Sign In to Follow Application
View All Documents & Correspondence

A Method And System Of Adhering Wireless Tag

Abstract: ABSTRACT A METHOD AND SYSTEM OF ADHERING WIRELESS TAG A method (100) of adhering wireless tag is disclosed. The method (200) begins at step 110, by integrating wireless tag (14) into a seal (12) to form a tag housing (10). At step 120, the tag housing (10) is joined on a tag holder (4) with a cavity. At step 130, the tag housing (10) is affixed on an article (6) by an attachment means (8). Further, the wireless tag (14) can be removed manually by peeling off the seal (12) and reused for another article (6).

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
03 October 2017
Publication Number
14/2019
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
vivek.dahiya@sagaciousresearch.com
Parent Application

Applicants

QFROG LOGISTICS PVT LTD
Flat No 1201, Plot No 12, IIT Engineers CGHS Ltd Society, Sector 10, Dwarka-110075 , New Delhi

Inventors

1. Shashank Khare
B984 GF, Palam Vihar, Gurgaon, Haryana-122017, India
2. Arijit Mukherjee
34 Sai Hills, Kolar Road, Bhopal, Madhya Pradesh, 462042, India

Specification

The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of The present invention relates generally to field of luggage luggageluggageluggageluggage and and and and inventory inventory inventory inventory inventory inventory management andmanagement andmanagement andmanagement andmanagement andmanagement andmanagement andmanagement andmanagement andmanagement and management andmanagement andmanagement and in particular in particularin particularin particular to to to a method method method method method method and and and and system system system system system of adheringadheringadheringadheringadhering adheringadhering wirelesswirelesswireless wireless tag tag. 5
BACKGROUND OF THE INVENTIONBACKGROUND OF THE INVENTIONBACKGROUND OF THE INVENTIONBACKGROUND OF THE INVENTION BACKGROUND OF THE INVENTION BACKGROUND OF THE INVENTIONBACKGROUND OF THE INVENTION BACKGROUND OF THE INVENTION BACKGROUND OF THE INVENTION
Today, Today, Today, Today, Today, Today, wirelesswireless wirelesswireless tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications tags are utilized in a variety of applications including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized including retail security, inventory management and computerized 10 checkout. checkout. checkout. checkout. checkout. checkout. In particular, In particular, In particular, In particular, In particular, In particular, In particular, Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)Radio Frequency Identification (RFID) Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)Radio Frequency Identification (RFID) Radio Frequency Identification (RFID)Radio Frequency Identification (RFID) Radio Frequency Identification (RFID)Radio Frequency Identification (RFID) Radio Frequency Identification (RFID)Radio Frequency Identification (RFID)Radio Frequency Identification (RFID) Radio Frequency Identification (RFID) tags are tags are tags are tags are tags are tags are rapidly becoming the preferred method of inventory trac rapidly becoming the preferred method of inventory trac rapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory trac rapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory trac rapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory trac rapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory trac rapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory trac rapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory trac rapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory trac rapidly becoming the preferred method of inventory trac rapidly becoming the preferred method of inventory tracrapidly becoming the preferred method of inventory trac king in retail and king in retail and king in retail and king in retail and king in retail and king in retail and king in retail and king in retail and king in retail and king in retail and king in retail and distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) distribution applications. RFID systems use a RF field generator (reader) and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods and a plurality of RFID tags that store information about the goods products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic products to which they are attached. RFID tags miniature electronic 15 circuits that typic circuits that typic circuits that typic circuits that typic circuits that typiccircuits that typic circuits that typic circuits that typiccircuits that typic ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small ally consist of a coil that acts as an antenna and small silicon silicon -based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single based microprocessor with a memory all embedded on single electronic circuit.electronic circuit. electronic circuit. electronic circuit. electronic circuit. electronic circuit.
Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory Conventional techniques for retail security and inventory 20 management include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic st management include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic st management include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic st management include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic st management include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic stmanagement include use of barcodes and magnetic st management include use of barcodes and magnetic stmanagement include use of barcodes and magnetic st rips. rips. rips. However,However,However,However,However,However,However,However, the the the use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data use of barcodes and magnetic strips is limited due to small amount data they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite they can encode and the effective range, at which be read, is quite short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range short. Magnetic strips, for example, generally have such a limited range that the rea that the reathat the reathat the reathat the rea that the reathat the reathat the rea that the reader must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode der must be in direct contact with the strip order to decode 25 the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with the data therein. Further, bar codes are mostly ink printed. Hence, with time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it time and rough handling of the article on which bar code is printed, it often gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes dif often gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes dif often gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes dif often gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes dif often gets erased. Thus, it becomes dif often gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes dif often gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difoften gets erased. Thus, it becomes difficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect ficult for the scanner to detect bar code and the information stored within.bar code and the information stored within.bar code and the information stored within. bar code and the information stored within.bar code and the information stored within. bar code and the information stored within.bar code and the information stored within.bar code and the information stored within.bar code and the information stored within. bar code and the information stored within.bar code and the information stored within. bar code and the information stored within.bar code and the information stored within.bar code and the information stored within.bar code and the information stored within.bar code and the information stored within.bar code and the information stored within. bar code and the information stored within.bar code and the information stored within. bar code and the information stored within.bar code and the information stored within. bar code and the information stored within. bar code and the information stored within. bar code and the information stored within.
30
There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and There have been a number of solutions provided for improved and
3
efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them efficient retail security, inventory management and logistics. Few of them have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below: have been discussed below:
US 7256699725669972566997256699725669972566997256699 B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into B2 discloses a RFID tag that is integrated into buttonbuttonbutton buttonbutton-type, substantially cylindrically type, substantially cylindricallytype, substantially cylindricallytype, substantially cylindrically type, substantially cylindrically type, substantially cylindricallytype, substantially cylindrically type, substantially cylindricallytype, substantially cylindrically type, substantially cylindricallytype, substantially cylindrically type, substantially cylindricallytype, substantially cylindricallytype, substantially cylindricallytype, substantially cylindricallytype, substantially cylindricallytype, substantially cylindrically type, substantially cylindrically type, substantially cylindrically type, substantially cylindrically type, substantially cylindrically-shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for shaped housing with a portion for 5 attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an attaching the tag to an articlearticle article to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through to be identified through Radio Frequency Radio Frequency Radio Frequency Radio Frequency Radio Frequency Radio Frequency Radio Frequency Radio Frequency Radio Frequency Radio Frequency Identification techniques Identification techniquesIdentification techniquesIdentification techniques Identification techniquesIdentification techniques Identification techniques Identification techniques Identification techniquesIdentification techniquesIdentification techniquesIdentification techniquesIdentification techniques Identification techniquesIdentification techniquesIdentification techniques.
US 8547228854722885472288547228854722885472288547228 B2 provides B2 provides B2 provides B2 provides B2 provides B2 provides B2 provides a multia multia multia multia multi -attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attach reusable RFID tag that is attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled attached to an article in two stages. An attachment clip is coupled 10 article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then article in first stage. During a second stage, the attachment clip is then secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing secured in a releasable locking mechanism of housing containing the the the RFID tag. RFID tag. RFID tag.RFID tag.RFID tag.
The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about The aforesaid documents and similar disclosures which talk about 15 RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, RFID tags comprise of number shortcomings and drawbacks such as, but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. but not limited to, complicated removal of the RFID tag from its housing. Further, the removal of RFID t Further, the removal of RFID tFurther, the removal of RFID tFurther, the removal of RFID t Further, the removal of RFID t Further, the removal of RFID tFurther, the removal of RFID tFurther, the removal of RFID t Further, the removal of RFID tFurther, the removal of RFID tFurther, the removal of RFID tFurther, the removal of RFID tFurther, the removal of RFID t Further, the removal of RFID tFurther, the removal of RFID t Further, the removal of RFID t Further, the removal of RFID tFurther, the removal of RFID tFurther, the removal of RFID t Further, the removal of RFID tFurther, the removal of RFID tag damages the ag damages the ag damages the ag damages the ag damages the ag damages the ag damages the ag damages the ag damages the ag damages the ag damages the ag damages the ag damages the packages and boxespackages and boxespackages and boxes packages and boxespackages and boxespackages and boxes packages and boxespackages and boxespackages and boxespackages and boxespackages and boxespackages and boxespackages and boxespackages and boxespackages and boxes or or as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. attach the RFID tag at source. 20
Accordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have an Accordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have anAccordingly, there remains a need in the prior art to have an efficientefficientefficientefficient efficientefficientefficient and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods and rapid delivery of goods by using reusableby using reusableby using reusableby using reusableby using reusable by using reusableby using reusable by using reusable by using reusableby using reusable and stackableand stackableand stackableand stackableand stackable and stackableand stackable and stackableand stackableand stackable RFID RFID tags, tags, tags, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, which overcomes the aforesaid problems and shortcomings. Further, the method and the method and the method and the method and the method and the method and the method and the method and the method and the method and the method and the method and the method and system for system for system forsystem forsystem forsystem forsystem for the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost the present invention are simple and cost 25 effective.effective.effective. effective. effective.effective.
OBJECT OBJECTOBJECT OF THE INVENTION OF THE INVENTION OF THE INVENTION OF THE INVENTIONOF THE INVENTION
It is It is It is an object object object object of the present invention toof the present invention to of the present invention to of the present invention toof the present invention toof the present invention toof the present invention to of the present invention toof the present invention to of the present invention toof the present invention toof the present invention toof the present invention toof the present invention toof the present invention to of the present invention toof the present invention toof the present invention toof the present invention to provide provide provide provide a methodmethodmethodmethodmethodmethod and and and and system system system of of of adhering wireless tagadhering wireless tagadhering wireless tagadhering wireless tagadhering wireless tag adhering wireless tagadhering wireless tagadhering wireless tag adhering wireless tag adhering wireless tagadhering wireless tag adhering wireless tag adhering wireless tag. 30
4
Another Another Another Another Another Another Another object object object object of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide manually manually manually manually manually manually manually manually removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles. removable or detachable wireless tags by peeling them off from articles.
Another Another Another Another Another Another Another objectobjectobject of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide of the present invention is to provide a system and a system and a system and a system and a system and a system and a system and a system and a system and a system and method method method method method method method of of adhering wireless tagadhering wireless tagadhering wireless tagadhering wireless tagadhering wireless tag adhering wireless tagadhering wireless tagadhering wireless tagadhering wireless tag adhering wireless tag adhering wireless tag adhering wireless tag adhering wireless tag, to provide to provideto provideto provide to provide improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail improved and efficient retail security, inventory management and logistics. security, inventory management and logistics. security, inventory management and logistics. security, inventory management and logistics. security, inventory management and logistics. security, inventory management and logistics. security, inventory management and logistics.security, inventory management and logistics.security, inventory management and logistics. security, inventory management and logistics. security, inventory management and logistics. security, inventory management and logistics.security, inventory management and logistics.security, inventory management and logistics.security, inventory management and logistics.security, inventory management and logistics.security, inventory management and logistics.security, inventory management and logistics.security, inventory management and logistics.security, inventory management and logistics. security, inventory management and logistics.security, inventory management and logistics.security, inventory management and logistics.security, inventory management and logistics. security, inventory management and logistics.security, inventory management and logistics.security, inventory management and logistics. 5
Yet another Yet another Yet another Yet another Yet another Yet another Yet another Yet another Yet another objectobjectobject of the present invention isof the present invention isof the present invention isof the present invention isof the present invention isof the present invention isof the present invention isof the present invention isof the present invention is of the present invention isof the present invention isof the present invention isof the present invention isof the present invention is of the present invention isof the present invention isof the present invention is of the present invention isof the present invention isof the present invention is to provide stackable to provide stackable to provide stackable to provide stackable to provide stackable to provide stackable to provide stackable to provide stackable to provide stackable to provide stackable to provide stackable to provide stackable to provide stackable wireless tag holderwireless tag holderwireless tag holder wireless tag holder wireless tag holderwireless tag holderwireless tag holder wireless tag holderwireless tag holder wireless tag holder for care of storage for care of storage for care of storage for care of storage for care of storagefor care of storage for care of storage for care of storage for care of storage.
Yet another obYet another obYet another ob Yet another obYet another obYet another obYet another obYet another obYet another obYet another ob ject

Claims:We Claim:
1. A method (100) of adhering wireless tag (14), the method comprising steps of:
integrating (110) wireless tag (14) into a seal (12) to form a tag housing (10);
joining (120) the tag housing (10) on a tag holder (4) with a cavity; and
affixing (130) the tag housing (10) on an article (6) by an attachment means (8);
wherein the wireless tag (14) can be removed manually by peeling off the seal and reused for another article (6).

2. The method as claimed in claim 1, wherein said wireless tag (14) is Radio Frequency Identification (RFID).

3. The method as claimed in claim 1, wherein said tag housing (10) is made of, but not limited to, plastic material, fiber material, polymers and mixture thereof.

4. The method as claimed in claim 1, wherein said attachment means (8) is selected from a group of, a punching gun, a plurality of adhesives and manual punching by using snap fit.

5. The method as claimed in claim 1, wherein said plurality of adhesives is selected from a group of, but not limited to, acrylate, acrylic resin, phenol formaldehyde resin and polyvinyl acetate (PVA).
6. The method as claimed in claim 1, wherein said article (6) is selected from a group of, but not limited to, packages and logistics.

7. The method as claimed in claim 1, wherein said wireless tag (14) is reusable by removing manually and integrating further into another article (6).
8. A system for adhering a wireless tag (14) comprising:
a tag holder (4);
a cavity provided within the tag holder (4);
a tag housing (10); and
an attachment means (8) for adhering the tag housing (10) of a wireless tag (14) on to the tag holder (4);
wherein, the wireless tag (14) is adapted to be fit in the cavity of the tag holder (4);
wherein, the wireless tag (14) configured to provide information about the article (6) and is manually removable.

9. The wireless tag (14) as claimed in claim 8, wherein said tag holder (4) is provided in multiple shapes of, oval, round, square, rectangular and ellipse.

10. The wireless tag (14) as claimed in claim 8, wherein said the article (6) is selected from a group of, packages and logistics.

11. The wireless tag (14) as claimed in claim 8, wherein said attachment means (8) is selected from a group of, a punching gun, a plurality of adhesives and manual punching.

12. The wireless tag (14) as claimed in claim 8, wherein said plurality of adhesives is selected from a group of, acrylate, acrylic resin, phenol formaldehyde resin and Polyvinyl acetate (PVA).

13. The wireless tag (14) as claimed in claim 8, wherein said wireless tag (14) is Radio Frequency Identification (RFID).

14. The wireless tag (14) as claimed in claim 8, wherein said tag housing (10) is made of, plastic material, fiber material, polymers and mixture thereof.

Dated this the 29th day of September 2017.

[VIVEK DAHIYA]
OF SAGACIOUS RESEARCH
AGENT FOR THE APPLICANT- IN/PA 1491
, Description:FORM 2
THE PATENTS ACT 1970
(39 of 1970)
&
THE PATENTS RULES, 2003
COMPLETE SPECIFICATION
[See section 10 and rule 13]

“A METHOD AND SYSTEM OF ADHERING WIRELESS TAG”

QFROG LOGISTICS PVT LTD, an Indian Company, of SGF003, of Flat No 1201, Plot No 12, IIT Engineers CGHS Ltd Society, Sector 10, Dwarka-110075, New Delhi

The following specification particularly describes the invention and the manner in which it is to be performed

FIELD OF THE INVENTION

The present invention relates generally to field of luggage and inventory management and in particular to a method and system of adhering wireless tag.

BACKGROUND OF THE INVENTION

Today, wireless tags are utilized in a variety of applications including retail security, inventory management and computerized checkout. In particular, Radio Frequency Identification (RFID) tags are rapidly becoming the preferred method of inventory tracking in retail and distribution applications. RFID systems use a RF field generator (reader) and a plurality of RFID tags that store information about the goods and products to which they are attached. RFID tags are miniature electronic circuits that typically consist of a coil that acts as an antenna and a small silicon-based microprocessor with a memory all embedded on a single electronic circuit.

Conventional techniques for retail security and inventory management include use of barcodes and magnetic strips. However, the use of barcodes and magnetic strips is limited due to small amount of data they can encode and the effective range, at which they can be read, is quite short. Magnetic strips, for example, generally have such a limited range that the reader must be in direct contact with the strip in order to decode the data therein. Further, the bar codes are mostly ink printed. Hence, with time and rough handling of the article on which the bar code is printed, it often gets erased. Thus, it becomes difficult for the scanner to detect the bar code and the information stored within.

There have been a number of solutions provided for improved and efficient retail security, inventory management and logistics. Few of them have been discussed below:

US 7256699 B2 discloses a RFID tag that is integrated into button-type, substantially cylindrically-shaped housing with a portion for attaching the tag to an article to be identified through Radio Frequency Identification techniques.

US 8547228 B2 provides a multi-attach reusable RFID tag that is attached to an article in two stages. An attachment clip is coupled to an article in first stage. During a second stage, the attachment clip is then secured in a releasable locking mechanism of a housing containing the RFID tag.

The aforesaid documents and similar disclosures which talk about RFID tags comprise of number of shortcomings and drawbacks such as, but not limited to, complicated removal of the RFID tag from its housing. Further, the removal of the RFID tag damages the packages and boxes or as per most of the cases, RFID tag itself gets damaged. Also, it is difficult to attach the RFID tag at the source.

Accordingly, there remains a need in the prior art to have an efficient and rapid delivery of goods by using reusable and stackable RFID tags, which overcomes the aforesaid problems and shortcomings. Further, the method and system for the present invention are simple and cost effective.

OBJECT OF THE INVENTION
It is an object of the present invention to provide a method and system of adhering wireless tag.
Another object of the present invention is to provide manually removable or detachable wireless tags by peeling them off from articles.
Another object of the present invention is to provide a system and method of adhering wireless tag, to provide improved and efficient retail security, inventory management and logistics.
Yet another object of the present invention is to provide stackable wireless tag holder for care of storage.
Yet another object of the present invention is to provide a punching gun to attach the tag holder with packaging box by generating constant force. The constant force ensures that during attachment process the packaging box do not get damaged.
SUMMARY OF THE INVENTION
Embodiments of the present invention aim to provide a method and a system for of adhering wireless tag. The present invention provides a system for efficient and rapid delivery of goods by using reusable and stackable wireless tags. The wireless tag adherence system of present invention facilitates stacking of the wireless tags as it is provided with protrusions that facilitate easy storage and transportation. Further, the wireless tags are suitably attached on to the articles by an attachment means. Further, the wireless tags are reusable and are easily detachable by peeling them off from articles.
According to first embodiment of the invention, a method of adhering wireless tag is disclosed, the method comprises steps of, but not limited to, integrating wireless tag into a seal to form a tag housing, joining the tag housing on a tag holder with a cavity and affixing the tag housing on an article by an attachment means. Further, the wireless tag can be removed manually by peeling off the seal and reused for another article.

Further, the wireless tag is Radio Frequency Identification (RFID). Further, the tag housing is made of, but not limited to, plastic material, fiber material, polymers and mixture thereof.

In accordance with an embodiment of the present invention, the attachment means is selected from a group of, but not limited to, a punching gun, a plurality of adhesives and manual punching by using snap fit.

In accordance with an embodiment of the present invention, the plurality of adhesives is selected from a group of, but not limited to, acrylate, acrylic resin, phenol formaldehyde resin and polyvinyl acetate (PVA).

In accordance with an embodiment of the present invention, the article is selected from a group of, but not limited to, packages and logistics.

In accordance with an embodiment of the present invention, the wireless tag is reusable by removing manually and integrating further into another article.

In accordance with another embodiment of the invention, a system for adhering a wireless tag, the system comprises, a tag holder, a cavity provided within the tag holder, a tag housing, a fastening means for adhering the tag housing of a wireless tag on to the tag holder. Further, the wireless tag is adapted to be fit in the cavity of the tag holder. Further, a seal is provided for adhering the wireless tag constituting a tag housing inside the cavity of the tag holder.

In accordance with an embodiment of the present invention, the tag holder is provided in multiple shapes of, but not limited to, oval, round, square, rectangular and ellipse.

In accordance with an embodiment of the present invention, the article is selected from a group of, but not limited to, packages and logistics.

In accordance with an embodiment of the present invention, the attachment means is selected from a group of, but not limited to, a punching gun, a plurality of adhesives and manual punching.

In accordance with an embodiment of the present invention, the plurality of adhesives is selected from a group of, but not limited to, acrylate, acrylic resin,
phenol formaldehyde resin and Polyvinyl acetate (PVA).

In accordance with an embodiment of the present invention, the wireless tag is Radio Frequency Identification (RFID). Further, the tag housing is made of, but not limited to, plastic material, fiber material, polymers and mixture thereof.

BRIEF DESCRIPTION OF THE DRAWINGS
So that the manner in which the above recited features of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may have been referred by embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawing illustrate only typical embodiments of this invention and are therefore not to be considered limiting of its scope, for the invention may admit to other equally effective embodiments.
These and other features, benefits, and advantages of the present invention will become apparent by reference to the following text figure, with like reference numbers referring to like structures across the views, wherein:
Fig. 1 (a) illustrates a schematic view of a tag housing that comprises a seal and a wireless tag, in accordance with an embodiment of the present invention.
Fig. 1 (b) illustrates top view of a tag housing, in accordance with an embodiment of the present invention.
Fig. 1 (c) illustrates bottom view of a tag, in accordance with an embodiment of the present invention.
Fig. 2 illustrates a schematic view of snapping a holder on an article by using a punching gun, in accordance with an embodiment of the present invention.
Fig. 3 illustrates side view of stacked wireless tag holders, in accordance with an embodiment of the present invention.
Fig. 4 is flowchart showing method of adhering wireless tag, in accordance with an embodiment of the present invention.
Fig. 5 is a front view showing the stacking of the wireless tag holders, in accordance with an embodiment of the present invention.

DETAILED DESCRIPTION OF THE DRAWINGS
While the present invention is described herein by way of example using embodiments and illustrative drawings, those skilled in the art will recognize that the invention is not limited to the embodiments of drawing or drawings described, and are not intended to represent the scale of the various components. Further, some components that may form a part of the invention may not be illustrated in certain figures, for ease of illustration, and such omissions do not limit the embodiments outlined in any way. It should be understood that the drawings and detailed description thereto are not intended to limit the invention to the particular form disclosed, but on the contrary, the invention is to cover all modifications, equivalents, and alternatives falling within the scope of the present invention as defined by the appended claim. As used throughout this description, the word "may" is used in a permissive sense (i.e. meaning having the potential to), rather than the mandatory sense, (i.e. meaning must). Further, the words "a" or "an" mean "at least one” and the word “plurality” means “one or more” unless otherwise mentioned. Furthermore, the terminology and phraseology used herein is solely used for descriptive purposes and should not be construed as limiting in scope. Language such as "including," "comprising," "having," "containing," or "involving," and variations thereof, is intended to be broad and encompass the subject matter listed thereafter, equivalents, and additional subject matter not recited, and is not intended to exclude other additives, components, integers or steps. Likewise, the term "comprising" is considered synonymous with the terms "including" or "containing" for applicable legal purposes. Any discussion of documents, acts, materials, devices, articles and the like is included in the specification solely for the purpose of providing a context for the present invention. It is not suggested or represented that any or all of these matters form part of the prior art base or were common general knowledge in the field relevant to the present invention.

In this disclosure, whenever a composition or an element or a group of elements is preceded with the transitional phrase “comprising”, it is understood that we also contemplate the same composition, element or group of elements with transitional phrases “consisting of”, “consisting”, “selected from the group of consisting of, “including”, or “is” preceding the recitation of the composition, element or group of elements and vice versa.

The present invention is described hereinafter by various embodiments with reference to the accompanying drawing, wherein reference numerals used in the accompanying drawing correspond to the like elements throughout the description. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiment set forth herein. Rather, the embodiment is provided so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those skilled in the art. In the following detailed description, numeric values and ranges are provided for various aspects of the implementations described. These values and ranges are to be treated as examples only, and are not intended to limit the scope of the claims. In addition, a number of materials are identified as suitable for various facets of the implementations. These materials are to be treated as exemplary, and are not intended to limit the scope of the invention.

Referring to the drawings, the invention will now be described in more detail. As shown in figure 1(a), a tag holder (4) is provided, which is capable to affix on an article (6) by an attachment means (8). Further, the wireless tag is adapted to be fit in the cavity of the tag holder (4). Further, the fastening means is seal (12), which is provided for adhering the wireless tag constituting the tag housing (10) inside the cavity of the tag holder (4) by an attachment means (8). Further, protrusions (2, 2’) are provided on all the four corners of the tag holder (4) to facilitate adherence of tag holder (4) having tag housing (10) of a wireless tag to an article (6) by attachment means (8). Further, the protrusions capable of fastening tag holder (4) on the article (6) for easy fit. Also, figure 1(b) and figure 1(c) illustrates the top view and bottom view of the wireless tag holder. Further, the tag housing (10) comprises of, but not limited to, a wireless tag (14) and seal (12). Further, the wireless tag configured to provide information about the article and is manually removable.

In accordance with an embodiment of the present invention, the tag holder (4) is provided in multiple shapes of, but not limited to, oval, round, square, rectangular and ellipse. Further, the attachment means (8) is selected from a group of, but not limited to, a punching gun, a plurality of adhesives and manual punching. Whereas, manual punching is done by snap fit which is used to attach flexible parts, usually plastic, to form the final product by pushing the parts' interlocking components together. However, use of punching gun as an attachment means (8) provides a tight grip to the wireless tag holder (4) over the article (6), consequently preventing any harm caused to the article (6) during wireless tag holder (4) fastening. The wireless tag holder (4) is provided with protrusions (2, 2’) to attach the tag holder (4) on an article (6). Further, the article (6) is selected from a group of, but not limited to, packages and logistics.

In accordance with an embodiment of the present invention, the plurality of adhesives is selected from a group of, but not limited to, acrylate, acrylic resin,
phenol formaldehyde resin and polyvinyl acetate (PVA)

Further, the tag housing (10) consists of wireless tag (14) and a tag holder (4). Further, the wireless tag is, but not limited to, Radio Frequency Identification (RFID). An RFID tag is a microchip combined with an antenna in a compact package and the packaging is structured to allow the RFID tag to be attached to an object to be tracked. Also, RFID uses radio waves to automatically identify an object, often by storing an information on an antenna. Further, the tag housing (10) is made of, but not limited to, plastic material, fiber material, polymers and mixture thereof.

Figure 2 illustrates a schematic view of a tag housing (10) that comprises a tag holder (4) and a wireless tag (14). The wireless tag (14) is configured with the tag holder (4) to form a tag housing (10) and the tag housing (10) is embedded into a cavity provided in the tag holder (4), which is capable of adhering to the article (6) by using attachment means (8). However, protrusions (2) are provided at the four corners of the tag holder (4) for easy and perfect fitting of the tag holder (4) on the article (6). Further, the wireless tag (14) is detachable by manual peel off.

In accordance with an exemplary embodiment of the present invention, the attachment means (8) is selected from a group of, but not limited to, a punching gun (8), a plurality of adhesives and manual punching.

Figure 3 illustrates side view of stacked wireless tag holders (14). The protrusions (2, 2’) provided in the four corners of the tag holder (4) are adapted to get fit into the protrusions (2, 2’) provided in another wireless tag holder (4). Further, the stacking of the wireless tag holder (4) reduces the storage space and subsequently lessens the expensive packing and shipping charges,

Figure 4 illustrates a method (100) of adhering wireless tag (14), in accordance with an embodiment of the present invention.
At step 110, as shown in figure 3, a wireless tag is integrated inside a tag housing (10). Further, the tag housing (10) is made of, but not limited to, plastic material, fiber material, polymers and mixture thereof.
At step 120, the tag housing (10) is joined on a tag holder (4).
At step 130, the tag holder (4) is affixed with an article (6) by attachment means (8). The tag holder (4) is fastened with the article (6) with the help of protrusions (2, 2’) provided in the all four corners of the tag holder (4). Further, the tag holder (4) is joined with the tag housing (10) that comprises the wireless tag (14). Further, the attachment means (14) are selected from a group of, but not limited to, a group of a punching gun (8), a plurality of adhesives and manual punching. Further, protrusions (2, 2’) facilitates proper, easy and perfect fitting of the tag holder (4) on the article (6).
Figure 5 illustrates front view showing the stacking of the wireless tag holders (4). The stackable wireless tag holder (4) facilitates storage of the wireless tag holders (4). The protrusions (2, 2’) provided in the tag holder (4) helps in the stacking and form a bundle of the wireless tags thereby providing easy storage and transportation.

Various modifications to these embodiments are apparent to those skilled in the art from the description and the accompanying drawings. The principles associated with the various embodiments described herein may be applied to other embodiments. Therefore, the description is not intended to be limited to the embodiments shown along with the accompanying drawings but is to be providing broadest scope of consistent with the principles and the novel and inventive features disclosed or suggested herein. Accordingly, the invention is anticipated to hold on to all other such alternatives, modifications, and variations that fall within the scope of the present invention and appended claim.

Documents

Application Documents

# Name Date
1 201711034960-STATEMENT OF UNDERTAKING (FORM 3) [03-10-2017(online)].pdf 2017-10-03
2 201711034960-FORM 1 [03-10-2017(online)].pdf 2017-10-03
3 201711034960-DRAWINGS [03-10-2017(online)].pdf 2017-10-03
4 201711034960-DECLARATION OF INVENTORSHIP (FORM 5) [03-10-2017(online)].pdf 2017-10-03
5 201711034960-COMPLETE SPECIFICATION [03-10-2017(online)].pdf 2017-10-03
6 201711034960-FORM 18 [04-10-2021(online)].pdf 2021-10-04
7 201711034960-FER.pdf 2022-03-10
8 201711034960-FER_SER_REPLY [08-09-2022(online)].pdf 2022-09-08
9 201711034960-CLAIMS [08-09-2022(online)].pdf 2022-09-08
10 201711034960-US(14)-HearingNotice-(HearingDate-02-07-2025).pdf 2025-05-22
11 201711034960-Correspondence to notify the Controller [30-06-2025(online)].pdf 2025-06-30
12 201711034960-Correspondence to notify the Controller [01-07-2025(online)].pdf 2025-07-01

Search Strategy

1 SearchHistory(86)E_09-03-2022.pdf