Monitoring System

ABSTRACT

A monitoring system includes a first sensor and a second sensor, at least one of which is a camera. A computer system coupled to the first and second sensors includes a memory and stored object types and associations between objects. The computer system is configured to infer a group association between a first and second object by retrieving an input from at least one of the sensors, inferring an interaction at a monitored location, infer possession of the second object by the first object, and terminate the inferred group association based on a subsequent inference.

PRIORITY CLAIM

This application is a continuation of U.S. patent application Ser. No.15/974,398 filed May 8, 2018, which is a continuation of U.S. patentapplication Ser. No. 14/479,993 filed Sep. 8, 2014, which is acontinuation-in-part of U.S. patent application Ser. No. 13/921,933filed Jun. 19, 2013, which is a continuation-in-part of U.S. patentapplication Ser. No. 13/010,027 filed Jan. 20, 2011 (now U.S. Pat. No.8,514,081, issued Aug. 20, 2013), which is a continuation of U.S. patentapplication Ser. No. 11/829,695 filed Jul. 27, 2007 (now U.S. Pat. No.7,898,419, issued Mar. 1, 2011); contents of which are incorporated byreference.

FIELD OF THE INVENTION

This invention relates generally to object localization and pathidentification and, more specifically, to object localization and pathidentification based on radio frequency identification (RFID) sensing.

BACKGROUND OF THE INVENTION

Systems and methods for localizing objects using RFID sensing tend to belimited to simple location determination and do not typically allow fordynamic sensing reconfiguration based on varying application demands.

SUMMARY OF THE INVENTION

In one example, the present invention comprises a networked radiofrequency identification system that includes a plurality of radiofrequency identification (RFID) tag readers, a computer in signalcommunication with the RFID tag readers over a network, and a softwaremodule for storage on and operable by the computer that localizes RFIDtags based on information received from the RFID tag readers using anetwork model having endpoints and oriented links.

In accordance with an additional example of the invention, the softwaremodule is configured to determine a semantic attribute of RFID tagmovement.

In accordance with an additional example of the invention, the softwaremodule is configured to restrict or allow access to an access point toauthorized RFID tags (access control). In one example, the softwaremodule accepts time intervals from a user along with accessrestriction/authorization rules associated with the time intervals aswell as identification information related to the RFID tags or groups ofRFID tags to be restricted/authorized. The software modulerestricts/authorizes access based on the time intervals, theirassociated access restriction/authorization rules, and the RFID taginformation. Access points include, for example, access doors, barriers,and access gates. In addition, tracking points within an area may alsobe monitored.

In accordance with further examples of the invention, at least one ofthe RFID tag readers includes an adjustable configuration settingselected from RF signal strength, antenna gain, antenna polarization,and antenna orientation. In one example, the software module adjusts theadjustable configuration setting based on input from a user. However,the software module may also adjust the configuration setting based onother configuration settings or based on computed values during runtime.In an additional example, the software module is configured to accepttime intervals from a user along with security levels that areassociated with the time intervals and the software module adjusts theconfiguration setting based on the time intervals and their associatedsecurity levels.

In accordance with other examples of the invention, the system localizesRFID tags based on information received from the RFID tag readers usinghierarchical threshold limit calculations. In one example, thehierarchical threshold limit calculations are based on accumulatedreading factors from groups of settings for the RFID tag readers. In anadditional example, the software module is configured to collect datafor each setting of the RFID tag readers during an interval of time andcalculate an aggregate result for each RFID tag reader based on analgorithm that uses a weighting function that includes W_(k,1) andNR_(k,1) as parameters where NR_(k,1) represents the number of RFID tagreadings at an interrogator ‘k’ configured with a setting ‘1’ andW_(k,1) represents a weighting factor assigned to the interrogator ‘k’configured with the setting ‘1’, and the algorithm spans all settings‘1’ for the interrogator ‘k’. The software module in this additionalexample is further configured to aggregate the calculated aggregateresults based on a second weighting function to determine an aggregationresult for an endpoint and compare the aggregation result for theendpoint to at least one of a threshold value or threshold interval todetermine whether the RFID tag is localized at the endpoint.

In accordance with further examples of the invention, the hierarchicalthreshold limit calculations are based on accumulated reading factorsfrom settings of groups of RFID tag readers. In one example, thesoftware module is configured to collect data for each group setting ofa group of RFID tag readers during an interval of time and calculate anaggregate result for each group setting based on an algorithm that usesa weighting function that includes W_(k,1) and NR_(k,1) as parameterswhere NR_(k,1) represents the number of RFID tag readings at aninterrogator ‘k’ configured with a group setting ‘1’ and W_(k,1)represents a weighting factor assigned to the interrogator ‘k’configured with the group setting ‘1’, and the algorithm spans all groupsettings ‘1’ for the interrogator ‘k’. The software module in thisexample is further configured to aggregate the calculated aggregateresults based on a second weighting function to determine an aggregationresult for an endpoint and compare the aggregation result for theendpoint to at least one of a threshold value or threshold interval todetermine whether the RFID tag is localized at the endpoint.

In accordance with yet other examples of the invention, the systemlocalizes RFID tags based on information received from the RFID tagreaders using probabilistic threshold calculations. In one example, theprobabilistic threshold calculations are based on accumulatedprobabilities from groups of settings for RFID tag readers. In anadditional example, the software module is configured to collect datafor each setting of the RFID tag readers during an interval of time andcalculate an aggregate result for each RFID tag reader based on analgorithm that uses a weighting function that includes W_(k,1) andP_(k,1) as parameters where P_(k,1)=PF_(k,1) (NR_(k,1), C_(k,1)) is theprobability that the RFID tag is at endpoint E as detected frominterrogator ‘k’ with settings ‘1’ calculated with the function PF_(k,1)with NR_(k,1) representing the number of RFID tag readings atinterrogator ‘k’ configured with settings ‘1’ and C_(k,1) representing areference reading value for interrogator ‘k’ configured with settings‘1’ and where W_(k,1) represents a weighting factor assigned to theinterrogator ‘k’ configured with the settings ‘1’, and the algorithmspans all settings ‘1’ for the interrogator ‘k’. The software module inthis additional example is further configured to aggregate thecalculated aggregate results based on a second weighting function todetermine an aggregation result for an endpoint and compare theaggregation result for the endpoint to at least one of a threshold valueor threshold interval to determine whether the RFID tag is localized atthe endpoint.

In accordance with additional examples of the invention, theprobabilistic threshold calculations are based on accumulatedprobabilities from settings of groups of RFID tag readers. In oneexample, the software module is configured to collect data for eachgroup setting of a group of RFID tag readers during an interval of timeand calculate an aggregate result for each group setting based on analgorithm that uses a weighting function that includes W_(k,1) andP_(k,1) as parameters where P_(k,1)=PF_(k,1)(NR_(k,1), C_(k,1)) is theprobability that the RFID tag is at endpoint E as detected frominterrogator ‘k’ with group settings ‘1’ calculated with the functionPF_(k,1) with NR_(k,1) representing the number of RFID tag readings atinterrogator ‘k’ configured with group settings ‘1’ and C_(k,1)representing a reference reading value for interrogator ‘k’ configuredwith group settings ‘1’ and where W_(k,1) represents a weighting factorassigned to the interrogator ‘k’ configured with the group settings ‘1’,and the algorithm spans all group settings ‘1’ for the interrogator ‘k’.The software module in this example is further configured to aggregatethe calculated aggregate results based on a second weighting function todetermine an aggregation result for an endpoint and compare theaggregation result for the endpoint to at least one of a threshold valueor threshold interval to determine whether the RFID tag is localized atthe endpoint.

In accordance with still further examples of the invention, the systemincludes a plurality of radio frequency identification (RFID) tagreaders, a computer in signal communication with the plurality of RFIDtag readers over a network, a locking device associated with an accesspoint, the locking device in signal communication with the computer, aninput device in signal communication with the computer, and a softwaremodule for storage on and operable by the computer. In some embodiments,multiple access points may be included and multiple locking devicesand/or input devices may be associated with each access point. In oneexample, the software module localizes an authorized RFID tag at theaccess point based on information received from at least one of theplurality of RFID tag readers, receives additional authorizinginformation from the input device, and sends an unlock signal to thelocking device based on the localization of the authorized RFID tag atthe access point and the additional authorizing information.

In accordance with yet other examples of the invention, the input deviceincludes a keypad and the additional authorizing information includes anaccess code. In some embodiments, the input device may include a keypadterminal, a computer, a touch screen, or other components.

In accordance with still another example of the invention, the inputdevice includes a mobile communications device, the software module isconfigured to send a request for an access code to the mobilecommunications device after the authorized RFID tag is localized at theaccess point, and the additional authorizing information includes therequested access code transmitted from the mobile communications device.In another example, the additional authorizing information may bereceived by the software module before the RFID tag is localized. Theauthorization message received from the mobile device may be valid for apredefined period of time, for example during which the RFID tag wouldneed to be localized at the access point for an unlock signal to be sentto a locking device associated with the access point. In still anotherexample, rather than an access code being received from the mobiledevice, an empty message might be received from a phone numberassociated with the mobile device, with the authorizing informationbeing the phone number of the message itself.

In accordance with still another example of the invention, the inputdevice includes a location enabled mobile communications device withglobal positioning system (GPS) capability, the software module isconfigured to receive or retrieve the location information from themobile communications device after the authorized RFID tag is localizedat the access point, and the additional authorizing information iscomputed based on the location information received from the mobilecommunications device.

BRIEF DESCRIPTION OF THE DRAWINGS

Preferred and alternative embodiments of the present invention aredescribed in detail below with reference to the following drawings:

FIG. 1 is a diagram illustrating an environmental view of a systemformed in accordance with an embodiment of the invention that isinstalled in a structure;

FIGS. 2A and 2B are diagrams showing additional detail for a portion ofFIG. 1; and

FIGS. 3-6 are diagrams showing examples of network models in accordancewith an embodiment of the invention.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

FIG. 1 is a block diagram showing an environmental view of a system 20formed in accordance with an embodiment of the invention that isinstalled in a structure 22. Although a transceiver is preferred, aseparate transmitter and receiver may alternatively serve as atransceiver within the scope of this invention.

The system 20 includes a plurality of radio frequency (RF) readers, eachof which is associated with at least one interrogator. Each interrogatorincludes a transceiver and an antenna. Each interrogator (includingtransceiver and antenna) or only the interrogator's antenna may beexternal to the associated RF reader or embedded within the RF reader.The system 20 as shown includes three RF readers 24 a, 24 b, and 24 c,each of which include two interrogators 26 that have antennas externalto the RF readers 24 a, 24 b, and 24 c. Transceiver components (notshown) of the interrogators 26 are embedded within the RF readers 24 a,24 b, and 24 c and are in signal communication with their associatedantennas. Although the interrogators 26 are numbered the same, theymight have differing technical characteristics in some embodiments. Thesystem 20 also includes an RF reader 28 that has two embeddedinterrogators 30, five RF readers 32 a, 32 b, 32 c, 32 d, and 32 e thateach has three embedded interrogators 30, and an RF reader 34 that hasone embedded interrogator 30.

The system 20 also includes a computer 36 that has a processor 38 indata communication with a memory unit 40 and a storage device 42 also indata communication with the processor 38. In an example embodiment, thecomputer 36 is an application and database server. Additional computersor computer banks are also present in some embodiments. The computer 36is in signal communication with a network 44. The network 44 is a wirednetwork in an example embodiment, but is a wireless network in otherembodiments. The RF readers 24 a, 28, and 32 a are also in signalcommunication with the network 44. The RF readers 24 b, 32 b, and 32 care in signal communication with a concentrator 46 a. A concentrator isa computer that handles a set of RF readers and that may controlparameters or settings of interrogators associated with any RF readersthe concentrator handles. A concentrator may also issue commands toaccess doors and/or locking devices and receive feedback from them. Theconcentrator 46 a is also in signal communication with the network 44.The RF readers 24 c, 32 c, 32 d, 32 e, and 34 are in signalcommunication with a concentrator 46 b that is also in signalcommunication with the network 44.

In the example shown in FIG. 1, the RF readers 24 a and 28 arepositioned outside an entrance to the structure 22. A door 50 located atthe entrance leads to a first end of a first hallway within thestructure 22. The RF readers 32 a and 32 b are positioned along thefirst hallway within the structure 22. The RF reader 24 b is shownoutside the structure 22, but the antennas of the interrogators 26associated with the RF reader 24 b are positioned along the firsthallway within the structure 22. The RF reader 32 c is positioned towarda second end of the first hallway, but is also positioned at a first endof a second hallway within the structure 22 that is oriented at a rightangle to the first hallway. The RF readers 32 d, 32 e, and 34 arepositioned along the second hallway within the structure 22. A door 52is located at a second end of the second hallway. The door 52 controlsaccess to a room 54 located within the structure 22. The antennas of theinterrogators 26 associated with the RF reader 24 c are positionedwithin the room 54. Although a specific configuration of RF readers,concentrators, and interrogators is shown, it should be understood thatalternative configurations are used in other embodiments. Someembodiments do not use concentrators, for example. Other embodimentshave the readers and/or the concentrators connected point to point in amesh topology.

The system 20 also includes a locking device 60 that is associated withthe door 50. The locking device 60 is in signal communication with thecomputer 36 over the network 44 (connection not shown) and isselectively locked and unlocked based on information received at thecomputer 36 from RF readers positioned near the door 50. Although thelocking device 60 is controlled by the computer 36 in this embodiment,in other embodiments the locking device 60 is in signal communicationwith one or more RF readers or one or more concentrators that controlthe locking device 60 in a decentralized fashion. A locking device 63,similar to the locking device 60, is associated with the door 52 so thatthe system 20 is able to selectively control access to the room 54. Afirst input device 62, such as a keypad or touch screen for example, ispositioned outside the structure 22 near the door 50. The first inputdevice 62 is in signal communication with the computer 36 over thenetwork 44 (connection not shown). In some embodiments, the input device62 is connected to a concentrator or to a computer (not shown) otherthan the computer 36. A second input device 64, such as a keypad ortouch screen for example, is positioned inside the structure 22 near thedoor 50. The second input device 64 is in signal communication with thecomputer 36 over the network 44 (connection not shown). In someembodiments, the input device 64 is connected to a concentrator or to acomputer (not shown) other than the computer 36.

The system 20 is configured to work with one or more RFID tags 70 thattypically include unique identifiers and may include other information.In an example embodiment, an RFID tag 70 is carried by a person thattravels into, out of, and within the structure 22. However, in otherembodiments, RFID tags are also associated with non-human objects. TheRFID tags may also be embedded in cards, clothing, devices, vehicles, orother objects in some embodiments. In one embodiment, the RFID tag 70 isa passive RFID device. However, other embodiments may be configured tolocate non-passive RFID devices. The system 20 is also configured tointeract with a mobile communications device 72 in some embodiments. Inone example, a software module localizes an authorized RFID tag at anaccess point such as the door 50 based on information received from atleast one of the plurality of RFID tag readers, receives additionalauthorizing information from an input device, and sends an unlock signalto a locking device such as the locking device 60 based on thelocalization of the authorized RFID tag at the access point and theadditional authorizing information. Since RFID tags recognized by thesystem typically include unique identifiers, different levels of accesscan be assigned to users or groups of users that have been assignedparticular RFID tags. In one example, the additional authorizinginformation includes an access code received at an input device such asthe first input device 62. In an additional example, the additionalauthorizing information includes an access code first transmitted to amobile communications device such as the device 72 by the system 20which is then entered at the first input device 62. In an additionalexample, an access code is entered into the device 72 and transmitted tothe system 20.

One exemplary manner of operation is as follows. Once the RFID tag 70 isdetected near the door 50, an appropriate signal is sent to the computer36. In some embodiments, the tag 70 might also have associated accesscontrol rules at the door 50. Separately, the user associated with thetag 70 may send a signal via email or cell phone (for example) that isreceived at the computer 36 over a network such as an external phone ordata network (not shown). The computer 36 searches one or more storeddatabases of RFID data and compares the stored data with the receivedsecondary signals. For example, the RFID tag 70 may be paired with acell call from a specific phone number, or receipt of an email from aparticular email address with “unlock” or other known subject headers.If both the RFID tag 70 is sensed and the secondary access code ormessage is received, the door 50 is caused to be unlocked by thecomputer 36. If the RFID tag 70 is sensed but no code received, thecomputer 36 may automatically send an email, text message, or othersignal to the user associated with the tag 70 to prompt the user to sendthe secondary access code.

A second exemplary manner of operation is as follows. Once the RFID tag70 is detected near the door 50, an appropriate signal is sent to thecomputer 36. Separately, the user associated with the tag 70 may have alocation enabled device that provides global location information suchas GPS coordinates that is received at the computer 36 over a networksuch as an external phone or data network (not shown). The computer 36compares the location information from the mobile device to the locationof the detected RFID tag and if the locations are close to one another(within a predetermined range), the door 50 is unlocked by the computer36. If the RFID tag 70 is sensed but no mobile device location isreceived or can be retrieved, or the locations don't match within thepredetermined range, the computer 36 may automatically send an email,text message, or other alarm signal to the user associated with the tag70 or to other personnel.

Typically, subjects that include employees, visitors, assets, cars, andother objects are assigned an RFID tag that is used to identify it tothe system 20.

FIGS. 2A and 2B are diagrams showing additional detail for a portion ofthe system 20 and the structure 22 near the room 54 in an exampleembodiment. The RF readers 32 e and 34 are shown, as well as theantennas of the interrogators 26 associated with the RF reader 24 c. Asubject with an RFID tag 70 is shown outside the room 54 near the door52. As the tag 70 is detected by the RF readers 32 e and 34, the system20 indicates that the subject is at a first endpoint, designated as E1.In FIG. 2A, the antenna of interrogator 30 associated with the reader 34is oriented at approximately a 90 degree angle from the wall to whichthe reader 34 is attached. FIG. 2B is substantially similar to FIG. 2A,except that the antenna of the interrogator 30 associated with thereader 34 is oriented at approximately a 45 degree angle from the wallto which the reader 34 is attached such that the antenna points in thegeneral direction of E1. Movement of the tag 70 into the room 54 causesthe RF reader 24 c to detect the tag 70, at which time the system 20indicates that the subject is at a second endpoint designated as E2A.The system also indicates that the tag just moved from E1 to E2A with anidentifier designated as Link1. Additional movement of the tag 70 withinthe room 54 is also tracked by the RF reader 24 c such that the subjectand tag 70 may be identified as being associated with an additionalendpoint E2B or E2C (links to other endpoints not shown) as they moveabout the room 54.

Sensing at each endpoint is done using one or more RF interrogators.Each interrogator includes a transceiver and an antenna. Theinterrogator antennas emit electromagnetic waves generated by thetransceiver which, when received by an RFID tag or card, eventuallyactivates the tag or card. Once the tag is activated, it reflects a wavewith encoded data that is received by the interrogator. Eachinterrogator has a number of settings, each with an associated weight.The settings include transmitted RF output power (RF signal strength),antenna gain, antenna polarization and antenna orientation. RF settingsmay change very rapidly in order to allow a broad range of collectiondata. The weights associated with the RF settings are used by alocalization engine to compute a value using eligibility calculationsthat determines the location of an object in space if it is within athreshold interval associated with a specific location. The localizationengine computes collected data received from the interrogators andaggregates the results. The aggregate result is then used to determinethe location and movement of subjects.

In the example shown in FIGS. 2A and 2B, the RF reader 24 c localizesthe tag 70 by transmitting and receiving RF signals using theinterrogators 26. Each of the two antennas of the interrogators 26associated with the RF reader 24 c is positioned with a differentposition and orientation. The received RF signal strength from the tag70 varies at each of the two interrogators 26 depending on the locationof the tag 70 within the room 54 and the current RF settings of eachinterrogator 26. The number of reads in a predetermined time period ateach interrogator 26 also varies depending on similar factors. Thelocalization engine then localizes the tag 70 within the room 54, suchat a location associated with E2A, E2B, or E2C based on the received RFsignal strength and/or number of reads received at each interrogator 26for particular RF settings.

FIGS. 3-6 are diagrams illustrating examples of network models inaccordance with an embodiment of the invention. Each network modelincludes one or more endpoints. Each endpoint has an associated physicallocation or area in space and is represented in the network model as agraph node. Two endpoints and their sequence define an oriented linkthat is mapped to an oriented link in the graph. The network model maybe hierarchical, on multiple levels, in the sense that at a higher levelone graph node (endpoint) may represent a collection of nodes(endpoints) of a lower level with better resolution. An installed systemis represented as a facility space network model that includes a seriesof endpoints (nodes) and their connected oriented links. As such, ateach level, the facility space network model resembles a spatial graph.

With respect to FIG. 3, the diagram includes first, second, third, andfourth endpoints designated as EP1, EP2, EP3, and EP4 respectively. Eachof the four endpoints is associated with a corresponding physicallocation that is labeled as location 1 through location 4 respectively.Oriented links labeled Link1 through Link6 are shown that representpossible paths that an RFID tag could take between spatial locationsassociated with the endpoints. EP1, EP2, and EP3 are shown within a boxlabeled Access Area A. In one example, location 4 is inside a room 80having an entrance with a door 82 (shown partially open) and Access AreaA corresponds to an area outside of the room 80 near the door 82. In anexample embodiment, a system, such as the system 20 described withrespect to FIG. 1 is used to localize an RFID tag within and outside theroom 80 at locations one through four and other locations, using RFreaders (not shown) in a similar manner to that described with respectto FIGS. 1, 2A, and 2B.

FIG. 4 is an example of a higher level network model used in conjunctionwith the model represented in FIG. 3 to form a hierarchical networkmodel. FIG. 4 includes a fifth node and a sixth node designated as EP5and EP6, respectively. EP5 represents all of the nodes EP1, EP2, andEP3, and EP6 represents EP4 and any location inside the room 80 shown inFIG. 3. Oriented links, labeled Link7 and Link8 are shown that representpossible paths that an RFID tag could take between spatial locationsassociated with EP5 and EP6.

With respect to FIG. 5, the diagram includes first, second, third, andfourth endpoints designated as EP7, EP8, EP9, and EP10 respectively.Each of the four endpoints is associated with a corresponding physicallocation that is labeled as location 7 through location 10 respectively.Oriented links are shown that represent possible paths that an RFID tagcould take between spatial locations associated with the endpoints. EP7is shown within a box labeled Access Area B. In one example, locations8, 9 and 10 are inside a room 90 having an entrance with doors 92 and 93(shown partially open) and Access Area B corresponds to an area outsideof the room 90 near the doors 92 and 93. In an example embodiment, asystem, such as the system 20 described with respect to FIG. 1 is usedto localize an RFID tag within and outside the room 90 at locationsseven through ten and other locations, using RF readers (not shown) in asimilar manner to that described with respect to FIGS. 1, 2A, and 2B.

FIG. 6 is an example of a higher level network model used in conjunctionwith the model represented in FIG. 5 to form a hierarchical networkmodel. FIG. 6 includes a node designated as EP11 and a node designatedas EP12. EP11 represents EP7 and any location inside Access Area B shownin FIG. 5. EP12 represents all of the nodes EP8, EP9, and EP10, and anylocation inside the room 90. Oriented links, labeled Link15 and Link16are shown that represent possible paths that an RFID tag could takebetween spatial locations associated with EP11 and EP12. A hierarchicalmodel such as that represented by FIGS. 5 and 6 allows differentsemantics of movement to be associated with each level. For example,Link9 and Link11 shown in FIG. 5 might represent semantic attributes of‘IN DOOR 92’ and ‘IN DOOR 93’, respectively while Link15 shown in FIG. 6might represent ‘ENTER ROOM 80’. Although FIG. 6 is one example of ahigher level network model corresponding to the model shown in FIG. 5,other models could be used in other embodiments. Additionally, more thantwo levels may be used in some hierarchical network models.

In an example embodiment, the network model is organized as a graph anda semantic engine computes semantic rules based on attributes ofelements in the network model graph. In some embodiments, the networkmodel has a hierarchical structure on multiple levels. Semantic rulesare both statically defined and learned by the semantic engine while thesystem is running in an example embodiment. An example of a staticallydefined semantic rule is that if a subject with an RFID tag passes anoriented link in the model and that link has an ‘IN’ attributeassociated with it, the semantic engine will interpret that movement asan entrance event into the space represented by the destination node,or, more generally, into a larger space in which the space representedby the destination node is located if the ‘IN’ attribute includesadditional information such as an ‘IN’ attribute labeled ‘INTO ROOM’ or‘INTO BUILDING’, for example. For example, movement from EP2 to EP4might represent an entrance event into the room 80, with Link5 having anattribute labeled ‘INTO ROOM’ associated with it. In this example, thesemantic engine would interpret movement of a subject with an RFID tagfrom EP2 to EP4 as an entrance event into the room 80. This semanticattribute is an indicator of movement from outside the room 80 to insidethe room 80, rather than simply an indicator that the detected tag is inthe room 80.

Movement into and out of spaces larger than those represented bydestination nodes may be identified in other manners in someembodiments. For example, an entrance event into the room 80 may beidentified based on Link5 having an attribute labeled ‘IN’ if location 4is mapped to the room 80 and the semantic engine uses this mapping alongwith the ‘IN’ attribute of Link5 to identify the entrance event. In someembodiments, direction of movement can also be considered to be asemantic event, such as ‘walk front to back in a particular area’ or‘walk north’, for example. In embodiments where a hierarchical networkmodel is used, the semantic engine may use the semantics of any level orcombination of levels to identify any semantic events. For example, thesemantic of movement from EP2 to EP4 at the level shown in FIG. 3 is ofmovement from location 2 to location 4. However, at a higher level (asrepresented in FIG. 4) the movement from EP2 to EP4 maps as a movementfrom EP5 to EP6 and the semantic might be of entrance into the room 80.Further still, at an even higher level (not represented here) thesemantic might be of entrance into a building where the room 80 islocated. The semantic engine infers the semantics of an action using thehierarchical model.

Learned semantic rules are determined by the system at runtime usinginputs and observations. An example of a learned semantic rule is when asubject with an RFID tag is preparing to leave a building through anaccess door, but is required by the system to enter the semanticspassing through the door before being allowed to pass through the doorand consequently a link in the network graph. The subject may specifythat it is a break event by using a keypad, touch screen, or other inputdevice such as the keypad 64 shown in FIG. 2 before passing through thedoor 50. The semantic engine then determines that passing that link inthe network graph represents an exit event (OUT event). In one example,time values are also recorded by the system 20 for some or alllocalization determinations and semantic attribute determinations. Thesetime values may be stored in association with an identifier associatedwith an RFID tag that had been localized or that had received a semanticattribute determination. The time values may be set to expire after acertain period of time, may only apply to particular semantic attributesor particular RFID tags, may be stored in a system database and/or logand/or be used to calculate (time) tracking data.

A software module (having an access control engine component) restrictsor allows access at an access point based on access control rulesassociated with elements in the network model graph. Access controlrules are based on configuration settings and/or they may be defined bya user and saved in the configuration settings. Access control rules areassociated with oriented links in the network model. An example of adefined access control rule is that an RFID tag is allowed to pass anoriented link only if it is authorized to do so. In another example, anRFID tag may be authorized to pass an oriented link in the network modelonly in certain periods of time during a day if the user has definedtime restriction intervals on the access path represented by theoriented link. The access control rules might be specific for each RFIDtag or group of RFID tags or may be general. The access control rulesmight also be associated with additional authorization information suchas entering an additional access code, mobile device authenticationinformation, or global positioning location matching, for example. Inone example, time values are also recorded by the system 20 for some orall access events (lock/unlock/door open) and access controldeterminations. These time values may be stored in association with anidentifier associated with an RFID tag that had been allowed orrestricted access. The time values may be set to expire after a certainperiod of time, may only apply to particular access events or particularRFID tags, may be stored in a system database and/or log and/or used tocalculate tracking data.

In one example, the system 20 is configured to localize an RFID tag atan endpoint by using hierarchical threshold limit calculations based onaccumulated reading factors from groups of settings for RFinterrogators. In one instance, localization of an RFID tag at E2A, E2B,or E2C as shown in FIGS. 2A and 2B could be performed by the RF reader24 c in this manner. In an alternate example, the system 20 isconfigured to use hierarchical probabilistic threshold calculationsbased on accumulated probabilities from groups of settings for RFinterrogators. In an additional example, the system 20 is configured touse hierarchical threshold limit calculations based on accumulatedreading factors from settings of groups of RF interrogators. In afurther example, the system 20 is configured to use hierarchicalprobabilistic threshold calculations based on accumulated probabilitiesfrom settings of groups of RF interrogators. Each of the four examplesis discussed in greater detail below. In each of the four examples,there are ‘n’ RF interrogators in the system designated as RF₁, RF₂ . .. RF_(n). There are ‘m’ endpoints defined in a network model, designatedas E₁, E₂ . . . E_(m). There is one RFID tag in range of the system, andthe system validates the tag's location as being at endpoint E_(i).Although only one RFID tag is discussed for simplicity, it should beunderstood that multiple RFID tags can be tracked by the system 20.

In the first example, the system uses hierarchical threshold limitcalculations based on accumulated reading factors from groups ofsettings for RF interrogators. In this approach each interrogator has anassigned collection of settings/configurations. For example, RF_(i)might have an assigned collection including two settings while RF_(j)might have a collection including five settings, with a setting beingdefined by values of any of the RF interrogator parameters or acombination of parameters such as transmitted RF power output, antennagain, antenna polarization, and antenna orientation. There is also aweight associated with each setting of the RF interrogator, designatedas W_(k,1) where ‘k’ is the index for the RF interrogator and ‘1’ is theindex for the interrogator's setting. For an endpoint E, there is athreshold value or interval (Tv) used in assessing whether a subjectwith an RFID tag is located at the endpoint. A threshold value orinterval is also used in the other examples, but the particular value orinterval may vary in each example.

In an interval of time, the system collects data for each setting of theRF interrogators with NR_(k,1) representing the number of tag readingsat the interrogator ‘k’ configured with the settings ‘1’ during the timeinterval. In a first step for endpoint E, the system calculates anaggregate result for each interrogator based on a weightingformula/function: A_(k)=F_(k)(W_(k,1), NR_(k,1)) where ‘k’ is theinterrogator index and ‘1’ spans all settings for interrogator ‘k’. Asecond step includes aggregating the results obtained in the first stepbased on a weighting formula/function: A=G (WA_(k), A_(k)) where ‘k’ isthe interrogator index and WA_(k) is the weight associated with theinterrogator k at the endpoint E. The aggregation result A is thencompared with the threshold value or interval Tv to assess whether thetag is localized at endpoint E.

One example implementation of this first example can be described withreference to FIGS. 2A and 2B. The endpoint of interest Ei is E1. A RFIDtag located at E1 may be read by all the interrogators 30 and 26. Theinterrogator 30 in reader 34 is assigned four settings: one setting forwhich the antenna is oriented as in the FIG. 2A with RF power output 36dBm, one setting for which the antenna is oriented as in the FIG. 2Awith RF power output 33 dBm, one setting for which the antenna isoriented at a 45 degree angle towards E1 as in FIG. 2B with RF poweroutput 36 dBm and one setting for which the antenna is oriented at a 45degree angle towards E1 as in FIG. 2B with RF power output 33 dBm. Theantenna of the interrogator 30 associated with the reader 34 hasvertical polarization. All the other interrogators have just onesetting, with the antennas' orientations as shown in FIG. 2A and an RFpower output of 33 dBm. All the interrogators' antennas have a fixedgain of 6 dBi. The interrogators 30 in the reader 32 e have differentantenna polarizations, one vertical, one horizontal and one circular.The first two settings of the interrogator 30 associated with the reader34, corresponding to the antenna orientation shown in FIG. 2A, areassigned negative weights W1,1=(−0.4) and W1,2=(−0.5) because theantenna is vertically polarized and does not point toward E1, in such away that it detects tags located away from E1. For the next twosettings, the weights are higher and set at W1,3=0.5 and W1,4=0.4respectively, because the antenna points toward EP1 and detects tagsaround EP1.

While the antennas may be oriented in a physical manner that directsthem in an angular fashion such that the point toward a desireddirection, it should be understood that they may alternatively (or inaddition) be electronically steerable to encompass a preferred field ofview.

The first two settings of the interrogator 30 associated with the reader34 are used to detect that the tag is not likely at endpoint E1 butrather in the coverage area for this setting away from E1, because theinterrogator antenna is oriented away from the location of E1; hencethese settings have associated negative weights. For all theinterrogators in reader 32 e, there is a single setting with a weight of0.8 (W2,1, W3,1, W4,1 are all 0.8). For E1, all the interrogators inreader 24 c have null weights(0). The weights are calculated anddetermined using site surveys and simulations, for example. Weightsassociated with other functions and examples are determined in a similarfashion.

During an interval of time, such as 1 ms for example, the systemcollects data from all settings from all readers. For the interrogator30 associated with the reader 34, it collects reading values for eachsetting and aggregates the values using an aggregation function. Theaggregation function (F) for each interrogator for this example may beviewed as a sum of weights applied to the number of tag reads. In otherexamples, the aggregation functions for each interrogator might bedifferent from each other. For the interrogator 30 associated with thereader 34, the readings are N1,1=16, N1,2=10, N1,3=2 and N1,4=0. For theinterrogator 30 associated with the reader 34, the aggregate valuebecomesA1=W1,1*N1,1+W1,2*N1,2+W1,3*N1,3+W1,4*N1,4=(−0.4)*16+(−0.5)*10+0.5*2+0.4*0˜(−10.4).For the three interrogators 30 associated with the reader 32 e, thesystem collects one reading value N2,1=4, N3,1=2 and N4,1=0,respectively, with the not null readings coming from horizontally andcircularly polarized antennas. The aggregate values for theinterrogators 30 associated with the reader 32 e becomeA2=W2,1*N2,1=0.8*4=3.2, A3=W3,1*N3,1=0.8*2=1.6 and A4=W4,1*N4,1=0.8*0=0,respectively. For the interrogators 26 associated with the reader 24 c,the collected data doesn't matter in this example calculation becausethe weights associated with the interrogators 26 are null (in thisexample those interrogators are not taken into consideration whilecalculating position at E1). The final result is then computed as anaggregation of the particular results normalized with the weightassociated with each interrogator.

The final aggregation function (G) for this example is a sum of theweights applied to the aggregated values for each interrogator from theprevious step. In this example, the interrogator 30 associated with thereader 34 is assigned a weight of WA1=0.5, the interrogators 30associated with the reader 32 e each have a weight of 0.6 (WA2, WA3, WA4are all 0.6), and as mentioned above all the other interrogators havenull weights. Using these weights, the final aggregate value becomeA=WA1*A1+WA2*A2+WA3*A3+WA4*A4=0.5*(−10.4)+0.6*3.2+0.6*1.6+0.6*0˜(−2.32).This value is compared with a previously determined threshold value Tv=1which is assigned to E1. In this example, the threshold value is notreached which means that the subject is not in endpoint E1.

In the second example, the system uses hierarchical probabilisticthreshold calculations based on accumulated probabilities from groups ofsettings for RF interrogators. This calculation is very similar with theprevious one, except that in the first step of the calculations, weightsare applied to a probability. For each interrogator setting there is areference reading value that expresses the highest probability that thetag may be at endpoint E. This is represented as C_(k,1) where ‘k’ isthe index for the RF interrogator and ‘1’ is the index for theinterrogator's setting. In a first step for endpoint E, the systemcalculates an aggregate result for each interrogator based on aweighting formula/function: A_(k)=F_(k)(W_(k,1), P_(k,1)) where ‘k’ isthe interrogator index, ‘1’ spans all settings for interrogator ‘k’ andP_(k,1)=PF_(k,1)(NR_(k,1),C_(k,1)) is the probability that the tag is atendpoint E as detected from interrogator ‘k’ in configuration ‘1’calculated with the function PF_(k,1). A second step includesaggregating the results obtained in the first step based on a weightingformula/function: A=G(WA_(k), A_(k)) where ‘k’ is the interrogator indexand WA_(k) is a weight associated with the interrogator ‘k’ at theendpoint E. The aggregation result A is then compared with a thresholdvalue or interval Tv to assess whether the tag is localized at endpointE.

An example implementation of this second example can be described withreference to FIGS. 2A and 2B. The endpoint of interest Ei is E1. A RFIDtag located at EP1 may be read by all the interrogators 30 and 26. Inthis example, the interrogator 30 associated with the reader 34 isassigned four settings: one setting for which the antenna is oriented asshown in FIG. 2A with an RF power output of 36 dBm, one setting forwhich the antenna is oriented as shown in FIG. 2A with RF power output33 dBm, one setting for which the antenna is oriented at a 45 degreeangle towards E1 as shown in FIG. 2B with RF power output 36 dBm, andone setting for which the antenna is oriented at a 45 degree angletowards E1 as shown in FIG. 2B, with RF power output 33 dBm. For allsettings, the antenna of the interrogator 30 associated with the reader34 has vertical polarization. All of the other interrogators have justone setting, with the antenna orientation as shown in FIG. 2A, and an RFpower output of 33 dBm. All of the interrogators' antennas have a fixedgain of 6 dBi. The interrogators 30 associated with the reader 32 e havedifferent antenna polarizations, one vertical, one horizontal and onecircular.

The first two settings of the antenna of the interrogator 30 associatedwith the reader 34 correspond to the antenna orientation as shown inFIG. 2A, and are assigned weights of W1,1=0.5 and W1,2=0.5. Thereference reading values are low values of C1,1=1 and C1,2=0 because theantenna is vertically polarized and does not point toward EP1, such thatit detects tags located away from E1. For the next two settings, theweights are higher W1,3=1 and W1,4=0.9 respectively and the referencereading values are higher values of C1,3=10 and C1,4=9, because theantenna points toward E1 and detects tags located near E1. For all ofthe interrogators 30 associated with the reader 32 e, there is a singlesetting with a weight of 0.9 (W2,1, W3,1, W4,1 are all 0.9) with areference reading value of 12 (C2,1, C3,1, C4,1 are all 12). For E1, allof the interrogators 26 associated with the reader 24 c have nullweights(0). The weights and the reference reading values are calculatedand determined using site surveys and simulations, for example.

During an interval of time, such as 1 ms for example, the systemcollects data from all interrogators for all settings. For theinterrogator 30 associated with the reader 34, the system collectsreading values for each setting and aggregates the values using anaggregation function. The aggregation function(F) for each interrogatorfor this example is the average of the weights applied to theprobability that the tag is at the endpoint E1 for each interrogatorsetting. The probability that the RFID tag is at endpoint E1 for eachinterrogator setting is computed based on a probability function P(N, C)which in this example is: for the first two settings of the interrogator30 associated with the reader 34 (P1,1, P1,2)={0 if N>C, 0.5 if N<=C};for the last two settings of the interrogator 30 associated with thereader 34 (P1,3, P1,4)={0 if N=0, C/N if N>C, N/C if N<=C}; and for allsettings of the interrogators 30 associated with the reader 32 e (P2,1,P3,1, P4,1)={0 if N=0, C/N if N>C, N/C if N<=C}. For the interrogator 30associated with the reader 34, the readings are N1,1=0, N1,2=0, N1,3=8and N1,4=7. For the interrogator 30 associated with the reader 34, theaggregate value becomesA1=(W1,1*P1,1+W1,2*P1,2+W1,3*P1,3+W1,4*P1,4)/4=(0.5*0.5+0.5*0.5+1*8/10+0.9*7/9)/4=2/4=0.5.For the three interrogators 30 associated with the reader 32 e thesystem collects three reading values N2,1=14, N3,1=12 and N4,1=6,respectively. The aggregate values for the interrogators 30 associatedwith the reader 32 e become A2=(W2,1*P2,1)/1=0.9*12/14=0.77,A3=(W3,1*P3,1)/1=0.9*12/12=0.9 and A4=(W4,1*P4,1)/1=0.9*6/12=0.45respectively. For the interrogators 26 associated with the reader 24 c,the collected data doesn't matter in this example calculation becausethe weights associated with the interrogators 26 are null (in thisexample those interrogators are not taken into consideration whilecalculating position at E1).

The final result is then computed as an aggregation of the particularresults normalized with the weight associated with each interrogator. Inthis example, the interrogator 30 associated with the reader 34 has aweight of WA1=0.8, the interrogators 30 associated with the reader 32 eeach have a weight of 0.9(WA2, WA3, WA4 are all 0.9) and, as mentionedabove, all the other interrogators have null weights. The finalaggregation function (G) for this example is the average of the weightsapplied to the aggregated values for each interrogator from the previousstep. The final aggregate value becomeA=(WA1*A1+WA2*A2+WA3*A3+WA4*A4)/4=(0.8*0.5+0.9*0.77+0.9*0.9+0.9*0.45)/4=(0.40+0.69+0.81+0.41)/4˜0.57.This value is compared with a previously determined threshold valueTv=0.50 which is assigned to E1. In this example, the threshold value isreached which means that the subject is at endpoint E1.

In the third example, the system uses hierarchical threshold limitcalculations base on accumulated reading factors from settings of groupsof RF interrogators. In this approach a group of interrogators has anassigned collection with any number of settings/configurations. Forexample, four RF interrogators at an access door might have an assignedcollection including two settings, with a setting being defined by thecombination of any RF interrogators' parameters such as transmitted RFpower output, antenna gain, antenna polarization, and antennaorientation. There is a weight associated with the endpoint E for eachsetting of a group of RF interrogators. There is also a weightassociated with each interrogator from the group configured with each ofthe group settings; this is represented as W_(k,1) where ‘k’ is theindex for an RF interrogator in the group and ‘1’ is the index for thegroup's setting. In an interval of time, the system collects data foreach setting of the group of RF interrogators with NR_(k,1) representingthe number of readings at the interrogator ‘k’ configured with the groupsetting ‘1’. In a first step for endpoint E, the system calculates anaggregate result for each group setting based on a weightingformula/function: A₁=F_(k)(W_(k,1), NR_(k,1)) where ‘k’ is theinterrogator index in the group and ‘1’ spans all settings for theinterrogator group. A second step includes aggregating the resultsobtained in the first step based on a weighting formula/function:A=G(WA₁, A₁) where ‘1’ is the group setting index and WA₁ is a weightassociated with the group setting ‘1’ at the endpoint E. The aggregationresult A is then compared with a threshold value/interval Tv to assesswhether the tag is localized at endpoint E.

An example implementation of this third example can be described withreference to FIGS. 2A and 2B. The endpoint of interest Ei is E1. A RFIDtag located at E1 may be read by all the interrogators 30 and 26. All ofthe interrogators 30 represent a group used to detect whether thesubject is at endpoint E1. The group of interrogators includes groupsettings, which are a collection of particular settings for eachinterrogator. In this example, two group settings are defined.

The first group setting includes: a setting for the interrogator 30associated with the reader 34 where the antenna is oriented at a 45degree angle towards E1 as shown in FIG. 2B, with interrogator RF poweroutput 33 dBm and antenna polarization circular; a setting for eachinterrogator 30 associated with the reader 32 e where the antenna isoriented as in FIG. 2A, with interrogator RF power output 36 dBm andantenna polarization vertical. For this first group setting, the weightassociated with the interrogator 30 associated with the reader 34 isW1,1=0.9 and the weights associated with the interrogators 30 associatedwith the reader 32 e(W1,2, W1,3, W1,4) are all 1, which means that allreads from all the interrogators in the group will count during theaggregation calculation for this group setting.

The second group setting includes: a setting for the interrogator 30associated with the reader 34 where the antenna is oriented as in FIG.2A, with interrogator RF power output 36 dBm and antenna polarizationvertical; the settings for the interrogators 30 associated with thereader 32 e don't matter because these interrogators are associatedweights of 0 for this group setting and they don't count during theaggregation calculation of this group setting. In this example, thesecond group setting may help detect that the tag is not likely to be atendpoint E1, but rather in the coverage area for this group setting awayfrom E1 because the only interrogator antenna that counts is orientedaway from the location of E1. However, this is just a particular caseand should not limit the generality of the algorithm. For the secondgroup setting, the weight associated with the interrogator 30 associatedwith the reader 34 is a negative value W2,1=−0.9 because theinterrogator settings allow detection in an area away from EP1 and theweights associated with the interrogators 30 associated with the reader32 e(W2,2, W2,3, W2,4) are all 0 which means that all the reads from theinterrogators 30 associated with the reader 32 e will not count duringthe aggregation calculation for this group setting. In this example, allthe interrogators' antennas have a fixed gain of 6 dBi.

In an interval of time, such as 1 ms for example, the system collectsdata from both group settings: for the first group setting the number ofreads at the interrogator 30 associated with the reader 34 is N1,1=2 andfor each interrogator 30 associated with the reader 32 e, the number ofreads are N1,2=0, N1,3=1, N1,4=2, respectively. For the second groupsetting, the number of reads at the interrogator 30 associated with thereader 34 is N2,1=10 and for each interrogator 30 associated with thereader 32 e, the number of reads are N2,2=0, N2,3=1, N2,4=2,respectively. For each group setting, the system aggregates the valuesusing an aggregation function. In this example, the aggregationfunctions(F) for each group setting can be considered as a sum ofweights applied to the number of tag reads for each interrogator in thegroup. In other examples, the aggregation functions for each groupsetting might be different from each other.

For the first group setting, the aggregate value becomesA1=W1,1*N1,1+W1,2*N1,2+W1,3*N1,3+W1,4*N1,4=0.9*2+1*0+1*1+1*2=(4.8). Forthe second group setting, the aggregate value becomesA2=W2,1*N2,1+W2,2*N2,2+W2,3*N2,3+W2,4*N2,4=(−0.9)*10+0*2+0*1+0*0=(−9).The final aggregation function(G) for this example is the sum of thegroup settings' weights applied to the aggregated values for each groupsetting from the previous step. The first group setting is assigned aweight of WA1=0.9 while the second group setting is assigned a weightvalue of WA2=0.8. Any weight might have a positive or negative value.The final aggregate value becomeA=WA1*A1+WA2*A2=0.9*4.8+0.8*(−9)=(−2.88). This value is compared with apreviously defined threshold value Tv=3 which is assigned to E1. In thisexample, the threshold value is not reached which means that the subjectis not at endpoint E1.

In the fourth example, the system uses hierarchical probabilisticthreshold calculations based on accumulated probabilities from settingsof groups of RF interrogators. This calculation is very similar to thethird example, except that in the first step of the calculations weightsare applied to a probability. For each group setting there is anreference reading value that expresses the highest probability that thetag may be at endpoint E, noted with C_(k,1) where ‘k’ is the index foran RF interrogator in the group and ‘1’ is the index for the group'ssetting. In a first step, the system calculates for endpoint E anaggregate result for each group setting based on a weightingformula/function: A₁=F_(k)(W_(k,1), P_(k,1)) where ‘k’ is theinterrogator index in the group, ‘1’ spans all settings for theinterrogator group and P_(k,1)=PF_(k,1)(NR_(k,1),C_(k,1)) is theprobability that the tag is at endpoint E as detected from interrogator‘k’ in group configuration ‘1’ calculated with the function PF_(k,1). Asecond step includes aggregating the results obtained in the first stepbased on a weighting formula/function: A=G(WA₁, A₁) where ‘1’ is thegroup setting index and WA₁ is a weight associated with the groupsetting ‘1’ at the endpoint E. The aggregation result A is then comparedwith a threshold value/interval Tv to assess whether the tag islocalized at endpoint E. In all of the configurations described withrespect to the four examples, the weights and the threshold valuesincluding reference reading values can be statically defined and/orcomputed during execution using a learning algorithm.

An example implementation of this fourth example can be described withreference to FIGS. 2A and 2B. The endpoint of interest Ei is E1. A RFIDtag located at E1 may be read by all the interrogators 30 and 26. All ofthe interrogators 30 represent a group used to detect whether thesubject is at endpoint E1. The group of interrogators includes groupsettings which are a collection of particular settings for eachinterrogator. In this example, two group settings are defined.

The first group setting includes: a setting for interrogator 30associated with the reader 34 where the antenna is oriented at a 45degree angle towards E1 as shown in FIG. 2B, with interrogator RF poweroutput 33 dBm and antenna polarization circular; a setting for eachinterrogator 30 associated with the reader 32 e where the antenna isoriented as shown in FIG. 2A, with interrogators RF power output 36 dBmand antenna polarization vertical. For this first group setting, theweight associated with the interrogator 30 associated with the reader 34is W1,1=0.9 and the weights associated with interrogators 30 associatedwith the reader 32 e(W1,2, W1,3, W1,4) are all 1 which means that allthe reads from all the interrogators will count during the aggregationcalculation for this group setting. The reference reading value for theinterrogator 30 associated with the reader 34 configured with this groupsetting is C1,1=10. This is a high value because the antenna in thissetting is circularly polarized and points directly toward E1 such thatit detects tags located near E1. For the other three interrogators inthe group configured with this group setting, the reference values areC1,2=10, C1,3=10 and C1,4=9. These are high values because theseinterrogators' antennas point toward E1 and detect tags located near E1.

The second group setting includes: a setting for the interrogator 30associated with the reader 34 where the antenna is oriented as shown inFIG. 2A, with interrogator RF power output 36 dBm and antennapolarization vertical. The settings for the interrogators 30 associatedwith the reader 32 e don't matter because these interrogators areassociated with weights of 0 for this group setting and they don't countduring the aggregation calculation of this group setting. For the secondgroup setting, the weight associated with the interrogator 30 associatedwith the reader 34 is a lower value W2,1=0.4 because the interrogatorsettings allow detection in an area away from the E1 location and theweights associated with the interrogators 30 associated with the reader32 e(W2,2, W2,3, W2,4) are all 0.9 which means that all the reads fromthe interrogators 30 associated with the readers 32 e will count duringthe aggregation calculation for this group setting. The referencereading value for the interrogator 30 associated with the reader 34configured with this group setting is C2,1=0. This is a low valuebecause the antenna in this setting is vertically polarized and pointsin a direction away from E1, such that it detects tags located away fromE1. For the other three interrogators in the group configured with thisgroup setting, the reference values are C2,2=10, C2,3=10 and C2,4=9.These are higher values because these interrogators' antennas pointtoward E1 such that they detect tags around EP1. In this example, allthe interrogators' antennas have a fixed gain of 6 dBi.

In an interval of time, such as 1 ms for example, the system collectsdata from both group settings: for the first group setting the number ofreads at the interrogator 30 associated with the reader 34 is N1,1=2 andfor each interrogator 30 associated with the reader 32 e, the number ofreads are N1,2=0, N1,3=1, N1,4=2 respectively. For the second groupsetting, the number of reads at the interrogator 30 associated with thereader 34 is N2,1=10 and for each interrogator 30 associated with thereader 32 e, the number of reads are N2,2=0, N2,3=1, N2,4=2respectively.

For each group setting, the system aggregates the values using anaggregation function. The aggregation function(F) for each group settingfor this example is the average of the weights applied to theprobability that the tag is at the endpoint E1 for each interrogatorsetting. The probability that the RFID tag is at endpoint E1 for eachinterrogator configured with the group setting is computed based on aprobability function P(N, C) which in this example is: for the firstgroup setting of the interrogator 30 associated with the reader 34(P1,1)={0 if N=0, C/N if N>C, N/C if N<=C}; for the second group settingof the interrogator 30 associated with the reader 34 (P2,1)={0 if N>C,0.5 if N<=C}; and for all the interrogators 30 associated with thereader 32 e group settings (P1,2, P1,3, P1,4, P2,2, P2,3, P2,4)={0 ifN=0, C/N if N>C, N/C if N<=C}.

For the first group setting, the aggregate value becomesA1=(W1,1*P1,1+W1,2*P1,2+W1,3*P1,3+W1,4*P1,4)/4=(0.9*2/10+1*0/10+1*1/10+1*2/9)/4˜0.52/4=0.13.For the second group setting, the aggregate value becomesA2=(W2,1*P2,1+W2,2*P2,2+W2,3*P2,3+W2,4*P2,4)/4=(0.4*0+0.9*0/10+0.9*1/10+0.9*2/9)/4˜0.29/4˜0.07.The final aggregation function (G) for this example is the average ofthe group settings' weights applied to the aggregated values for eachgroup setting from the previous step. The first group setting isassigned a weight of WA1=0.9 while the second group setting is assigneda weight value of WA2=0.8. Any weight might have a positive or negativevalue in other examples.

The final aggregate value becomesA=(WA1*A1+WA2*A2)/0.2=(0.9*0.13+0.8*0.07)/2˜0.087. This value iscompared with a previously defined threshold value Tv=0.50 which isassigned to E1. In this example, the threshold value is not reachedwhich means that the subject is not at endpoint E1.

For each of the weighting formulas above, the weights are numericalvalues (real numbers). Any of the weights might have a positive or anegative value. An example of an aggregation function F or G) is a sumof weights applied to each number to be aggregated Funct(Wn,Nn)=SUM(Wn*Nn) where n is an integer. Another example of an aggregationfunction(G) is an average of weights applied to each number to beaggregated Funct(Wn, Nn)=SUM(Wn*Nn)/M where n is an integer spanningfrom 1 to M. Although specific values have been used in the examplesabove, it should be understood that the system is not limited to usingthe example values.

In an example embodiment, the system 20 is dynamically configurable toallow a system administrator, for example, to define intervals of timein which RFID tag reading at one or more endpoints is performed in amanner that is different than the manner in which RFID tags are read atthe identified endpoints during other time intervals. This functionalitycan be used to provide more stringent security settings at differingtimes of day. The system adjusts the RF settings of the endpoint's RFinterrogators and their associated weights to values that correspond toa desired level of RFID tag reading performance. As an example, for anendpoint used to read RFID tags for access to a building or room duringoff hours, the system settings may have high weights for settingscorresponding to low transmitted RF output power, low antenna gain, andlinear polarization of external interrogators at building accesslocations, but very low or null weights for other settings. This resultsin RFID tags being sensed at a shorter range during the off-hoursinterval than during the regular hours interval and requires a closeproximity of an RFID tag to an external antenna before access isallowed. In one example, an RF signal strength setting is adjusted basedon the received time interval and associated security level setting. Insome embodiments, the time interval and associated security levelsetting may be entered once and kept in a system configuration. In otherembodiments, the time interval and associated security level setting maybe changed by the system administrator or other authorized users.

In one example, a system administrator defines a first regular-hoursinterval of time from 8 am-8 pm, a second off-hours interval from 8pm-10 pm and a last interval from 10 pm to 8 am when no access isallowed. The system settings for the off-hours interval have highweights for settings corresponding to low transmitted RF output power,low antenna gain, and linear polarization of external interrogators atbuilding access locations but very low weights or null weights for othersettings. This results in RFID tags being sensed at a shorter rangeduring the off-hours interval than during the regular-hours interval andrequires a close proximity of an RFID tag to an external antenna beforeaccess is allowed. Alternatively, the system settings may be set suchthat RFID tags are more easily sensed at a longer range during theoff-hours interval than during the regular-hours interval. This couldpossibly be desirable if an entrance were located such that many peoplewith RFID tags pass by the entrance during the regular-hours intervalwithout having an intention of entering, but people with RFID tagsafter-hours generally pass through the entrance if they are detectednearby.

Returning to the use of semantics, the following describes a furtherimplementation of semantics with RFID. Semantic RFID is a novel conceptand technology that uses RFID and sensing semantic models of buildingsand facilities in order to automatically determine, manage and controlthe semantics of movements of objects.

The Semantic RFID system uses collaborative sensing, localization andtracking techniques for recording and inferring the semantics of objectstraveling through the semantic modeled facilities. The semantics canrange from very simple determinations as entering or exiting an area ordirection of travel to more complex determinations as checkout, returns,boarding, carry luggage, expired items, unsafe to consume etc. and isbased on travel sequences and interactions in the semantic field. Theapplicability of semantic sensing is potentially endless.

In some examples, the semantic determinations are based on systeminternal observed semantics and can be coupled with system externalsemantics

The semantic engine gathers information from sensing and controlentities including sensors, digital and analog I/O devices, RFID sensorsand readers, RFID tags and any other managed entities. The sensingentities may be independent or attached to a monitored entity includingwasher/dryer, refrigerator, cars, medical devices, human body,environment, doors etc. The sensors include internal, external,environmental, wearable, biological, human-centric, digital, analog,industrial, building or any other type. They can communicate via wiredor wireless connections; a particular case of a sensor is a one that isconnected to a wireless circuit, tag or device; this provides theability for the sensor values to be read via a wireless reader, canstore sensed information in time and can be read or processed whencommunication via wireless protocols is available. The sensors might beof different types and can store a history of measurements and/orprovide real time data that can be sampled anytime or at time intervals;additionally, the sensor may have notification capabilities that notifyobservers of the measured values or any type of activity in themonitored environment.

The system might issue control commands to sensing and control entitiesfor any purpose including the reset of the device, change parameters,open/close/activate/deactivate commands, change notification settings,change sample data etc.

The semantic engine may couple the system internal sources with systemexternal sources including electronic calendars, RSS feeds, socialgraphs, electronic forum posts, electronic organizational charts and anyother external to the system.

The system internal semantics can be based on travel sequences,interactions in the semantic field and sensing or a combination of allof those.

The semantic determinations can have an expiration time or a validityinterval in the sense that once determined the system might invalidatethese determinations when the expiration time is reached or the validityinterval passes.

The semantic chain may include any type of definitions, determinations,compositions, interdependencies, timing, inference models and techniquesfor any type of semantics or semantic groups and may be continuouslydeveloped by inference and learning techniques.

A semantic group consists of at least two entities each being monitoredin the semantic field that share a semantic relation or commonality;semantic groups can be structured in a composite fashion with at leasttwo semantic groups forming another composite semantic group; forcomposite semantic groups similar semantic rules between its membersapply as for a semantic group. As such, the semantic groups can form andbe represented as a hierarchical type structure.

For a semantic group, a group semantic can be assigned and can be groupdependent when the semantic is a semantic event of one entity in rapportwith another within the same group; or, group independent semantic whenthe semantic is not determined by the interactions between the groupmembers.

A semantic group can be inferred based on interactions in the semanticfield; further, the system may use categories of RFID tags and sensingentities to create rules or templates for semantic group formations(e.g. the system may define tag categories for items and cars and definea rule that semantic groups should be created when at least one memberof an item category interacts with a member of a car category in aspecific way; another example of tag categories are in the case of anemployee which is has assigned one tag/card from the category PARKINGand one from BUILDING ACCESS).

Any semantics can be combined at any time in order to infer newsemantics. As such the semantics can be simple semantics which arederived from the determinations in the semantic field, composite whenare determined from a combination of other determined semantics, orcomplex when they are determined from any combination of the former. Asan example for a manufactured product lifecycle, simple semantics can be“PACKAGED” (when the semantic is inferred based on the packaging arealink), “STORED” (inferred for a warehouse link), “SHIPPED” (inferred fora loading area), “LOAD” (inferred when loading a truck) and “UNLOAD”(inferred when unloading from the truck). A composite semantic of thesecan be “DELIVERED” because the tagged product went through the requireddelivery lifecycle. Further, if for the same tagged article a semanticof “LOAD”, “UNLOAD” and “RECEIVED” was determined then a furthercomposite semantic of “RETURN” and/or “PENDING REFUND” can be derived.

The semantics may be represented as a hierarchy and the semantics areinferred based on the hierarchy traversal.

A semantic structure might have costs associated with its data andsemantics; the system might trigger or prefer one semantic or the otherbased on costs calculations.

The semantic structure may use timing enhancements for facilitating thetime dependent semantic determinations

The semantic inference can be time sensitive as for example a compositeor complex semantic is not inferred unless some semantic determinationsused for its determination are complying with timing requirements; thetiming requirements can include being within an interval of time(e.g. inthe product lifecycle example the “PENDING REFUND” semantic might not beinferred if the timing between DELIVERED and RECEIVED would have beenlonger than 30 days; instead a semantic of type “RESTOCKING REFUND”might have been more suitable, or as an alternative a combination of“PENDING REFUND” and “RESTOCKING FEE”. Similarly, any group semantic canbe time dependent in the sense that it may require some of the eventsthat trigger the semantic inference to comply with certain timingrequirements etc.

Composite semantics can have assigned to them determination spans whichcontrol the maximum amount of time between the start of compositedetermination to the end of the composite determination. In someversions if the component semantics of a composite semantic are notrealized within the determination span then the composite semantic isnot inferred. The determination span can be a time interval or asemantic interval. Further, a composite semantic might be consideredvalid only if it matches a sequencing rule in which the componentsemantics occur in a specific order. Further, a composite semantic mightbe deemed as exclusive and be validated only if it matches anexclusivity rule where there are no other semantics occurring during itssemantic determination except the composite semantics that define it; anon-exclusive composite semantic can be inferred even there are othersemantics occurring besides the component semantics during its semanticdetermination. The semantic determination can have expiration timeswhich are used by the system to invalidate determined semantics once theexpiration time passes.

The semantic timing definitions and determinations including theexpiration time can be defined as a time threshold, as a time intervaland, further, as an interval based on semantics; the interval based onsemantics is basically a time interval between when the intervalsemantic boundaries occurred or expired.

The semantics assigned to a tag or group of tags can have expirationtimes; as such, the expired semantic will not participate in additionalcomposite semantic inference once the semantic is expired. The compositesemantic determinations can also have other time rules that determinethe semantic inference including semantics that expire based on othersemantics, semantics inferred and/or validated based on an interval oftime and any other time sensitive inference. The time insensitivesemantics are the ones that never expire or do not require timedeterminations to be validated; those can be simple semantics orcomposite as a result of composition of any type of semantic; they canbe used to compose any other type of semantics. As an example, the timesensitive semantic determinations help with implementation of theexclusion zones (e.g. for hazardous substances interaction)—as anexample in a pharmaceutical facility if a tag has been assigned asemantic of “PATHOGEN” because it visited a highly sensitive laboratorytesting area then it shouldn't be allowed to enter for the next 24 hoursin the generic drugs manufacturing area; in this case we can define thesemantic as having an expiration time of 24 hours and define a blockaccess control rule for this semantic; hence the tag may be allowed toenter the generic drugs area only after the “PATHOGEN” semantic expiredand which is 24 hours. Further, when the “PATHOGEN” semantics expire thesystem may infer that the tag is in a clean state and infer othersemantics throughout the system.

A preferred method for the operation of semantic determination is one inwhich the system monitors the semantic field through the sensingentities and the RFID readers and keeps data structures tracking thesemantics definition, semantic sequencing, semantic intervalsdefinitions and the semantics that have been occurred. The system maydetect that the conditions for a tag or a plurality of tags have beenmet for determining a semantic or group semantic, where the conditionsmay include using any combination of a detected endpoint presence,sensing entity value, link passing, input from a user, other inferredsemantic, external semantic or tag to tag semantic marking. Once the newsemantic or group semantic is inferred based on the field data and thesemantic definitions the system further checks the semantic definitionsto identify all the composite semantics that are defined based on thiscomponent semantic. Then, for each identified composite semantic thesystem checks if all composite semantics are realized and if the othersemantic rules including the span, exclusivity rule and sequencing ruleare met. In one version the system will not consider in thedetermination the semantics for which the expiration time have passed;that is, it will automatically reject such semantics. If the rules aremet then the system infers the composite semantic and, further may usethe inferred semantic to determine other composite semantics in arecursive manner. If a tag is at an endpoint that enforces accesscontrol and if there is at least one realized semantic (which may be acomposite semantic) that will match one access control rule that allowsthe tag to pass then the system may allow the tag to pass to a secondcontrolled endpoint. The system may check the semantic intervals rulesand see which one is in effect or not and the system determines, basedon semantic intervals and the semantic sequencing, whether thedetermined semantic is within a matching semantic interval. Based on thedetermination of whether the semantic is or not within a semanticinterval the system might ask for a user input, might trigger an eventor alarm, further use the semantic rules for semantic inference orcreate/update system records. The system might also determine based onthe group semantics definitions and sequencing that any of the realizedsemantics lead to a group semantic between this tag and possibly othertag or group of tags and further recursively execute the processdescribed above. Further, the system may use the group semanticdetermination to instruct the RFID readers to monitor the particularsemantic group by issuing a list or mask for filtering the particulartags in the semantic group. In this way the RFID interference might bereduced and the semantic group can be monitored more effectively untilthe system determines that to be no longer necessary or until a newsemantic rule come into effect.

Further, the system may store the semantic determinations andexpirations to tags' memory. For example, this can be useful if there isno network connectivity between two facilities and the system shouldrely on the information stored on tags for semantic inference, accesscontrol, time management and semantic chain development.

A tag memory may store semantic inference rules that the tag uses toinfer semantics and store them to the local memory. Further, the systemmight retrieve and manage the semantic determinations stored on the tag.Also, the tag memory may store the semantic groups to which it belongs.

The oriented links preferably have semantic attributes assigned to them;the semantic attributes can be defined or inferred as dependent on asensing entity measurement or status. As an example, if in adisinfection area a sensor senses that the concentration of disinfectantis below the required standard the system might change the semanticattribute of the entry and/or exit links from the disinfection area fromSAFE to HAZARDOUS; or, the system may select the link semantic based onthe measured value and an interval-semantic configuration or datastructure. Further, the system might assign to all the tags present inthe disinfection area a hazardous related type semantic. Thus, in oneversion a semantic attribute is a function of an oriented link and atleast one additional parameter unrelated to the geographic relationshipbetween the links.

Group dependent semantics may be derived, for example, in any of thefollowing situations.

In one example, the semantic group follows certain paths and patterns ofmovement. As an example imagine a person who is wearing a library badgeand is carrying RFID tagged books throughout a library (the person andthe books are identified in the same locations and/or use the same pathsand links within an interval of time, and therefore they are assigned tothe same semantic group) and the semantic assigned to the books can bethat the person checked them out from the library once the semanticgroup uses a “CHECKOUT” link in the library. In one version, once thebooks and the tag associated with the person pass an exit checkpoint theCHECKOUT semantic is applied to the group. Also, the system might createa new semantic group and further track the semantic group, possibly byusing a filter or mask based on the semantic group.

In another example, the semantic group passes certain oriented links,eventually, within an interval of time; additionally, if required, amanual input can be used for additional usages and determinationsincluding to differentiate between same type of objects in the samelocation, for entering additional authentication or authorizationinformation or to manually add additional semantic information. Forexample, a person badge and a tracked luggage pass the same orientedlink in an interval of time, the system infers that the luggage belongs,is in possession or has been checked out by that person. If multipleperson tag badges or luggage tags are detected within the interval oftime in the same locations or using the same links, a manual input maybe required by the badges holders to specify the luggage belonging tothem and, possibly, providing other additional information. The accesscontrol subsystem may enforce the manual input requirement by impedingthe badge wearer or the tagged luggage to traverse the oriented linkunless an input is received; this may include denying access to thedestination point of the link, raising an alarm, triggering an event,inferring a semantic, setting up an internal parameter or any othermeans that may be required by such an access rule. The manual input isthen used to help derive a group dependent semantic between the tagbadges and baggage tags or any other group independent semantic. Anotherexample may take place in a warehouse and a dock in the receiving area.When a truck unload event occurs the system can be setup so that theperishable items are unloaded to a specific location, eventually via a“PERSISHABLE” link while the non-perishable items are unloaded to asecond separate location, eventually via a “NON-PERISHABLE” link. Insome versions, where links are used, they can even be on the same pathand following the same direction with the exception that one of them mayhave a shorter distance to travel. Additionally, a location and aninterval of time may also be used as an internal semantic for an item orgroup of items, e.g. the fact that an item is present in a certain areabetween certain times of the day may determine the system to infer aPERISHABLE semantic. Similarly, the semantic inference for the semanticgroup can be enabled/disabled within time intervals, semantic intervalsor be enabled or disabled when required; the intervals may be controlledor replaced by other semantic events, internal or external e.g. a GPSmonitored truck arriving in the docking area defines the semantic “TRUCKIN” which is used as a starting point to enable the PERISHABLE semanticinference.

In yet another example, when items are in the same location at any pointin time it can be interpreted to mean that they interacted in one way orthe other. While they are in the same location they may be coupled withsensorial information related with particularities at that location,sensorial information related with any of the tagged objects orsensorial information related with interaction between them. As anexample if tagged goods are in a refrigeration area and a temperaturesensor senses a temperature below freezing for an interval of time thenthe system might assign to any of those tags the semantic “EXPIRED”which means that they will be monitored and controlled in a specific wayin the semantic field. Another example might include at least two peoplein a facility that are in close proximity/location and a sound/speechsensor senses a sound of a specific pitch in the area then the systemmight infer a semantic of type “ACUSTOMIZED”, “NETWORKED” or“DISCUSSION” for the semantic group based also on the duration of theinteraction. Wearable sensors can also sense different vital signswithin the same or close interval of time when two or more people aredetected in close proximity and then assign a semantic attribute basedalso on those e.g. “RELAXED” or “ALERT”. The combination of these priordetermined semantics for the group of people may lead to specific andcomplex or composite semantics e.g. “COMPATIBLE” as a combination of“NETWORKED” and “RELAXED” or “RELAXED” for a combination of “DISCUSSION”and “RELAXED”. RFID enabled sensors can also be used and the system mayaccess the sensing data and, possibly, localize the sensor via RFID. Inanother example RFID temperature sensors might be attached to goods inthe refrigeration area and once the system receives the sensors data itmight use it to infer additional semantics for the RFID tagged object.The RFID sensor may optionally provide real time sensing data and,possibly, preserve a history of sensor measurements and sampling atdifferent interval of times, and the system may analyze the data fromthe sensor and detect that at one interval the temperature dropped belowsafe levels. In this case the system assign the semantic EXPIRED to theRFID tagged object.

As another example, the tags may have a certain pattern of movementand/or sensed values (e.g. a group of RFID moisture sensors, affixed tocertain water sensitive plant (cultures) spread across an area, sense anover-humid condition when a specific tagged humidifier device passes thearea. The humidifier might have chosen a path that would have determinedto carry more moisture in the air than required, maybe because it had topass through water, or use a specific charging pump or any other reason.Also, the moisture sensors might sense that while the humidifier passesthrough the area, the humidity measurements pattern decreases as thehumidifier body dries out, finishes its water sources or passes throughvery warm areas. The humidifier itself might have a moisture and/ortemperature sensor attached that might detect whether has passed throughwet and very warm areas. Further, while passing through warm areas,temperature sensors in the area or affixed to the humidifier itselfmight detect this condition and be further used for more complexsemantics. As such, semantics are inferred based on the path ofmovement, pattern of sensed values or any combination of these.

In a further example, the tags in the semantic field are interacting insuch a way in which at least one of the tags becomes invisible to thesemantic system when in close vicinity to another tag; e.g. an item istracked to a warehouse and at a point in time is detected within theclose proximity or location with a truck. If later the item becameinvisible, very likely because the tag cannot be read due to beingloaded into the truck, the system may create a group semantic andpossibly further a semantic group with all the articles that follow thesame pattern(as loaded in the truck) or between the item tag and thetruck tag; additionally, the system may use during the process asemantic assigned previously to the truck (e.g. RFID DISABLED which mayhave been assigned to the truck, possibly, just because the systemdetected that an article first detected at location A but disappearedfrom the semantic field for an interval of time, reappeared at thelocation B and the out of field time matches the time interval of thetruck moving from the location A to location B)

The detection of the disappearance of one tag from the semantic fieldand the semantic inference can be further improved based on the detectedabsence of the response of a group of tags from a semantic group thatincludes the tag. The system may infer that the tag has disappeared fromthe semantic field only if at least one other tag or, in some situationsall tags from the semantic group have disappeared from the semanticfield. As an example, this may be the case if the tags are groupedtogether in a pallet or they travel together.

Tag to tag communication can be used to identify a semantic group andassign a semantic to the semantic group. Further, tag to tagcommunication can be used to detect the disappearance of a semanticgroup.

The group independent semantics can also be determined in similarfashion as the group dependent semantics with the difference that thesemantics are not inferred based on the interactions within the group.

Also combinations between any of simple tag semantics, group dependentsemantics and/or group independent semantics can lead to additional tagsemantics, semantic groups and group semantics and add up to thesemantic chain. These can be based on mathematical logic theory or anyother deductive logic and inference techniques (e.g. transitivity—if theperson A and person B are assigned a group dependent semantic“COMPATIBLE” and person B and person C also has been assigned“COMPATIBLE” then A and C are “COMPATIBLE”; or, person A and person Bare assigned a group dependent semantic “FRIENDS” and person A andperson C also has been assigned “FRIENDS” then B and C can form theirown semantic group “FRIENDS OF A” and further person A and the group“FRIENDS of A” can form a semantic dependent group. As it can be seenthe single tag semantics and group semantics whether dependent andindependent can be mixed in various ways based on various inferencetechniques.

The techniques described above coupled with additional sensinginformation can be used to generate additional semantics and semanticgroups and infer relationship between them.

Additionally, a tracked artifact may be assigned different semanticsbased on the path followed as explained throughout the application.

One aspect of the implementation of semantic enabled products is thesemantic modeling which is the process that establishes therelationships between the characteristics and goals of the operationalprocess to the facilities network layout. Various localizationtechniques are employed based on the specifics of each layout foroptimized semantic inference.

The semantic engine can be used, potentially, with commerciallyavailable hardware; improved localization and semantic inference isachieved if the hardware implements advanced operational control andsynchronization.

The localizations, RFID tag readings and sensing accuracy may beinfluenced by the number of the tagged entities in the semantic field.As such the system may adjust its RFID readings, localization andsensing parameters based on the tag population in the field.Additionally, the localization system uses tag filtering and selectiontechniques on an as needed basis in order to adjust parameters, tune thesystem and improve localization and semantic determinations. As anexample, the system might decide, that it needs to read only specifictags from the semantic field for particular locations; in this case thesystem may instruct the readers to mask, filter and/or select only thetags of interest; the mask, filter and/or selection may select a tagbased on the information stored in its memory including, but notlimited, to a global identifier, group identifier, type identifier,stored data value, stored sensed data recording etc.

The system may adjust reader to tag protocol parameters including datarate, the reference time interval, modulation, encoding and slotcount(used for collision mitigation protocols). Further, the system mayadjust its parameters based on the type of tag because different tagtypes have different response times and operational particularities.Other adjustments might take into account the size and the type of thememory to be read by selecting or masking based only on the memory ofinterest etc. The semantic groups can also determine the adjustment ofreader to tag protocol parameters; this may happen when the system isfocused on the detection and tracking of particular semantics groups;this may be based on the size of the semantic group, its localization orany other parameters associated with the semantic group.

Semantics determinations for a tag can be also stored in the tag memoryand can be used by the system for semantic inference. The tag memory canalso store semantic groups and/or the identification of which groups thetag belongs.

The semantic data stored on the tag memory can be generated by the tagitself based on locally stored semantic determinations rules or can begenerated and stored on the tag by the system via a reader or othertags. If the system and the tags implements tag to tag communication,the system may use tag to tag semantic marking in which the semanticdata and/or semantic selection commands might be transmitted from tag totag via standard or tag to tag protocols. Further, once receiving dataor a request from another tag a current tag may store the received dataand/or commands and/or infer additional semantics. The additionalsemantics may be based possibly on the received data, communicationparameters, internal memory data, internal semantic circuitry or anycombination of former. Further, the semantic data might be stored on thetags internal memory and circuitry and be used at any time for semanticselection and/or determination via reader to tag or tag to tagcommunication. The system may use masking, filtering and/or selectingtechniques based on single tags, semantics, semantic groups andsemantically connected tags. This will allow the system to identify andcommunicate with the tags in more efficient manner and to avoidunnecessary interference and communication in the semantic field. Thesystem may also adjust the protocol parameters based on the size of thepopulation being interrogated and which can be based on single ormultiple tags, semantic attributes, semantic groups or semanticrelationships. In one selection technique the system may provide thereaders with the masks and/or the selection filters and then the readerssend selection commands with the masks and/or selection filters to thetags; once a tag checks its memory or registers and identifies that therequested memory and/or values comply with the filters and/or masks itmay set an internal selection flag or session and/or, sends therequested data back to the reader; the selection flag or session can beused for further communication with the readers. If the system and thetags implements tag to tag communication, the selection commands mightbe transmitted from tag to tag via standard or tag to tag protocols.

The system may use a mask or filter to track semantic groups orsemantically connected tags. The received RFID data from the group oftags might be correlated in order to infer whether the tags are in closeproximity, infer additional semantics based on location and/or receiveddata or tune up RFID protocol parameters.

The semantics, whether simple, composite or group, can be used to defineaccess control rules and plans. The access control plans may includerules for allowing/denying access to specific areas, raising alarms,generating events, controlling I/O, activating/deactivating hardwareinputs and/or outputs or any other action that is needed for the overallconsistency and access throughout the semantic field. As describedabove, the system iterates through the access control rules andidentifies and applies all rules that are related with the potentialpaths and links that the RFID tag may take from a location. As the RFIDprogresses through those locations, paths and links, the system mayinfer semantics including the semantics used to determine the access inthe first place. The system may use previously identified semantics toapply against access control rules and also the semantics that theobject may be able to infer while passing any oriented link from theendpoint where is located; hence the object will be assigned only theallowed semantics. If the object tries to infer semantics that are notallowed, the system might impede physical access, raise alarms, generateevents, infer semantics and any other action that might be applicable bythe use case.

The access control rules may use semantic intervals that are in facttime interval specified based on semantics. For example instead ofdefining a time interval in terms of a date and/or time, the system mayaccept also a time interval based on when one or more specific semanticsoccurs/expires. Also, the access control rules might be specified interms of how many times a semantic has been inferred and/or at whattimes.

Access control rules may be specified based on, or associated withsensing data for advanced operational control. For example if a sensorin a refrigeration area detects that the temperature is below freezingthe system might impede access to the freezing area to a perishableitem, and, eventually open access for the item in another normalfunctioning refrigeration area.

Access control rules may further be specified as a function of group orcomposite semantics applied to a tag. For example, a tag may beauthorized to enter a given area when assigned to a group, and only whenmoving with the group, but not authorized if moving alone.Alternatively, a tag may be authorized only based on a particularcomposite semantic of two or more semantics.

The system can define time management rules and plans in order tomanage, track and record the time of the objects in the field and alsoallow for events, alerts and semantics based on time rules. The timemanagement rules and plans define how the time of the objects should beinterpreted and recorded in the field; they may also enable generationof events, alerts and semantics based on the plans' rules.

The plans can be defined on daily basis, weekly or any other interval oftime; there can be also plans for special days, special intervals,holidays or any other time interval as required. Usually the daily basedplans include fine grained time rules used for daily bases usage, whileother time plans can make use of the daily based plans to assign anddefine daily time plans for each day in the considered interval. Thetime plans can be composite which means they can be mixed together forincreasing the interval coverage and ease of use. The time plans mayalso be used as templates for any time management needs.

Time management rules and plans may use semantics within theirdefinitions and rules and further, may enable and define rules used bythe system for semantic inference.

As in the case of access control rules and plans, the time managementrules and plans can be coupled with semantics in order to define morecomplex or effective time rules and patterns. For example an asset dailytime plan might define an interval designed for disinfection; if thesystem detects that the asset haven't been using the DISINFECTION linkwhile in the designed time interval it may generate an alert, promptuser for an input or any other action as appropriate. Further, thesystem may not infer the DISINFECTION semantic if the DISINFECTION linkhas been used outside of the allowable interval; additionally theDISINFECTION semantic may not be inferred if a sensing entity in thedisinfection area recorded a disinfectant concentration below therequired disinfection threshold interval. If the system detected thatthe disinfection occurred as planned it may record any requiredinformation including the time the item was in disinfection, infersemantics and not generate any out of ordinary events or actions.Similarly, the system may record information, may generate events, infersemantics and require actions for not according to the plan events.

The time management rules and plans may also be used to derive newsemantic artifacts and improve the semantic chain; in our previousexample, if the DISINFECTION semantic didn't occur as planned the systemmight infer a REQUIRE DISINFECTION semantic for the locations and linksthrough which the asset passed or is passing or for the close by assets.Thus, in this case the system may assign a semantic to a tag based onthe determination that a tag did not traverse a particular link (orlinks) within a given time or in a particular manner. The system mayalso use access control rules to impede the access to endpoints untilthe asset hasn't been disinfected. Additionally, the tag of the personhandling the equipment might be assigned semantics to reflect the factthat might not be compatible to handling the equipment and generatespossible hazardous consequences. Further, the system might use the eventto create a group of persons qualified or not qualified to handle theequipment, assets requiring disinfection and assign members andsemantics to it.

The access control rules and plans and time management rules and plansmay use semantic intervals that are in fact time intervals specifiedbased on semantics. For example instead of defining a time interval interms of a date and/or time, the system may accept also a time intervalbased on when specific semantics occurs/expires. Also, the accesscontrol rules and plans and time management rules and plans might bespecified in terms of how many times a semantic has been inferred and/orwhat times.

Time management rules and plans may be specified based on, or associatedwith sensing data for advanced operational control and accountability.For example if an air quality sensor in a warehouse detects that the airquality is low the system may adjust the recorded working time for theemployees working in the warehouse and/or provide alerts to the shiftmanager. In one example, the system may thereby assign a semantic basedon one or more combinations of the air quality, location, and timeattributes of the employee.

Access control rules and plans and time management rules and plans mayuse semantic groups or semantic group templates for rules definition.For example a semantic group might be assigned specific rules forincreased system accuracy. If a semantic group template is used, therules may apply for all semantic groups that comply with the template.Additionally, the system may generate new semantic groups and rulesbased on the template.

Further access control rules and plans and time management rules andplans may use templates for rules and/or plan definition. Thesetemplates may be used to be matched against semantics and semanticgroups; additionally they can be used to generate new rules and/orsemantic artifacts.

The time management rules and plans might use semantic intervals thatare in fact time interval specified based on semantics. For exampleinstead of defining a time interval in terms of a date and/or time, thesystem may accept also a time interval based on when a specificsemantics is determined or expires. In one case, an interval can startwhen a semantic of “IN WAREHOUSE” is determined/expired and possiblyspans for a time interval or, alternatively, until when another semanticis determined/expired. This allows for fine grained control of timerecordings and time management because the time is recorded every timein a recording/working area and eventually not recorded when out of arecording/working area. The semantics used to define semantic intervalsmay have full capabilities including composition, grouping, expirationand any other semantic features.

The system records and keeps track of the time a tag consumed ondifferent activities based on semantics. In one example if a tag isassigned a “MAINTENANCE” semantic, maybe because it passed a“MAINTENANCE” oriented link to the maintenance area, then the system mayrecord the time (or duration) that the tag was in maintenance activitybased on the determined semantics and assign the time to particularactivities.

Also the time management rules and plans might include hours that shouldbe calculated with indexing and correction factors; this correction andindexing factors might be also based on determined or soon to bedetermined semantics. For example if an employee tag has been assigned asemantic of HAZARDOUS condition then the system might use specificindexing and correction factors (e.g. multiply the time worked underhazardous conditions with a factor of 2).

A rating and/or weight can be assigned to a semantic or a semanticgroup. Additionally, a rating can be derived for the tags or group oftags in the semantic field; the derived rating might be of a generalnature, rating the artifact overall or, it can be of a more particularnature rating a particular aspect of the artifact via a semantic.Semantic ratings can be used to calculate an overall rating. For exampleif a tag is assigned several MAINTENANCE semantics duringnon-maintenance windows the tag rating might be decreased because thetagged device may not be very reliable. The system may assign ratingsand/or weights to semantics and semantic groups and apply those to ratethe tags once semantics and semantic groups are inferred or at any othertime. As an example, a rating of a car may increase if it has beenassigned a semantic of WASHED. For a perishable item that has beenstored for an interval of time in a non-refrigerated area its ratingmight also decrease and possibly be used to decrease the expirationdate. Also, a tag rating may change based on the ratings of other tagsor groups found in its vicinity. Additionally, the ratings and/orweights might be further processed, adjusted and assigned to a semanticor a semantic group.

Further, the ratings and/or weights can be used to define or augmentaccess control rules and time management rules. As an example, theaccess control rules and time management rules might use time intervalsor semantic intervals to specify rules based on ratings or define ratingand/or weighting rules. Additionally, rating plans may be defined andthey may use rating and/or weighting rules based on time intervals,semantic intervals and/or rating intervals.

The semantic model may be associated with rating rules and rating plans.The rating rules may change based on internal or external semanticsand/or semantic groups.

Additionally, the locations and the oriented links can be associatedwith rating rules and plans and the semantic model.

The semantic model may change based on ratings. For example, if a paintspray pump is assigned a high rating on POLLUTION and it has been usedin a warehouse, then the system might assign to the warehouse locationor the links to the warehouse a semantic of HAZARDOUS, possibly with arating of 2 stars or a weight of 0.5, while the spray pump was presentand possibly an additional interval thereafter. Additionally, theratings of the tags/items or tag/item semantic groups inside thewarehouse may be decreased based on the POLLUTION and HAZARDOUSsemantics and their assigned ratings and/or weights. The system may alsoadjust the ratings and/or weights based on other semantics or intervals(e.g. the HAZARDOUS semantic weight is decreased with the time passedsince the paint pump has been left the warehouse; or, possibly, untilanother semantic of DEPOLLUTION occurs; or can be correlated with asensing device that measures the quality of air). Yet other newsemantics may be inferred for tags or semantic groups once a ratingreaches a threshold value or interval. A rating can be acquired fromexternal sources. It can be provided, for example, by a user from amobile device. Once the rating is acquired the system may adjust theinternal ratings and weights based on the acquired rating.

The tag or group of tags ratings can be used to determine rewards andincentives. The system may determine rewards and incentives in a similarway that it determines the ratings for a tag or group of tags. Thesemantic model may be associated with reward rules and plans. Therewards rules may change based on internal or external semantics and/orsemantic groups. Additionally, the locations and the oriented links canbe associated with reward rules and plans.

An aspect of using the system to calculate rewards and incentives isthat the system may use a fixed or dynamic amount or quantity of rewardsand incentives. As such, the system may recalculate and redistribute therewards and incentives based on ratings, semantics, semantic groups,semantic model and network model. Further, the semantic model may changebased on the amount and quantity of rewards and incentives.

In some examples, the system uses sensing data for inferring semantics.Sensing measurements from sensing entities are used to infer and derivesemantics in the semantic field. The semantics can be derived from anytype of sensing event, recording or data and may include rules anddeterminations based on time intervals, semantic intervals, thresholdsetc.

Once a semantic is inferred the system may use it to trigger commands tothe sensing and control entities. The system may setup time intervals orsemantic intervals when these entities perform specific operations.Sensing and control entities may include I/O devices, locks, switches orany other analog or digital device.

RFID enabled sensors may be configured by the system with semanticinference rules stored in the tag's memory. The tag may use these rulesto infer semantics when the sensing data is read or a measurement isperformed. The system may also store semantics in the RFID sensor memorywhen it reads the sensing data or at any other time.

The user inputs can be used by the semantic engine to learn how tofurther infer other semantics. As explained above, the system mightinfer link semantics or other complex semantics based on user input.

Sometimes the system might require manual inputs from a user. This mayhappen in some instances when the system detects unusual events or anyother time when the system require additional information for semanticinference. As an example, during unloading a vegetable truck in thereceiving area, the system might monitor the unloading of vegetablecases and detect that tagged cases are unloaded at a particularlocation. The system might not know a priori what kind of products arein those cases and it may require an input from the user on the type ofproduct being stacked at that location. Once the input is received, thesystem may infer that the products in that location, or following thelink from the truck unload door to that location, are products of thetype input by the user (for example, tomatoes).

Further, the system might infer a group dependent semantic for thetomatoes cases as being part of the same shipment and even further, linkthose with the truck driver or the employees performing the unloading.Thus, for example, a group semantic is created as a function of thelocation of the goods and/or employees (at the dock), presence at acommon point in time, and optionally an oriented link to arrive at thelocation. Also, other products can be semantically identified based onthe location where they are unloaded or if they follow a particularoriented link. The locations can be close by, on the same path ordifferent paths or any other location that might be seen suitable forthe operation that takes place. Further, the system might create asemantic inference rule that links the tomatoes with the currentunloading location, with the employee performing or coordinating theunloading, truck driver or any other entity involved in the process; bydoing so, next time in similar conditions, when the semantic inferencerules are checked the system will simply assume that the productsstacked at that location are tomatoes; further, the system might usethese semantic chain inputs to infer similar semantics for otherlocations, for other products or players in the semantic field thatmight be, or not, part of the same semantic groups.

As explained above, semantic inference learning was possible afteradditional information has been provided based on the user input. Theadditional information can be provided or extracted from other internalor external sources. For example, instead of requiring a user input thesystem might use a weighting sensor and/or maybe a color and shaperecognition camera to identify the product stacked at a location asbeing of a certain type. Further, it may identify the speed of unloadingand loading for the specific dock door and truck type and categorizethat as possibly another semantic, group semantic and/or semantic groupand feed it back to the semantic chain. As another automated inferenceexample, one or more of the tags in the group may include identificationinformation (for example, identifying the object as a tomato orsomething else), such that the system infers that the other items in thegroup are of the same type and therefore assigns them all to the groupof that identification type.

The learning process and patterns may evolve as more information is fedinto the system.

Similarly with the learning process for tagged items the system maycreate a learning process and/or patterns based on information receivedfrom sensing entities. As such, the system might infer semanticartifacts, improve the semantic chain, improve and develop the learningprocess and patterns based on sensing measurements, possibly, coupledwith other internal and external sources.

As explained throughout the application the system uses a learningprocess to improve the semantic chain and deduct new inferencetechniques and parameters. The system may use in the learning processsemantics and learning patterns from multiple sources whether internalor external.

Localization, path of travel and semantic techniques can also be used todetect illegitimate or counterfeited tags and tag spoofing. Acounterfeited tag tries to copy or imitate a legitimate tag in order tolegitimize the artifacts that it is attached to. A counterfeited tag maybe an exact hardware copy or may be encoded with the same data as thelegitimate tag; additionally, it may communicate with the RFIDinterrogators, readers, or detection and localization units in the sameway as the legitimate tag. Similarly, tag spoofing uses hardware andcommunication artifacts to masquerade as a legitimate tag.

An illegitimate tag definition preferably has a broader meaning in thesense that the legitimacy is based on more general terms than being afake tag or not. Accordingly, the legitimacy of a tag may be based onlocation and semantics. For example a refrigerated item that has beendeemed expired because the measured temperature in its travel path hasbeen too high may be considered illegitimate in certain paths orlocations of the cold supply chain.

While it is hard to detect a counterfeited tag or tag spoofing by asimple detection or interrogation it is much easier to detect a problemif the tag path of the travel is known or inferred a-priori and if theRFID network and/or the tag are encoded with path or semantic routes forthe tag. For example, the path of travel for a tag can bepre-established and be sent to the RFID network through any means ofcommunication to the concentrators, controllers, localization units andRFID readers. The path of travel might include locations, links, andcheckpoints and may be associated with timestamps or time intervals.

A semantic route specifies a collection of semantics and potentialvalidity or synchronization times or time intervals. In one example, thesystem uses semantic routes to validate the legitimacy of a tag. Asemantic route might be stored on the RFID networked system or on thetag itself. A tag or a semantic group may have an associated semanticroute and the system compares the semantics in the semantic route withthe acquired collection of semantics for the tag; if there areinconsistencies with the acquired collection of semantics for a tag andan associated semantic route then the system infers that the tag iscounterfeited or spoofed.

In a semantic group proof, the tag is part of a semantic group and thesystem checks the legitimacy of the tag based on additional evaluationof the semantic group and members of the group. For example, if two tagsfrom the same semantic group are detected in separate locations withinan interval of time when they are expected to travel together in thesemantic field as a group then the system infers that there is apotential legitimacy problem with one of the tags. The semantic groupproof might extend to the whole semantic structure including all thesemantic relationships.

As described in a previous section above there are areas within themonitored environment where items sharing a specific semantic arestored, located or routed. In these semantic zones the items that do nothave the shared semantic can be considered as illegitimate or cantrigger system events while detected in the zone. If environmentalsensors are attached to the tags or are present in the environment, thenthe sensor reported value can be used with sematic group or semanticzones proofing.

In some examples the system uses historical data to determine thelegitimacy of a tag travelling to a certain path on the semantic field.If the historical data pattern does not match the current path of travelthen in one version the system determines that the tag is likely to becounterfeited or a spoofing attempt occurred.

While a tag's path of travel or semantic route checking helps to detecta counterfeited or spoofed tag that is in an out of range location, itdoes not solve the problem of detecting a counterfeited tag that is inthe expected travel path or expected semantic route. Thus, some versionsemploy an additional layer of detecting the counterfeited tags, such asincorporation of challenge-response codes for the tag in question andthen verifying the challenge-response codes at certain locations oraccess points. The codes can be generated based on location, path oftravel, semantics or any other method, whether manual or automatic.

For example a tag's memory might be uploaded with challenge responsepairs that exist or are sent into the RFID network via any means ofcommunications. When the tag arrives at a location in the path of travela reader or a set of readers detects the tag at the location and issuesthe challenge for which the tag sends back the paired response that wasrecorded in memory. The system is thereby able to verify that is alegitimate tag by confirming the accuracy of the paired response.

The tag can also be coded with semantic routes or path codes. Thesemantic routes or path codes can be pre-recorded or created and updatedwhen the tag passes locations, links and checkpoints. The system canoptionally generate these challenge codes to be stored on the tag basedon the path of travel, locations, type of tag, semantic artifacts andgroups or any other methods whether manual or automatic.

For example, as a tag passes through the path of travel its memory maybe updated with information about location, link, inferred semantics orsemantic groups. In order to verify the authenticity the system issuesat least one challenge that is based on a location, link or semanticsupposedly acquired by the tag including those related with semanticgroups. If the tag returns a valid code or result then the system canidentify the tag as authentic.

Additionally, while a tag is at a particular location the system mightupdate and encode a tag with environmental conditions or sensormeasurements. At a later time the system can optionally query the tagsuch that the response of the tag to a challenge would include thoseconditions. For example, if a tag passes through a location or linkwhich is associated with a humidity of 33%, the system can encode thatvalue into the tag's memory. Upon a later challenge of the tag by thesystem, the tag would return the response of 33% in order to confirmauthenticity. If the tag contains a humidity sensor then the humidityvalue may be recorded by the tag itself when requested by the system orat any other time.

It might even happen that the legitimate tag and a counterfeited tag aredetected and localized at the same time; however, in this case it iseasy to deduce that one of the tags is illegitimate.

In certain conditions a tag can be disabled or enabled based on aninferred semantic or other condition such as the tag passing a certainlink or path. For example once a retail customer purchases a tagged itemand the tag for the item is detected as following the exit path the tagmay be disabled or killed by the RF readers detecting the tag. Further,if the customer returns the item to the store the tag may be enabledagain when following the return path.

In the same way RF readers or interrogators may change the tagoperational state based on an assigned semantic. A tag's operationalstate changes can include disablement, enablement, tag killing or anyother technique that would alter the visibility of the tag in the RF andsemantic field. The tag operational status change can optionally requirea password that was previously encoded in the tag for read/writeprotection.

The activation status of a tag specifies whether the tag is active orinactive in the semantic system. This status is assigned to the tag inthe semantic system and it might be or not related to the tag'soperational status. In some versions, particular locations may beassigned for changing the activation status or operational status ofgroups of tags, such as by automatically changing the status when thetag is present at the location.

Additionally, a group of tags in a particular location may be assigned agroup semantic based on their activation status or operational status inthe semantic field. For example tagged items that need to be disabledcan be stacked in a particular location and be disabled based onlocation. The disablement can occur automatically, at certain times, atsemantic intervals or when an operator issues a specific command at thatlocation.

In another example a new batch of tagged items of the same type can bestacked at a particular location and be made active as part of the samesemantic group.

Further, the system might use a reference tag for changing theactivation status of a group or inferring a group semantic. In this casethe reference tag activation status and its assigned semantics may beused for further group semantic inference, by determining the status ofa particular tag, using it as a reference tag, and inferring its statusto the rest of the tags in the group.

In another example for a fast tagging application, a group of taggedobjects such as a collection of a plurality of magazines all having acommon date are stacked at a single location. The information about thestacked items can be entered manually into the system or can be inferredbased on the information known about at least one magazine in the stack.

The semantic inference and activation status changes can occurautomatically, at certain times or semantic intervals, can be triggeredby sensing events or when an operator issues a specific command.

If the system detects a counterfeited tag or a tag spoofing attempt itcan block the access of the tag to a location, send an alarm, mark othertag as illegitimate, counterfeited or spoofed, create new semanticgroups and semantic artifacts and/or infer new semantics.

Semantic routes and semantic profiles can be established based onhistorical data. A rating provided a-priori for a tagged item can beused to determine at a later time the optimal location and/or path forthe same item or an item of the same class. For example if a product hasbeen rated high by a consumer then the paths followed by the affixedtags within the supply chain are identified, including the measuredenvironmental factors in certain paths' locations and used for furtherroutes that matches the environmental factors, paths or semantic routeswithin the supply chain. Additionally, while the same or a similarproduct moves through the path, the system can receive input fromenvironmental sensors and issue commands to adjust the environment tothe optimal conditions for the travelling item. For example, if atemperature or humidity level is too low, the computer system monitoringthe tagged item and in communication with a thermostat or similarcontroller can issue an instruction causing the temperature or humiditylevel to raise, for example by turning on an air conditioning unit.

When in a particular location of the supply chain the system mightsuggest a specific location, path or storage for a product based on thehistorical environmental sensor data and a provided rating.

A semantic trail which includes a sequence of semantics acquired by atag in the semantic field might be recorded and used later to determinea semantic route for items of the same class, semantic group andcategory. A rating can also be used to determine the best semantic routeto follow. More generally, semantic routing includes the routing andstorage of tagged artifacts based on previous and current semanticobservations.

In another example when a user experience is assigned a rating, the tagof the user is recorded together with its environmental, location andsemantic factors. Later, the recorded data is used to process the mostlikely location or path of comfort for the user. As such, semanticprofiles are created for tagged artifacts that can be associated to asingle tag or a tagged semantic group.

The system may infer semantic routes and profiles based on the semanticchain observations. Further, using statistical and learning techniquesthe system may determine semantic routes and profiles based on anypreviously acquired data.

The system time management capabilities include the recording andtracking of the time a tag consumed on different activities based onsemantics. The semantic might be represented as a string, and caninclude special characters or strings which are interpreted in aspecific way. For example a semantic IN@LOADING assigned to a tag meansthat the tagged article is in a LOADING mode while the semanticOUT@LOADING specify that the article is out of LOADING mode. Theinterval of time between an in and out semantic event is recorded forthe particular semantic, in this case LOADING. Further the system canpost or transmit semantic events on social networking media sites. Forexample a semantic of #GREEN_AUTOS_ON_ROUTE_66 might be posted to asocial thread every time an automobile passes a link on route 66 and itspollution parameters are below a certain level. The posting can alsoinclude additional identification information, and can be rated and usedto recalculate the semantic ratings and weights.

The RFID tags as described above may take any form, but they commonlyinclude at least one transmitting and/or receiving logic and antenna.The tags may include an energy harvesting component, an energy sourceand/or storage components. As some examples, the energy source mightinclude a super-capacitor, a battery, a solar cell or any other energyharvesting and/or storage component. In energy harvesting mode the tagscollect and eventually store environmental energy that can be used laterfor communication purposes. In some instances the energy can be used byan internal sensing component. The energy harvesting component can bealso fed at times by a RF transmitter which may be part of an RFIDreader, tag or any other charging wireless unit.

The harvesting of the energy can be done using the communication antennaor a separate antenna used for this particular purpose. The antennas canuse metamaterials for miniaturization, optimal energy transfer andcommunication. A metamaterial antenna might reduce loses from the energysource due to its capabilities of focusing and guiding the receivingelectromagnetic energy.

During a localization or semantic cycle the tags that receive RF signalsgenerated by readers can use the RF signal energy to recharge thestorage unit. When in a communication cycle the tags may be instructedto respond/adjust using certain transmit power level, antennapolarization, gain, radiation pattern and orientation. If the tagantenna includes patterns of radiating elements then the tag may beinstructed to activate only specific radiating elements forcommunication and localization optimization and/or tune specificradiating elements with specific parameters. This may save energy andreduce unnecessary interference.

When in energy harvesting mode the tags can orient and tune theparameters of their energy harvesting antenna dynamically to the energysource, based on parameters measured at the antenna elements. Themeasured parameters can include angle of arrival, phase, signalstrength, signal polarization and others. The same dynamic antennaorientation approach might work for any transmit or receive cycle. Insome versions, a tag can tune and setup its transmit and receiveparameters based on received or determined semantics. The localizationand semantic techniques can likewise be used in various environments andsetups using various RF protocol stacks, communication, positioning,localization and identification.

RFID readers can be replaced by RFID tags in broadcast or beacon modethat actively broadcast or advertise information, including their ownidentifiers, on demand or at intervals of time. The RFID beacon tags maybe comprised from at least one RF transmitter and antenna which may havethe capability of changing its operational parameters including RFtransmit power, antenna gain, antenna radiation pattern, antennaorientation, antenna polarization and RF transmit frequency. In general,the use of the term “RFID tag” includes RFID beacon tags or RFID tagsoperable in a beacon mode. Similarly, in general the term RFID tagreader includes receivers configured to receive communications from RFIDbeacon tags.

The RFID beacon tags may be setup to transmit in the field of view usingvarious settings at different times. The receivers of the RF beaconsignals can use the received signal and/or convey parameters andmeasured attributes of the received signal to a localization computingentity that uses localization techniques and algorithms to estimate thereceiver position. Similarly, an RFID master tag may also include beaconcapabilities in addition to its other capabilities.

An RFID beacon tag may transmit with advertisements besides its ownidentifier, the settings, or an identifier of the settings. As such, thesignal from the RFID beacon tags can carry data that includes the tag orbeacon identifier, the transmit settings and any other information thatmay be used for profiling and/or localization.

A localization sequence can entail having a tag receiving a beaconsignal that encodes the beacon identifier together with the beaconsettings parameters. The tag conveys that information together with itsown identifier and received signal attributes to the localization unitfor further processing. The localization unit may aggregate the datafrom the tags and determine the location and/or semantics. Tag to tagcommunication including signal and semantic beaconing can optionallyoccur for improved localization and semantic inference.

When a tag is switched to semantic identification mode it startsbroadcasting a signal with acquired or inferred semantic informationthat can be used by other tags to derive additional semantics based onthe stored semantic rules or to identify themselves as part of asemantic group.

The tags can optionally encode in the internal memory semantic rulesthat can be used to derive additional semantics based on the datareceived from the beacon tags. The semantics can be stored internallyand used for further processing, can be transmitted to other tags or toa localization or semantic unit.

While the preferred embodiment of the invention has been illustrated anddescribed, as noted above, many changes can be made without departingfrom the spirit and scope of the invention. For example, functionsperformed by the computer 36 may be performed in a distributed manner inother embodiments, making use of various combinations of computersembedded within the concentrators and the RFID readers themselves.Further, the above description relates to a variety of hardware andsoftware functions and components to accomplish those functions. In manycases, components that are described as hardware in a preferredembodiment may be replaced by software capable of performing thefunction of the hardware, and vice versa. Accordingly, the scope of theinvention is not limited by the disclosure of the preferred embodiment.Instead, the invention should be determined entirely by reference to theclaims that follow.

I claim:
 1. A monitoring system comprising: a first sensor; a secondsensor, at least one of the first sensor and the second sensor being acamera; a computer system coupled with the first sensor and the secondsensor; a memory associated with the computer system, the memory storinga plurality of object types and associations between objects; thecomputer system being configured to infer a group association between afirst object and a second object by: receiving an input from at leastone of the first sensor and the second sensor; inferring an interactionat a monitored location at a first time between the first object and thesecond object; and inferring a possession of the second object by thefirst object based on the received input, the inferred interaction, andthe plurality of stored object types; and terminating the inferred groupassociation between the first object and the second object based on asecond inference at a second time.
 2. The monitoring system of claim 1,wherein the group association between the first object and the secondobject is further inferred based on a disappearance of the first objectand the second object at the monitored location within an interval oftime.
 3. The monitoring system of claim 1, wherein at least one of thefirst and second object is a person.
 4. The monitoring system of claim1, wherein at least one of the first object and second object is avehicle.
 5. The monitoring system of claim 1, wherein the system isfurther configured to determine that at least one of the first object orthe second object is localized in an illegitimate location semantic zonefor the object, and to generate a notification event based on thedetermination.
 6. The monitoring system of claim 1, wherein the systemis further configured to determine that the inferred association betweenthe first object and the second object is localized in an illegitimatelocation semantic zone and to generate an event based on thedetermination.
 7. The monitoring system of claim 1, wherein the memoryfurther stores a plurality of endpoints and at least one semanticattribute associated with at least one endpoint from among the pluralityof endpoints, and further wherein the system is configured to associatethe semantic attribute to the inferred group association.
 8. Themonitoring system of claim 7, wherein the system further stores aplurality of access control rules and further wherein at least oneaccess control rule from among the plurality of access control rules isassociated with the semantic attribute associated to the inferred groupassociation.
 9. The monitoring system of claim 8, wherein the inferredgroup association is further associated with an access control action.10. The monitoring system of claim 7, wherein the associated semanticattribute comprises a semantic weight.
 11. The monitoring system ofclaim 7, wherein the group association between the first object and thesecond object is invalidated based on the semantic attribute.
 12. Themonitoring system of claim 11, wherein the system is configured toinvalidate the sematic attribute after an interval of time.
 13. Themonitoring system of claim 1, wherein the group association is inferredbased on a time management rule.
 14. The monitoring system of claim 7,wherein the semantic attribute is associated with a time managementrule.
 15. The monitoring system of claim 13, wherein the time managementrule is based on a semantic interval.
 16. The monitoring system of claim13, wherein the time management rule is associated with a weightingrule.
 17. The monitoring system of claim 8, wherein at least one of theplurality of access control rules is based on a semantic interval. 18.The monitoring system of claim 11, further wherein the group dependentsemantic is inferred based on an input from a user.
 19. The monitoringsystem of claim 9, wherein the system is configured to control a devicebased on the access control action.
 20. The monitoring system of claim11, wherein the system is configured to control at least one of thefirst sensor or the second sensor based on the inferred semanticattribute.
 21. The monitoring system of claim 8, wherein at least one ofthe plurality of the access control rules is associated with at least aweighting rule.