U.S. patent application number 11/986736 was filed with the patent office on 2008-05-29 for system and method for reading and verifying rfid tags.
This patent application is currently assigned to I.D. Systems, Inc.. Invention is credited to Kenneth S. Ehrman, Michael L. Ehrman, Jeffrey M. Jagid.
Application Number | 20080122626 11/986736 |
Document ID | / |
Family ID | 36941742 |
Filed Date | 2008-05-29 |
United States Patent
Application |
20080122626 |
Kind Code |
A1 |
Ehrman; Kenneth S. ; et
al. |
May 29, 2008 |
System and method for reading and verifying RFID tags
Abstract
A method for reading and verifying RFID tags includes reading
identifications of proximately located RFID tagged items and
comparing the read identifications to a list of RFID tagged items
expected to be read. In operation an RFID reader is used to read
the RFID tags. A communicator is coupled to the RFID reader to
receive the read identifications and then communicate the received
read identifications over a wireless interface to a central data
processing system. Each mobile portal may be actuated for RFID read
operations in response to information sensed concerning operation
of the mobile asset/vehicle. Additionally, the central data
processing system may issue instructions concerning mobile
asset/vehicle operation, with those instructions communicated over
the wireless interface to the mobile portal. Responsive to
implementation of those instructions, the mobile portal actuates
the RFID reader and compares the read identifications to a list of
RFID tags that were expected to be read.
Inventors: |
Ehrman; Kenneth S.; (New
York, NY) ; Ehrman; Michael L.; (New York, NY)
; Jagid; Jeffrey M.; (Closter, NJ) |
Correspondence
Address: |
TROUTMAN SANDERS LLP
600 PEACHTREE STREET , NE
ATLANTA
GA
30308
US
|
Assignee: |
I.D. Systems, Inc.
Hackensack
NJ
|
Family ID: |
36941742 |
Appl. No.: |
11/986736 |
Filed: |
November 26, 2007 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
11276468 |
Mar 1, 2006 |
|
|
|
11986736 |
|
|
|
|
11276469 |
Mar 1, 2006 |
|
|
|
11276468 |
|
|
|
|
11276470 |
Mar 1, 2006 |
|
|
|
11276469 |
|
|
|
|
60657655 |
Mar 1, 2005 |
|
|
|
60657655 |
Mar 1, 2005 |
|
|
|
60657655 |
Mar 1, 2005 |
|
|
|
Current U.S.
Class: |
340/572.1 |
Current CPC
Class: |
G06Q 10/08 20130101 |
Class at
Publication: |
340/572.1 |
International
Class: |
G08B 13/14 20060101
G08B013/14 |
Claims
1. A method for determining whether a correct set of RFID tags were
read at a location, the method comprising the steps of: actuating
an RFID reader, mounted on a mobile asset/vehicle, to read
identifications of proximately located RFID tagged items; and
comparing the read identifications of the proximately located RFID
tagged items to a predetermined list of RFID tagged items.
2. The method of claim 1, further comprising the step of receiving
the predetermined list of RFID tagged items.
3. The method of claim 1, wherein the step of comparing the read
identifications to the predetermined list of RFID tagged items is
performed by a central computer.
4. The method of claim 1, further comprising the step of
transmitting data representative of the read identifications of
proximately located RFID tagged items to a central computer.
5. The method of claim 1, wherein the step of comparing the read
identifications to the predetermined list of RFID tagged items is
performed by a processor associated with the mobile
asset/vehicle.
6. The method of claim 1, further comprising the step of storing
read identifications of proximately located RFID tagged items on a
memory device.
7. The method of claim 1, wherein the mobile asset/vehicle is a
belt-loader.
8. The method of claim 1, wherein the predetermined list of RFID
tagged items is representative of one or more items on a cargo
manifest.
9. The method of claim 1, wherein the predetermined list of RFID
tagged items is representative of one or more baggage items
destined for a particular air flight.
10. The mobile RFID portal of claim 1, further comprising the steps
of: transmitting the predetermined list of RFID tagged items to an
RFID portal.
11. The method of claim 1, further comprising the step of providing
a visual indicator to an operator of a mobile asset/vehicle
associated with the RFID reader.
12. The method of claim 1, further comprising the step of providing
a visual indicator to an operator of the mobile asset/vehicle when
an RFID tagged item is identified that is on the predetermined list
of RFID tagged items.
13. The method of claim 1, further comprising the step of providing
a visual indicator to an operator of the mobile asset/vehicle when
an RFID tagged item that is not on the predetermined list of RFID
tagged items.
14. The method of claim 1, further comprising the step of providing
a visual indicator to an operator of the mobile asset/vehicle
representative of an RFID tagged item that is not on the
predetermined list of RFID tagged items.
15. The method of claim 1, further comprising the step of providing
a visual indicator to an operator of the mobile asset/vehicle
representative of a list of RFID tags that were read by the RFID
reader that were not on the predetermined list of RFID tagged
items.
16. The method of claim 1, further comprising the step of providing
a visual indicator to an operator of the mobile asset/vehicle
representative of a list of RFID tags that were expected to be read
but were not read.
17. The method of claim 1, further comprising the step of receiving
login data from an operator.
18. The method of claim 1, further comprising the step of receiving
data representative of a flight number.
19. The method of claim 18, further comprising the step of
accessing the predetermined list of RFID tagged items based on the
data representative of a flight number.
20. The method of claim 1, further comprising the step of
associating an operator that has logged in with tags read by the
RFID reader.
21. The method of claim 1, further comprising the step of
associating the tagged items read with a location at which they
were read.
22. The method of claim 1, further comprising the step of
associating the tagged items read with a time at which they were
read.
23. The method of claim 1, further comprising the step of
associating the tagged items read with operational characteristics
of the mobile asset/vehicle at the time at which the tagged items
were read.
24. The method of claim 1, wherein the step of actuating an RFID
reader is performed without human intervention.
25. The method of claim 1, wherein the step of actuating an RFID
reader is performed based on operational data associated with the
mobile asset/vehicle.
26. The method of claim 25, wherein the operational data is
representative of vehicle motion data.
27. The method of claim 25, wherein the operational data is
representative of a belt movement condition.
28. The method of claim 25, wherein the operational data is
representative of a vehicle location.
29. The method of claim 1, further comprising the step of
activating a barcode reader to read a barcode associated with an
item that was not identified by the RFID reader.
30. The method of claim 1, further comprising the step of
transmitting read identifications to a central computer via a
wireless interface.
31. The method of claim 1, further comprising the step of
controlling operation of the mobile asset/vehicle if an RFID tagged
item is identified that is not on the predetermined list of RFID
tagged items.
32. The method of claim 31, wherein the step of controlling
operation of the mobile asset/vehicle further comprises controlling
operation of the mobile asset/vehicle by stopping movement of a
belt associated with the mobile asset/vehicle.
33. The method of claim 31, wherein the step of controlling
operation of the mobile asset/vehicle further comprises controlling
operation of the mobile asset/vehicle by limiting movement of the
mobile asset/vehicle.
34. The method of claim 1, wherein the mobile asset/vehicle is a
cargo container.
35. The method of claim 34, further comprising the step of reading
identifications of items passing into the cargo container.
36. The method of claim 34, further comprising the step of
transmitting data representative of the read identifications when
the cargo container is closed.
37. The method of claim 34, further comprising the step of:
determining that an object is entering the cargo container; and
wherein the step of actuating the RFID reader is performed when it
is determined that an object is entering the cargo container.
38. The method of claim 34, further comprising the step of:
determining that an object is exiting the cargo container; and
wherein the step of actuating the RFID reader is performed when it
is determined that an object is exiting the cargo container.
39. The method of claim 34, further comprising the step of:
determining that an object is passing through an opening in the
cargo container; and wherein the step of actuating the RFID reader
is performed when it is determined that an object is passing
through an opening in the cargo container.
40. The method of claim 1, further comprising the step of receiving
a request to initiate an RFID scan.
41. The method of claim 1, further comprising the step of receiving
instructions for an operator to perform a task.
42. The method of claim 41, wherein the operator is selected based
on location data associated with the operator.
43. The method of claim 1, further comprising the step of selecting
an operator based on the operator's proximity to one or more RFID
tagged items to be manipulated.
44. The method of claim 43, further comprising the steps of:
receiving information about a baggage item that was identified in
an incorrect location; and receiving information about where the
baggage item should be transported.
45 The method of claim 1, wherein the predetermined list of RFID
tagged items is created as RFID tagged items are input for
handling.
46. The method of claim 1, wherein the mobile asset/vehicle is a
fork-lift.
47. The method of claim 46, wherein the predetermined list of RFID
tagged items identifies RFID tagged items associated with a
pallet.
48. The method of claim 1, further comprising generating the
predetermined list of RFID tagged items as RFID tagged items are
offloaded from an airplane.
49. The method of claim 1, further comprising generating the
predetermined list of RFID tagged items by adding items to the
predetermined list when the items are read by a second RFID reader.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation-in-part of U.S. patent
application Ser. Nos. 11/276,468 filed Mar. 1, 2006, 11/276,469
filed Mar. 1, 2006, and 11/276,470 filed Mar. 1, 2006, each of
which claim the benefit of U.S. Provisional Application No.
60/657,655, filed Mar. 1, 2005.
BACKGROUND OF THE INVENTION
[0002] 1. Technical Field of the Invention
[0003] The present invention relates to the field of radio
frequency identification (RFID) systems.
[0004] 2. Description of Related Art
[0005] Conventional RFID technology is focused on techniques for
scanning items (such as pallets, baggage, products, and the like)
using either passive or active wireless interrogation at distances
of between approximately 2-10 feet. Such a wireless interrogation
process serves to replace the need of prior art bar code scanning
systems that manually scan each individual item, with a more
efficient process that allows for a one-time remote scan of all
included items. RFID-based scanning thus reduces the labor
associated with manually manipulating items in order to access a
bar code label.
[0006] A typical RFID system installation places wireless
interrogators at fixed locations known as "portals." As tagged
items pass through (or just in proximity to) these fixed portals
(for example, as carried by a person, vehicle or machine), the
associated RFID tag for the item is wirelessly interrogated to
obtain item identification information. This identification
information is then associated with information relating to the
identity and/or position of the fixed portal that made the read.
The collected information is then reported to a central data
processing system where the information can be viewed and stored
for purposes of later query and manipulation.
[0007] The successful deployment of such RFID systems has
heightened industry's awareness of the potential for a truly fully
automated data tracking and monitoring system. With this emerging
technology comes unique concepts for its use in productivity
monitoring.
[0008] Therefore, it can be seen that a need yet exists for an
enhanced RFID system that provides superior functionality and
usefulness over conventional RFID-based systems. It is to such a
mobile portal for RFID applications that the present invention is
primarily directed.
BRIEF SUMMARY OF THE INVENTION
[0009] Briefly described, in its preferred form, the present
invention is a mobile RFID portal that is associated with a mobile
asset, such as a vehicle. An RFID interrogator is positioned on the
mobile asset and operates to wirelessly interrogate for proximately
located RFID tags attached to items. A wireless radio frequency
(RF) communications transmitter also positioned on the mobile asset
is coupled to the RFID interrogator and functions to establish a
data communications link with a central data processing system. The
RFID interrogator captures "captured item identification
information" from proximately located RFID tags (either passive or
active tags), and the RF communications transmitter transmits the
captured item identification information over the data
communications link to the central data processing system.
[0010] Further, in an exemplary embodiment, the present invention
provides a mobile RFID portal on a baggage handling device, such as
a belt-loader for loading baggage on an aircraft. The portal, and
associated system, may identify baggage being loaded by the
belt-loader and compare the baggage to a list of baggage destined
for a particular aircraft. The system verifies that each baggage
item is being loaded on the correct aircraft and may issue an alert
if an incorrect baggage item is identified. Additionally, the
system may provide an alert if any baggage items listed on the
baggage manifest are not loaded onto the belt-loader. Accordingly,
the system provides improved baggage loading accuracy.
[0011] Additionally, in another exemplary embodiment of the present
invention, the mobile RFID portal may be installed on a baggage
transport vehicle, such as a tug. The portal may be adapted to scan
each item loaded on the vehicle and identify whether the correct
baggage items are loaded and being transported to a particular
aircraft.
[0012] As a further enhancement, the RF communications transmitter
may further include functionality for determining information
regarding the mobile asset, "mobile asset identification
information", preferably being location information. The RF
communications transmitter can then transmit both the captured item
identification information and the mobile asset identification
information over the data communications link to the central data
processing system.
[0013] The captured item identification information and the mobile
asset identification information may then be associated with each
other by the central data processing system, thus allowing for the
determination of not only what items were present, but also where
those items were located when their RFID tags were read.
[0014] In one exemplary embodiment, a luggage handling system is
implemented that tracks luggage from baggage check-in, though the
airport, to a baggage cart, to a belt-loader, and into an airplane.
Each baggage handling device may be equipped with an RFID
interrogator to determine which bags are present. Additionally,
mobile RFID portals associated with the baggage cart, the
belt-loader, and the airplane, may assure that the correct luggage
is loaded onto the airplane.
[0015] As the operator of a mobile asset, such as a baggage
carrier, moves about an environment, such as an airport tarmac, the
mobile RFID portal uses its wireless interrogator to identify items
being handled by that mobile asset, and further uses its RF
communications transmitter to transmit the captured item
identification information, along with the mobile asset
identification information, to the central data processing system
over the data communications link.
[0016] In another preferred embodiment, the mobile RFID portal
further determines the mobile asset location at each wireless
interrogation, and includes the mobile asset identification
information, being location information, along with the captured
item identification information in the RF communication to the
central data processing system. Advantageously, this allows for the
monitoring of the mobile asset operator and asset location while
efficiently, cost-effectively and reliably tracking the
identification of items being moved. This concept essentially
creates a "mobile" RFID portal operable to track tagged items, and
the mobile assets that manipulate those items, in real-time
throughout the baggage handling process.
[0017] In another preferred embodiment, the mobile RFID portal
comprises an RFID reader mountable to a mobile asset/vehicle and a
communicator associated with the RFID reader for actuating the RFID
reader to read identifications of proximately located RFID tagged
items when predetermined mobile asset/vehicle operational data is
identified.
[0018] In yet another preferred embodiment of the present
invention, a system is provided, and comprises a mobile RFID portal
for attachment to a mobile asset/vehicle. The mobile RFID portal
includes an RFID reader for reading identifications of proximately
located RFID tagged items, and a communicator coupled to the RFID
reader to receive the read identifications, and communicate the
received read identifications over a wireless interface. A central
data processing system is coupled to the wireless interface to
receive the read identifications communicated from the communicator
in the mobile RFID portal.
[0019] Another preferred embodiment of the present invention
comprises a system provided with a mobile RFID portal for
attachment to a mobile asset/vehicle. The mobile RFID portal
includes an RFID reader for reading identifications of proximately
located RFID tagged items, and a communicator coupled to the RFID
reader to receive the read identifications, and communicate the
received read identifications over a wireless interface. A gateway
node is operable to wirelessly communicate with the communicator in
the mobile RFID portal over the wireless interface and receive the
communicated read identifications.
[0020] In accordance with yet another preferred embodiment, a
system for tracking RFID tagged items comprises a plurality of
mobile RFID portals for attachment to a plurality of mobile
asset/vehicles. Each mobile RFID portal includes an RFID reader for
reading identifications of proximately located RFID tagged items, a
data storage device for storing read identifications, and a
communicator for transmitting read identifications over a wireless
interface. The system may also include a central data processing
system coupled to the wireless interface to receive the read
identifications communicated from the communicators in the
plurality of mobile RFID portals. Additionally, the central data
processing system maintains records of the location of a plurality
of RFID tagged items present in a predetermined geographic area and
it receives data from each of the plurality of mobile RFID portals
representative of the RFID tagged items moved by the mobile
asset/vehicle associated with the respective mobile RFID portal.
Furthermore, one or more of the plurality of mobile RFID portals
reads the identifications of proximately located RFID tagged items
a first time when a first predetermined mobile asset/vehicle
operational data is identified and a second time when a second
predetermined mobile asset/vehicle operational data is identified.
The one or more of the plurality of mobile RFID portals may also
transmit data representative of the RFID tagged items read the
first time and the second time along with a location at which the
second reading was made to the central data processing system.
Finally, the central data processing system stores the data
representative of the location at which the second reading was made
as a current location for each of the RFID tagged items that were
read both the first time and the second time.
[0021] These and other objects, features and advantages of the
present invention will become more apparent upon reading the
following specification in conjunction with the accompanying
drawing figures.
BRIEF DESCRIPTION OF THE FIGURES
[0022] FIG. 1 is a block diagram of an asset/item monitoring system
in accordance with a preferred embodiment of the invention;
[0023] FIG. 2 illustrates an implementation configuration for the
system of FIG. 1;
[0024] FIG. 3 illustrates an operational implementation diagram for
a vehicle asset communicator in accordance with a preferred
embodiment of the invention; and
[0025] FIG. 4 is a functional block diagram illustrating the
operation of the system of FIG. 1.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
[0026] Referring now in detail to the drawing figures, wherein like
reference numerals represent like parts throughout the several
views, FIG. 1 illustrates a block diagram of an asset/item
monitoring system 10 in accordance with a preferred embodiment of
the invention.
[0027] The system 10 includes at least one RFID tag 12. The RFID
tag 12 can be a low cost device of known passive or active design
(such as, for example, the tags supplied by Matrics/Symbol
Technologies, Inc.) that can be attached to an item 14 to be
tracked. The item 14 may range in size from a relatively small
article (such as a product, package or box) to a relatively large
article (such as a pallet, crate or container). In an exemplary
embodiment of the present invention, the item 14 is a baggage item,
such as a suitcase, garment bag, duffel bag, box, briefcase, or
other item transported by an air carrier for a passenger.
[0028] The system 10 further includes a vehicle asset communicator
(VAC) 16, which is a device that is installed on preferably each
mobile asset (i.e., a vehicle, such as, for example, a forklift,
man-lift, truck, trailer, pallet rider, order picker, loader,
handler, airport ground-support vehicle, and the like, which
operates to manipulate tagged items). The vehicle asset
communicator 16 is operable to effectuate data communication
transmissions over a radio frequency (RF) data communications link
18. Depending on design choices and installation requirements, the
vehicle asset communicator 16 may be implemented as a single piece
of hardware, or may be implemented using a plurality of components
located together or separate. Further, the various functions of the
vehicle asset communicator 16 may be implemented in hardware,
software, or a combination of the two.
[0029] The vehicle asset communicator 16 can further include a
peripheral interface 20 through which interconnection for data
communication can be made with one or more peripheral data sensing
and data capture devices 22. The information collected by the
peripheral devices 22 is then packaged by the vehicle asset
communicator 16 for transmission over the data communications link
18.
[0030] At the other end of the data communications link 18, a
central data processing system 24 receives and processes the
information communicated from the vehicle asset communicator 16.
The processing of the communicated information in the central data
processing system 24 may include displaying the information,
storing the information, searching the information, manipulating
the information, and the like data processing operations known and
understood to those skilled in the art. Accordingly, the central
data processing system 24 may, in one embodiment, take the form of
a server and database. As an example, the central data processing
system may include Windows.RTM.-based software for the purpose of
monitoring and tracking the movement of the items throughout an
area or facility both historically and in real-time. The software
could also be used to monitor the productivity of the industrial
vehicle/asset operators and equipment, as well as for fleet
maintenance scheduling and safety checking.
[0031] Central data processing communication over the data
communications link 18 is supported by one or more gateway devices
26. One or more gateway device(s) 26 are mounted at strategic
locations so as to facilitate communication of data between the
vehicle asset communicator 16 and the central data processing
system 24. Gateway devices 26 can possess RF communication
capabilities to support wireless data communication over the data
communication link 18.
[0032] The RF communication over the data communications link 18
is, in a preferred implementation, a very low power link, and a
highly secure link (for example, certified for use at military
installations).
[0033] In a preferred implementation, the vehicle asset
communicator 16 is an industrial vehicle monitoring device
installed on a mobile asset. As mentioned previously, the mobile
asset functionally operates to manipulate RFID-tagged items 14 (for
example, by moving, lifting, placing, and the like). The industrial
vehicle monitoring device in a preferred implementation is a
wireless, intelligent, asset-mounted computer that can be
programmed with decision-making capabilities. Such a device for the
vehicle asset communicator is available from I.D. Systems, Inc., of
Hackensack, N.J. The asset-mounted computer may be interfaced into
the vehicle to receive a supply voltage. Alternatively, the
computer may receive power from a portable power source, such as a
battery. Additional interfaces allow the computer to receive
information concerning operation of the asset (for example, vehicle
motion status, speed and lift or tow status, operational
parameters, and the like). The interface functionality further
allows the monitoring device to interface to numerous peripherals
for collecting data about the asset and the environment in which
the asset is operating.
[0034] As an example, the device 16 uses its interface 20 to
connect with the peripheral device 22 in the form of an RFID
interrogator/reader 30. The interrogator/reader 30 via a read link
32 functions to read proximately located RFID tags 12 attached to
items 14. From the RFID tags 12, the interrogator/reader 30
captures captured item identification information relating to the
item(s). This captured item identification information from the
proximately located RFID tags 12 passes through the interface 20 to
the vehicle asset communicator 16 where it is transmitted over the
data communications link 18 (via gateway 26) to the central data
processing system 24.
[0035] In an exemplary embodiment of the present invention, the
interrogator/reader 30 may communicate with the VAC 20 through a
wired or wireless connection. Suitable wireless connections may
include, but are not limited to, Bluetooth, infrared, or IEEE 802.1
1.
[0036] Thus, if the mobile asset were moving a certain pallet
(i.e., an item 14), the interrogator/reader 30 would read the RFID
tag 12 attached to that pallet to obtain its identification and
communicate it to the vehicle asset communicator 16, and the
vehicle asset communicator 16 would transmit that pallet
identification to the central data processing system 24 over the
data communications link 18. In this way, the system 10 can track
item location in connection and association with a mobile
asset/moving vehicle.
[0037] The system 10 accordingly permits the tracking of a number
of pieces of information relating to the items and the assets. For
example, the vehicle asset communicator 16 may include a locator
functionality (for example, using GPS, triangulation or other known
location systems) and communicate over the data communications link
18 to the central data processing system 24 the location of the
vehicle at a certain time, or in connection with performing a
certain activity (such, lifting, placing, loading, and the like).
The communicated location information can further be associated
with other collected information.
[0038] The vehicle asset communicator 16 may include a
user/operator data input device (such as a keypad or touchscreen)
through which that user/operator enters data of interest (for
example, access codes, log-in codes, operation codes, maintenance
information, flight numbers, and the like). The user/operator
entered information is then communicated over the data
communications link 18 to the central data processing system
24.
[0039] Additionally, vehicle asset communicator 16 may receive
data, either via operator entry, or from the central data processor
24 identifying expected RFID tagged items. For example, the list of
expected RFID tagged items may be a baggage manifest identifying
baggage items to be loaded onto a particular aircraft. In
operation, an operator may enter a flight number, or otherwise
identify an aircraft to be loaded, and the vehicle asset
communicator 16 may then access data indicative of the baggage
manifest.
[0040] The vehicle asset communicator 16 can further utilize the
RFID reader 30 to read from the RFID tag 12 the identification of
the item being manipulated, and associate that identification with
a timestamp indicating when the item was manipulated. If the
communicator is location enabled, the location where the
manipulation occurred is also collected. All this information may
then be communicated over the data communications link 18 to the
central data processing system 24 where it can be processed so as
to allow for identification of the item, its route of travel, and
the times when it was manipulated.
[0041] The vehicle asset communicator 16 can further utilize the
collected location data in connection with a data communication
report made to the central data processing system 24. The location
data can be processed, in connection with the other reported time
stamped data, so as to allow the system 10 to validate the moves
made by the asset/vehicle in the sense of monitoring place and time
of movement and confirming asset/vehicle authorization to be at
that place at the noted time.
[0042] The system 10 uses the peripheral connection 20 support
provided by the asset-mounted computer of the vehicle asset
communicator 16 to interface with the wireless, or wired, RFID
interrogator 30. The system 10 accordingly can integrate the RFID
reader into a wireless, intelligent, asset-mounted computer, such
that intelligent, automated, accurate interrogations will occur for
items being manipulated by the vehicle. This would enable the
reading of RFID tags in any location within or outside a facility,
without the need for a fixed portal infrastructure, by leveraging
the processing capabilities of mobile, intelligent, wireless
devices (i.e., the vehicle asset communicator). The communicator
and reader accordingly may form a "mobile portal" that allows for
RFID read data to be collected in connection with vehicle
operation. The mobile portal may comprise additional elements such
as, but not limited to, a controller for controlling operation of
the mobile portal, a data storage device for storing data captured
by the RFID Reader 30, and/or a Mobile Portal Processor. When the
vehicle moves into communication range of the gateway device 26, a
data communications link is established between the communicator
and the central data processing system to enable communication of
pertinent data.
[0043] A number of benefits accrue from use of the system 10 over
conventional systems.
[0044] Lowest cost device on the item--RFID tags are becoming the
standard. RFID tag readers on vehicles/assets use the lowest
possible cost RFID tag system on the numerous items to be tracked.
As RFID tags are proliferated, the system becomes significantly
more comprehensive.
[0045] Secure RF system--the RF system on the asset that transmits
the RFID tag data to the central database is proven secure (for
example, is currently installed on military bases). The system has
been through DITSCAP approval.
[0046] Data processing power on the vehicle/asset allows decisions
to be made remotely without reliance on a central computer. The RF
device on each vehicle/asset not only identifies the item being
manipulated, but also provides instantaneous feedback to the
operator in case there is a mistake (i.e., the operator is told he
is manipulating the wrong item in comparison to, for example, a
cargo manifest). Data from each manipulation is analyzed remotely
at the asset without relying on the central computer. This lessons
the load on the central computer and significantly reduces the
response time it takes to convey the validity of each item
manipulation to the operator.
[0047] In an exemplary embodiment of the present invention, an RFID
verifier may be used to compare read RFID tags to a list of RFID
tags that intended to be read. The RFID verifier may be implemented
as part of the communicator 16, as part of the central data
processing system 24 in wireless communication with the
communicator 16, as a stand alone system, or as part of another
component of the system 10. Throughout the present description, the
RFID tags verification functionality may be discussed as being
performed by a specific portion of the system 10, but such
description is present for example only and is not intended to
limit the scope of the present invention.
[0048] Significantly fewer RFID tag readers are required than
conventional systems. Typically, tagged items are identified when
they pass through fixed portals. These fixed portals are limited in
number and usually monitor the item twice (once on their way in and
once on their way out). The location of a particular item is
therefore impossible to determine unless portals are installed on
nearly every inch of the facility. Using the system 10, the RFID
readers are powered from the vehicle/asset, thus allowing the
assets themselves to function as mobile portals. As a result,
management can determine the precise location of an item whether it
is stationary or on the move. By utilizing the vehicles/assets that
move the items as mobile portals, the installation of much fewer
portals throughout the facility is achievable while allowing for
essentially an unlimited number of monitoring points.
[0049] Another significant benefit of the system is the elimination
of the need for real-time network access for the RFID interrogator
30, especially in a situation where the interrogator must be
mobile. This implementation creates a "nested" RFID tag system, in
which the initial read would transpire at the vehicle, with the
interrogated data stored on the mobile, asset-mounted computer,
followed by a secondary data transfer between the mobile,
asset-mounted computer and its wireless infrastructure. For
example, by adding tag reading capability to the vehicle-mounted
system of an airport baggage handler, the operator of a tug or
belt-loader can scan and/or verify bags (i.e., items) as they are
loaded onto a plane, right at the plane, without requiring
real-time network access for a mobile interrogator or requiring the
driver to drive through a portal, both of which might hold up the
airplane loading process. The manifest of bags on the plane would
then be stored on the mobile, intelligent, wireless device.
Additionally, because the mobile, intelligent computer can include
vehicle access control authentication, the system can also record
the person that loaded the plane and the location and time of the
process. Because the mobile, intelligent computer can also store a
passenger baggage manifest, it can also double check each bag for
positive passenger baggage matching. Because the mobile,
intelligent computer can provide for a display, it can notify the
driver of the vehicle about any unexpected baggage scans, such as a
bag that is not in the manifest, or any missing bags, such as bags
that are on the manifest that have not been loaded.
[0050] Additionally, the system may operate in cooperation with the
belt-loader to prevent unexpected baggage items from being loaded
on the belt-loader. For example, the system may be operable to halt
the belt-loader and sound an alert when an unexpected bag is
detected. A baggage handler may then identify and remove the
unexpected bag.
[0051] In an exemplary belt-loader embodiment of the present
invention, an RFID reader 30 may be mounted on an archway extending
over the moving belt of the belt-loader such that all baggage items
pass through the reader. In such an archway configuration, multiple
RFID reader 30 antennas may positioned around the archway to
increase scanning rates. Alternatively, the RFID reader 30 may be
mounted in other arrangements suitable for ensuring that bags pass
within the reading proximity of the reader. In order to accommodate
exceptionally large packages, it may be desirable to mount the RFID
reader 30 adjacent or below the moving belt so that it does not
hinder the movement of the baggage items. Also, multiple RFID
reader 30 antennas may be used to ensure that substantially all of
the baggage items are identified.
[0052] The present invention may also include a VAC 16 and require
each operator to log-in to the system prior to operating the mobile
asset (i.e., a belt-loader or tug). Additionally, such operation
identifies the personnel associated with the baggage loading
process. In such an embodiment, the system may maintain records of
each baggage item along with the operator that handled the item.
The VAC 16 may require an operator to log-in to the system in order
to ensure that only approved operators access the belt-loader. Such
security measures reduce the chance that baggage items are loaded
on an incorrect aircraft. The VAC 16 may also include a GPS
tracking system for continually monitoring the location of the
mobile asset. The system may also be operable to prevent operation
of the mobile asset if it is outside of an allowed operation
region.
[0053] In an exemplary embodiment of the present invention, the VAC
16 may be in communication with the operational electronics of the
belt-loader in order to control movement of the belt-loader. For
example, if the VAC 16 detects a baggage item on the belt-loader
that should not be loaded on the aircraft currently being loaded,
the VAC 16 may stop the belt and prevent movement of the belt until
an operator confirms that the misplaced bag has been removed.
Additionally, the VAC 16 may receive operational data from the
belt-loader in order to optimize operation of the RFID reader 30.
For example, the VAC 16 may detect when the belt is moving and only
read tags during such movement.
[0054] Preferably, the VAC 16 is installed on the belt load
adjacent the operator controls so that the operator has ready
access to the VAC 16 during regular operation of the belt-loader.
For example, the VAC 16 may be installed in the proximity of the
driver's side dash area of the belt-loader.
[0055] Typically, in operation, the operator should provide the
flight number, or other identifying information, to the VAC 16
prior to beginning the loading process. Alternatively, the VAC 16
may be in communication with electronics in the aircraft to
determine the aircraft on which the baggage is being loaded. If the
VAC 16 does not receive such information, it may halt operation of
the belt until an operator supplies flight information to the VAC
16.
[0056] During a baggage loading process, the RFID reader 30 may
begin to read when the operator indicates that baggage is being
loaded, or when the belt begins to move. The RFID reader 30 may
automatically stop reading tags when the belt stops, when no RF tag
is received for a predetermined period of time (e.g., five
minutes), when the belt-loader vehicle begins to move, or when the
operator presses and key to end the read process.
[0057] The system 10 may also include a visual indicator, such as
red and green lights, to indicate whether each baggage item was
successfully scanned and whether the baggage item is authorized for
loading. For example, the green light may light if the baggage item
was read and should be loaded on the aircraft and the red light may
light if the baggage item should not be loaded or if the baggage
tag was not recognized by the VAC 16.
[0058] In another exemplary embodiment of the present invention,
RFID portals may be used throughout the baggage handling chain to
maintain an accurate, and traceable, inventory of every baggage
item within the baggage handling system. Additionally, the system
may track which baggage personnel handled each baggage item during
each step of the baggage loading and/or unloading process.
[0059] Further, after an aircraft is fully loaded, the data
associated with the baggage loaded on the aircraft may be
transmitted to the destination airport for the aircraft. This data
may then be used at the destination to track each baggage item and
ensure that every item is removed from the aircraft. Such data
sharing between airports may help ensure that an airline maintains
a chain of custody of every baggage item from the time it is
checked in until it is picked up by the passenger.
[0060] Each VAC 16 can either transmit data to the gateway 26 in
real time or at intervals. If the VAC 16 is out of communication
range of the gateway 16, it can transmit stored data when the
vehicle device comes back into range of its RF infrastructure. Even
if not available at the airplane loading point, all verifications
and uploads would transpire and no data would be lost. In general,
this implementation would greatly simplify installation
requirements and eliminate a major source of system failure/delay
during airplane loading.
[0061] Additionally, in another exemplary embodiment of the present
invention, the mobile RFID portal may be installed on a baggage
transport vehicle, such as a tug. The portal may be adapted to scan
each item loaded on the vehicle and identify whether the correct
baggage items are loaded and being transported to a particular
aircraft. Typically, the RFID reader 30 may be installed on the tug
and be adapted to read RFID tags 12 that are on carts being towed
by the tug.
[0062] Yet another significant benefit of the present system is the
automation of the scanning process. In a conventional system, the
scanning process is either constantly performed, such as at a fixed
portal, or is initiated via a manual process, such as pressing a
scan button. In a mobile vehicle environment, such as a baggage
handling system, the items (baggage) are often in range of a
vehicle that is not actually moving the baggage. For example, a tug
may be close to many baggage items that are not loaded onto the
carts being pulled by the tug. As a result, the likelihood for
false reads is significant with a "constant" read approach at the
vehicle. The manual scan process is also flawed in that it requires
a vehicle operator to remember to press the scan button to perform
a scan, and the scan will only occur once. The fixed portal
approach is also unreasonable, in that it requires the driver to
drive potentially long distances to the nearest portal to perform a
read. In this implementation, the mobile, asset-mounted computer is
aware of the vehicle's lift/tug status and/or motion status (i.e.,
is it manipulating tagged items). Throughout the present
description, the vehicle's lift/tug status and/or motion status may
be referred to as the vehicle's operational status. However, a
vehicle's operational status may include additional states beyond
the lift/tug status and motion status.
[0063] Using these inputs to initiate RFID tag scans in an
intelligent way provides for an accurate, automated solution for
pallet scanning, for example. The initial read would transpire at
the vehicle, at the time the load is first lifted or tugged, with
the interrogated data stored at the vehicle. Then, while the
vehicle is in motion, the system can optionally scan periodically
to further validate the resultant list of scanned items against the
initial list, to improve scanning accuracy.
[0064] For example, if on the initial scan, an item is scanned
which is not actually being pulled by the tug, it will not appear
again on a subsequent scan after the vehicle has traveled a certain
distance. The list of items would continue to be "honed" until the
vehicle either comes to a stop or releases the load. At that point,
the intelligent, mobile, asset-mounted computer will perform a
secondary data transfer of the accurate list of loaded items to its
wireless infrastructure. This solution can, for example, add
accurate tag reading capability to each vehicle in the baggage
handling system, without the operator of the vehicle actively
initiating any scans or driving through a portal, and without
requiring real-time network access for the mobile interrogator
which could be nearly impossible in such an uncontrolled
environment. The list of moved baggage items would then be stored
on the mobile, intelligent, wireless device. Additionally, because
the mobile, intelligent computer can include vehicle access control
authentication, the system can also record the person that moved
the items and the location and time of the process. Because the
mobile, intelligent computer can also include a weight sensor, it
can also transmit and/or double check the weight cargo. When the
vehicle device comes back into range of its RF infrastructure, even
if not available at every pickup point around the airport, all
uploads would transpire and no data would be lost. In general, this
implementation would greatly simplify installation requirements,
eliminating the need for each vehicle operator to drive through a
fixed portal to perform a scan, which would improve factory
efficiency. Since the mobile asset can determine its location at
all times, the start and end locations can also be transmitted with
the final "honed" list of tags, rather than sending the scan
location for each intermediate scan attempt.
[0065] It will, of course, be understood that the foregoing example
relating to validating scan content in the context of airport
baggage handling has much broader application to any item
manipulation process including pallet handling systems.
[0066] The vehicle asset communicator 16 may further support
bi-directional communications over the data communications link 18.
Such communications may, for example, be effectuated using 2-way
paging. With bi-directional communication support, item
manipulation jobs can be downloaded to the vehicle/asset operator.
This would initiate the need to perform an RFID scan. The job
contents/specification can further be used to validate the RFID
scan and thus the manipulation of the items identified by that
scan. Given reported vehicle/asset location information, the
downloaded job can be efficiently sent to an available operator
(vehicle) which is closest to the currently believed location of
the items which are the subject of the job. This can be especially
valuable when a baggage item lost or is identified at an incorrect
location. The system can alert an operator to transport the baggage
item to the correct location.
[0067] In the context of an RFID tagged container (or other item
containing device), it will be understood that the RFID tag may
include the identifications for items contained in the container
and that the item identifications will be communicated to the
central data processing system 24 following a read of the container
RFID tag.
[0068] Reference is now made to FIG. 2 wherein there is shown an
implementation configuration for the system 10. Each vehicle asset
communicator 16 supports multiple sensors with respect to the
vehicle/asset to which it is mounted. The vehicle asset
communicator 16 functions as an autonomous embedded device. With
respect to data communications, the vehicle asset communicator 16
is not provided with an IP address.
[0069] The data communications link 18 supports communications
between the vehicle asset communicator 16 and the gateways 26. This
link 18 is preferably a bidirectional RF communications link in the
868-928 MHz RF band. Operationally, the vehicle asset communicator
16 and gateway 26 support frequency agile access to the link 18,
and communications are maintained at low power so as to not
interfere with other RF systems.
[0070] The gateways 26 are preferably strategically located with
respect to the environment within which the system 10 operates. For
example, the gateways can be positioned at critical access points
such as entrances and exits. Multiple gateways 26 are provided so
that no single point of failure exists with respect to the data
communication path between the vehicle asset communicator 16 and
the data processing system 24.
[0071] The connection between the gateway 26 and the data
processing system 24 is preferably an Ethernet LAN/WAN. UDP/IP
protocols can be used for the data communications. The data
processing system 24 may be configured as a Microsoft.RTM. SQL
Server having access to a Microsoft.RTM. SQL Server database.
Windows.RTM.-based services are provided on the server which can be
a part of a larger existing computer network if desired (or
alternatively operated on a stand-alone basis). Other computers on
the network run Windows.RTM.-based or Web-based support software.
Communication between other computers and servers associated with
the system 10 is supported by the Ethernet LAN/WAN and utilize ODBC
or SQLOLEDB over TCP/IP.
[0072] Reference is now made to FIG. 3 wherein there is shown an
operational implementation diagram for a vehicle asset communicator
16. The vehicle asset communicator 16 is associated with a mobile
asset or vehicle (for example, mounted therein) and receives power
40 from the asset itself (wherein the asset is identified for
exemplary purposes herein as a belt-loader). Through its peripheral
interface 20, the vehicle asset communicator 16 is coupled to a
plurality of vehicle sensors 42 that function to detect certain
operational conditions of the vehicle. For example, the sensors 42
may function to detect whether the belt-loader's belt mechanism is
moving (and the direction, such as up/down, of that movement). As
another example, the sensors 42 may function to detect whether or
not the belt-loader is moving (and provide information concerning
speed of the vehicle). Each of the sensors 42 may provide data
regarding the operation of the vehicle. Such vehicle operational
data may include, but is not limited to vehicle motion, belt
operation, belt direction, load presence, load weight, vehicle
speed, vehicle direction, vehicle location, vehicle type, and
vehicle operator. The vehicle operational data may also be referred
to as the vehicle operational status or the vehicle operational
characteristics.
[0073] Data collected by these sensors 42 is provided to the
vehicle asset communicator 16 for processing in the manner
described herein. The vehicle asset communicator 16 can also be
coupled to the vehicle's starter or interlock system, which
functions to interrupt and control vehicle use. This permits the
vehicle asset communicator 16 to verify and validate the operator
of the vehicle before permitting its use.
[0074] Through its peripheral interface 20, the vehicle asset
communicator 16 is further coupled to RFID reader/interrogator 30.
As discussed herein, the interrogator 30 reads the identification
information from proximately located RFID tags. The communicator 16
may control actuation of the interrogator 30. In one
implementation, the interrogator can be turned on whenever the
communicator 16 is on. Thus, RFID reads will occur substantially
continuously. In another implementation, the interrogator can be
selectively turned on at the instruction of the communicator 16.
Thus, RFID reads only occur when desired (for example, as an event
driven exercise). Beneficially, this implementation minimizes
spurious read and RF interference due to reads and can be used to
substantially improve read accuracy, since multiple reads can be
combined with sensor data to "hone" a tag list.
[0075] The vehicle asset communicator 16 supports a number of
processor driven functionalities 50 (executed in response to and
under the control of an algorithm executed by a processor within
the vehicle asset communicator). One primary function performed is
data storage (for example, through use of a RAM). Data collected
from peripheral devices 22 (vehicle sensors, RFID reader 30, and
the like) can be temporarily stored in the data storage memory in
the event the communicator 16 does not, or cannot, communicate that
data over the link 18.
[0076] The vehicle asset communicator 16 is also an autonomous,
intelligent device and accordingly includes processing
functionality that governs its actions. This processing
functionality can determine when to take sensor and/or RFID reads
and when to make data communications. For example, a read or
communication may be triggered by identifying the occurrence of an
event of interest (such as vehicle movement or belt movement or
location detection). The vehicle asset communicator 16 still
further includes a radio frequency (RF) communications
functionality. In one implementation, that functionality can be
only a transmit operation. In another implementation, the
functionality is a transceiver which supports both transmit and
receive operations. Preferably, the RF communications are low power
and secured--as an example, communications frequency agile in the
868-928 MHz RF band.
[0077] The vehicle asset communicator 16 still further
incorporates, or supports the connection to, a visual display and a
data entry device. As an example, both display and entry can be
accommodated using a touchscreen. Separate LED/LCD display and data
entry keypads provide another optional implementation. Data entered
through the data entry device is handled by the processing
functionality and stored in the data storage memory. Additionally,
as discussed herein the vehicle asset communicator 16 includes, or
supports connection to, a geographic location system such as a GPS
receiver or a triangulation system. Location data is collected at
the direction of the processing functionality and stored in the
data storage memory.
[0078] The vehicle asset communicator 16 configured in the manner
described herein allows for the collection of important data in a
related manner. For example, through the vehicle sensors the
vehicle asset communicator 16 can determine that an item
manipulation is occurring (for example, a baggage item is now on
the belt). Responsive thereto, the processing functionality can
order the RFID reader 30 interrogate the RFID tag for the item and
collect the associated identification data. This data can be stored
in the data storage memory and transmitted, when appropriate, using
the RF communications functionality over the link 18.
[0079] Location data may also be collected and associated with the
identification data to provide a record of where the item was
manipulated and interrogated. Monitoring of location can continue
as the mobile asset moves about the environment. Collected location
data can be stored to enable tracking of mobile asset movement in
connection with the handling and manipulation of the item.
[0080] Through the data entry device, the identification of the
mobile asset operator can be obtained with this information also
stored in the data storage memory in association with the item
being handled. In this way, a record is kept of who was involved in
data handling and operation of the mobile asset. All of the
foregoing data can be time stamped so as to record when the data
was collected. Again, this time information is stored by the data
storage memory in association with the other data. Thus a record is
kept of when each read or data collection event occurred.
[0081] An appropriate processing algorithm can be created within
the capabilities of one skilled in the art to govern the operations
of the vehicle asset communicator processor. Some functional
operations to be performed by the processor are discussed in detail
herein.
[0082] Reference is now made to FIG. 4 wherein there is shown a
functional block diagram describing operation of the system of FIG.
1. The vehicle asset communicator 16 includes an RFID
reader/interrogator 30 and further monitors the mobile asset
operation. Certain operational actions taken by the mobile asset
trigger actuation of the RFID reader/interrogator 30 to obtain item
identification from proximately located RFID tags 12. The
processing functionality processes the identification data obtained
by the RFID reader 30 in comparison with stored data obtained from
the central data processing system 24 which specifies the items to
be manipulated by that mobile asset. The processing functionality
can accordingly ensure accuracy in the item manipulation process.
For example, the central data processing system 24 may specify that
certain items are to be moved from one location to another. When
the mobile asset reaches the first location and captures the items,
an RFID read is performed to obtain the identification of the items
being captured. This list of item identifications is then compared
by the processing functionality in the vehicle asset communicator
16 to ensure that the proper items have been captured. If a
discrepancy is found (i.e., too many items, wrong items, not enough
items, missing items, and the like), the operator of the mobile
asset is notified through the display so that corrective action can
immediately be taken. A discrepancy report can also be formatted by
the vehicle asset communicator 16 for transmission back to the
central data processing system 24.
[0083] As mentioned before, the RFID read can be triggered by a
certain event. For example, the mobile asset may move about the
environment and if the RFID reader were active then many irrelevant
identification reads would occur. With event triggering, the number
of reads can be controlled, thus making the collected data more
relevant and accurate. In one example, as a tug moves about an
airport terminal without a load of items, no RFID reads are taken.
This not only eliminates spurious reads from the tug's reader, but
also prevents interference with adjacent tugs. When the tug stops
and connects to a baggage cart, this event acts as a trigger and
the RFID reader is activated to check for proximately locate RFID
tags. The read identifications are then captured and stored by the
vehicle asset communicator. The tug then drives off with its
collected items. This triggers a second RFID read for proximately
located RFID tags. The currently read identifications are captured
and compared with the previously read and stored identifications.
This comparison functions to confirm that the items identified in
the first read are still present on the tug. If an item is missing
as identified by the comparison an alert can be generated. Also, if
an item is missing, this could be indicative of the fact that the
read item was proximately located to the tug when the tug was
connected to the cart, but was not one of the items which was
captured and moved; alternatively, the missing item may indicate a
read failure during this scan or may indicate that a luggage item
fell off the cart. Still further, if a new item is found then this
would be indicative of a spurious read (of a proximate but not
loaded item) as it is not possible to have captured a new tagged
item while the tug is in motion, or of a failure rate from a
previous attempt. This new item read can then be ignored. This
process can be repeated periodically throughout the duration of the
movement to further validate the list of loaded items, and resolve
discrepancies between RFID read rate issues with non-loaded items.
It will thus be understood that validation of the loaded items can
be more accurately made than could otherwise be done with a single
scan.
[0084] The gateway 26 functions to receive data transmitted from
the vehicle asset communicator 16 over the link 18. The gateway 26
further functions, in implementations where the vehicle asset
communicator 16 possesses transceiver RF functionality, to send
data received from the central data processing system 24 to the
vehicle asset communicator. As mentioned herein, this transmitted
data may comprise a specification of items to be manipulated by the
mobile asset. The gateway 26 supports communication with a
plurality of vehicle asset communicators 16 and thus functions as a
node in a distributed processing system.
[0085] The central data processing system 24 supports discontinuous
communications connections with the plurality of vehicle asset
communicators 16. No real-time communications link need be
established with the vehicle asset communicators 16. For example,
with respect to the vehicle asset communicator 16, it can store
data to be transmitted to the central data processing system 24 and
wait for an appropriate time when access to the gateway 26 over the
link 18 becomes available. Similarly, with respect to the central
data processing system 24, it can communicate a message intended
for delivery to a certain vehicle asset communicator 16 to one or
more of the gateways 26 where the message is queued for later
delivery by that gateway when the addressed vehicle asset
communicator comes into communications range.
[0086] Importantly, the central data processing system 24 need not
make any decisions about the validity of RFID reads or the data it
receives from vehicle asset communicators 16. Instead, the vehicle
asset communicators 16 operate as autonomous devices with
processing functionality that allows each communicator to evaluate
the validity of its RFID reads and thus communicate validity
checked data over the link 18 to the central data processing system
24. Additionally, the central data processing system 24 need not
micro-manage the operations of the vehicle asset communicators, as
the autonomous operation and intelligent processing functionality
of the vehicle asset communicators allows the communicators to
function with minimal, and in some instance no, instruction. In
this way, it will be recognized that only necessary data need be
transmitted and received by the central data processing system 24.
The abilities of the vehicle asset communicator 16 and gateway 26
to engage in decision making advantageously eliminate the need for
middleware, real-time communications links, and unnecessary
communication. Instead, problems can be detected and addressed with
the vehicle asset communicator 16 thus obviating the need for the
large data processing capabilities at the central node. However,
for purposes of redundancy checking, it may be desirable to perform
further processing at the central data processing system 24.
[0087] It will of course be understood that the vehicle asset
communicator and its associated RFID reader 30 could be installed
on a moveable item/asset itself (such as a freight container, a
trailer, a railroad freight car, and the like). Since these
items/assets may not be powered for movement, the vehicle asset
communicator 16 may receive power from an alternate power source 60
(see FIG. 3) such as a rechargeable battery. When in this
configuration, the "mobile portal" can read the identifications of
tagged items as they are placed in or removed from the moveable
asset/item. Then, when the moveable asset/item is moved into range
of a gateway 26, for example, when a container is loaded on an
aircraft, the read identification information for the current item
contents can be communicated through the gateway 26 to the central
data processing system 24.
[0088] Such cargo containers may be useful for carrying baggage to
be loaded onto an aircraft. In such an embodiment, the VAC 16 may
be installed on the outside of a container. The VAC 16 may be
operable to not only monitor contents put into or taken out of the
container, but it can also control access to the container. For
example, the VAC 16 may communicate with a locking mechanism that
requires an operator to log into the VAC 16 in order to gain access
to the container. The operator may also be required to log in to
the VAC 16 in order to gain authorization to perform a read
operation on the contents of the container. In an exemplary
embodiment of the present invention, access to the contain is
controlled by a VAC 16 and when the door to the container is open
(or the contents of the container are otherwise accessible) the
RFID reader 30 reads any tags that pass into or out of the
container. The RFID reader 30 may transition out of read mode when
the container is closed or when it is moved.
[0089] The container may also include sensors in communication with
the VAC 30 to detect when the container is open, when it is moving,
or when someone attempts to tamper with the container. The VAC 30
may be operable to communication such information to the central
data processor 24.
[0090] When an operator logs in to the VAC 30, the operator may
identify the flight on which the container is to be placed. The
system 10 may then identify the flight's baggage manifest to
identify which baggage items may be placed in the container. In an
alternative embodiment, the container may be loaded prior to
receiving a manifest list. In such an embodiment, the container
will build a manifest list and once a flight is identified, the
system 10 may indicate whether all of the baggage items loaded on
the container belong on the identified flight. Generally, it is
preferable to access the manifest prior to loading the container
because then the system 10 can indicate whether each item belongs
in the container as it is being inserted.
[0091] In an exemplary embodiment of the present invention, the
container includes indicators, such as green and red lights, to
indicate whether a baggage item loaded into the container is on the
container's manifest. If a particular baggage item is authorized to
be put into the container, a green light may illuminate to indicate
that the baggage item should be placed in the container. If a
baggage item is not authorized to be placed into the container, a
red light may illuminate to indicate that the baggage item does not
below in the container.
[0092] A more complete understanding of the configuration and
operation of the system of the present invention may be obtained by
consideration of the following operational characteristics.
[0093] First, it is recognized that the mobile portal can read and
store RFID information in an autonomous manner (i.e., without the
use of the wireless gateway or the central processing computer). In
this way, reads can occur regardless of whether a wireless
connection with the central computer exists. Additionally, one can
be assured of the performance of a read, regardless of wireless
connection state, since the mobile portal can make the read and
store the data until an opportunity arises to wirelessly
communicate with the central computer. The system is accordingly
much more robust and immune to interfering wireless systems.
[0094] Second, since the RFID reads can be triggered by events such
as vehicle movement and/or lift operation alone, and further does
not require the existence of a wireless communication link to the
central computer, there is no need in a given environment for fixed
portals. As discussed herein, such portals are extremely wasteful
for drivers to pass through in the course of business (wastes of
time and money).
[0095] Third, because the mobile portals are intelligent computing
devices, the mobile portal can take actions on its own (in
accordance with its programming) without commands from a central
processing system. For example, the mobile portal can decide on its
own to shut down in the event of an invalid read or alternatively
generate and alert or warning to an operator. Still further, the
mobile portal can monitor for state of completion concerning a
designated task and provide status updates to the operator
concerning completion of that task. Additionally, the mobile
portals can "think" in a deductive reasoning capacity with respect
to the collected data and then draw necessary conclusions with
respect to item manipulation.
[0096] Fourth, the intelligent computing device design for the
mobile portals further facilitates control over use of the mobile
asset. Again acting in an autonomous or semi-autonomous manner, the
mobile portal can exercise control over use of the mobile asset by
requiring an operator to present identification prior to enabling
the asset for operation. In this way, once knowledge of the
authorized operator is presented, the mobile portal can associate
that operator identification to each RFID read in an automatic
manner. This information can be saved and remotely reported, and
thus allows for tracking of which operator manipulated each
item.
[0097] Fifth, through use of the locating component, the mobile
portal can implement its own continuous vehicle location
determination technique (indoors and outdoors) in an automatic
fashion. This allows the mobile portal to associate each RFID read
to a location. The location information can be coupled by the
mobile portal with other data, such as vehicle sensor data, to
associate operation locations to RFID tagged items and the movement
or manipulation of those items.
[0098] Sixth, the collected sensor data can be associated with RFID
reads. For example, an amount of weight loaded, a distance
traveled, a length of time controlled, and the like, can all
comprise pieces of information that are associated with a read.
This data becomes even more valuable when further linked to
location data as discussed herein.
[0099] Seventh, the mobile portal can implement an auto-read
algorithm wherein it exercises control over when, where and how
often RFID reads are taken. The algorithm further can intelligently
draw conclusions from the reads and the instances of those reads
concerning what, where, when and how items are being manipulated.
For example, the mobile portal can leverage knowledge of belt
status, tug status, and vehicle movement status (including distance
traveled) to intelligently cause multiple RFID reads to occur and
the filter out read information which do not "stay" with the
vehicle during movement so as to provide significantly improved
read accuracy. Thus, RFID reads are not saved with respect to
nearby located items since that data will not be present over the
course of the multiple RFID reads displaced over time and/or
distance. In this way, the mobile portal can accurately report only
as to those items which actually have been manipulated.
[0100] Eighth, since the algorithm is automatically executed (i.e.,
without need for human interaction and control), and further is
initiated by the mobile portal itself (i.e., without need for
central computer interaction and control), human error and
environmental communications conditions are eliminated as factors
which could adversely affect the read process.
[0101] While the invention has been disclosed in its preferred
forms, it will be apparent to those skilled in the art that many
modifications, additions, and deletions can be made therein without
departing from the spirit and scope of the invention and its
equivalents as set forth in the following claims.
* * * * *