Sign In to Follow Application
View All Documents & Correspondence

Method And System For Bagging Items

Abstract: The invention relates to a system for bagging items. The system includes an input module configured to scan an item and validate the item based on a set of validation rules. A tunnel comprising an openable top operatively coupled to the processor is configured to permit the item to enter into a master bag within the tunnel when the item is determined as valid. The tunnel includes a plurality of antennas operatively coupled to the processor and configured to transmit RFID signals received from one or more RFID tags, where the processor to validate an item based on a signal strength received from a corresponding RFID tag, and the set of validation rules until the master bag is filled with a predefined list of valid items.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
16 March 2023
Publication Number
38/2024
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Myntra Designs Private Limited
3rd floor, AKR TECH Park, Krishna Reddy Industrial Area, Muneshwara Nagar, Bangalore – 560068 INDIA

Inventors

1. Maria Relix Johnrose
C 306, DSR White Waters Phase-1, Gunjur Dodakkanelli Road, Gunjur Palya, Bangalore - 560035, Karnataka, India
2. Sharath Kumar
Door No: 11-25, Santhe street, Devanga pet, Kollegal - 571440, Chamarajanagar District, Karnataka, India

Specification

Description:FORM 2

THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENTS RULES, 2003

COMPLETE SPECIFICATION
(Section 10, rule 13)

“METHOD AND SYSTEM FOR BAGGING ITEMS”

Myntra Designs Private Limited
3rd Floor, AKR Tech Park, Krishna Reddy Industrial Area, Muneshwara Nagar, Bangalore 560068

The following specification particularly describes the invention and the manner in which it is to be performed

BACKGROUND
[0001] The invention generally relates to the field of radio frequency identification (RFID) technology and more particularly to a system and method for bagging items in a warehouse using RFID.
[0002] Bagging is an important step in the supply chain process, where a set of products are put together physically in a bag (for example a carton, a crate or a gunny bag). Such bags are also known as master bag or mother bag. Generally, bagging is done when the set of goods need to be moved together from one point to another point. For example, motivation for bagging the set of items together in one bag can be a common destination address, a common vendor location to which the set of items need to be returned, and the like.
[0003] The current practice for bagging includes, a user taking an empty bag, placing a barcode on each item, scanning the barcode of each item, getting the item validated by a computer system based on the barcode, and adding an item into the bag based on the validation result. An operator or a user is prompted by the computer system to add an item into the bag, if the validation result indicates that the item is to be packed into the bag. Similarly, the operator is alerted by the computer system to avoid adding the item into the bag, if the validation result indicates that the item is not to be packed into the bag. For example, an item is indicated to be packed into the bag if the vendor location or the destination address of the bag and the item is same. When all items are packed into the bag, a unique identity is printed for the bag and the identity is stuck on the bag, the bag is closed and then transported to a destination.
[0004] The above-mentioned current process suffers from several fallacies, such as misrouting of items when the operator fails to take cognizance of the prompt or alert provided by the computer system, and thereby mistakenly packs an item into the bag when the validation result indicated that the item is not to be packed into the bag. As a result, an item can get shipped to an incorrect destination address.
[0005] Further, products can get missed and fail to reach the destination address, when the operator fails to add an item into the bag when the validation result indicated that the item is to be packed into the bag. Further, the operator may fail to scan an item before adding the item to the bag, thereby circumventing the validation procedure of the computer system. As a result, incorrect items may get shipped to the destination address.
[0006] To avoid the above mentioned problems, there is a need for a method and system that can validate items that are added into the bag, without having to open the bag. In case the bag has an incorrect item or the bag does not contain a valid item, the system should alert the user or operator accordingly. The method and system must perform processing of the items within the bag at a very fast rate (for example, hundreds of bags in a couple of hours).
SUMMARY
[0007] The following summary is illustrative only and is not intended to be in any way limiting. In addition to the illustrative aspects, example embodiments, and features described, further aspects, example embodiments, and features described, further aspects, example embodiments, and features will become apparent by reference to the drawings and the following detailed description. Example embodiments provide a system and method for bagging items.
[0008] Briefly, according to an example embodiment, a system for bagging items is provided. The system includes a system for bagging items, the system includes an input module and a tunnel. The input module comprises a scanner having a first antenna configured to scan an item; and a processor to validate the item based on a set of validation rules. The tunnel includes an openable top portion operatively coupled to the processor that is configured to permit the item into a master bag within the tunnel, when the item is determined as valid, and a plurality of antennas mounted within the tunnel and operatively coupled to the processor, to transmit a Radio Frequency Identification (RFID) signal received from one or more RFID tags present within a predetermined radius to the processor, wherein the processor to validate an item based on a signal strength received from a corresponding RFID tag, and the set of validation rules, until the master bag is filled with a predefined list of valid items.
[0009] According to another example embodiment, a system for bagging items in a warehouse is provided. The system includes a tunnel having a top portion movable to an open position to enable an item to be put into a master bag placed within the tunnel, when the item is determined as valid by an input module coupled to the tunnel. The input module includes a scanning module having a first antenna, extending external to the tunnel and perpendicular to the top portion, configured to scan a RFID tag on the item; and a processor mounted on the tunnel configured to validate the item based on the RFID tag received from the scanning module and a set of validation rules stored in a memory coupled to the processor. The system further includes a second antenna mounted to a first wall of the tunnel at a first predefined distance from the top portion; and a third antenna mounted to a second wall of the tunnel at a second predefined distance from the top portion; and a fourth antenna mounted to a bottom surface of the tunnel, wherein each of the second antenna, the third antenna and the fourth antenna is configured to: read a set of RFID tags present within a predetermined radius of the each antenna a plurality of times until the master bag is filled with a predefined list of valid items; and provide a signal strength value received on reading each RFID tag to the processor. The processor validates an item corresponding to each RFID tag based on the signal strength received from the each RFID tag, a percentage of fill of the master bag and the set of validation rules.
[0010] In a further embodiment, a method for bagging items is provided. The method includes scanning, by a first antenna, a plurality of items sequentially and assigning, by a processor, a master bag and a plurality of validation rules for the master bag based on a plurality of attributes associated with a first item scanned. The method further includes validating, by the processor, each item scanned subsequent to the first item to be part of the master bag as a valid item based on the plurality of validation rules; facilitating, by the processor, entry of a valid item into the master bag situated within a tunnel, wherein the tunnel comprises a plurality of antennas installed at predetermined locations; transmit, by the plurality of antennas, RFID signals received from one or more RFID tags present within a predetermined radius, to the processor; and validate an item based on a signal strength received from a corresponding RFID tag, and the set of validation rules, until the master bag is filled with a predefined list of valid items.

BRIEF DESCRIPTION OF DRAWINGS
[0011] There and other features, aspects, and advantages of the example embodiments will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
[0012] FIG. 1 is a perspective view of a system for bagging items, according to some aspects of the present description,
[0013] FIG. 2 is a cross-sectional view of the system of FIG. 1, according to some aspects of the present description,
[0014] FIG. 3 is a diagrammatic view illustrating a plurality of motions of antennas of the system of FIG. 1, according to some aspects of the present description,
[0015] FIG. 4 is a diagrammatic view illustrating bagging of items into a master bag, according to some aspects of the present description, and
[0011] FIG. 5 is a flowchart of a method for bagging items, according to some aspects of the present description.
[0012] FIG. 6 is a block diagram of an embodiment of a computing device in which the modules of the system for bagging items, described herein, are implemented.

DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS
[0016] The drawings are to be regarded as being schematic representations and elements illustrated in the drawings are not necessarily shown to scale. Rather, the various elements are represented such that their function and general purpose become apparent to a person skilled in the art. Any connection or coupling between functional blocks, devices, components, or other physical or functional units shown in the drawings or described herein may also be implemented by an indirect connection or coupling. A coupling between components may also be established over a wireless connection. Functional blocks may be implemented in hardware firmware, software or a combination thereof.
[0017] Various example embodiments will now be described more fully with reference to the accompanying drawings in which only some example embodiments are shown. Specific structural and functional details disclosed herein are merely representative for purposes of describing example embodiments. Example embodiments, however, may be embodied in many alternate forms and should not be construed as limited to only the example embodiments set forth herein.
[0018] Accordingly, while example embodiments are capable of various modifications and alternative forms, example embodiments are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that there is no intent to limit example embodiments to the particular forms disclosed. On the contrary, example embodiments are to cover all modifications, equivalents, and alternatives thereof. Like numbers refer to like elements throughout the description of the figures.
[0019] Before discussing example embodiments in more detail, it is noted that some example embodiments are described as processes or methods depicted as flowcharts. Although the flowcharts describe the operations as sequential processes, many of the operations may be performed in parallel, concurrently or simultaneously. In addition, the order of operations may be re-arranged. The processes may be terminated when their operations are completed but may also have additional steps not included in the figure. The processes may correspond to methods, functions, procedures, subroutines, subprograms, etc.
[0020] Specific structural and functional details disclosed herein are merely representative for purposes of describing example embodiments. Inventive concepts may, however, be embodied in many alternate forms and should not be construed as limited to only the example embodiments set forth herein.
[0021] It will be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first element could be termed a second element, and, similarly, a second element could be termed a first element, without departing from the scope of example embodiments. As used herein, the term “and/or,” includes any and all combinations of one or more of the associated listed items. The phrase “at least one of” has the same meaning as “and/or”.
[0022] Further, although the terms first, second, etc. may be used herein to describe various elements, components, regions, layers and/or sections, it should be understood that these elements, components, regions, layers and/or sections should not be limited by these terms. These terms are used only to distinguish one element, component, region, layer, or section from another region, layer, or section. Thus, a first element, component, region, layer, or section discussed below could be termed a second element, component, region, layer, or section without departing from the scope of inventive concepts.
[0023] Spatial and functional relationships between elements (for example, between modules) are described using various terms, including “connected,” “engaged,” “interfaced,” and “coupled”. Unless explicitly described as being “direct,” when a relationship between first and second elements is described in the above disclosure, that relationship encompasses a direct relationship where no other intervening elements are present between the first and second elements, and also an indirect relationship where one or more intervening elements are present (either spatially or functionally) between the first and second elements. In contrast, when an element is referred to as being “directly” connected, engaged, interfaced, or coupled to another element, there are no intervening elements present. Other words used to describe the relationship between elements should be interpreted in a like fashion (e.g., “between,” versus “directly between,” “adjacent,” versus “directly adjacent,” etc.).
[0024] The terminology used herein is for the purpose of describing particular example embodiments only and is not intended to be limiting. As used herein, the singular forms “a,” “an,” and “the,” are intended to include the plural forms as well, unless the context clearly indicates otherwise. As used herein, the terms “and/or” and “at least one of” include any and all combinations of one or more of the associated listed items. It will be further understood that the terms “comprises,” “comprising,” “includes,” and/or “including,” when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
[0025] It should also be noted that in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may in fact be executed substantially concurrently or may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
[0026] Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which example embodiments belong. It will be further understood that terms, e.g., those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
[0027] Portions of the example embodiments and corresponding detailed description may be presented in terms of software, or algorithms and symbolic representations of operation on data bits within a computer memory. These descriptions and representations are the ones by which those of ordinary skill in the art effectively convey the substance of their work to others of ordinary skill in the art. An algorithm, as the term is used here, and as it is used generally, is conceived to be a self-consistent sequence of steps leading to a desired result. The steps are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of optical, electrical, or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
[0028] The systems described herein, may be realized by hardware elements, software elements and/or combinations thereof. For example, the devices and components illustrated in the example embodiments of inventive concepts may be implemented in one or more general-use computers or special-purpose computers, such as a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable array (FPA), a programmable logic unit (PLU), a microprocessor or any device which may execute instructions and respond. A central processing unit may implement an operating system (OS) or one or software applications running on the OS. Further, the processing unit may access, store, manipulate, process and generate data in response to execution of software. It will be understood by those skilled in the art that although a single processing unit may be illustrated for convenience of understanding, the processing unit may include a plurality of processing elements and/or a plurality of types of processing elements. For example, the central processing unit may include a plurality of processors or one processor and one controller. Also, the processing unit may have a different processing configuration, such as a parallel processor.
[0029] Software may include computer programs, codes, instructions or one or more combinations thereof and may configure a processing unit to operate in a desired manner or may independently or collectively control the processing unit. Software and/or data may be permanently or temporarily embodied in any type of machine, components, physical equipment, virtual equipment, computer storage media or units or transmitted signal waves so as to be interpreted by the processing unit or to provide instructions or data to the processing unit. Software may be dispersed throughout computer systems connected via networks and may be stored or executed in a dispersion manner. Software and data may be recorded in one or more computer-readable storage media.
[0030] At least one example embodiment is generally directed to a system for Radio Frequency Identification (RFID) technology and more particularly to a system and method for bagging items in a warehouse using RFID which is described in further detail below.
[0031] FIG. 1 is a perspective view of a system for bagging items implemented according to aspects of the present technique. As shown system 10 includes a plurality of components such as an input module 12, a processor 14, a user interface 16 and a tunnel 18. Each component is described in further detail below.
[0032] The input module 12 further includes a scanner 28 (see FIG. 2) having a first antenna that can scan a plurality of items sequentially. An item is physically associated with a Radio Frequency Identification (RFID) tag, and the RFID tag is scanned by the first antenna. The processor 14 receives an RFID signal from the scanner once the RFID tag is scanned, and validates the item based on the RFID signal received and a set of validation rules. The RFID signal includes one or more attributes of the item such as a vendor location, destination address to which the item needs to be shipped and a type or category of the item. The set of validation rules are usually associated with a master bag into which the item needs to be bagged or packed. Example of the set of validation rules includes determining an item as valid if the one or more attributes of the item map to attributes of the master bag such as, a common vendor location of items to be packed into the master bag, a destination address to which the master bag is shipped, a type of items that can be packed together and the like.
[0033] In an example, the item is determined as valid for the master bag in case the destination address and the type of the item is same as predefined for the master bag, and the item is determined as invalid incase the destination address, the type of item is different from those as predefined for the master bag. The set of validation rules of the master bag is stored in a storage medium that is accessible by the processor 14. Further, post validation of the item, the processor 14 displays a message on the user interface 16, regarding the validity of the item.
[0034] In case the item is determined as valid, the processor 14 operates an openable top portion 20 of the tunnel 18, into an open position, so that the item can fall into the master bag placed within the tunnel 18. However, in case the item is determined as invalid, the processor 14 operates the openable top portion 20 into a closed position and displays a message on the user interface 16, that the item is invalid and needs to be kept aside.
[0035] The tunnel 18, includes a plurality of antennas 22-26 mounted at predetermined positions. Each antenna is operatively coupled to the processor 14. The manner in which the antennas operate is described in further detail in FIG. 2 and FIG. 3.
[0036] FIG. 2 is a cross sectional view of the tunnel having the plurality of antennas implemented according to aspects of the present technique. The antennas 22 and 24 are mounted on opposite walls 36 and 38 respectively, and the antenna 26 is positioned on a bottom surface 40 of the tunnel 18. The wall-mounted antennas 22 and 24 are configured to move laterally along the walls along directions 46 and 48 and angularly along directions 42 and 44 as shown in FIG. 3. The movement of the antennas 22 and 24 ensures efficient reading of RFID tags present within the tunnel.
[0037] Further, each antenna 22-26, transmits a RFID signal received from one or more RFID tags present within a predetermined radius from each antenna to the processor 14. The one or more RFID tags can include RFID tags physically associated with items present inside the tunnel and stray RFID tags present outside the tunnel. The processor 14, validates an item corresponding to an RFID tag based on the signal strength received and the set of validation rules. For example, a RFID signal received from a RFID tag present inside the master bag 30 would be higher in strength than a stray RFID tag present outside the master bag 30. However, as the master bag 30 starts getting filled up, the signals of RFID tags present deep inside the master bag 30 may get severely attenuated.
[0038] In order to compensate for the aforesaid attenuation in signal strength, the processor 14 validates an item present within the master bag 30, based on a score determined from a set of signal strength values received over a predefined time period for each RFID tag. Each RFID tag that is identified, is scored over a period of time, and based on the score, the each RFID tag is determined to be either inside or outside the tunnel. For example, when the plurality of antennas 22-26 detect a RFID tag with a Received Signal Strength Indicator (RSSI) value, a score is assigned based on the RSSI, as shown in the table below:

RSSI Range (in dBm) Score
0 to -35 30
-36 to -45 20
-46 to -55 5
-56 to -65 3
<= -66 -30

[0039] A linear mapping function of RSSI value to score with a negative scoring for low strength RSSI, helps to ignore stray tags, thereby reducing errors caused due to leakage. The processor 14 maps the score against a threshold value applicable for the percentage of fill of the master bag 30 to determine presence of an item associated with the each RFID tag within the master bag 30. Typically, the score is below the threshold value applicable for an item present outside the tunnel, and the score exceeds the threshold value applicable for an item present inside the tunnel. Hence, if the score for an item exceeds the threshold, the item is determined to be inside the tunnel.
[0040] For example, if a tag T1, is detected 10 times consecutively with RSSI -20, then its score shall be 300, cause with each occurrence of -20 RSSI a score of 30 is added to an existing score. The cumulation of scores is performed over time, and the cumulated scores for each tag, is further categorized into a plurality of thresholds. In an example, the plurality of thresholds may be as follows: maximum (500), medium (50) and minimum (20). For example, tags that reach any of the thresholds are considered directly to be inside the master bag with high confidence. Different thresholds are applied depending on a percentage of fill of the master bag 30.
[0041] For example, the maximum threshold is applied when the master bag 30 is still 75% empty. Tags which are added when the master bag is still 75% empty, reach the maximum threshold of 500 immediately, as such items are usually picked up by each of the plurality of antennas 22-26. When the master bag 30 is filled between 75% to 90%, then the medium threshold is applied, as each of the plurality antennas 22-26 may not be able to read the tags present inside the master bag 30. Further, when the master bag 30 is filled between 90 -100%, then the tags that reach a score of the minimum threshold of 20 are considered to be inside the master bag 30. The minimum threshold is applied as when the master bag 30 is filled to the maximum capacity of 90-100%, then each of the antennas 22-26 would not be able to detect an item present inside. Usually, when the master bag 30 is filled upto 90-100% then, only items that are closer to the top portion, or items that are closer to the wall mounted antennas 22-24 may be detected.
[0042] By such scoring-based testing, tags that reach the medium score threshold, irrespective of the percentage of fill of the master bag, are determined as stray tags. Further, tags that reach a negative score (for example -30 for an RSSI value less than -66) are eliminated as stray tags for being outside the tunnel. As such tags are outside the tunnel, they will have low signal strength hence less RSSI value. Such stray tags would never cross the minimum threshold or attain a positive score.
[0043] It is pertinent to note that, the aforementioned score based testing conducted based on the RSSI values detected by the plurality of antennas 22-26 is done only for items that are validated by the first antenna in the input module on the top. This score based testing helps to detect items that though invalidated by the input module, still get added into the master bag 30 unintentionally by the user or by mistake. Further, the processor 14, identifies an item present within the master bag 30, as an invalid item or a valid item based on the set of validation rules. In case an invalid item is detected within the master bag 30, the processor 14 provides on the user interface 16, an alert to remove the invalid item from the tunnel 18. The manner in which the bagging of the master bag is completed is described in further detail below, with reference to FIG. 4.
[0044] FIG. 4 is a diagrammatic view illustrating bagging of items into a master bag, according to some aspects of the present technique. In the example illustration, items 82A to 82N are sequentially filled into the master bag 30. Once the master bag 30 is filled with the predefined list of valid items 82A-82N, a master bag tag 84 is scanned and physically associated with the master bag 30. The master bag 30 is then removed from the tunnel 18 once the processor 14 determines that the master bag 30 contains only the predefined list of valid items 82A to 82N. Upon removal of the master bag 30 from the tunnel 18, the master bag tag 84 is physically attached to the master bag.
[0045] Once the master bag 30 is created, to ensure all items 82A to 82N are present inside the master bag 30, a bulk scan maybe performed. For performing the bulk scan, the processor 14 increases a transmit power to the plurality of antennas 22-26. The master bag 30 containing the RFID tagged items is then scanned by the plurality of antennas 22-26, that operate at high RF antenna power. This process is followed, to ensure all RFID tags are read, as some RFID tags that are not in good phase with some on the antennas during filling the master bag 30 could go unread. In some occasions, the Radio Frequency (RF) waves may not be suitably received by the RFID tags, thus leading to a missing item. Hence, when the antennas 22-26 are enabled with high powers, better detection of RFID tags is ensured. The master bag 30 can also be shuffled to change orientation of the items present inside, and rescanned to ensure that the RFID tags are read from a different space and angle.
[0046] However, in the normal bulk scan, as the antennas are operated with higher transmit power, the items outside the tunnel may also get read. To avoid this error, an expected list of items is provided before the bulk scan. The items scanned during the bulk scan are examined over the expected list.
[0047] In case the expected list has a fixed number of tags to be detected, the tunnel is run with a high transmit power for a specific time period (for example 5 seconds), to consider all the tags with minimum threshold. In case the tag is not present in the expected list, the tag is then examined over the maximum threshold. In case the list of items detected map to the expected list, the bulk scan is considered a success and the result is displayed on the user interface 16. If some tags from the expected list are not detected, the bulk scan is considered a fail, and the bulk scan is performed again focusing only on the missing list from the initial bulk scan with more transmit power provided to the antennas than in the initial bulk scan. In the event that some extra tags are detected that are not part of the expected list, the scan is again considered a fail and another bulk scan is conducted with a lower transmit power focusing only on the extra items. This bulk scanning process ensures, that the master bag 30 only has items from the predetermined list of valid items. The process by which the master bag is bagged only with the correct tags is described in further detail below.
[0048] FIG. 5 is a flowchart of a method for bagging items, according to some aspects of the present description. The bagging process starts when the plurality of items to be bagged in a master bag are scanned and ends when master bag is ready. Each step is described in detail further below.
[0049] At step 52, a plurality of items is scanned by a first antenna of an input module sequentially. It may be noted that the item is determined as valid for a master bag based on a plurality of attributes such as destination address, a specific type of the item is same as predefined for the master bag, and the item is determined as invalid incase the destination address, the type of item is different from those as predefined for the master bag.
[0050] At step 54, a master bag is assigned to the plurality of items, and a plurality of validation rules is assigned to the master bag. The plurality of validation rules is based on the plurality of attributes associated with the first item that was scanned. Hence based on these attributes, a master bag is selected. Further, in this case, the validation rules assigned to the master bag may include bagging only items having similar type, vendor location and destination address. In another case, the validation rules may include a predetermined list of items to be added to the master bag.
[0051] At step 56, each item scanned after the first item is validated to determine if the subsequent items should be a part of the master bag. The validation is performed using the plurality of validation rules.
[0052] At step 58, entry of a validated item is facilitated into a tunnel having the master bag. The tunnel has a plurality of antennas mounted at predetermined locations to read the RFID tagged items entering the master bag.
[0053] At step 60, RFID signals received from one or more RFID tags present within a predetermined radius of the plurality of antennas is transmitted to the processor. At step 62, an item is validated based on a signal strength from a corresponding RFID tag, and as set of validation rules until that master bag is filled with a predetermined list of valid items.
[0054] There are various advantages of the RFID technique described above that include leakage reduction, compliance, productivity, and visibility. The disclosed technique ensures that invalid items, that are added to the master bag 30 unintentionally by the user or by mistake are detected with high accuracy, thereby improving the overall productivity of bagging items. The presence of a plurality of antennas within the tunnel ensures visibility of the plurality of items being bagged which in turn prevents an invalid item from being bagged into a master bag. Accordingly, compliance with the protocols and rules of bagging items is maintained. The signals are processed using a general purpose computer system which is described in further detail below.
[0055] FIG. 6 is a block diagram illustrating an example computer system 600, according to some aspects of the present description. Examples of such computer system 600 include without limitation, workstations, personal computers, desktop computers, or other types of generally fixed computing systems such as mainframe computers, servers, and minicomputers. Other examples of such computer system 600 include mobile or portable computing devices, such as one or more laptops, tablet computers, personal data assistants, mobile phones (such as smartphones), IoT devices, wearable electronic devices such as smartwatches, and other mobile or portable computing devices such as embedded computers, set-top boxes, vehicle-mounted devices, wearable computers, etc. Servers can include mail servers, file servers, database servers, virtual machine servers, and web servers.
[0056] To bag items, the output of the processor 14 is provided with the computer system 600. The set of validation rules for the master bag, the one or more attributes and other relevant information maybe stored in a storage (e.g., disk drives, storage arrays (e.g., storage-area network (SAN) and/or network-attached storage (NAS) technology), semiconductor memory (e.g., solid-state storage devices), network-attached storage (NAS) devices, tape libraries, or other magnetic, non-tape storage devices, optical media storage devices, or combinations thereof. In some embodiments, storage is provided in a cloud storage environment (e.g., a private cloud or one operated by a third-party vendor).
[0057] The various components in the computer system 600 may communicate through the network(s) (not shown) and/or locally. It should be noted that a computer system environment may include a plurality of networks to connect different components of the system environment. In one embodiment, the network(s) use standard communications technologies and/or protocols. Thus, the network(s) can include links using technologies such as Ethernet, 802.11, worldwide interoperability for microwave access (WiMAX), 3G, digital subscriber line (DSL), asynchronous transfer mode (ATM), InfiniBand, PCI Express Advanced Switching, etc. Similarly, the networking protocols used on the network(s) can include multiprotocol label switching (MPLS), the transmission control protocol/Internet protocol (TCP/IP), the User Datagram Protocol (UDP), the hypertext transport protocol (HTTP), the simple mail transfer protocol (SMTP), the file transfer protocol (FTP), etc.
[0058] The system 10 to bag items is configured to bag items based on validation performed by the processor 14, wherein the processor 14 creates a set of validation rules and a plurality of attributes associated with the items.
[0059] The systems and methods described herein may be partially or fully implemented by a special purpose computer system created by configuring a general-purpose computer to execute one or more particular functions embodied in computer programs. The functional blocks and flowchart elements described above serve as software specifications, which may be translated into the computer programs by the routine work of a skilled technician or programmer.
[0060] The computer programs include processor-executable instructions that are stored on at least one non-transitory computer-readable medium, such that when run on a computing device, cause the computing device to perform any one of the aforementioned methods. The medium also includes, alone or in combination with the program instructions, data files, data structures, and the like. Non-limiting examples of the non-transitory computer-readable medium include, but are not limited to, rewriteable non-volatile memory devices (including, for example, flash memory devices, erasable programmable read-only memory devices, or a mask read-only memory devices), volatile memory devices (including, for example, static random access memory devices or a dynamic random access memory devices), magnetic storage media (including, for example, an analog or digital magnetic tape or a hard disk drive), and optical storage media (including, for example, a CD, a DVD, or a Blu-ray Disc). Examples of the media with a built-in rewriteable non-volatile memory, include but are not limited to memory cards, and media with a built-in ROM, including but not limited to ROM cassettes, etc. Program instructions include both machine codes, such as produced by a compiler, and higher-level codes that may be executed by the computer using an interpreter. The described hardware devices may be configured to execute one or more software modules to perform the operations of the above-described example embodiments of the description, or vice versa.
[0061] Non-limiting examples of computing devices include a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable array (FPA), a programmable logic unit (PLU), a microprocessor or any device which may execute instructions and respond. A central processing unit may implement an operating system (OS) or one or more software applications running on the OS. Further, the processing unit may access, store, manipulate, process and generate data in response to the execution of software. It will be understood by those skilled in the art that although a single processing unit may be illustrated for convenience of understanding, the processing unit may include a plurality of processing elements and/or a plurality of types of processing elements. For example, the central processing unit may include a plurality of processors or one processor and one controller. Also, the processing unit may have a different processing configuration, such as a parallel processor.
[0062] The computer programs may also include or rely on stored data. The computer programs may encompass a basic input/output system (BIOS) that interacts with hardware of the special purpose computer, device drivers that interact with particular devices of the special purpose computer, one or more operating systems, user applications, background services, background applications, etc.
[0063] The computer programs may include: (i) descriptive text to be parsed, such as HTML (hypertext markup language) or XML (extensible markup language), (ii) assembly code, (iii) object code generated from source code by a compiler, (iv) source code for execution by an interpreter, (v) source code for compilation and execution by a just-in-time compiler, etc. As examples only, source code may be written using syntax from languages including C, C++, C#, Objective C, Haskell, Go, SQL, R, Lisp, Java®, Fortran, Perl, Pascal, Curl, OCaml, Javascript®, HTML5, Ada, ASP (active server pages), PHP, Scala, Eiffel, Smalltalk, Erlang, Ruby, Flash®, Visual Basic®, Lua, and Python®.
[0064] One example of the computing system 600 is described in FIG. 6. The computing system 600 includes one or more processor 602, one or more computer-readable RAMs 604 and one or more computer-readable ROMs 606 on one or more buses 608. Further, the computing system 600 includes a tangible storage device 610 that may be used to execute operating systems 620 and the processor 14. Both, the operating system 620 and object screening system 100 are executed by processor 602 via one or more respective RAMs 604 (which typically includes cache memory). The execution of the operating system 620 and/or the system for bagging items 10 by the processor 602, configures the processor 602 as a special-purpose processor configured to carry out the functionalities of the operation system 620 and/or the system for bagging items 10, as described above.
[0065] Examples of storage devices 610 include semiconductor storage devices such as ROM 606, EPROM, flash memory or any other computer-readable tangible storage device that may store a computer program and digital information.
[0066] Computer system 600 also includes a R/W drive or interface 612 to read from and write to one or more portable computer-readable tangible storage devices 626 such as a CD-ROM, DVD, memory stick or semiconductor storage device. Further, network adapters or interfaces 614 such as a TCP/IP adapter cards, wireless Wi-Fi interface cards, or 3G or 4G wireless interface cards or other wired or wireless communication links are also included in the computer system 600.
[0067] In one example embodiment, the information associated with system for bagging items 10, may be stored in tangible storage device 610 and may be downloaded from an external computer via a network (for example, the Internet, a local area network or another wide area network) and network adapter or interface 614.
[0068] Computer system 600 further includes device drivers 616 to interface with input and output devices. The input and output devices may include a computer display monitor 618, a keyboard 622, a keypad, a touch screen, a computer mouse 624, and/or some other suitable input device.
[0069] In this description, including the definitions mentioned earlier, the term ‘module’ may be replaced with the term ‘circuit.’ The term ‘module’ may refer to, be part of, or include processor hardware (shared, dedicated, or group) that executes code and memory hardware (shared, dedicated, or group) that stores code executed by the processor hardware. The term code, as used above, may include software, firmware, and/or microcode, and may refer to programs, routines, functions, classes, data structures, and/or objects.
[0070] Shared processor hardware encompasses a single microprocessor that executes some or all code from multiple modules. Group processor hardware encompasses a microprocessor that, in combination with additional microprocessors, executes some or all code from one or more modules. References to multiple microprocessors encompass multiple microprocessors on discrete dies, multiple microprocessors on a single die, multiple cores of a single microprocessor, multiple threads of a single microprocessor, or a combination of the above. Shared memory hardware encompasses a single memory device that stores some or all code from multiple modules. Group memory hardware encompasses a memory device that, in combination with other memory devices, stores some or all code from one or more modules.
[0071] In some embodiments, the module may include one or more interface circuits. In some examples, the interface circuits may include wired or wireless interfaces that are connected to a local area network (LAN), the Internet, a wide area network (WAN), or combinations thereof. The functionality of any given module of the present description may be distributed among multiple modules that are connected via interface circuits. For example, multiple modules may allow load balancing. In a further example, a server (also known as remote, or cloud) module may accomplish some functionality on behalf of a client module.
[0072] It will be understood by those within the art that, in general, terms used herein, are generally intended as “open” terms (e.g., the term “including” should be interpreted as “including but not limited to,” the term “having” should be interpreted as “having at least,” the term “includes” should be interpreted as “includes but is not limited to,” etc.). It will be further understood by those within the art that if a specific number of an introduced claim recitation is intended, such an intent will be explicitly recited in the claim, and in the absence of such recitation no such intent is present.
[0073] For example, as an aid to understanding, the following appended claims may contain usage of the introductory phrases “at least one” and “one or more” to introduce claim recitations. However, the use of such phrases should not be construed to imply that the introduction of a claim recitation by the indefinite articles “a” or “an” limits any particular claim containing such introduced claim recitation to embodiments containing only one such recitation, even when the same claim includes the introductory phrases “one or more” or “at least one” and indefinite articles such as “a” or “an” (e.g., “a” and/or “an” should be interpreted to mean “at least one” or “one or more”); the same holds true for the use of definite articles used to introduce claim recitations. In addition, even if a specific number of an introduced claim recitation is explicitly recited, those skilled in the art will recognize that such recitation should be interpreted to mean at least the recited number (e.g., the bare recitation of “two recitations,” without other modifiers, means at least two recitations, or two or more recitations).
[0074] While only certain features of several embodiments have been illustrated and described herein, many modifications and changes will occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the scope of the invention and the appended claims.
, Claims:CLAIMS

1. A system for bagging items, the system comprising:
an input module comprising:
a scanner having a first antenna configured to scan an item; and
a processor to validate the item based on a set of validation rules;
a tunnel comprising:
an openable top portion operatively coupled to the processor is configured to permit the item into a master bag within the tunnel, when the item is determined as valid; and
a plurality of antennas mounted within the tunnel and operatively coupled to the processor, to:
transmit a RFID signal received from one or more RFID tags present within a predetermined radius to the processor, wherein the processor to validate an item based on a signal strength received from a corresponding RFID tag, and the set of validation rules, until the master bag is filled with a predefined list of valid items.

2. The system of claim 1, wherein the processor is configured to:
create the set of validation rules for the master bag based on a plurality of attributes associated with a first item and one or more attributes of the master bag, wherein the plurality of attributes comprises a type of the first item, a destination location of the first item, and a vendor of the first item, and wherein the one or more attributes comprises a percentage of fill of the master bag and a size of the master bag;
validate each item scanned by the first antenna subsequent to the first item to be part of the master bag based on the set of validation rules;
facilitate the top portion of the tunnel into an open position to input a subsequent item into the master when the subsequent item is determined as valid; and
facilitate the top portion into a closed position and provide an alert, when the subsequent item is determined as invalid.

3. The system of claim 1, wherein the processor is further configured to:
determine a score from a set of signal strength values received over the predefined time period for each RFID tag;
map the score against a threshold value applicable for the percentage of fill of the master bag to determine a presence of an item associated with the each RFID tag within the master bag;
identify for an item determined to be present within the master bag as an invalid item or a valid item based on the set of validation rules; and
provide on a user interface, an alert to remove the invalid item from the tunnel.

4. The system of claim 3, wherein the score is below the threshold value applicable for an item present outside the tunnel, and wherein the score exceeds the threshold value applicable for an item present inside the tunnel.

5. The system of claim 3, wherein the threshold value applicable is inversely proportional to the percentage of fill of the master bag.

6. The system of claim 1, wherein the processor is further configured to:
create a masterbag tag when the master bag is filled with the predetermined list of valid items; and
associate the master bag tag to the master bag.
6. The system of claim 5, wherein the processor is further configured to:
facilitate an increase in a transmit power of the plurality of antennas to scan the master bag;
determine a cumulative score based on a signal strength value received for each item present within the master bag from the plurality of antennas for another predefined time period;
determine the master bag to contain the predetermined list of valid items when the cumulative score exceeds a first threshold for the each item;
identify the master bag to contain an invalid item when the cumulative score for the invalid item is less than the first threshold; and
facilitate sealing and removal of the master bag from the tunnel when the master bag is determined to contain the predetermined list of valid items.

8. The system of claim 1, wherein the plurality of attributes associated with the first item include a destination address of the first item and a vendor of the first item.

9. A method for bagging items in a warehouse, the method comprising:
scanning, by a first antenna, a plurality of items sequentially;
assigning, by a processor, a master bag and a plurality of validation rules for the master bag based on a plurality of attributes associated with a first item scanned;
validating, by the processor, each item scanned subsequent to the first item to be part of the master bag as a valid item based on the plurality of validation rules;
facilitating, by the processor, entry of a valid item into a the master bag situated within a tunnel, wherein the tunnel comprises a plurality of antennas installed at predetermined locations;
transmit, by the plurality of antennas, RFID signals received from one or more RFID tags present within a predetermined radius, to the processor; and
validate an item based on a signal strength received from a corresponding RFID tag, and the set of validation rules, until the master bag is filled with a predefined list of valid items.

10. The method of claim 9, further comprising:
determining by the processor, a cumulative score for the each item from a set of signal strength values received over the first predefined time period; mapping the score against a threshold value applicable for a level of fill of the master bag to determine a presence of the each item within the master bag;
identifying for an item determined to be present within the master bag as one of an invalid item and a valid item by using the plurality of validation rules; and
prompting a user to remove an invalid item from the master bag.

11. The method of claim 9, wherein the score is below the threshold value applicable for an item present outside the tunnel, and wherein the score exceeds the threshold value applicable for an item present inside the tunnel.

12. The method of claim 9, wherein the threshold value applicable is inversely proportional to the level of fill of the master bag.

13. The method of claim 9, further comprising:
creating a masterbag tag when the master bag is filled with the predetermined list of valid items; and
associating the master bag tag to the master bag.

14. The method of claim 13, further comprising:
facilitating an increase in a transmit power of the plurality of antennas;
performing a bulk scan of the master bag over a second predefined time period;
determining the master bag to contain the predetermined list of valid items when a signal strength that exceeds a first threshold is received for each valid item during the bulk scan; and
sealing and removing the master bag from the tunnel upon successful completion of the bulk scan.

15. The method of claim 9, wherein the plurality of attributes associated with the first item include a destination address of the first item and a vendor of the first item.

16. A system for bagging items in a warehouse, the system comprising:
a tunnel having a top portion movable to an open position to enable an item to be put into a master bag placed within the tunnel, when the item is determined as valid by an input module coupled to the tunnel, the input module comprising :
a scanning module having a first antenna, extending external to the tunnel and perpendicular to the top portion, configured to scan a RFID tag on the item; and
a processor mounted on the tunnel configured to validate the item based on the RFID tag received from the scanning module and a set of validation rules stored in a memory coupled to the processor; and
a second antenna mounted to a first wall of the tunnel at a first predefined distance from the top portion;
a third antenna mounted to a second wall of the tunnel at a second predefined distance from the top portion; and
a fourth antenna mounted to a bottom surface of the tunnel, wherein each of the second antenna, the third antenna and the fourth antenna is configured to:
read a set of RFID tags present within a predetermined radius of the each antenna a plurality of times until the master bag is filled with a predefined list of valid items; and
provide a signal strength value received on reading each RFID tag from the set of RFID tags to the processor; wherein the processor to validate an item corresponding to the each RFID tag based on the signal strength received from the each RFID tag, a percentage of fill of the master bag and the set of validation rules.

17. The system of claim 16, wherein the processor is further configured to:
create the plurality of validation rules for the master bag based on a plurality of attributes associated with a first item scanned; wherein the plurality of attributes comprise one or more of a vendor of an item, a destination address and category of item; and
validate each item scanned subsequent to the first item to be part of the master bag based on the plurality of validation rules.

18. The system of claim 16, wherein the processor is further configured to:
determine a cumulative score for the each item from a set of signal strength values received over the predefined time period;
map the score against a threshold value applicable for the percentage of fill of the master bag to determine a presence of each item within the master bag;
identify for an item determined to be present within the master bag as one of an invalid item and a valid item by using the plurality of validation rules; and
prompting a user to remove the invalid item from the tunnel.

19. The system of claim 18, wherein the score is below the threshold value applicable for an item present outside the tunnel, and wherein the score exceeds the threshold value applicable for an item present inside the tunnel.

20. The system of claim 17, wherein the threshold value applicable is inversely proportional to the percentage of fill of the master bag.

21. The system of claim 16, wherein the processor is further configured to:
create a masterbag tag when the master bag is filled with the predetermined list of valid items; and
associate the master bag tag to the master bag.

22. The system of claim 21, wherein the processor is further configured to:
facilitate an increase in a transmit power of the plurality of antennas to scan the master bag;
determine a cumulative score based on a signal strength value received for each item present within the master bag from the plurality of antennas for another predefined time period;
determine the master bag to contain the predetermined list of valid items when the cumulative score exceeds a first threshold for the each item;
identify the master bag to contain an invalid item when the cumulative score for the invalid item is less than the first threshold; and
facilitate sealing and removal of the master bag from the tunnel when the master bag is determined to contain the predetermined list of valid items.

23. The system of claim 16, wherein the plurality of attributes associated with the first item include a destination address of the first item and a vendor of the first item.

Documents

Application Documents

# Name Date
1 202341017613-STATEMENT OF UNDERTAKING (FORM 3) [16-03-2023(online)].pdf 2023-03-16
2 202341017613-PROOF OF RIGHT [16-03-2023(online)].pdf 2023-03-16
3 202341017613-FORM 1 [16-03-2023(online)].pdf 2023-03-16
4 202341017613-DRAWINGS [16-03-2023(online)].pdf 2023-03-16
5 202341017613-DECLARATION OF INVENTORSHIP (FORM 5) [16-03-2023(online)].pdf 2023-03-16
6 202341017613-COMPLETE SPECIFICATION [16-03-2023(online)].pdf 2023-03-16