Sign In to Follow Application
View All Documents & Correspondence

Object Tracking

Abstract: A method of tracking an object (1) tagged with a radio frequency identification tag (2) having an identification code using a network of readers (3) is described. A reader (3) interrogates the tag (2) by transmitting its identification code. In response to receiving its identification code, the tag identifies itself to the reader. Otherwise, it does not identify itself. The method comprises identifying an expected location of the object and directing one or more selected readers according to the expected location to interrogate the tag using its identification code.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
10 September 2008
Publication Number
43/2008
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

FRIENDLY TECHNOLOGIES LTD
UNIT 72,CARIOCCA BUSINESS PARK, 2 SAWLEY ROAD, MANCHESTER M40 8BB, U.K

Inventors

1. MORAN, HUMBERTO
557 GREAT WESTERN ROAD, ABERDEEN AB10 6PA, U.K

Specification

Object tracking
Field of the Invention
The present invention relates to object tacldng,in particular privacy-friendly object trackng.
Background Art
Portable transponders, such as Radio Frequency Identification (RFID) tags, usually comprise one or more semiconductor chips for processing and storing data and an antenna for communicating with external devices, such as readers or "interrogators" and, via such readers, with other parts of supporting infrastructure. Typically, a transponder (hereinafter referred to simphy as a "tap") is provided with a unique identifier (UID) assigned from a global numbering scheme. A tag may also have sensing capabilities, such as being provided with a sensor for detecting temperature, pressure etc.
Tags usually communicate with readers using radio waves propagating through, for example, air. However, other parts of the electromagnetic spectrum may be used, such as optical parts of the spectrum (e.g. visible or infra red regions), and other forms of signal propagation may be used, such as acoustic waves. The distance for interrogadon varies from few millimetres to several meters depending on the type of tag and reader, frequency, media, antenna, interferences and other factors. Depending on their technical characteristics, RFID readers can concurrently interrogate many tags in quick sequence, for example several per second, usually in a round-robin approach.
Typically, RFID tags interact with readers which are interconnected to identification and acdoning systems comprising a data nerwork and computers running appropriate software, Flerem, such identification and actioning systems are referred to as "RFID systems". These systems can trigger or perform a given action upon detection of a predetermined event. Examples of such actions include triggering replenishment transactions when stocks are reduced after object removal, firing an alarm upon temperature rise, or adding an item to the shopper's bill when they

reach a till. RFID tags and supporting infrastructure ie.g. readers, data nerworl: and computers) provide an integral system for identifying and controlling objects and their environment. Neither the tag, nor the supporting infrastructure work in isolation. Therefore, within an RFID system, tags and the supporting infrastructure mteroperate through, for example, standardisation of frequencies, protocols, interrogation procedures and numbering schemas and standardisation of protocols for the exchange of object identification and data.

for by
In recent years, the use of RFID systems is becoming increasingh' widespread. Fo example, RFID tags are attached to goods and products and these are managed by reading and wridng information to and from the tags. This allows objects to b identified, tracked and traced, and their environmental conditions to be monitored.
RFID systems are employed in variety of fields such as manufacturing, logistics and distribution, amusement, rental and leasing. They can be applied, for example, m factories to manage the products or production materials being conveyed on a beh-tvpe convevor. in airports to manage baggage and in retail to track groceries. Leading manufacturers, distributors and retailers art promoting the use of RFID tags to replace barcode-based product identification procedures, to improve the visibility of their stock and to automate their operations.
RFID tags may be "passive", i.e. they have no internal energy source and obtain energy for their reply from the inrerrogation field, or they may be "active", i.e. contain an internal energy source, for example a battery. Tags usually reply only when they are within or have recently passed through an interrogation field. The interrogation field may function to select a single tag among a population of such tags, to issue a generic interrogation aimed at all the tags within the interrogation field, to issue a semi-generic interrogation aimed at some of the tags within the interrogation field, and/or, in the case of passive tags, to provide energy, a portion of which may be used in constructing the reply. Passive tags arc described in US-A-3713148.

Typically, RFID tags, respond to interrogations bv transmitting their LTD and, optionally, other data. Some tags can communicate using encryption mechanisms, for example as described m US-A-2005/017844 and WO-A-2005/027022, although most tags, particularly passive tags, have no security or encryption mechanisms. In particular, the prohibitive cost of RFID tags with encryption capabilities hinders their usage in the tagging of fast moving consumer goods (FMCG', and other low-cost or low-margin objects. Moreover, due to cost efficiencies and securitv reasons, RFID tags in FMCG are usually "embedded" into the packaging or product itself, hence impeding or complicating their removal. More importantly, most RFID systems used m the control of FMCG typicallv reply overtlv to generic or semi-generic interrogation from compatible readers, tnese are usuallv referred to as "talkative" tags.
For these reasons, adoption of RFID systems for the tracking of FMCG and other goods is facing significant opposition from privacy advocates and regulators because their usage might allow spying on consumers and exposing them to theft. For example, talkative tags can be interrogated by unauthorised parties through clothing, when in pockets or hand bags, and even through tnin walls. Moreover, some RFID global numbering systems include the product tvpe within their codification structure, so revealing important product characteristics such as product nature, price etc.
Consequenly, some RFID advocates propose the removal or disabling of tags at the Point Of Sale (POS)and reference is made to US-A-2006/061475 However, this option has been rejected bv some privacy advocates because the process is cumbersome, unreliable and hinders valuable post-POS applications, such as domestic applications, automatic recycling etc.
Similarly, temporary deactivation of tags may' not satisfy privacy concerns. RFID protocol proposals include a kill command that renders the tag inoperable. This lull command is often referred to as a "Privacy" command, which can be used to permanently deactivate the device at the end of its working life, for example as a customer leaves a store, However, there are two problems associated with the kill

command. Firstly, the execution of a kill command is only protected by a short password, for example 8 bits long. Organizations using RFID tags are therefore concerned that unauthorized people may be able to deactivate them even before point of sale. Secondly, privacy advocates are afraid that the kill command mav not permanently "destroy" a tag. The entity that made the tag may also have means to reactivate it.
The present invention seeks to provide. method of and apparatus for tracking an object tagged with a radio frequency' identification: tag which is privacy friendly,
Summary of the Invention
According to a first aspect of the present invention there is provided a method of traclang an object tagged with a radio frequency identification tag having a identification code using a network of readers, wherein a reader interrogates the tag by transmitting its identificadon code and, m response to receiving its identificadon code, the tag identifies itself to the reader, the method comprising idenufying an expected locadon of the object and directing one or more selected readers according to the expected location to interrogate the tag using its identification code.
This can help to provide a method of tracking objects which is privacy friendly.
In response to receiving a message comprising an identification code different to its identification code or in response to receiving a message not comprising an identification code, the tag may not identify- itself.
In response to receiving its identification code, the tag mav identify itself to the reader by transmitting a predefined message and/or bv transmatting its identification code.
The method may further comprise receiving a communication that the object has entered a system and instructing all readers to poll the identification code. The method may further comprise determining whether at least one reader receives a response, identifying which readers do not receive a response and in response to at

least one reader receiving a response, instructing the readers which do not receive a response to stop polling the identification code. The method mav further comprise receiving a communication that: the object has left a system and instructing readers to stop polling the identification code. The method may further comprise determining whether the tag stops responding to interrogation by a reader, identifying readers surrounding the location covered b)' the reader, the surrounding readers monitoring areas through which the object may pass and instructing the surrounding readers to poll the identification code. The method may further comprise determining whether the object has remained undetected for a given period of time and in response to determining that the object has remained undetected for the given period of time, instructing readers in a wider area to seek the object.
According a second aspect of the present invention there is provided a computer program which, when executed bv a computer, causes the computer to perform the method.
According a third aspect of the present invention there is provided a computer program product comprising a computer-readable medium storing the computer program.
According to a fourth aspect of the present invention there is provided apparatus for tracking an object tagged with a radio frequency identification tag having an identification code using a networii of readers, wherein a reader interrogates the tag by transmitting its identification code and, in response to receiving its identification code, the tag identifies itself to the reader, the apparatus comprising means for identifying an expected location of the object and means for directing one or more selected readers according to the expected location to interrogate the tag using its identification code.
The directing means may be configured, in response to receiving a communication that the object has entered a system, to instruct all readers to poll the identification code. The directing means may be configured to determine whether at least one

reader receives a response, to identify which readers do not recent a response and, in response to at least one reader receiving a response, to instruct the readers which do not receive i. response to stop polling the identification code. The directing means may be configured, in response to receiving a communication that the object has left a system, to instruct readers to stop polling the identification code. The directing means may be configured to determine whether tne tag stops responding to interrogation by a reader, to identify readers surrounding the location covered bv the reader, the surrounding readers monitoring areas through which the object may pass and to instruct the readers to poll the identification code. The directing means may be configured to determine whether the object has remained undetected for a given period of dme: and, in response to determining that the object has remained undetected for the given period of time, to instruct readers m a wider area to seel: the object.
The directing means mav be computer connected to the network of readers, The apparatus may further comprise the network o: readers. Tne directing means may be distributed within the network of readers.
According to a fifth aspect of the present invention there is provided a reader for interrogadng a radio frequency identification tag, wherein the reader is configured to interrogate the tag by transmitting its an identification code and, in response to receiving its identification code, the tag identifies itself to the reader, the reader connectable to other radio frequency identification tag readers to form a network of readers, the reader comprising means for identifying an expected location of the object and means for directing one or more selected readers according to the expected location to interrogate the tag using its identification code.
According to a sixth aspect of the present invention there is provided system for the tracking and control of mobile objects in the industrial, domestic, and public environments using RFID Tags; said system, allowing the usage of discreet RFID Tags attached to said objects, said Discreet Tags which cannot be interrogated by unauthorised readers; also comprising a method to deploy the network of readers, said method allowing for the tracking and authorised interrogation of ail tagged

objects without exceeding the technical capacity of readers, and without leaving unmonitored corridors or shadow zones through which said tagged objects can move without being detected; and an algorithm to direct the network of readers to follow said tagged objccts as they move around by timely and precisely distributing the required object identifiers, and by sharing identification information with other systems if necessary, and more specifically when objects are incorporated into or leave the system.
Brief Description of the Drawings
Embodiments of the present invention will now be described, by way of example. wiith reference to the accompanying drawings in which:
Figure 1 is a schematic diagram of an embodiment of a tag system; m accordance with the present invention; Figure 2 is a schem atic diagram of a tag;
Figure 3 illustrates operation of a tag when interrogated with generic or semi-generic query or a query using an incorrect tag identifier;
Figure 4 illustrates operation of a tag when interrogated with a query using a correct tag identifier;
Figure 5 is a flow diagram, of a process performed by a tag; Figure 6 illustrates an example of layout of tag readers within a facility; Figure 7 illustrates selective activation of readers shown in Figure 6; Figure 8 is a flow diagram of a process performed by a controller; Figure 9 illustrates a computer system implementing the process described in relation to Figure 8; and Figure 10 is a schematic diagram illustrating some of the functions of the controller.
Detailed Description of the Invention
Referring to Figure 1, an embodiment of a privacy-friendly system for tracking at least one object 1 in accordance with the present invention is shown. The system includes at least one tag 2, each object 1 carrying a respective tag 2, at least one tag readers 3 and a controller 4. To help provide a privacy-friendly system, the tags 2 are discreet, i.e. they do not respond to generic or semi-generic interrogations or do
not do so m a way that reveals their identity. The object1 can carry more than one tag 2,
The tag 2 may be mounted on a surface of the object 1 or embedded within the object 1. The object 1 may be packaged and so the tag 2 mav be carried by packaging (not shown) rather than the object 1 itself.
The tags 2 and readers 3 are configured to exchange signals through the radio frequency portion of the electromagnetic spectrum, i.e. the tags 2 and readers 3 arc RFID tags 2 and RFID readers 3 respectively, However, the tags 2 and readers 3 may be configured to exchange signals through other portions of the electromagnetic spectrum, e.g. visible or infrared, or using other forms of propagation, such as acoustic waves
As will be described in more detail later, the reader; 3 are arranged tt) cover points of access to delimited areas, such as corridors, rooms, buildings or other closed areas, such that an object 1 can be tracked as it enters or leaves a delimited area.
The controller 4 is a separate unit, for example, a computer 17 (F.igure 9) which executes a computer program, 25 (Figure 9) for predicting and following movement of objects 1 and which selectively directs readers 3 to transmit an interrogation message. The controller 4 may also trigger actions and communicate with other systems 5. In some embodiments, the function of the controller 4 mav be executed by one or more readers 3 and, thus, the separate controller 4 mav be omitted. A reader 3 which executes functions of the controller is referred to as an "intelligent reader'".
Referring to Figure 2, the discreet tag 2 is similar to commonly-used types of RFID tag in that it has a chip 6 connected to an antenna 7 The tag 2 is assigned a unique identifier (UID) 8 from a global numbering scheme, stored in the chip 6 and which, optionally, mav also be displayed on the tag 2, for example as shown in Figure 2. The tags 2 may provide other data and/or sensing information.
The discreet tag 2 is passive, i.e. it has no internal energv source and obtains energy for its reply' from an interrogation field. However, the tags 2 may include a batten-and may be active.
The discreet tag 2 differs from the commonly-used IIFID tags in that the internal logic of the chip 6 is different. Instead of overly transmitting its UID and data upon generic or semi-generic interrogation, the discreet tag 2 only replies when specificaiiy interrogated with its UID and, optionally, £ password. Otherwwise, the discreet tag 2 stays silent. Thus, the discreet tag 2 is not ''talkative" like most RFID tags.
Behaviour of the discreet tag 2 is equivalent to answering only closed questions such as "Is your id 453455?", as opposed to the behaviour of typical RFID tags that overtly respond to open questions such as "What is vour id and data"-'".
To improve the security of discreet tags 2, their UID can be extended by adding a random password generated at time of manufacture. For increased security, the tag 2 may be programmable so that the password can be changed by owners (users or consumers). Extending the UID by adding a randomly-generated password makes it more difficult for unauthorised persons to guess the UID of a tagged object 1 b}-trial-and-error. For clarity, references to "UID" arc intended to include a UID ■+ password. The UID is a unique identifier and is difficult to guess. This is generally this is achieved by maldng the identifier a long number (for example, 96-bits long) and, opdonally, providing a randomly-generated part.
As explained earlier, discreet tags 2 only reply when interrogated with exactly their UID (i.e. correct interrogadon) and remain silent otherwise. However, discreet tags 2 may be modified such that they reply with a standard "negative" signal when interrogated generically, semi-generically, or with the wrong UID (i.e. incorrect interrogation).
When correctly interrogated, a discreet tag 2 can respond with (a) their UID, (b) their UID plus other data and sensing information, (c) other data and sensing
information, (d) a standard "1 am here" signal, or (e) a standard "I am here" signal plus other data and sensing information.
Referring to Figures 3 and 4, operation of a discreet tag 2 in response to interrogation by a reader 3 is shown.
Referring in particular to Figure 3, when the reader 3 interrogates the discreet tag 2 by sending a signal 9 (also referred to herein as an ''interrogation message"} which is generic or semi-generic, or specific but carrying the incorrect UlD) (step S3()l), the discreet tag 2 does not reply (step S302;, Alternatively, the discreet tag 2 sends a negative reply.
Referring in particular to Figure 4, if the reader 3 interrogates the discreet tag 2 by sending a signal 9' with the UID specific to the tag 2 (step S401), Then the discreet tag 2 sends a reply 10, for example comprising its UID and, optionally, other data (step S402).
Referring still to Figures 3 and 4 and also to Figure 5. a flow diagram of a process performed by the logic of the discreet tag 2 is shown.
The tag 2 listens or waits for an interrogation message 9, 9' (step S501). The tag 2 continues to listen or to wait for signals 9, 9' until it receives one (step S502). For a passive tag, receiving a signal provides power which allows subsequent steps to be performed.
When the tag 2 receives an interrogation message 9, 9', it identifies the type of interrogation (step S503), and determines whether the interrogation is generic or semi-generic (step S504).
If the interrogadon is generic or semi-generic, then it ignores the message (step S505) and waits for the next interrogation (step S501). Instead of ignoring the message, the tag 2 may reply with a "negative" message.
If the interrogation is directed to a specific tag, then the tag identifies the UID (step S506) and compares the received UID with the tag UID, i.e. stored in the tag (step S507; and determines whether there is a match (step S508).
If both codes are equal (i.e. there is a match;, then the tag 2 sends a reply 10 with identification and, optionally, other data (step S509). Alternativeh, the tag may reply with an "1 am here" signal 10. If the UIDs are different, then the tag 2 ignores the signal 9 and waits for the next interrogation or sends a "negative'" replay (step S505).
Referring again to Figure 1, m many industrial, commercial and other types of environment, tagged objects often move through specific paths and locations along a supply chain and within facilities, such as a plant or warehouse. In embodiments of the present invention, mobile objects 1 have discreet tags 2 attached and readers 3 are placed at doors, corridors and/'or shelves along the paths through which the object 1 moves and locations at which objects are stored or kept.
The locations of readers 3 are chosen such that objects 1 in an area (e.g. a defined or delimited area) are covered by the interrogation field of at least one reader 3 or are "surrounded'" by a readers 3 such that the object 1 crosses an interrogation field to leave (or enter; the area. In other words, the locations of readers 3 are chosen so as not to leave any unmonitored corridors or "shadow zones" along the possible paths along which an object 1 may move.
The readers 3 can be arranged to limit the number of tagged objects 1 to be tracked concurrently by each reader 3 within its interrogation cycle, which is limited by its tracking capacity.
The tracking capacity, TC, of a reader 3 is given by its interrogation speed, IS, which is the number of tags the reader 3 can interrogate per second and which depends on its characteristics and other technical factors frequency and protcol, by the distance, D, to the closest adjacent reader , by the length, L, of its interrogation field along the path of the object and by the maximum potential object speed, OS.
This is to enable the reader 3 to detect the disappearanct of an object 1 within its range and to notify surrounding readers before the object 1 reaches them and to be able to detect moving objects 1 before it cross its interrogation field.
Thus, the traciang capacity is expressed as:
TC≈ mm (IS x(D/OS), IS x(L/OS)) (1)
Ideally, the layout of the readers 3 should be such that no traciang area or space can normally contain more objects than the individual traciang capacity of each surrounding reader, plus some margin for lost/misplaced objects, extra security, reading failures, and orocessing and other overheads. In small facilities containing relatively few tagged objects, a reader per door might suffice. Large facilities might require dozens of scattered readers.
Referring to Figure 6, an example of a layout of readers 5 m a facility 11, such as a warehouse or supermarket, is shown. The facility 11 has three storage shelves 121, 122, 123 arranged m parallel. The outer pair of shelves 121, 123, are each equipped with three readers 31, 32, 33, 34, 35, 36 at their ends and in the middle. The facility 11 is accessed via two doors 13,, 132 each equipped with a respective reader 37, 38,.
First, second, third, fourth, fifth, sixth, seventh and eighth readers 31, 32, ..., 38 each
have associated with it a respective interrogation field 141, 142, 148, shown in the
Figure 6 as a surrounding or adjacent circle, i.e. the readers 31, 32 ..., 38 are either located at the centre or off centre to the interrogation field 141, 142, — 148. The interrogation field 141, 142,..., 148 is the area m which a tag 2 and a reader 31, 32,..., 31, can interact.
In this example, the second reader 32 is able to track concurrendy tagged objects 1 in its interrogation field 142 and also in first and second areas 151, 152 bounded by the first and second shelves 121, 122, and lying between the first and second interrogation fields 141, 142 and the second and third mterrogation fields 142, 143. The eighth reader 38 is able to track concurrently tagged objects 1 m its
interrogation field 148 and in a third area 153. boundec; bv tne inside of the facility- 11
and by adjacent integrations fields 141, 143, 146, 147, 148. The third reader 33, is able to track concurrently tagged obiects 1 in its interrogation field 143 and in the second and third areas 152, 153.
A controller 4 running a computer program 25 (Figure 9) is provided with knowledge of the layout of the facility 11 and keeps record of the last or current approximate location of tagged obiects 1 (i.e. m terms of the last reader 3 which detected them) and directs seek operations accordingly-, m other words directs specific readers 3 to transmit an interrogation message 9.
The controller 4 knows the location of the readers 3 and reacts when a tagged object strays 1 from the range of a giver: reader (i.e. when the object '"disappears") by instructing surrounding readers 3 and/or readers 3 within the possible paths of the object 1 to seek it using its UID.
When an object 1 is detected by another reader 3 or bv the origmal reader 3 (i.e. the reader 3 which previously detected the object 1), the controller 4 stops other readers 3 from looking for the object J and instructs the successful reader 3 (i.e. the reader 3 which currently detects the object 1) to keep polling 11 (i.e. keep transmitting the mterrogation signal 9) so as "to keep an eye on it" until the cycle starts again. Optionally, when an object 1 is out of contact for a certain period of time, readers 3 within a wider area or within the whole facility 11 can be instructed to seek the tagged object 1 using its UID. This can help to provide security against "losing" the tag 2 should a reader 3 or network fail. The period of time depends upon the distance to the next set of neighbouring readers 3 and the speed of the object 1. As explained earlier, all or part of the functions of the controller 4 may be implemented by intelligent readers or in computers connected to tine network of readers, either m a centralised or distributed approach.
Referring to Figure 7, object tracking within the facility 11 will now be described.
In a first position 16,, a first object 1, carrying 1; first, tag 2. is within range of the first reader 3,. Therefore, the controller 4 instructs only the first reader 3, to poll the first tag's UID.
In a second position 162, a second objcct 12 carrving a second tag 22 is within range of the first and seventh readers 3,, 3-,. Therefore, thr controller ■M instructs oniv the first and seventh readers 31, 3, to poll the second tag's UID.
A third object 13 carrying a third tag 23 is currenth' moving between the second and third readers 31, 33. The third object 13, is outside the reach ('i.e. interrogation field) of any reader. The second reader 32 is the last reader 3 to have detected it. Under this scenario, the controller 4 instructs first, second and third readers 31, 32, 33, to look for the UID of third object 13, The system does not knov the direction of the movement, but knows that the third object 13 cannot reach other areas without passing through the first or third interrogation fields 141, 142 or coming back to the second interrogation field 142. Once the third object 13 reaches the third reader 33, the controller 4 instructs the firs: and second readers 31, 32 to stop polling the third tag's UID.
A fourth object 14 carrving a fourth tag 24 has been outside the reach of all readers 3 for a time longer than the threshold. Therefore, the controller 4 instructs all readers 31, 3.2,..., 38 m the facility 11 to look for the fourth tag 24, by polling its UID.
In summary, using the layout of the readers 3 and the current locations of the tags 2 shown in Figure 7, all readers 31, 32, .... 38, poll the UID of the fourth tagged object 14, the seventh reader 37, also polls the UID of the second tagged object l2, the first reader 3, also polls the UID of the first, second and third tagged objects 11, 12, 13 and second and third readers 32 , 33 also poll the UID of second tagged object 12,
Referring to Figures 7 and 8, a flow diagram of a process performed by the controller 4 is shown.
The controller 4 listens for events (step S801);, Tht conrrolier 4 determines whether it has detected an event (step S802): and. if not. it continues to listen (step S801).
If the controlier 4 detects an event, then it identifies the type of event (step S802). An event may be an appearance or disappearance of an object, as reported bv a reader 3, an external event, such as object transfer to or from another facility or a sale or a time-out when an object 1 remains undetected for a specific period of time.
The controller 4 determines whether the even: is a time out (step S804).
If the event is a time-out, the controller 4 identifies the object 1 and its last known location (step S806), idendfies the readers 5 in a wider area around the last known location (step S807) and instructs these readers to look for the object 1 using object's UID (step S808). The controller 4 then continues to lister. for events (step S801).
If the event is not a time-out, then the controller 4 determines whether the event is new detection (step S809).
If the event is a detection of a previously undetected UID, the controller 4 identifies the UID of the appearing object 1 and its iocation (step S810), identifies other readers currently (and unsuccessfully) seeking for this UID (step S811), and instructs these readers 3 to stop looking for it (step S812). The controller 4 then continues to listen for events (step S801 ).
If the event is not a new detection, then the controller 4 determines whether the event is an external event (step S813).
If the event is not an external event and is a disappearance of a UID, the controller 4 idendfies the object 1 and its last known location (step S814), programs (i.e. starts) an event timer for this object (step S815), identifies surrounding readers 3 to the location where the object disappeared (step S816) and instructs these readers to look for the object (step S813).
If the event is the reception, transfer or sale o; the object, as communicated by other systems such as inventory management or point-of-sale (PC)S;, then all readers 5 are instructed to start/stop ioolung for the object's UID (step S818) and it is included/removed into/from the system (step S819),
It will be appreciated that events can be identified in a different order. For example, the controller 4 can determine whether ar event is an external event before determining whether it is a time out.
Referring to Figure 9, the controller 4 is implemented ir. software in a computer system 17. The computer system 17 includes a processor 18, memory 19 and an input/output (I/O) interface 20 operativeJA- connected by a bus 21. The computer system 17 mav include more than one processor. The l/C) interface 2(! is operadvelv connected to a network interface 22 for communicating with readers 3 and, if present, externai systems 5 (Figure 1) and to storage 23. for example, m the form of a hard disc drive (or drives).
Optionally, the computer system. 17 may also serve as a reader 3, i.e. as an "intelligent reader". Thus, the I/O interface 20 is also operativeiy connected to a wireless transceiver 24, e.g. an RF transceiver,
Computer program code 25 which, when executed by the computer system. 17, causes the computer system 1" to perform the process described in relation to Figure 8 is stored on the hard drive 23 and loadec into memory 19 for execution by the processor 1 8.
If the system 17 also serves as a reader 3, then additional program) code for executing the functions of the reader is also stored on the hard drive 23.
It will be appreciated that an "intelligent reader" may be arranged to be compact and so could be implemented as a computer-on-a-chip or as a chipset.
Referring to Figure 10, the controller 4 comprises functional units including an interface 26 for receiving notifications 27 of external events, for example from readers 3 (Figure 1} or external systems 5 (Figure 1), and for sending instructions 28 to readers 3 (Figure 1) or notifications 29 to external systems 5 (Figure j), a control unit 30 and a tag tracldng unit 31. The control unit 3(' and trackng unit 21 access one or more databases 32 which store, lor example list of readers 33, layout 34 oi the faciliy' 11 (Figure 6) and current locations 35 or tags 2 (Figure 1).
As explained earlier, the functions of the controller may be implemented by a separate entity, i.e. controller 4. However, the funcnons may be implemented by one or more readers 3 (Figure 1). Moreover, the functions may be distributed amongst more than one reader or the functions may be repeated by more than one reader 3 (Figure 1). Thus, the need for a separate entity can be avoided.
The process performed by the controller 4 can be modified for use m a domestic environment or in pubic places.
The process may also be modified to support or enable mobile RFID readers and to feed them with information about objects. For example, mobile readers can determine their approximate location at any momen: by means of fixed "talkative" tags or location technologies such as Global Positioning Svstems etc. Thus, a modified process can provide mobile readers with UIDs of all objects within their tracking area, so as to authorise and enable their interrogation.
Optionally, the system can interface with other systems in order to obtain UIDs of objects in the first place or feed other RFID systems downstream the supply chain. For example, the use of a discreet tag on product items can be complemented by the usage of active (bundling) tags in product bundles such as cases, pallets etc. Bundling informadon, including the UIDs of bundled items, can be either transmitted via inter-organisational transactions (electronic data interchange such as Advance Shipment Notices etc.), or stored in the bundling (active) tag. Upon reception of the bundle, the interrogation of the bundling tag can automatically trigger the interrogation of ail bundled items, checking for delivery completeness
and feeding the local privacy-friendly RFID system with their UIDs so as to start the tracking process described above. A; its output, when tagged objects are sold or transferred to other facilities, the privacy-friendly PvFID system could interface with their respective RFID systems bv electronically sending the UIDs of transferred objects or with specialised personal UID-carrying devices such as mobile phones, flash memories, specialised watches, cameras etc. so object owners can interact with their discreet RFID tags, including the possibility of changing their passwords at will if so supported bv the tags.
As explained earlier, in the RFID system hereinbefore described RFID tags cannot be easilv queried bv unauthorised parties. This hclps to protect the privacy of the carrier of the tag and to make it harder to fake or duplicate the tag.
Since discreet tags 2 are not "talkative", interrogation requires a-priori knowledge of their UID. As explained earlier, a controller and a network of readers is able to predict, follow and appropriately interrogate tagged objects as they move or as they remain static.
When a discreet tag leaves the privacy-friendly RFID system, they cannot be surreptitiously queried because they do not reply to generic or semi-generic interrogations and their UIDs are unknown outside the system. Thus, consumer privacy is protected.
Embodiments of the present invention can be used in industrial or commercial applications, for example to enable automatic replenishment (or "re-stocking"), automatic check-out, to reduce counterfeiting, to locate misplaced products, to streamline distribution and logistics, to improve product recalls and so on. Embodiments of the present invention can also be used m domestic applications, for example to facilitate recycling, automatic selection of washing programmes by the washing machine and so on. Advantageously, the tags can be used without compromising consumers' privacy.
As explained earlier, the use of discreer tags requires that their interrogators have a-priori knowledge of their UID and, optionally, a password (as explained earlier, the password can be considered to be part of the UID). This helps to protect consumers from surreptitious interrogation of the tags they carry. If UIDs are properly secured in retailer or owner databases and are never linked to personal identification data of their owners, the use of discreet tags allows the creation of a privacy-friendly "Internet of Things'"', where objects remain anonymous and cannot or cannot easily be tracked without authorisadon. Even if some of these UIDs accidentally leak out, it would be aimosr impossible to search for them on the street since they require specific interrogation by UID. Searching for a tag with a specific UID would be like "Jooking for a needle in a havstack".
Furthermore, if tags are used which allow consumers to change the password element of UIDs of objects m their possession, then this makes surreptitious interrogation much more difficult and virtually impossible. As long as their UID is known by the RFID system, discreet tags offer the same functionality as "talkative" RFID tags. If their UID is lost, they can no longer be interrogated and become useless and harmless from a privacy point of view .
Consumers may can save the UIDs of tags on their property in personal computing devices, such as mobile phones, portable computers, music plavers, flash memory devices and so on. This can be useful, after sale, m domestic applications. Optionally, the personal computing devices may require or prompt the user to change a password or even to change the password on their behalf.
Although interacdons between discreet tags and readers can be performed without encryption or other security mechanisms and, thus, can be vulnerable to eavesdropping, this is usually not an issue since the interactions are short range so making eavesdropping difficult. Consumers could be warned about eavesdropping so as to avoid interacting with their tagged objects when eavesdropping is possible or likely. For instance, consumers could interface with their tagged objects withm the privacy of their homes or m relatively quiet places.
The system can be used to enhance tne usage of RFID tags in applications. such as anti-counterfeit and access control, because discreer tags cannot be easiiv read by unauthorised persons, thereby making faking (i.e, copying or "cloning" and subsequently using the copy or "clone"; very difficult.
Many existing RFID readers are able to interrogate specific tags using their UID. This means that discreet tags can interoperate with some existing RFID technologies and does not require special readers or sophisticated parallel RFID infrastructures.
Since discreet tags are interrogated in sequence hv their UID, they do not require the ann-collision mechanisms typical of "talkative" RFID tags, which may reply simultaneously and hence require random reply lags and re-interrogation. This means that the interrogation performance of discreet tags is, at least theoretically, superior than that of "talkative" tags.
It will be appreciated that many modifications may be made tc the embodiments hereinbefore described. Although tags and readers have been described m the context of RFID, other forms of tags and readers, e.g. based on infra red communication can be used.

Claims
1. A method of tracking an object tagged with a radio frequency identification
tag having an identification code using a network of readers, wherein a reader interrogates the tag by transmitting its identification code and, in response to receiving its identification code, the tag identifies itself to the reader, the method comprising:
identifying an expected location of the object: and
directing at least one selected reader according to the expected location to interrogate the tag using its identification code.
2. A method according to claim. 1, wherein, m response to receiving a message comprising an identification code different to its identification code, the tag does not identify itself
3. A method according to claim 1 or 2, wherein, m response to receiving a message not comprising an identificauon code, the tag does not identify itself.
4. A method according to anv preceding claim, wherein in response to receiving its identification code, the tag identifies itself to the reader by tra
nsmitting a predefined message.
5. A method according to any preceding claim, wherein in response to receiving
its identification code, the tag identifies itself to the reader by transmitting its
identification code.
6. A method according to any preceding claim, comprising: receiving a communication that the object has entered a system.; and instructing all readers to poll the identification code.
7. A method according to claim 6, comprising: determining whether at least one reader receives a response; identifying which readers do not receive a response; and
in response to at least one reader receiving a response, instructing the readers which do not receive a response to stop polling the idsnafication code.
B. A method according to any preceding claim, comprising:
receiving a communication that the object has left a system; and instructing readers to stop polling the identification code.
9. A method according to anv preceding claim, comprising:
determining whether the tag stops responding to interrogation by a reader; identifying readers surrounding the location covered by the reader, the surrounding readers, monitoring areas through which the object mav pass; and instructing the surrounding readers to poll the identification code,
10. A method according to claim 9, further comprising:
determining whether the object has remained undetected for a given period of time; and
in response to determining that the object has remained undetected for the given period of time, instructing readers in a wider area to seek the object.
11. A method according to any preceding claim., wherein the idendfication code comprises a fixed part and a user-changeable part.
12. A computer program comprising computer-readable code which, when executed by a computer, causes the computer to perform a method according to any preceding claim.
13. A computer program product comprising a computer readable medium storing thereon a computer program according to claim 12.
14. Apparatus for tracidng an object tagged with a radio frequency identification tag having an identification code using a nerwork of readers, wherein a reader interrogates the tag by transmitting its identificadon code and, in response to receiving its identification code, the tag identifies itself to the reader, the apparatus
comprising:
means for identifying an expected iocation oi the object, and
means for directing one or more selectecl readers according to the expected
location to interrogate the tag using its identification code,
15. Apparatus according to claim 14, wherein the directing means is configured, m response to receiving a communicauon that the object has entered a system, to instruct all readers to poll the identification code.
16. Apparatus according to claim 14 or 15, wherein the directing means is configured to determine whether at least one reader receives a response, to identify which readers do not receive a response and, in response to at least one reader receiving a response, to instruct the readers which do not receive a response to stop polling the identification code.
17. Apparatus according to claim 16, wherein the directing means is configured, in response to receiving a communication that the object has left a system, to instruct readers to stop polling the identification code.
18. Apparatus according to anv one of claims 14 to 17 wherein the directing means is configured to determine whether the tag stops responding to mterrogauon by a reader, to identify readers surrounding the location covered by the reader, the surrounding readers monitoring areas through which the object may pass and to instruct the readers to poll the identification code.
19. Apparatus according to claim 18, wherein the directing means is configured to determine whether the object has remained undetected for a given period of time; and, m response to determining that the object has remained undetected for the given period of time, to instruct readers m a wider area to seek the object.
20. Apparatus according to any one of claims 14 to 19, wherein the directing means is computer connected to the network of readers.
21. Apparatus according to any ont of claims 14 to 19, further comprising:
the network of readers.
22. Apparatus according to claim 21, wherein the directing means is distributed within the network of readers.
23. A reader for interrogating a radio frequency identification tag, wherein the reader is configured to interrogate the tag bv transmuting its an identification code and, in response to receiving its identification code, the tag identifies itself to the reader, the reader connectable to other radio frequency identification tag readers to form a network of readers, the reader comprising:
means for identifying an expected location of the object; and means for directing one or more selected readers according to the expected location to interrogate the tag using its identification code.
24. A system for the tracking and control of mobile objects m the industrial, domestic, and public environments using RFID Tags; said system allowing the usage of discreet RFID Tags attached to said objects, said Discreet Tags which cannot be interrogated by unauthorised readers; also comprising a method to deploy the network of readers, said method allowing for the tracking and authorised interrogation of all tagged objects without exceeding the technical capacity of readers, and without leaving unmonitored corridors or shadow zones through which said tagged objects can move without being detected; and an algorithm to direct the network of readers to follow said tagged objects as they move around by timely and precisely distribudng the required object identifiers, and by sharing identification information with other systems if necessary-, and more specifically when objects are incorporated into or leave the system.
25. Apparatus for tracking an object tagged with a radio frequency identification tag having an-identification code using a network of readers, wherein a reader interrogates the tag by transmitting its identification code and,in response to receiving its identification code, the tag identifies itself to the reader, the apparatus comprising:
a trackng unit arranged tc identify an expected location o: the object: and a control unit arranged to direct one on more selected readers according to tne expected locatior to interrogate tne tag using its: identification code.
26. A method o: traciang an ob|ec: tagged with a tag having an idennfication code using i. nerwork; of readers, wherein a reader mterrogares tnt tag using tht identification code and the tag responds to interrogation by tht reader, tne mefnod comprising:
directing tht nerworl: of readers tc follow tht object as it moves around.

Documents

Application Documents

# Name Date
1 7667-DELNP-2008-AbandonedLetter.pdf 2017-04-22
1 7667-DELNP-2008-Form-18-(23-02-2010).pdf 2010-02-23
2 7667-DELNP-2008-Correspondence-Others-(23-02-2010).pdf 2010-02-23
2 7667-DELNP-2008-FER.pdf 2016-08-27
3 7667-delnp-2008-pct-306.pdf 2011-08-20
3 7667-delnp-2008-Correspondence Others-(14-02-2014).pdf 2014-02-14
4 7667-delnp-2008-pct-304.pdf 2011-08-20
4 7667-delnp-2008-Form-3-(14-02-2014).pdf 2014-02-14
5 7667-delnp-2008-pct-210.pdf 2011-08-20
5 7667-delnp-2008-Correspondence Others-(04-03-2013).pdf 2013-03-04
6 7667-delnp-2008-form-5.pdf 2011-08-20
6 7667-delnp-2008-Form-3-(04-03-2013).pdf 2013-03-04
7 7667-delnp-2008-form-3.pdf 2011-08-20
7 7667-delnp-2008-abstract.pdf 2011-08-20
8 7667-delnp-2008-form-2.pdf 2011-08-20
8 7667-delnp-2008-claims.pdf 2011-08-20
9 7667-delnp-2008-correspondence-others.pdf 2011-08-20
9 7667-delnp-2008-form-1.pdf 2011-08-20
10 7667-delnp-2008-description (complete).pdf 2011-08-20
10 7667-delnp-2008-drawings.pdf 2011-08-20
11 7667-delnp-2008-description (complete).pdf 2011-08-20
11 7667-delnp-2008-drawings.pdf 2011-08-20
12 7667-delnp-2008-correspondence-others.pdf 2011-08-20
12 7667-delnp-2008-form-1.pdf 2011-08-20
13 7667-delnp-2008-claims.pdf 2011-08-20
13 7667-delnp-2008-form-2.pdf 2011-08-20
14 7667-delnp-2008-abstract.pdf 2011-08-20
14 7667-delnp-2008-form-3.pdf 2011-08-20
15 7667-delnp-2008-Form-3-(04-03-2013).pdf 2013-03-04
15 7667-delnp-2008-form-5.pdf 2011-08-20
16 7667-delnp-2008-Correspondence Others-(04-03-2013).pdf 2013-03-04
16 7667-delnp-2008-pct-210.pdf 2011-08-20
17 7667-delnp-2008-Form-3-(14-02-2014).pdf 2014-02-14
17 7667-delnp-2008-pct-304.pdf 2011-08-20
18 7667-delnp-2008-pct-306.pdf 2011-08-20
18 7667-delnp-2008-Correspondence Others-(14-02-2014).pdf 2014-02-14
19 7667-DELNP-2008-FER.pdf 2016-08-27
19 7667-DELNP-2008-Correspondence-Others-(23-02-2010).pdf 2010-02-23
20 7667-DELNP-2008-Form-18-(23-02-2010).pdf 2010-02-23
20 7667-DELNP-2008-AbandonedLetter.pdf 2017-04-22