the fixture tag and estimate the distance and direction from its current location to the fixture tag and uses the estimate to navigate towards the fixture.

In some cases, the system may monitor the location of a remotely controlled vehicle using an RFID tag on or embedded in the vehicle. The system or user may direct the vehicle toward the fixture if desired. In these cases, the vehicle may not include any tag readers.

Alternatively, the RFID tag may include identification information (e.g., a serial number) of the item, but not the expected or expected location of the item. Instead, the identification information is associated with the desired location information in the database. An RFID tag reader (e.g., on an autonomous vehicle) may read the identification information and communicate with a database to retrieve the location information.

Automatic racking may be performed with an autonomous vehicle after closing the store every night and/or before opening the store every morning. In some cases, the racking procedure is automated such that the racking procedure may be performed without human monitoring. Therefore, racking can be performed after hours to save overtime costs.

In some cases, racking may be performed as needed. For example, when the system determines that an item is in demand, the system may send a person or robot to a warehouse, pick up an item and deliver the item to a desired location. In some cases, the person or robot may also be guided to pick up the misplaced item and place it in the correct position. The system may guide the robot to the location of the misplaced item and the desired location of the item. In some cases, the RFID tag data and/or camera data may also reveal the orientation of the object and other information, such as weight, geometry, and weight distribution, to help solve complex problems such as grasping.

11.3 monitoring inventory of RFID tagged items

The system may monitor inventory of items based on accurately tracking the location of the items with RFID tags. As described above, the system may determine that an item has been picked up or is being carried by a customer, in which case the system may remove the item from the list of available items. The system may also place the item in a temporary item list that the customer considers for purchase. Once the item is checked out by the customer (e.g., in the event that the customer leaves the store with the item), the system may remove the item from the temporary list. However, if the customer changes ideas and puts the item back (or simply discards the item) before checkout, the system may put this item back on the available list.

In some cases, once the system determines that an item is under consideration by a customer, the system may interrogate RFID tags attached to the item at a frequency greater than 1Hz to track the movement of the item. After the items are returned to the shelves, the interrogation frequency may be reduced to reduce the computational burden on the system.

Employees may participate in inventory monitoring by processing defective items. Defective articles may be identified by an employee or customer. In either case, the employee may scan the RFID tag on the item using the employee device and enter the status of the item (e.g., "defective" or "damaged") into the system. The employee device may include a tag reader and an interactive interface (e.g., a touch screen) for the employee to update the inventory. In response to receiving the status, the system may remove the item from the available list and place the item in another list (e.g., a repair list or a return list). The system may also send one or more alerts to personnel associated to process defective items.

11.4 employee and product location Using RFID tag location System

The RFID tag location system may include a plurality of cameras, RFID tags, and a wireless communication system, such as bluetooth or Wi-Fi, to track the precise location of employees and products within the store. The location of the employee and product may be derived from the RFID tag location data collected by the RFID tag location system and then displayed using a GUI on a smartphone or tablet. FIG. 6 illustrates an exemplary GUI showing the location of employees and several products on a floor plan of a store. Because the RFID tag location system can identify the exact location of the employee and the product, the relative location between the employee and the product can also be displayed, as shown in fig. 6. In addition to displaying the location of the product on the floor plan, as shown in FIG. 6, the location of the product may also be displayed in a virtual tour of the store, in a 3D view of the store, or in an online shopping feature.

11.5 selecting products using GUI

As described, the GUI may display one or more products on a floor plan of the store. The GUI may also allow a user, employee, or customer to interact with the displayed product in order to perform a particular action. User interaction with the GUI may be accomplished by a number of methods, including a pointing device (e.g., a mouse), a touch-based system (e.g., a user's finger or a stylus), and so forth. For example, in a touch-based system, a user may select one or more products by drawing a shape with their finger around the products displayed in the GUI. This process is illustrated in fig. 7A to 7D. FIG. 7A shows a plurality of products displayed in the GUI. The user may use their finger to begin drawing a circular shape around multiple products, as shown in fig. 7B, until the circular shape is completed, as shown in fig. 7C. Thus, the products contained within the circular shape are selected. Prior to the user-specified action, information about the selected product, such as the number of selected products, may be displayed, as shown in fig. 7D.

Once the user selects a product, the user may then specify a number of actions to be performed on the selected product. These actions may include the following: (1) listing product details, e.g., type, color, price, size, etc., (2) listing quantity sold or value, (3) instructing the RFID reader to read only the selected product, e.g., during receipt of a new shipment, inventory taking, etc., (4) changing floor display of a particular product, (5) selecting to receive a price reminder for the selected product, (6) displaying information about similar products, (7) receiving a recommendation about similar products or updated models of the selected product, or (8) causing the selected product to be delivered or picked for purchase. Some actions may only be available to employees or customers according to their functionality.

11.6 automatic Notification of updates to inventory and new product shipments

RFID tag location systems may also be used to facilitate updating inventory when new product shipments arrive at stores. For example, a shipment may be delivered to a store from a manufacturer, a warehouse, a distribution center, or another store. To verify the number of products shipped, an RFID reader and user application may be used. The RFID reader may be optimally located in a store shipment handling area, such as a warehouse, sales area, or other location where a retailer may use to handle inbound shipments.

The products contained in the shipment may or may not contain RFID tags. For products with RFID tags, the employee may use the RFID reader and the user application to verify that the number of products received corresponds to the corresponding invoice for the product order. For products without RFID tags, employees may add RFID tags to the products and encode the appropriate product information to the tags using an RFID reader and a user application. These products can then be added before confirming the number of products received in the shipment.

Once the number of products received is verified, the RFID inventory of the products and the main enterprise inventory of the products (which may include products with and without RFID tags in multiple stores) will be updated to show the exact inventory levels of the products at the stores where the shipments were received and at the enterprise level of the multiple stores. If there is a discrepancy between the number of products received and the number of products in the invoice, the RFID tag location system may facilitate resolving the discrepancy by checking whether a product arrives in a shipment, whether an arriving product does not have an RFID tag, and whether an arriving product has an incorrect RFID tag.

Electronic notifications may also be automatically sent to customers informing them of the delivery of newly shipped products to the store. Notifications may be sent using a variety of methods, including email, text messaging, messaging applications, such as WhatsApp, Facebook messenger, geo-fencing applications, or other electronic messaging services integrated with an RFID tag location system. Notifications may be customized for priority products based on customer preferences, such as new products, best-selling products, or products for which the customer selects the notification. Notifications may also be sent to customers who previously visited a particular store, or who have subscribed to receive notifications from a particular retailer or retail location. The redirected advertisements or electronic messages may also be sent to customers who have previously visited the store but failed to purchase a particular product due to lack of availability (e.g., a preferred product does not have the desired size).

The RFID tag location system may also facilitate finding products that have lost RFID tags or products with incorrect RFID tags after delivery or during inventory checks. For example, an employee, while inspecting a pile of the same clothing, may find that the inventory level of the clothing is zero, indicating that the RFID inventory is in error due to a missing or erroneous RFID tag. In another example, an employee may be carrying a particular product and visually notice that the product lacks an RFID tag. If a product is found to have a missing RFID tag or an erroneous RFID tag after receiving and verifying a shipment, an employee may add an RFID tag to the product or replace the RFID tag of the product and use an RFID reader and user application to encode the correct product information for the tag. After encoding the new RFID tag, the RFID inventory of the product will be updated and an automatic electronic notification may be sent to the customer, as previously described.

11.7 automatic Notification of product movement and Retention

The RFID tag location system may also monitor product movement, e.g., to prioritize whether a product has not been moved to an appropriate location, such as a sales area, or to monitor product retention, e.g., a product is not set to customer retention. Based on the RFID tag location data, an electronic notification may be sent to authorized personnel, area management personnel, or business management personnel if product movement or product retention does not occur within a certain time threshold set by the retailer, e.g., 30 minutes. Notifications may be sent using a variety of methods, including email, text messaging, messaging applications, such as WhatsApp, Facebook messenger, geo-fencing applications, or other electronic messaging services integrated with an RFID tag location system.

11.8 RFID tag based product status

The RFID tag location system may also encode additional information in the RFID tag of the product. For example, RFID status tags may be used, which may include various product status and tracking information. The RFID status tags are distinguished from RFID tags in that the RFID status tags can assign the same product information to a group of RFID tags corresponding to the RFID status tags.

A variety of product states may be encoded into the RFID tag and may be based on various categories including transfer Out, e-commerce orders, and damage. In the roll-out category, the product status may include: (1) the product may be a product that is to be sent from a first store to a second store, warehouse, or distribution center, (2) the time and date of product status creation, (3) a roll-out type, e.g., a transfer to a different store, a transfer to a warehouse, a transfer to a distribution center, a transfer of damaged or recalled products, a transfer of products that require such services if cleaning or customization of the products occurs outside of the store, (3) a source of the product, e.g., a store number, (4) a destination of the product, e.g., a store number, a distribution center, a manufacturing facility number, or (5) a roll-out quantity, e.g., a tracking number created by an RFID tag location system or an existing legacy system.

In the e-commerce order category, the product status may include: (1) the goods to be sent from the store to the customer's order-designated third-party shipping address, (2) the time and date of creation of the product status, (3) the source of the goods, e.g., the store number, (4) the customer account number, e.g., an account created by an e-commerce system, (5) the e-commerce order number, e.g., an order number created by an RFID tag location system or an existing traditional e-commerce system, or (6) the e-commerce status, e.g., in-progress-the product is picked up and currently in the processing area waiting to be packaged, or packaged-has been picked up and packaged for outbound shipment.

In the damage category, the product status may include: (1) items that are currently unavailable for sale due to contamination, damage or defects, (2) the time and date of product status creation, or (3) damage transfer numbers, e.g., reference numbers created by an RFID tag location system or existing legacy systems.

The use of RFID status tags may facilitate the distribution of product status in a particular area of a store based on the location accuracy of the RFID tag location system or according to product type. For example, an RFID status tag on a particular product may automatically assign the same status to other products in its immediate vicinity, e.g., products located within 4 inches of the RFID tagged product. In another example, an RFID status tag on a particular product may assign the same status to a group of products throughout the store. The status changes for a set of products may be displayed in the GUI using different colors or symbols for those products. The visual indicator may help the employee verify the status of the product.

The RFID tag location system may also automatically alter the status of the product based on the RFID inventory of the product. For example, an RFID tagged product having a roll-out status (e.g., to another store, to a warehouse, or to a distribution center) may be considered available inventory that may fulfill an e-commerce order through the store that sent the product, as long as the store does not confirm the roll-out process. Validation may include the product being in a sealed box, the transfer of documents being completed, etc.

11.9 tracking arrival and departure routes of products

An RFID tag location system, which may include an RFID reader, a (depth) camera, and techniques to accurately determine the location of RFID tags, may be used to record the path of one or more RFID tagged products (e.g., products grouped in boxes, bags, or carts with RFID tags or RFID status tags) through a store as the products enter or exit the store. Using the user application, the path may then be displayed to the user in the GUI as an animation overlaid on the floor plan of the store, as shown in FIG. 8.

The RFID tag location system may also play back a recorded video feed of the arrival or departure of the RFID tagged product using the date, time, and location technology of the system and location data recorded by the camera as shown in fig. 8. Additionally, the RFID tag location system may also identify the individual accompanying the RFID tagged product based on facial or gait identification, the individual's bluetooth or Wi-Fi enabled device, or the user ID.

To ensure that the store is completely covered by the RFID tag positioning system, the components of the RFID tag positioning system may be mounted on the ceiling or walls, in increments of every 500 to 1000 square feet, depending on the layout and environment of the store. This enables the RFID tag location system to track all RFID tagged products and bluetooth or Wi-Fi ___33 enabled devices within the store. In addition, the system may also identify boundaries of the store, e.g., floors, rooms, entrances, exits, etc. The boundaries of the store may be marked for detection with RFID reference tags or other manual marking methods. In particular, by identifying entrances and exits, the RFID tag location system automatically registers when a product has entered or exited the store.

11.10 Intelligent, adaptive floor display of product quantity

The RFID tag positioning system may enable a user, such as an employee, to set a desired number of products, such as 12 units of products on a floor display, to be located in a particular area of a store. Further, the RFID tag location system may suggest to the user a desired placement of the product based on historical data regarding product performance in order to maximize sales. For example, a particular product may have a variety of variations, such as footwear, apparel, accessories, women's wedding dresses having different sizes. The RFID tag location system may suggest the highest performing product variant to the user for placement on the floor display of that particular store. The historical performance data may include: historical sales, number of times a customer viewed or tested a product or product variation, or conversion rate of a product or product variation, e.g., viewing versus sales, customer testing versus sales, etc.

The RFID tag location system may also dynamically modify the number and location of products in the store in real time based on inventory available at the store. For example, in table 1, an ideal scenario is shown where M and L sized products are the best performing variants, followed by S and XL sized products. Based on the user-defined requirements for the total number of products to be displayed, e.g., 12 in this example, the RFID tag positioning system automatically calculates the number of products of each size to be placed on the floor display. In this case, since the M and L sized products perform better, more M and L sized products are displayed than S and XL sized products.

TABLE 1

Figure BDA0002256389710000341

Figure BDA0002256389710000351

In another example, table 2 shows a modified scenario where the M-sized product is in short stock and therefore fails to meet the ideal floor display previously presented in table 1. In response, the RFID tag location system redistributes the number of product variations to be placed on the floor display based on the next best performing product variation. This does not necessarily display zero M-sized products, but rather reduces the number of M-sized products to accommodate available inventory and customer requirements. In this case, more L-sized products are displayed, followed by S and XL-sized products.

TABLE 2

Figure BDA0002256389710000352

Table 3 shows yet another modified scenario where both M and L size products are sold out and other product variants are not in sufficient inventory to meet the total number of products required. In this case, the RFID tag location system will redistribute the number of product variations to satisfy the total number of products that are displayed as better as possible while prioritizing the dimensions that represent the best.

TABLE 3

Figure BDA0002256389710000353

If the number of sales floor is set to zero, the RFID tag location system sets the number of products falling on the floor display to zero. Further, if at least one product is in a sales area and no product is on a floor display, a notification may be sent to the employee. This is based on a possible retailer strategy where all products available on the sales area should also be placed on the floor display. The RFID tag positioning system may also be configured to detect differences in the number of products on the sales floor and floor display, particularly to compensate for input errors of the system.

11.11 creation and optimization of picklists

As previously described, the RFID tag locating system may accurately track the number of products located in different areas of the store (e.g., sales areas or warehouses), and thus may determine which products or product variations may need to be moved to the sales area in real-time. For example, table 4 shows the distribution of product variables in the store. As shown in the table, there is an insufficient number of M and XL sized products available at the sales floor based on the number of products displayed on the floor display. As a result, two M size and one XL size product should be moved from the warehouse to the sales floor.

TABLE 4

To facilitate replenishment of a product or product variation, the RFID tag location system may immediately compile a picklist or list of requested products that require replenishment in real time. The pick-up list may then be sent to a user, e.g., a warehouse employee, who then completes the request by picking up all of the requested products and delivering the products to the sales area.

The use of pick-up lists may also be suitable for fulfilling e-commerce orders where the RFID tag location system compiles a list of products requested by the online customer to be picked up in the store. The products in the pick list may also be set to be retained by employees on behalf of the customer, by the customer using the retailer's website or application, or by customer variations of the user application. Pick lists may also be used in customer inventory requests where products are requested from the store by in-store customers through sales floor personnel, or for misplacing products where the products are placed in incorrect locations on the sales floor or in the store.

Because the RFID tag location system may track the location of a user (e.g., a warehouse employee) and the location of all products in the pick list, an Optimized Pick Path (OPP) may be generated based on the shortest time or distance that the employee picks all products. The OPP may be displayed to the user in the GUI of the user application. In fig. 9A, the OPP is shown in dashed lines, along with the location of the nearest product and user on the pick list. The OPP will be updated as the user moves, as shown in fig. 9B. When the user starts picking up a product on the pick list, the OPP will continue to update and will also display the number of products the user has picked up, as shown in fig. 9C and 9D. Also, the next product to be picked up by the user will be displayed in the GUI. OPP can also be used for e-commerce orders, customer inventory checks, and misplaced products in mobile stores or on sales areas.

If a product on the first user's pick list is picked up by a second user and delivered to a sales area, and the first user is still in the process of satisfying the request and before picking up the product, the RFID tag location system will specifically mark the product on the first user's pick list to inform the first user that the product is no longer needed. This notification process may be performed in real time using an RFID tag location system.

11.12 picklist Filter

The RFID tag location system may also enable a user to refine the pick list based on product attributes or location. For example, the user may filter the pick-up list according to a women's wedding dress, warehouse 1, or a women's wedding dress in warehouse 1. Further, the user may set a maximum number of products to be included in the pick list, for example, 10 units. The RFID tag location system will then display a pick list having up to 10 units. Based on the user filter and the maximum number, the RFID tag location system may optimize the products on the pick list that generate the most sales for the store.

11.13 stray product

Stray products are products that are placed in an incorrect location within the store, for example, products that are designated as being on the sales floor but are located in the warehouse. The RFID tag location system can actively and accurately track the location of specific product units, e.g., all units of a men's black V-neck T-shirt are located on a sales floor or in a warehouse. The combination of the location accuracy of the RFID tag location system and the ability to monitor all units of a particular product can enable automatic detection of stray products in the store. If stray products are detected, a notification that the product unit is in an incorrect location may be sent to the user, e.g., an employee, immediately and automatically, or after a user-defined time threshold, e.g., greater than 10 minutes.

In addition, the user application may also generate a path within the GUI that directs the user to all stray products. This path generation feature can also be used for non-stray products. For example, FIG. 10 shows a GUI for selecting a particular product within a store. The units of the selected product may not be located in the same warehouse or in the same area of a particular warehouse, for example, the units of the product may not be located within six feet of each other. In these cases, the GUI may display to the user the total number of locations that the user must access to retrieve all of the units of the product.

11.14 Intelligent routing of product notifications to Users

The location tracking features of RFID tag location systems, particularly RFID readers, user applications and systems, can be used to accurately monitor the location of a product or a variation of a product. By tracking all RFID tagged products within the store, the system can automatically notify a user, e.g., an employee, in real time whether replenishment of products is required within a particular area of the store. The threshold or criteria for product replenishment may be user determined. For example, a product may be required to have 10 units on a floor display. If initially there are 10 units of product on the floor display and the customer purchases 1 unit, a notification may be sent to the employee that the number of products on the floor display has dropped below a specified requirement, prompting the employee to transfer 1 product unit to the floor display.

An employee receiving a product replenishment notification may also send a request for a product to another employee, for example, a sales floor employee may request a product from an inventory employee using an internal inventory request. If the requested product is not in stock at the first store, the employee may instead use an external store request to request the product from a second store or warehouse and deliver it to the first store or customer's preferred address. This tracking feature may also be used by the customer via their mobile device using a user application to locate a particular RFID-tagged product in a store or another nearby store.

The RFID tag location system may also intelligently route inventory requests to specific employees or locations to minimize the time to deliver the requested inventory to specific areas of the store or to customers. Internal inventory requests may be routed to employees based on their proximity to the store area, customer, or warehouse, and the ability to complete tasks in a minimum amount of time. For example, employee A is processing 5 inventory requests of other customers, who must preferably fulfill these 5 inventory requests. The RFID tag location system may then route the additional request to the nearest available employee, for example, employee B, to fulfill the inventory request. Employees may also choose to turn off or mute the notification of inventory requests if an unrelated task is currently being performed. The RFID tag location system may also monitor the time it takes for an employee to complete an inventory request since the initial receipt of the inventory request to deliver a product to a customer or store area by tracking the product and employee as they move about the store.

For external inventory requests, the RFID tag location system may actively monitor and update the availability of products at multiple stores. For example, if a customer of a second store has a requested product in their shopping cart, the RFID tag location system will remove that product from the available inventory of the second store to ensure accurate information about the availability of the product to the customer of the first store. The RFID tag location system may also be used to predict the time required for an externally requested product to be delivered to a preferred address of a store or customer based on the distance between the starting location (e.g., a second store or warehouse) and the destination, as well as data detailing the speed at which inventory requests are fulfilled and transported by the starting location.

11.15 inventory request fulfillment

RFID tag location systems actively track the location of products available on the sales floor and the warehouse of the store in real time and at all times. This active tracking may facilitate employees to quickly complete a customer's inventory request. For example, a customer may use a user application to request an inventory level check of a particular product in a store. FIG. 11 illustrates an exemplary GUI in which a customer is requesting products from a warehouse for delivery to them at a sales area with an option to specify a particular product variant, e.g., a medium-sized black dress. The request may then be sent to an employee of the sales area. Employees of the sales area may then request the product requested by the customer from the store employee using the user application. The warehouse employees may then find and pick up multiple requested products for different customers. To facilitate the delivery of products to different customers of a sales area, store employees may use a user application that actively monitors the location of the different customers in real-time.

In addition to inventory requests, there may be instances where the product is misplaced or not easily found by the customer, but still exists in the sales area. The user application may provide the location of products (if present) in various areas of the store. For example, in FIG. 12, the GUI may display to the customer the location of the selected product on the sales area in addition to the quantity available in the warehouse. The user application may also enable the customer to find misplaced products on the sales area if the store's employees do not move the misplaced products.

11.16 automatic tagging of pick lists

Pick lists refer to lists of products requested by users and may include requests for internal restocking, e-commerce orders, inventory requests, misplaced products, or any other list of products that a user needs to find. The products in the pick list may be automatically marked as picked if the following conditions are met: (1) the user is using the user application to process the pick list, (2) the user picks up a product in the pick list, and (3) if a product on the user's pick list is moving with the user, the RFID/computer vision item positioning system identifies that the product is picked up by the user based on the user device or its RFID employee tag. Once these conditions are met, the RFID/computer vision item location system should automatically mark the product as it is picked by the user. To improve the accuracy of pick list auto-tagging, a threshold may be used to determine whether a product is picked by a user, such as the time after the product was picked or the distance the product has moved.

11.17 tracking high shopping cart value for customers

The RFID tag location system may also be used to actively track the number and types of products in a customer's shopping cart in real time. The shopping cart may include a basket, bag, cart, or the like. If a customer's shopping cart contains products that exceed a user-defined threshold, for example, 5 total units or $ 500 worth, a notification may be automatically sent to the employees that identify the customers. Additionally, a particular product or product category may also be flagged by the employee for preferential tracking. This tracking feature may have a variety of functional uses in the store. For example, the tracking feature may be used to prevent shoplifting by tracking products in their shopping carts that may have a large or high value or that may have selected many indicia. The tracking feature may also be used to identify customers who may be willing to spend more gold lines, which may inform employees to provide better customer service to customers, to up-sell those customers, or to recommend free products to those customers.

The RFID tag location data may be displayed to the user in various formats using a GUI in the user application. For example, an employee may view all customers within a store in the GUI and monitor their shopping carts based on the number of products or based on total value. To facilitate identification of the customer, the RFID tag location system may associate people in the store with customer profiles if the customer uses a customer variation of the user application. Otherwise, customers with products in their shopping carts may still be identified by tracking the movement of the products and determining whether the products are associated with registered employee devices.

11.18 automatically notify VIP customers

The RFID tag location system may also store data about the customer. The data may include the number of visits the customer has to the store or the amount the customer spends monthly or annually. Based on this data, the VIP title may be attributed to a customer that exceeds a user-defined threshold.

The RFID tag location system may then be used to detect and identify VIP customers and notify employees when a VIP enters a store or a particular portion of a store. Identification of the VIP may be accomplished using a variety of methods, including (1) detecting VIP status based on customer profiles stored in a user application on a customer's mobile device via bluetooth or Wi-Fi, (2) identifying a customer mobile device id based on a user application on a customer's mobile device, or (3) identifying based on facial or gait recognition using the computer vision capabilities of an RFID tag positioning system.

11.19 identification of potential product theft

As previously mentioned, the RFID tag location system may actively track the movement of products in a customer's shopping cart in real time. If an abnormal event occurs while monitoring a product, a potential theft of the product may be detected. For example, if a customer were to remove an RFID tag from a product, the RFID tag location system could detect this removal and immediately notify the employee of the exact product and its last known location in the store. Additionally, the RFID tag location system may also identify and retrieve video recordings recorded by the system's cameras or RFID readers to assist employees in locating customers or products. After this information is provided to the employee, the employee may then approach the customer to provide assistance with the product that lacks the RFID tag.

The RFID tag location system may also timestamp and store anomalous events associated with the RFID tagged product. This information can be used to display potential high theft areas to the employee in the GUI based on data such as the frequency of the RFID tags that disappear. This data may be viewed in the GUI in a user-defined time frame, e.g., the first 7 days, 30 days, 180 days, etc. In addition, the RFID tag location system may also identify and highlight areas in the store that may become highly stolen by identifying the current location of RFID tags that tend to disappear within the store.

11.20 automatic monitoring fitting room

Detection strategies similar to those used to identify potential product theft may also be used to automatically monitor fitting rooms. The RFID tag location system may track the product as it enters or leaves the fitting room. Notifications of entry or exit from the fitting room may be sent to the staff of the product in real time. If the product is left in the fitting room, the RFID tag location system may notify the employee that stray products are present in the fitting room and return the product to its correct location within the store. If the RFID tag is to be removed, resulting in the disappearance of the product in the RFID tag location system, an employee may also be sent a notification that the product may have disappeared and identify the customer with which the product was last associated. When the problematic product disappears, the customer may also be identified by other products in their shopping cart.

11.21 capture and measurement of customer and product interactions

The RFID tag location system may also be used to detect and measure data related to customer and product interactions within the store. For example, the system may track (1) how often a customer picks up products, (2) how long the customer is looking at the products, (3) which products are viewed together, (4) which products the customer is holding while viewing a new product, (5) which products may be obtained from a fitting room, (6) which products the customer interacts with before making a purchase, (7) products that may be tested by the customer, e.g., the customer fitting clothes, based on the measured distortion of the RF signal due to proximity to a body of water (e.g., a human body), (8) how long the customer tests the products. For products tested by the customer, information may also be gathered on products not purchased (e.g., clothing left in a fitting room) to assess manufacturing or fit issues, e.g., the customer prefers the appearance of a piece of clothing rather than a piece of fitted clothing. This data can be used to inform the store how to potentially modify the manufacture of the product to increase sales.

To measure these parameters, the RFID tag location system is able to track objects in 3D space with high spatial and temporal resolution. For example, the RFID tag locating system may detect whether a product has moved more than a threshold distance, e.g., 4 inches, and for a threshold period of time, e.g., more than 3 seconds. If such conditions are met, the product may be considered to be picked up or viewed by the customer.

As previously mentioned, the RFID tag location system may track the movement of products and customers within the store. The customer may be identified by: (1) the customer uses a user application on their mobile device that is detected by a bluetooth, Wi-Fi, or other wireless communication system or sensor, or (2) detects the customer by basing the customer on an individual that does not have a device or tag that is identifiable by an RFID tag location system, assuming that the employee has a tag or device.

The RFID tag location system may also collect product performance data based on product group, such as product category, subcategory, product, color, size, price range, any combination of the foregoing types, and the like. For these product groups, the performance data that can be collected includes the following: (1) the most or least viewed product group, (2) the longest or shortest viewed product group, (3) the most or least taken to fitting room product group, (4) the most or least tested or tried product group, (5) the longest or shortest time period tested or tried product group, (6) the product group with the best or worst conversion defined as the number of sales compared to the other types of data mentioned. For example, if a product is viewed 100 times a day and sold 10 times a day, the conversion is 10%. In another example, if 100 products are tried out for more than 30 seconds and sold 10, the products that are tried out for more than 30 seconds have a conversion of 10%.

Based on the product performance data collected by the RFID tag location system, improvements in store operation can be achieved by: (1) identifying the sales area in the store that performs best, (2) identifying the area where the most product interactions occur to improve staffing in that area, or (3) marketing strategies such as automatically calculating and recommending product categories based on best-selling combinations (e.g., black jeans and white T-shirts perform best together), or identifying the area of the store that is best suited for certain product types, e.g., area a dress in the store has the highest conversion rate.

Similarly, product performance data may improve a customer shopping experience by: (1) learning a customer's historical shopping preferences based on the previously defined set of products to inform the customer of new or restocked products previously searched in the store or online to the store, (2) personalizing the in-store shopping experience by highlighting products in the store or in areas of the store that may be of interest to the customer, (3) informing the customer of potential in-store promotions, or (4) identifying the customer by detecting customer profiles in a user application stored on the customer's mobile device via bluetooth or WiFi, identifying the customer mobile device id based on the user application on the customer's mobile device, or identifying the customer based on facial or gait recognition using the computer vision capabilities of an RFID tag positioning system.

11.22 conclusion

While various embodiments have been described and illustrated herein, numerous other means and/or structures for performing the functions and/or obtaining the results and/or one or more of the advantages described herein are possible. More generally, all parameters, dimensions, materials, and configurations described herein are meant to be exemplary, and the actual parameters, dimensions, materials, and/or configurations will depend upon the particular application or applications for which the teachings disclosed are used. It is to be understood that the foregoing embodiments are presented by way of example only and that embodiments may be practiced otherwise than as specifically described and claimed. Embodiments of the present disclosure are directed to each individual feature, system, article, material, kit, and/or method described herein. In addition, any combination of two or more such features, systems, articles, materials, kits, and/or methods, if such features, systems, articles, materials, kits, and/or methods are not mutually inconsistent, is included within the scope of the present disclosure.

The above-described embodiments may be implemented in any of a variety of ways. For example, embodiments of the techniques disclosed herein may be implemented using hardware, software, or a combination thereof. When implemented in software, the software code can be executed on any suitable processor or collection of processors, whether provided in a single computer or distributed among multiple computers.

The various methods or processes outlined herein may be coded as software that is executable on one or more processors that employ any one of a variety of operating systems or platforms. Additionally, such software may be written using any of a number of suitable programming languages and/or programming or scripting tools, and may also be compiled as executable machine language code or intermediate code that is executed on a framework or virtual machine.

In this regard, the various inventive concepts may be embodied as a computer-readable storage medium (or multiple computer-readable storage media) (e.g., a computer memory, one or more floppy disks, compact disks, optical disks, tapes, flash memories, circuit configurations in field programmable gate arrays or other semiconductor devices, or other non-transitory or tangible computer storage media) encoding one or more programs that, when executed on one or more computers or other processors, perform methods that implement the various embodiments of the inventions discussed above. The computer readable medium or media may be transportable, such that the program or programs stored thereon can be loaded onto one or more different computers or other processors to implement various aspects of the present invention as discussed above.

The terms "program" or "software" are used herein in a generic sense to refer to any type of computer code or set of computer-executable instructions that can be employed to program a computer or other processor to implement various aspects of embodiments as discussed above. In addition, it should be appreciated that according to one aspect, one or more computer programs that when executed perform methods of the present invention need not reside on a single computer or processor, but may be distributed in a modular fashion amongst a number of different computers or processors to implement various aspects of the present invention.

Computer-executable instructions may take many forms, such as program modules, executed by one or more computers or other devices. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Typically, the functionality of the program modules may be combined or distributed as desired in various embodiments.

Also, various disclosed concepts may be embodied as one or more methods, examples of which have been provided. The actions performed as part of the method may be ordered in any suitable way. Accordingly, embodiments may be constructed which perform acts in an order different than illustrated, which may include performing some acts simultaneously, even though shown as sequential acts in illustrative embodiments.

All definitions, as defined and used herein, should be understood to control over dictionary definitions, definitions incorporated by reference into a document, and/or to define the ordinary meaning of a term.

The indefinite articles "a" and "an", as used in this specification and in the claims, unless expressly specified to the contrary, should be understood to mean "at least one".

The phrase "and/or" as used in this specification and claims should be understood to mean "either or both" of the elements so joined, i.e., the elements are present in combination in some cases and are present in isolation in other cases. Multiple elements listed with "and/or" should be interpreted in the same manner, i.e., "one or more" of the elements so concatenated. In addition to elements specifically identified by the "and/or" clause, other elements may optionally be present, whether related or unrelated to those elements specifically identified. Thus, as a non-limiting example, a reference to "a and/or B," when used in conjunction with open-ended language (e.g., "comprises"), may refer in one embodiment to a alone (optionally including elements other than B); in another embodiment, only B (optionally including elements other than a); in yet another embodiment, refer to both a and B (optionally including other elements), and so forth.

As used in this specification and claims, "or" should be understood to have the same meaning as "and/or" as defined above. For example, when separating items in a list, "or" and/or "should be interpreted as being inclusive, i.e., including at least one but more than one of a number of elements or list of elements, and optionally including additional unlisted items. Only terms explicitly indicated to the contrary, such as "one of only … …" or "one of exactly … …," or "consisting of … …" when used in the claims, will refer to including exactly one element of a number or list of elements. In general, the term "or" as used herein when preceded by an exclusive term (such as "either," "one of … …," "only one of … …," or "just one of … …") should be construed merely to indicate an exclusive alternative (i.e., "one or the other, but not both"). "consisting essentially of … …" when used in the claims shall have the ordinary meaning as used in the patent law field.

As used herein, the terms "about" and "approximately" generally refer to plus or minus 10% of the stated value.

As used in this specification and the claims, the list phrase "at least one" referring to one or more elements should be understood to mean at least one element selected from any one or more of the elements in the list of elements, but not necessarily including at least one of each element specifically listed in the list of elements, and not excluding any combinations of elements in the list of elements. This definition may also be such that elements other than the elements specifically identified in the list of elements to which the phrase "at least one" refers may optionally be present, whether related or unrelated to those elements specifically identified. Thus, as a non-limiting example, "at least one of a and B" (or, equivalently, "at least one of a or B," or, equivalently "at least one of a and/or B") can refer, in one embodiment, to at least one (optionally including more than one) a, no B (and optionally including elements other than B); in another embodiment, to at least one (optionally including more than one) B, no a is present (and optionally including elements other than a); in yet another embodiment, at least one (optionally including more than one) a, and at least one (optionally including more than one) B (and optionally including other elements), and so forth.

In the claims, as well as in the specification above, all transitional phrases such as "comprising," "including," "carrying," "having," "containing," "involving," "holding," "consisting of," and the like are to be understood to be open-ended, i.e., to mean including but not limited to. The transition phrases "consisting of … …" and "consisting essentially of …" alone should be closed or semi-closed transition phrases, respectively, as described in the U.S. patent office patent inspection program manual, section 2111.03.

58页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:位置推断系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!