Systems and methods for locating tags

ABSTRACT

Systems and methods for determining a physical location of a first Radio Frequency Identification (“RFID”) tag. The methods involve: analyzing timestamped tag read information acquired during multiple tag reads to determine a first physical location for the first RFID tag read by the mobile reader while moving through a facility; identifying second RFID tags from a plurality of RFID tags read by the mobile reader that are located in proximity to the first RFID tag and that are coupled to objects similar to an object to which the first RFID tag is coupled; selecting an RFID tag from the second RFID tags that has a first location confidence value associated therewith which is greater than second location confidence values associated with other RFID tags of the second RFID tags; and modifying the first physical location based on a second physical location at the time of reads, location of the RFID tag selected from the second RFID tags.

CROSS-REFERENCE TO RELATED APPLICATIONS

This patent application claims the benefit of U.S. Provisional Ser. No.62/404,340 filed Oct. 5, 2016, the entirety of which is incorporatedherein by reference.

BACKGROUND Statement of the Technical Field

The present disclosure relates generally to Radio FrequencyIdentification (“RFID”) systems. More particularly, the presentdisclosure relates to implementing systems and methods for locating tagsin RFID systems.

Description of the Related Art

Retailers are adding more RFID tags to their products to trackinventory. However, the total number of products on a store floorconstantly changes as products are sold and restocked. Putting RFIDreaders at the transition areas of the store floor and at the Point OfSale (“POS”) stations would work well if 100% of the RFID tags werecorrectly read. However, in practice only 60-98% of the RFID tags areread at each transition area. This means that the inventory process isnot 100% accurate. In addition, products are removed from the store bythieves without the RFID tags being read.

The ideal technical solution is to have hundreds of fixed RFID readersplaced around the retail store. However, this is too expensive toimplement. The best alternative is to use handheld readers to trackinventory. However, this handheld inventorying process is very timeconsuming, human resource intensive and costly. Thus, the handheldinventorying process is typically performed monthly. Additionally, thehandheld inventorying process is error prone due to employee mistakes.

SUMMARY

The present document concerns systems and methods for determining aphysical location of a first Radio Frequency Identification (“RFID”)tag. The methods comprise analyzing timestamped tag read informationacquired during multiple tag reads to determine a first physicallocation for the first RFID tag read by the mobile reader while movingthrough a facility. Each of the multiple tag reads are performed whenthe mobile reader is at a respective one of a plurality of differentlocations within the facility. The mobile reader has the same ordifferent RF power level setting at each one of the different locations.

Next, second RFID tags are identified from a plurality of RFID tags readby the mobile reader that are located in proximity to the first RFID tagand that are coupled to objects similar to an object to which the firstRFID tag is coupled. An RFID tag is selected from the second RFID tagsthat has a first location confidence value associated therewith which isgreater than second location confidence values associated with otherRFID tags of the second RFID tags. The first physical location ismodified based on a second physical location of the RFID tag selectedfrom the second RFID tags. A third location confidence value associatedwith the first RFID may also be increased by an amount selected based onat least one of (a) how much the first physical location was modified,(b) the first location confidence value associated with the RFID tagselected from the second RFID tags, and (c) a degree of similaritybetween an object to which the first RFID tag is coupled and an objectto which the RFID tag selected from the second RFID tags is coupled.

A graphical map can be generated that shows the first physical locationof the first RFID tag in a virtual space representing the facility. Thegraphical map comprises a human readable name for a geographic area inwhich the first RFID tag resides. The human readable name is determinedby translating a read code (e.g., a product identification code or asymbol sequence (e.g., a number) which can be used to acquire theproduct identification code from a data store) into the human readablename. The translating is performed by the mobile reader without anymanual input from a user.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments will be described with reference to the following drawingfigures, in which like numerals represent like items throughout thefigures.

FIG. 1 is an illustration of an illustrative system.

FIG. 2 is an illustration of an illustrative mobile reader.

FIG. 3 is an illustration that is useful for understanding a mobilereader's coverage area.

FIG. 4 is an illustration that is useful for understanding how knowledgeof a mobile reader's pointing direction can facilitate tag location.

FIG. 5 is an illustration that is useful for understanding how aplurality of tag reads can be used to find a tag of interest.

FIG. 6 is an illustration that is useful for understanding how readinformation for other tags can be used to increase an accuracy of atag's location.

FIG. 7 is an illustration of an illustrative server.

FIG. 8 is an illustration of an illustrative graphical map.

FIGS. 9A-9B (collectively referred to as “FIG. 9”) is a flow diagram ofan illustrative method for determining physical locations of RFID tagsin a facility.

FIG. 10 is a flow diagram of an illustrative method for generating agraphical map.

DETAILED DESCRIPTION

It will be readily understood that the components of the embodiments asgenerally described herein and illustrated in the appended figures couldbe arranged and designed in a wide variety of different configurations.Thus, the following more detailed description of various embodiments, asrepresented in the figures, is not intended to limit the scope of thepresent disclosure, but is merely representative of various embodiments.While the various aspects of the embodiments are presented in drawings,the drawings are not necessarily drawn to scale unless specificallyindicated.

The present solution may be embodied in other specific forms withoutdeparting from its spirit or essential characteristics. The describedembodiments are to be considered in all respects only as illustrativeand not restrictive. The scope of the present solution is, therefore,indicated by the appended claims rather than by this detaileddescription. All changes which come within the meaning and range ofequivalency of the claims are to be embraced within their scope.

Reference throughout this specification to features, advantages, orsimilar language does not imply that all of the features and advantagesthat may be realized with the present solution should be or are in anysingle embodiment of the present solution. Rather, language referring tothe features and advantages is understood to mean that a specificfeature, advantage, or characteristic described in connection with anembodiment is included in at least one embodiment of the presentsolution. Thus, discussions of the features and advantages, and similarlanguage, throughout the specification may, but do not necessarily,refer to the same embodiment.

Furthermore, the described features, advantages and characteristics ofthe present solution may be combined in any suitable manner in one ormore embodiments. One skilled in the relevant art will recognize, inlight of the description herein, that the present solution can bepracticed without one or more of the specific features or advantages ofa particular embodiment. In other instances, additional features andadvantages may be recognized in certain embodiments that may not bepresent in all embodiments of the present solution.

Reference throughout this specification to “one embodiment”, “anembodiment”, or similar language means that a particular feature,structure, or characteristic described in connection with the indicatedembodiment is included in at least one embodiment of the presentsolution. Thus, the phrases “in one embodiment”, “in an embodiment”, andsimilar language throughout this specification may, but do notnecessarily, all refer to the same embodiment.

As used in this document, the singular form “a”, “an”, and “the” includeplural references unless the context clearly dictates otherwise. Unlessdefined otherwise, all technical and scientific terms used herein havethe same meanings as commonly understood by one of ordinary skill in theart. As used in this document, the term “comprising” means “including,but not limited to”.

Presently, there is a desire to take advantage of normal operations inretail stores to do inventory readings using mobile readers. The mobilereaders can include, but are not limited to, handheld RFID readers,robotic RFID readers (e.g., readers disposed on an Unmanned GroundVehicle (“UGV”) or an Unmanned Aerial Vehicle (“UAV”)), and/or RFIDreaders capable of being attached to, coupled to or worn by individuals(e.g., store employees). The present solution involves adding a locationtracking feature to the mobile readers. The mobile readers are then usedin a manner that ensures enough data points are obtained to facilitate ahighly accurate inventorying process.

For example, mobile RFID readers are attached or coupled to storeemployees such that RFID tag reads are performed while the storeemployees restock shelves, clean the facility, conduct securityactivities, and/or assist customers. In this case, ecommerce orders canbe prepared for shipping or pick-up relatively quickly since storeemployees can find where the purchased products reside in the retailstore with a relatively high degree of accuracy.

Today, it often takes 1-15 minutes for a product to be located in aretail store. This is not the case when employing the present solution.While a store employee uses the improved mobile reader of the presentsolution to find the purchased products in the retail store, the mobilereader logs the location of every tag read thereby. This locationinformation is then used to update a tag location database so that ithas close to real-time accuracy. In addition, advanced algorithms areemployed to improve the accuracy of the location information stored inthe tag location database. For example, the accuracy of a given tag'slocation can be improved using the locations of neighbor tags.

The present solution as disclosed herein utilizes inventive algorithmsto accomplish at least the following objectives: improving the accuracyof a mobile reader so that its location and pointing direction are knownin 3D space; mapping a tag read onto a graphical 3D store map so thatindividuals can visualize where in the facility the tag is located;providing wearable tag readers to employees and adding tag readers tostore equipment so that tags are read during normal business processes;and taking advantage of the tag reads performed while the employees aresearching for products that need to be located to fulfill onlineecommerce orders. Power cycling can be used to improve the locationaccuracy of tags that are read.

The present solution also advantageously provides methods to autoconfigure an RFID tag system in a facility (e.g., a retail store) withvery limited fixed infrastructure. The present solution improves fixedlocation tag micro-location, and can be used with high accuracy mobiletag readers that know their locations in 3D space without use ofstationary location tags or location beacons. The present solution alsoincludes algorithms and analytic logic to associate neighbor nodes witheach other and dynamically adjust power levels of the tag readers so asto facilitate highly accurate tag location determinations with minimalhardware and/or software modifications.

Illustrative Systems

Referring now to FIG. 1, there is provided a schematic illustration ofan exemplary system 100 that is useful for understanding the presentsolution. The present solution is described herein in relation to aretail store environment. The present solution is not limited in thisregard, and can be used in other environments. For example, the presentsolution can be used in distribution centers, factories and othercommercial environments. Notably, the present solution can be employedin any environment in which objects and/or items need to be locatedand/or tracked.

The system 100 is generally configured to allow improved object and/oritem locating within a facility. As shown in FIG. 1, system 100comprises a Retail Store Facility (“RSF”) 128 in which display equipment102 ₁, . . . , 102 _(M) is disposed. The display equipment is providedfor displaying objects (or items) 110 ₁-110 _(N), 116 ₁-116 _(X) tocustomers of the retail store. The display equipment can include, but isnot limited to, shelves, article display cabinets, promotional displays,fixtures and/or equipment securing areas of the RSF 128. The RSF canalso include emergency equipment (not shown), checkout counters and anEAS system (not shown). Emergency equipment, checkout counters, and EASsystems are well known in the art, and therefore will not be describedherein.

At least one mobile reader 120 is provided to assist in locating anobject 110 ₁-110 _(N), 116 ₁-116 _(X) within the RSF 128. The mobilereader 120 comprises a handheld RFID reader capable of being carried byan individual (or store employee) 122 or an RFID reader capable of beingattached or coupled to the individual 122. The present solution is notlimited in this regard. In other scenarios, the mobile reader 120comprises a robotic RFID reader.

As shown in FIG. 1, RFID tags 112 ₁-112 _(N), 118 ₁-118 _(X) arerespectively attached or coupled to the objects 110 ₁-110 _(N), 116₁-116 _(X) (e.g., pieces of clothing or other merchandise). The mobilereader 120 is generally configured to read RFID tags 112 ₁, . . . , 112_(N), 118 ₁, . . . , 118 _(X). The RFID tags are described herein ascomprising single-technology tags that are only RFID enabled. Thepresent solution is not limited in this regard. The RFID tags canalternatively or additionally comprise dual-technology tags that haveboth EAS and RFID capabilities. Also, the RFID tags can be replaced withEAS tags having a communications means other than RFID.

Notably, the mobile reader 120 is configured to determine and track itslocation within the RSF 128 as it is being moved about therein. Bycorrelating the mobile reader's RFID tag reads and locations within theRSF 128, it is possible to determine the location of objects 110 ₁, . .. , 110 _(N), 116 ₁, . . . , 116 _(X) within the RSF 128 with arelatively high degree of accuracy. Accordingly, RFID tag readinformation and mobile reader location information is stored in a datastore 126. This information can be stored in the data store 126 using aserver 124. Server 124 will be described in more detail below inrelation to FIG. 7.

In some scenarios, the mobile reader 120 operates in a staticconfiguration. The operator sets the power and other RFID parametersbefore reading tags for inventorying the same. The whole inventory oftags is performed with the configuration set at the start of theinventorying process.

In other scenarios, the mobile reader 120 operates in a dynamicconfiguration. The mobile reader 120 dynamically adapts its parametersbased on whether or not it is present within an Area Of Interest(“AOI”). The AOI is selected from a plurality of separate areas definedwithin the RSF 128. The separate areas can be identified based on RFIDtag groupings.

The RFID tags can be assigned to groups based on their productidentification codes (e.g., Stock Keeping Unit (“SKU”) numbers) and/orrelative locations within the RSF 128. For example, the mobile reader120 reads an RFID tag 112 ₁ to acquire its SKU number. The SKU number isthen translated into a human readable name (e.g., men's shoe size 7). Analgorithm and/or look-up table can be used to achieve this translation.Operations are then performed to identify other RFID tags that arelocated in proximity to (or within a distance range (e.g., <10 feet inone or more directions) from) the read RFID tag. The identified RFIDtags are then deemed to be attached to items of the same or similar type(e.g., men's shoes of various sizes) as that to which the read RFID tagis attached. The geographic area in which this group of RFID tags resideis then assigned a general human readable name (e.g., men's shoes). Thisgeographic area may constitute an AOI.

A map can be generated and displayed by the mobile reader 120 to assistan individual in traveling to an AOI within the RSF 128. In this regard,the map can comprise visual lines designating separate geographic areaswithin the RSF and corresponding text representing the general humanreadable names associated therewith.

Referring now to FIG. 2, there is provided a detailed block diagram ofan illustrative mobile reader 200. Mobile reader 120 of FIG. 1 is thesame as or similar to mobile reader 200. As such, the discussion ofmobile reader 200 is sufficient for understanding mobile reader 120.

Mobile reader 200 may include more or less components than that shown inFIG. 2. However, the components shown are sufficient to disclose anillustrative embodiment implementing the present solution. Some or allof the components of the mobile reader 200 can be implemented inhardware, software and/or a combination of hardware and software. Thehardware includes, but is not limited to, one or more electroniccircuits. The electronic circuit may comprise passive components (e.g.,capacitors and resistors) and active components (e.g., processors)arranged and/or programmed to implement the methods disclosed herein.

The hardware architecture of FIG. 2 represents an embodiment of arepresentative mobile reader 200 configured to facilitate improvedobject locating within an RSF (e.g., RSF 128 of FIG. 1). In this regard,the mobile reader 200 comprises an RF enabled device 250 for allowingdata to be exchanged with an external device (e.g., RFID tags 112 ₁, . .. , 112 _(N), 118 ₁, . . . , 118 _(X) of FIG. 1) via RF technology. Thecomponents 204-216 shown in FIG. 2 may be collectively referred toherein as the RF enabled device 250, and include a power source 212(e.g., a battery).

The RF enabled device 250 comprises an antenna 202 for allowing data tobe exchanged with the external device via RF technology (e.g., RFIDtechnology or other RF based technology). The external device maycomprise RFID tags 112 ₁, . . . , 112 _(N), 118 ₁, . . . , 118 _(X) ofFIG. 1. In this case, the antenna 202 is configured to transmit RFcarrier signals (e.g., interrogation signals) to the listed externaldevices, and/or transmit data response signals (e.g., authenticationreply signals) generated by the RF enabled device 250. In this regard,the RF enabled device 250 comprises an RF transceiver 208. RFIDtransceivers are well known in the art, and therefore will not bedescribed herein. However, it should be understood that the RFtransceiver 208 receives RF signals including information from thetransmitting device, and forwards the same to a logic controller 210 forextracting the information therefrom.

The extracted information can be used to determine the location of RFIDtags within a facility (e.g., RSF 128 of FIG. 1). Accordingly, the logiccontroller 210 can store the extracted information in memory 204, andexecute algorithms using the extracted information. For example, thelogic controller 210 can perform operations to correlate its own tagreads with tag reads made by other tag readers (static or mobile) todetermine the location of the RFID tags within the facility.

Notably, memory 204 may be a volatile memory and/or a non-volatilememory. For example, the memory 204 can include, but is not limited to,a Random Access Memory (“RAM”), a Dynamic Random Access Memory (“DRAM”),a Static Random Access Memory (“SRAM”), a Read-Only Memory (“ROM”) and aflash memory. The memory 204 may also comprise unsecure memory and/orsecure memory. The phrase “unsecure memory”, as used herein, refers tomemory configured to store data in a plain text form. The phrase “securememory”, as used herein, refers to memory configured to store data in anencrypted form and/or memory having or being disposed in a secure ortamper-proof enclosure.

Instructions 222 are stored in memory for execution by the RF enableddevice 250 and that cause the RF enabled device 250 to perform any oneor more of the methodologies of the present disclosure. The instructions222 are generally operative to facilitate determinations as to whereRFID tags are located within a facility. Other functions of the RFenabled device 250 will become apparent as the discussion progresses.

The mobile reader 200 may also comprise a trigger which can be manuallydepressed to initiate tag read operations. The tag read operations canadditionally or alternatively be performed automatically in accordancewith a given application. The mobile reader 200 may further comprises alocation device 274 for determining the location of the mobile readerwithin the RSF 128. An optional sensor(s) 276 can be provided toincrease the accuracy of the determined location. The optional sensor(s)include, but are not limited to, a proximity sensor. The proximitysensor detects the distance from the mobile reader 200 to anotherobject. The distance can be used to compute a more precise mobile readerlocation.

A compass 272 is provided to determine the pointing direction of themobile reader 200 at the time of each tag read. As the mobile reader's120 pointing direction and location are known at the time of an RFID tagread, the physical location of the RFID tag can be deduced, as discussedbelow. A location confidence value is computed for each physicallocation deduced for each tag involved. The location confidence value iscomputed based on the number of reads, an average Received SignalStrength Indicator (“RSSI”), a max RSSI, and/or the mobile reader'spower level at the time of a tag read.

In some scenarios, the location confidence value is computed inaccordance with the following mathematical equation (1).

CV=w ₁ N+w ₂ A+w ₃ M+w ₄ P  (1)

where CV represents a location confidence value, N represents a numberof reads, A represents an average RSSI, M represents a max RSSI, Prepresents the mobile reader's power level at the time of a tag read,and w₁-w₄ represent weighting values. The present solution is notlimited to the particulars of this scenario.

Referring now to FIG. 3, there is provided an illustration that isuseful for understanding how the mobile reader 200 can determine a tag'sphysical location within a facility (e.g., RSF 128 of FIG. 1). As shownin FIG. 3, the mobile reader 200 has an actual coverage area 302 atfirst RF power level P₁. Since the pointing direction of the mobilereader 200 is unknown, the mobile reader is considered to have acircular possible coverage area 304. Accordingly, any RFID tag 306 readby the mobile reader 200 while at a first location L₁ is determined tobe somewhere within the circular possible coverage area 304, and not inits actual coverage area 302. This determination of the RFID tag'slocation is relatively inaccurate.

The accuracy of the RFID tag's location can be increased simply bydecreasing the RF power level of the mobile reader from the first RFpower level P₁ to a second RF power level P₂, as shown by FIG. 4. Asshown in FIG. 4, the possible coverage area 408 is smaller than thepossible coverage area 304.

The accuracy of the RFID tag's location can be further improved byknowing the mobile reader's pointing direction. In this regard, itshould be understood that the mobile reader's actual coverage area 308is also known. With this information, the RFID tag 306 read by themobile reader 200 is determined to be somewhere within the actualcoverage area 402, rather than in the much larger possible coverage area406.

Still, the accuracy of the RFID tag's location can be further improvedusing information from multiple tag reads. Referring now to FIG. 5,there is provided an illustration showing the mobile reader at a firstlocation L₁ and a second location L₂ with the same RF power level P₂setting. The mobile reader performs tag read operations at bothlocations while pointing in opposing directions 404, 502. Since the tag306 was detected during both tag read processes, the location thereof isdetermined to be within the overlapping coverage area 504.

The accuracy of the tag's location can be further improved using anRSSI. For example, the mobile reader records a time window centered on atimestamp of each location L₁ and L₂. Then for each RFID tag, thetimestamp of the read having the highest RSSI is used to retrieve theassociated location L₁ or L₂ if it is included in a recorded timewindow. The tag's location is deduced from the mobile reader'sassociated location L₁ or L₂. The present solution is not limited to theparticulars of this example.

The accuracy of the tag's location can be further improved using tagread information for at least one other tag located in proximity theretoand/or coupled to an object/item of the same or similar type. Referringnow to FIG. 6, there is an illustration that is useful for understandinga process for more accurately determining RFID tag location using readinformation for other tag(s). As shown in FIG. 6, the mobile reader 200is shown at three different locations L₁, L₂ and L₃. The mobile reader200 performs tag read operations at all three locations while having thesame RF power level P₂ and different pointing directions 404, 502, 620.During the tag read operations at the first location L₁, four tags 306,602-606 were detected. Three tags 306, 602, 608 were detected during thetag read operations at the second location L₂. Two tags 602, 606 wasdetected during the tag read operations at the third location L₃. Themobile reader's coverage areas at the first and second locations overlapin first area 504. The mobile reader's coverage area at the thirdlocation overlaps the overlapping coverage area 504 in second area 622.Since tag 306 was not detected during the tag read operations at thethird location L₃, the location thereof is determined to be within area624 of the overlapping coverage area 504, and not in area 622 of theoverlapping coverage area 504.

The physical location of tag 306 can be adjusted or modified based onthe physical locations of one or more of the other tags 602-606. Forexample, tags 606, 602 are coupled to objects similar to the object towhich tag 306 is coupled. Such objects are supposed to be located in aparticular area of the facility having a pre-defined overall size. Ifthe distance between the physical locations of tags 602/306 and/or606/306 exceeds a threshold value, then the physical location of tag 306can be adjusted accordingly (e.g., a distance between two locations isdecreased). The present solution is not limited to the particulars ofthis example.

Notably, location confidence values are determined for derived taglocations. Each location confidence value is computed based on thenumber of reads, an average RSSI, a maximum RSSI, and the mobilereader's power level used to read the RFID tags. The location confidencevalue for tag 306 is lower than the location confidence value for tag602 at least since tag 306 was detected in only two of the three tagreads while tag 602 was detected in all three tag reads.

The location confidence value for tag 306 can be adjusted based on thelocations of nearby tags with relatively high confidence values and/orassociated object/item similarities. In this regard, the presentsolution involves: identifying first tags 602-606 located in proximityto a tag of interest 306; identifying second tags 602, 606 from thefirst tags 602-606 that are coupled to object/items which are similar tothe object/item to which the tag of interest 306 is coupled; selectingone of the second tags 602 with the highest confidence value associatedtherewith; determining if the location of the tag of interest 306 iswithin a pre-defined distance range from the location of the selectedtag 602; adjusting the location of the tag of interest 306 if it wasdetermined that it was not within the pre-defined distance range fromthe location of the selected tag 602; and/or increasing the locationconfidence value for the tag of interest.

The tag locations and location confidence values can be determined bythe mobile reader and/or by a remote computing device, such as server. Adetailed block diagram of an exemplary architecture for a server 700 isprovided in FIG. 7. Server 124 of FIG. 1 is the same as or substantiallysimilar to server 700. As such, the following discussion of server 700is sufficient for understanding server 124.

Notably, the server 700 may include more or less components than thoseshown in FIG. 7. However, the components shown are sufficient todisclose an illustrative embodiment implementing the present solution.The hardware architecture of FIG. 7 represents one embodiment of arepresentative server configured to facilitate (a) tag locationdeterminations, (b) tag location confidence value computations, and/or(c) the provision of a three dimensional map showing locations of RFIDtags (e.g., RFID tags 112 ₁, . . . , 112 _(N), 118 ₁, . . . , 118 _(N)of FIG. 1) within an RSF (e.g., RSF 128 of FIG. 1). As such, the server700 of FIG. 7 implements at least a portion of the methods describedherein.

Some or all the components of the server 700 can be implemented ashardware, software and/or a combination of hardware and software. Thehardware includes, but is not limited to, one or more electroniccircuits. The electronic circuits can include, but are not limited to,passive components (e.g., resistors and capacitors) and/or activecomponents (e.g., amplifiers and/or microprocessors). The passive and/oractive components can be adapted to, arranged to and/or programmed toperform one or more of the methodologies, procedures, or functionsdescribed herein.

As shown in FIG. 7, the server 700 comprises a user interface 702, aCentral Processing Unit (“CPU”) 706, a system bus 710, a memory 712connected to and accessible by other portions of server 700 throughsystem bus 710, and hardware entities 714 connected to system bus 710.The user interface can include input devices (e.g., a keypad 750) andoutput devices (e.g., speaker 752, a display 754, and/or light emittingdiodes 756), which facilitate user-software interactions for controllingoperations of the server 700.

At least some of the hardware entities 714 perform actions involvingaccess to and use of memory 712, which can be a RAM, a disk driverand/or a Compact Disc Read Only Memory (“CD-ROM”). Hardware entities 714can include a disk drive unit 716 comprising a computer-readable storagemedium 718 on which is stored one or more sets of instructions 720(e.g., software code) configured to implement one or more of themethodologies, procedures, or functions described herein. Theinstructions 720 can also reside, completely or at least partially,within the memory 712 and/or within the CPU 706 during execution thereofby the server 700. The memory 712 and the CPU 706 also can constitutemachine-readable media. The term “machine-readable media”, as used here,refers to a single medium or multiple media (e.g., a centralized ordistributed database, and/or associated caches and servers) that storethe one or more sets of instructions 720. The term “machine-readablemedia”, as used here, also refers to any medium that is capable ofstoring, encoding or carrying a set of instructions 720 for execution bythe server 700 and that cause the server 700 to perform any one or moreof the methodologies of the present disclosure.

In some scenarios, the hardware entities 714 include an electroniccircuit (e.g., a processor) programmed for facilitating the provision ofa three dimensional map showing locations of RFID tags within afacility. In this regard, it should be understood that the electroniccircuit can access and run a location determining application 724installed on the server 300. The software application 724 is generallyoperative to facilitate: the determination of RFID tag locations withina facility; and the mapping of the RFID tag locations in a virtual threedimensional space. The software application 724 is also operative to useproduct identification codes (e.g., tag SKU information) to group tagsinto product (e.g., SKU) areas; determine generic human readable namesfor the product (e.g., SKU) areas; and add visual lines and/or text tothe map for visually showing product (e.g., SKU) areas. Other functionsof the software application 724 will become apparent as the discussionprogresses.

An illustration of an illustrative graphical map 800 is provided in FIG.8. The map provides a 2D or 3D virtual representation of a retail storefacility (e.g., RSF 128 of FIG. 1). The map includes dotted linesshowing different areas 802, 804, 808 of the retail store facility intowhich a plurality of tags 806 ₁, . . . , 806 ₆ have been grouped. Textis also included on the map identifying the type of products containedin the respective areas. For example, area 802 has text which reads“Men's Accessory Area” associated therewith.

This feature of the present solution facilitates an automaticconfiguring of a store so that there is no need for installation of afixed infrastructure and/or system calibration. In some scenarios, thepresent solution takes into account the product identification codes(e.g., SKU information) of the RFID tags being read in order to groupthem into product (e.g., SKU) areas. Then, the product (e.g., SKU) areainformation is used to assign a human readable name to the location of agroup of tags. This would involve transforming a tag read into a textualname (e.g., Men's Shoes Size 7). A determination is then made that mostof the tags near the read tag are coupled to men's shoes of varioussizes. This information is then displayed on the map and stored in adata store (e.g., data store 126 of FIG. 1, memory 204 of FIG. 2, and/ormemory 712 of FIG. 7). There is no need for an employee to edit data oradd labels and text to the map. This would be done automatically bysoftware and displayed to the customer or employee when (s)he viewed theinventory on the map. This same type of logic could be used to map outan entire store so that when someone wants to go from their currentlocation to a specific spot in a store, all of the productidentification codes (e.g., SKUs) read could be used to direct theirmotion through the store without configuring anything manually.

Illustrative Methods for Locating an RF Enabled-Device in a Facility

Referring now to FIG. 9, there is provided a flow diagram of anillustrative method for determining physical locations of RFID tags in afacility. As shown in FIG. 9A, method 900 begins with 902 and continueswith 904 where a plurality of RFID tags (e.g., RFID tags 112 ₁-112 _(N),118 ₁-118 _(X) of FIG. 1, RFID tag 306 of FIGS. 3-6, RFID tags 602-606of FIG. 6) are respectively coupled to objects (e.g., objects (or items)110 ₁-110 _(N), 116 ₁-116 _(X) of FIG. 1). Next in 906-908, the RFIDtags are activated and placed throughout a facility (e.g., RSF 128 ofFIG. 1).

Thereafter in 910, a mobile reader (e.g., mobile reader 120 of FIG. 1)is optionally coupled to an individual (e.g., employee 122 of FIG. 1).The mobile reader then performs operations in 912 to read the RFID tagsas the individual moves through the facility. Accordingly, multiple tagreads are performed by the mobile reader at different locations withinthe facility (e.g., locations L₁, L₂, L₃ of FIG. 6). The mobile readermay have the same or different RF power level setting at each location.

Timestamped tag reader information is stored in a data store (e.g., datastore 126 of FIG. 1, memory 204 of FIG. 2, and/or memory 712 of FIG. 7),as shown by 914. The timestamped tag reader information is analyzed in916 to determine a physical location for each read RFID tag within thefacility. The physical location is determined based on at least one ofthe following: the mobile reader's location at the time of reads; themobile reader's pointing directions at the time of reads; the mobilereader's power level(s) at the time of the reads; a total number ofreads (e.g., so that an average of a plurality of physical locations canbe determined); the mobile reader's coverage areas at the time of thereads; overlapping coverage areas at the time of the reads; and/orRSSIs. The analysis of 916 can be performed by the mobile reader and/ora remote device (e.g., server 124 of FIG. 1).

A location confidence value is then determined for each of thedetermined physical locations, as shown by 918. The location confidencevalue is determined based on the number of reads in which the respectivetag was detected, an average RSSI, a max RSSI, and/or the mobilereader's power level(s) at the time of the tag reads. The locationconfidence value can be determined by the mobile reader and/or a remotedevice (e.g., server 124 of FIG. 1).

In next 920, first RFID tags (e.g., tags 602-608 of FIG. 6) areidentified. The first RFID tags include those RFID tags of the pluralityof RFID tags which are located in proximity to an RFID tag of interest(e.g., tag 306 of FIG. 6). In some scenarios, a pre-defined maximumdistance (e.g., 1-20 feet) can be used to determine which tags are inproximity to the RFID tag of interest.

Second RFID tags are then identified in 922 from the first RFID tags.The second RFID tags (e.g., tags 602 and 606 of FIG. 6) include thosetags that are coupled to objects/items which are similar to theobject/item to which the RFID tag of interest is coupled. One of thesecond RFID tags (e.g., tag tags 602 of FIG. 6) is selected with thehighest location confidence value associated therewith, as shown by 924.Thereafter, method 900 continues with 926 of FIG. 9B.

As shown in FIG. 9B, 926 involves determining if the physical locationof the tag of interest is within a pre-defined distance range from thelocation of the tag selected in 924. If so [928:YES], then 930 isperformed where method 900 goes to 936. If not [928:NO], then 932 isperformed where the physical location of the tag of interest isadjusted. For example, the physical location can be adjusted to fallwithin the pre-defined distance range.

Additionally in 934, the location confidence value for the tag ofinterest is also increased. The location confidence value is increasedby a pre-defined amount or an amount selected based on (a) how much thephysical location was adjusted, (b) the location confidence valueassociated with the tag selected in 924, and/or (c) a degree ofsimilarity between an object to which the tag of interest is coupled andan object to which the tag selected in 924 is coupled For example, thephysical location is moved 0.5 feet in a direction towards the tagselected in 924, and the location confidence value associated with thetag selected in 924 is 85%. In this case, the location confidence valueis increased by 10% (i.e., from 65% to 75%) in accordance withpre-defined rules and/or information contained in a pre-defined look-uptable. The present solution is not limited to the particulars of thisexample. Subsequently, 936 is performed where method 900 ends or otherprocessing is performed.

Referring now to FIG. 10, there is provided a flow diagram of anillustrative method 1000 for generating a graphical map (e.g., graphicalmap 800 of FIG. 8). The operations of method 1000 can be performed bythe mobile reader and/or a remote device (e.g., server 124 of FIG. 1).

Method 1000 begins with 1002 and continues with 1004 where a productidentification code (e.g., a SKU number) is obtained from at least afirst RFID tag of a plurality of RFID tags (e.g., RFID tags 112 ₁-112_(N), 118 ₁-118 _(X) of FIG. 1, RFID tag 306 of FIGS. 3-6, RFID tags602-606 of FIG. 6). In next 1006, the product identification code istranslated into a human readable name (e.g., Men's Shoes). Thistranslation can involve: accessing a data store (e.g., data store 126 ofFIG. 1) to obtain information specifying the type of product the tag iscoupled to as well the size of the product; and deriving a genericproduct name based on the obtained information, pre-defined rules,and/or information contained in a look-up table.

Second RFID tags are identified from the plurality of RFID tags in 1008.The second RFID tags include those tags that are located within adistance range from the first RFID tag. The second RFID tags areconsidered as being coupled to objects/items of the same or similar typeas the object/item to which the first RFID tag is coupled, as shown by1010.

In 1012, the human readable name is assigned to the geographic area inwhich the first and second tags reside. The graphical map is thengenerated in 1014. The graphical map comprises (a) icons showing wherethe RFID tags are located in a facility (e.g., RSF 128 of FIG. 1), (b)visual lines designating where the geographical area is within afacility, and/or (c) the human readable name for the geographic area.Subsequently, 1016 is performed where method 1000 ends or otherprocessing is being performed.

Although the present solution has been illustrated and described withrespect to one or more implementations, equivalent alterations andmodifications will occur to others skilled in the art upon the readingand understanding of this specification and the annexed drawings. Inaddition, while a particular feature of the present solution may havebeen disclosed with respect to only one of several implementations, suchfeature may be combined with one or more other features of the otherimplementations as may be desired and advantageous for any given orparticular application. Thus, the breadth and scope of the presentsolution should not be limited by any of the above describedembodiments. Rather, the scope of the present solution should be definedin accordance with the following claims and their equivalents.

What is claimed is:
 1. A method for determining a physical location of afirst Radio Frequency Identification (“RFID”) tag, comprising: analyzingtimestamped tag read information acquired during multiple tag reads todetermine a first physical location for the first RFID tag read by themobile reader while moving through a facility; identifying second RFIDtags from a plurality of RFID tags read by the mobile reader that arelocated in proximity to the first RFID tag and that are coupled toobjects similar to an object to which the first RFID tag is coupled;selecting an RFID tag from the second RFID tags that has a firstlocation confidence value associated therewith which is greater thansecond location confidence values associated with other RFID tags of thesecond RFID tags; and modifying the first physical location based on asecond physical location of the RFID tag selected from the second RFIDtags.
 2. The method according to claim 1, wherein each of the multipletag reads are performed when the mobile reader is at a respective one ofa plurality of different locations within the facility.
 3. The methodaccording to claim 2, wherein the mobile reader has the same ordifferent RF power level setting at each one of the different locations.4. The method according to claim 1, further comprising increasing athird location confidence value associated with the first RFID by anamount selected based on at least one of (a) how much the first physicallocation was modified, (b) the first location confidence valueassociated with the RFID tag selected from the second RFID tags, and (c)a degree of similarity between an object to which the first RFID tag iscoupled and an object to which the RFID tag selected from the secondRFID tags is coupled.
 5. The method according to claim 1, furthercomprising generating a graphical map showing the first physicallocation of the first RFID tag in a virtual space representing thefacility.
 6. The method according to claim 5, wherein the graphical mapcomprises a human readable name for a geographic area in which the firstRFID tag resides.
 7. The method according to claim 6, wherein the humanreadable name is determined by translating a read product identificationcode into the human readable name.
 8. The method according to claim 6,wherein the translating is performed by the mobile reader without anymanual input from a user.
 9. A system, comprising: a processor; and anon-transitory computer-readable storage medium comprising programminginstructions that are configured to cause the processor to implement amethod for determining a physical location of a first Radio FrequencyIdentification (“RFID”) tag, wherein the programming instructionscomprise instructions to: analyze timestamped tag read informationacquired during multiple tag reads to determine a first physicallocation for the first RFID tag read by the mobile reader while movingthrough a facility; identify second RFID tags from a plurality of RFIDtags read by the mobile reader that are located in proximity to thefirst RFID tag and that are coupled to objects similar to an object towhich the first RFID tag is coupled; select an RFID tag from the secondRFID tags that has a first location confidence value associatedtherewith which is greater than second location confidence valuesassociated with other RFID tags of the second RFID tags; and modify thefirst physical location based on a second physical location determinedfor the RFID tag selected from the second RFID tags.
 10. The systemaccording to claim 9, wherein each of the multiple tag reads areperformed when the mobile reader is at a respective one of a pluralityof different locations within the facility.
 11. The system according toclaim 10, wherein the mobile reader has the same or different RF powerlevel setting at each one of the different locations.
 12. The systemaccording to claim 9, wherein the programming instructions are furtherconfigured to cause the processor to increase a third locationconfidence value associated with the first RFID by an amount selectedbased on at least one of (a) how much the first physical location wasmodified, (b) the first location confidence value associated with theRFID tag selected from the second RFID tags, and (c) a degree ofsimilarity between an object to which the first RFID tag is coupled andan object to which the RFID tag selected from the second RFID tags iscoupled.
 13. The system according to claim 9, wherein the programminginstructions are further configured to cause the processor to generate agraphical map showing the first physical location of the first RFID tagin a virtual space representing the facility.
 14. The system accordingto claim 13, wherein the graphical map comprises a human readable namefor a geographic area in which the first RFID tag resides.
 15. Thesystem according to claim 14, wherein the human readable name isdetermined by translating a read product identification code into thehuman readable name.
 16. The system according to claim 15, wherein thetranslating is performed by the mobile reader without any manual inputfrom a user.
 17. A method for generating a graphical map, comprising:obtaining a code from a first Radio Frequency Identification Code(“RFID”) tag; translating the code into a human readable name;identifying second RFID tags from a plurality of RFID tags that arelocated in proximity to the first RFID tag; considering the second RFIDtags as being coupled to objects similar to an object to which the firstRFID tag is coupled; assigning the human readable name to a geographicarea in which the first and second RFID tags reside; and generating agraphical map comprising the human readable name and showing where thefirst and second RFID tags are located in the geographic area assignedto the human readable name.
 18. The method according to claim 17,further comprising displaying the graphical map on a mobile readerconfigured to read RFID tags.
 19. The method according to claim 18,wherein at least the translating is performed by the mobile readerwithout any manual input from a user.