Object control and tracking system with zonal transition detection

ABSTRACT

An improved object tracking and control system is provided and is particularly suited to implementation at an automobile dealership. The system includes a Key Track system adapted to control access to and log the check out and check in of keys to vehicles on the lot. RFID tags are provided on the vehicles and tag readers are embedded at selected locations within the dealership parking lot to detect movement of vehicles. In one embodiment, the lot is subdivided into zones and the readers are located at transition regions between the zones. Information about the check out and check in of keys from the Key Track system is combined and integrated with information about the movement of vehicles about the lot to reach conclusions regarding authorized movement and to provide useful information to dealership management.

REFERENCE TO RELATED APPLICATIONS

[0001] This application claims the benefit of the filing date of priorfiled U.S. Provisional Patent Application Serial No. 60/099,954, filedSep. 11, 1998 (37 CRF 1.78(a)(4)).

TECHNICAL FIELD

[0002] This invention relates generally to object tracking and controlsystems and, in a preferred embodiment, to vehicle key tracking systemsand enhancements usable with such systems for monitoring and trackingthe movement and use of vehicles accessed by such keys.

BACKGROUND OF THE INVENTION

[0003] Many objects have intrinsic value while other objects have valuebecause they provide access to intrinsically valuable objects. Forinstance, jewelry, coins, automobiles, sensitive business files, andsimilar objects have intrinsic value. Accordingly, these items generallyare secured against theft or misuse either by locking them in vaults orstorage cabinets in the case of smaller objects, or by providing themwith their own locking and security systems such as, for example, locksand security systems on automobiles. Keys to automobiles, storagecabinets, file rooms, or apartment complexes are examples of objectsthat have value because they provide access to intrinsically valuableobjects.

[0004] The collection of keys to automobiles at an automobile dealershiphave substantial value because of the number of vehicles to which theyprovide access. Accordingly, such collections of keys have traditionallybeen either locked up or tracked in some way, not only to prevent theftof vehicles but also to allow sales and maintenance personnel to locatethe keys to a vehicle quickly when the vehicle needs to be shown, testdriven, or provided with maintenance. Tracking and control of access tothese keys is therefore of critical importance to an automobiledealership.

[0005] In the past, a variety of systems have been implemented to trackand control access to keys to vehicles in an automobile dealership. Forexample, peg boards have been used to keep track of keys assalespersons, maintenance personnel, and others remove keys for accessto vehicles. Generally, sign-out sheets have been employed to log thecheck-in and check-out of such keys. Obviously, such a manual system oftracking has numerous shortcomings due in large part to the very realpotential of human error and forgetfulness in carrying out the sign-inand sign-out procedures.

[0006] More recently, automated computer controlled key tracking systemshave been implemented for tracking vehicle keys at automobiledealerships and other types of keys such as pass keys to the apartmentsof apartment complexes. One such system particularly applicable to thepresent invention and used widely at automobile dealerships is the keytracking system disclosed and claimed in my U.S. Pat. No. 5,801,628, thedisclosure of which is hereby incorporated fully by reference. In thissystem, referred to herein as the “Key Track” system, keys to a vehicleare attached with a rivet or the like to a thin plastic key tag having adepending tongue. The tongue carries a small button-shaped electronictouch memory device, which stores a unique code. The tongues of the keytags are configured to be insertable in an array of slots formed in atop panel within a storage drawer. A printed circuit backplane isdisposed beneath the array of slots and is provided with a plurality ofpairs of upstanding metal contacts, each pair of contacts being alignedwith a corresponding one of the slots. When the tongue of a key tag isinserted in a selected one of the slots, its touch memory device isengaged by the corresponding pair of contacts. The Key Track system mayalternatively include radio frequency or RF tags rather than touchmemory devices. In such an embodiment, the codes stored on the tags arecommunicated to RF sensors on the backplane, eliminating the need forphysical contacts.

[0007] A computer based controller is electronically coupled through acommunications buss such as a data matrix to the contacts or sensors onthe backplane and periodically polls each pair of contacts or sensor,preferably several times per second, to determine the presence orabsence of a touch memory device or RF tag and thus which slots in thestorage drawer contain key tags and which do not. When a slot contains akey tag, the touch memory device of the tag is read to determine itsunique code, from which the identity of the particular key on the tagcan be determined through a table lookup. In this way, the absence orpresence and location within the storage drawer of the key tags andtheir associated keys can be noted by the controller each time the arrayof contacts are polled. If a tag present in a slot on a prior polling isabsent on a subsequent polling, then the controller notes that the tagand its key have been removed from the storage drawer. Conversely, if akey tag is detected in a previously empty slot, the controller notesthat the tag and its key have been replaced in the storage drawer andalso notes the location of the slot in which the tag resides. Theremoval and replacement or “check out” and “check in” of keys at thestorage location is therefore continuously monitored.

[0008] An access feature of the Key Track system requires an authorizeduser such a salesperson needing a particular key to enter an ID codeinto the controller to unlock and access the storage drawer. Thecontroller then informs the user of the location within the drawer ofthe key tag bearing the key, or, if the key has been checked out byanother, so informs the user. When the history of check out and check inof key tags and their keys is combined with other available information,such as the time at which tags are removed and replaced and theidentities of the persons who accessed the drawer and times of access,access to the keys in the drawer can be controlled and monitored,detailed tracking logs can be created, and queries can be made of thecontroller at any time to ascertain which keys are checked out and theidentities of individuals who checked them out. This system greatlydecreases instances of lost or hoarded keys, reduces the time requiredto find keys, and generally provides automatic tracking and control ofthe keys, and thus, to some extent, tracks the vehicles to which thekeys provide access.

[0009] The Key Track system described above has proven extremelyvaluable in the tracking and control of keys. However, the trackinginformation available to the system is limited to the time that each keyis checked out, the time it is checked back in, and the identity of theindividual who accessed the key. Information about the disposition ofthe key in the interim between check out and check in, and moreimportantly the disposition and movements of the vehicle or object towhich the key provides access have not been available to the Key Tracksystem. Nevertheless, such information, if available, could be valuableto automobile dealerships for a variety of purposes. For example, suchinformation, when coupled and integrated with already availableinformation from the basic Key Track system, can enable compilation ofstatistics regarding the average lengths of test drives, which salespersonnel take customers for test drives most often, and which testdrives results in sales. In a broader sense, the ability to monitor themovement of vehicles accessed by checked out keys can allow dealershipsto locate vehicles on a lot simply by issuing a query to the controller,to follow vehicle movements between designated areas or “zones” of thelot, to confirm that when a vehicle leaves the lot, its key has beenchecked out by a person authorized to take the vehicle, and to detecttheft by sensing when a vehicle attempts to leave the lot without itskey having been properly checked out. In a similar environment, a rentalcar lot, the ability to monitor the disposition of keys and movement ofvehicles can prevent vehicles from leaving the lot without having beenproperly leased, allows rental vehicles to be located accurately andquickly, and deters theft. In all these situations there is a stronginterest in tracking vehicle movements about a lot between the time whenthe keys to the vehicle are checked out and when they are checked backin and in determining when vehicles leave and when they return to thelot.

[0010] Thus, a need exists for a method and apparatus and an enhancementto the basic Key Track system to enable the system to track not only thecheck out and check in of keys, but also the interim movements ofvehicles to which the keys provide access. It is to the provision ofsuch a method and apparatus that the present invention is primarilydirected.

SUMMARY OF THE INVENTION

[0011] Briefly and broadly described, the present invention comprises asystem for tracking the movement of objects in a predefined area. Thesystem includes a central computer or microprocessor based controllerand a readable tag on each of the objects to be tracked. Preferably, thereadable tags are radio frequency (RF) tags, which store unique codesidentifying their corresponding objects and transmit their codes whenappropriately activated. Readers, which preferably comprise RF sensorsor antennas connected to local controller/receivers, are positioned atpreselected locations within the predefined area for reading the codesof the readable tags as objects bearing the tags move past the readers.The preselected locations can correspond to transition regions betweendesignated zones of the area within which the objects are to be tracked.Communication links connect the local controllers to the centralcontroller. The central controller is programmed to collect data fromthe local controllers and to issue instructions to the local controllersfor monitoring, tracking, and controlling the movement of objects withinthe predefined area.

[0012] A more specific and preferred embodiment of the invention, andthe embodiment that forms the context within which the invention isdescribed herein and that is considered the best mode of practicing theinvention, comprises enhancements and improvements to the Key Tracksystem disclosed in my U.S. Pat. No. 5,801,628 to adapt the system foruse in tracking and controlling the movement of vehicles at anautomobile dealership. It should be understood, however, that eventhough the invention is described in the context of such an embodimentfor clarity, many other applications and embodiments, some of which arediscussed in more detail below, are possible and all such applicationsand embodiments should be considered to be within the scope of theinvention.

[0013] In the preferred embodiment, vehicles at a dealership are eachprovided with one or more RF tags and the dealership lot is organizedinto a number of logical zones, such as the service area, fueling area,areas outside lot exits, and the like. Tag readers are located at thetransition regions between the zones and each tag reader includes alocal controller and one or more antennas or other appropriate sensors,preferably embedded within the pavement at the transition regions. Thelocal controllers are connected through communications links to thecentral Key Track system controller, which also monitors and controlsaccess to keys to the vehicles as previously described. Thecommunications links can be one of many possible types of data linksincluding, for example, RS232 lines, ethernet links, or parallel orserial communications busses.

[0014] As vehicles are moved from one zone of the lot to another, theypass the tag readers at the transition regions, where the RF tags of thevehicles are activated to transmit their unique codes, which arereceived by the local controllers and conveyed to the centralcontroller. The central controller can thus determine the movement ofeach vehicle about the lot as well as movement of vehicles off of andonto the lot through the lot exit. This information is combined withinformation maintained by the Key Track system about the disposition ofthe keys to each vehicle, such as the identity of the person who checkedout the keys, to provide substantially improved and enhanced monitoringand control of vehicle movement. For example, if a vehicle approachesthe exit to leave the lot, the central controller is able to determinewhether the individual who checked out the keys has authority to removethe vehicle from the lot. If so, a gate can be opened and if notappropriate alarms can be generated. Further, and even moresignificantly, the system provides automatic day time security againsttheft without the need for gates or other physical barriers. Morespecifically, if a vehicle is detected by a reader and its key has notbeen checked out, then a theft is indicated and appropriate alarms orremedial actions can be taken. In addition to authorizing vehiclemovement and providing security, useful data such as the length of testdrives, maintenance histories, fuel usage, and the like becomes readilyavailable to the dealership through the present invention and can beused to improve procedures and ultimately provide better service to thecustomer.

[0015] Many other embodiments and implementations of the presentinvention are possible, both within the context of an automobiledealership and otherwise. For example, the invention can be implementedwith advantageous results in an automobile rental lot or any place wherevehicles or, indeed, any mobile objects need to be tracked. Placement oftwo reader antennas in close proximity and/or two RF tags on a vehicleenhances the ability to determine the transition of a vehicle from onezone to another and provides built in system redundancies. If desired,the monitored zones within a parking lot can be as small as one parkingspace so that the precise location of each vehicle in the lot can bedetermined.

[0016] Other applications and embodiments of the invention includecontrolling access to and tracking the movement of sensitive orconfidential files within a file room, tracking the check out andmovement of expensive tools at a work site, the tracking and control ofaccess to evidence in a court's evidence room, and other applicationswhere tracking the movement of and controlling access to objects isdesirable.

[0017] Thus, a method and system is now provided that enhances the KeyTrack system by adding the capability not only to log check out andcheck in of keys, but also to monitor and collect information about andauthorize the movement of vehicles corresponding to the keys. Thecollected information is transmitted to the Key Track controller whereit is combined and strategically integrated with existing informationabout the disposition of keys to provide valuable reports and to controlingress and egress to the lot or between various zones of the lot. Thecombined information can be used for other purposes, such as schedulingand tracking maintenance schedules where vehicles naturally move fromone zone to the next as part of the maintenance process. In a broadersense, monitoring and control of access to and movement of many types ofportable objects is possible with this invention. These and otherapplications, features, objects, and advantages of the invention willbecome more apparent upon review of the detailed description set forthbelow taken in conjunction with the accompanying drawing figures, whichare briefly described as follows.

BRIEF DESCRIPTION OF THE DRAWINGS

[0018]FIG. 1 is a simplified diagramatic sketch of an automotivedealership subdivided into zones and illustrating the present inventionin a preferred embodiment thereof.

[0019]FIG. 2 is a perspective illustration of a zonal transition regionwithin an automotive dealership showing the embedded antennae and localcontroller of the tag reader.

[0020]FIG. 3 is a perspective view illustrating application of thepresent invention to control operation of a fueling station in anautomotive dealership.

[0021]FIG. 4 is a perspective view illustrating application of thepresent invention to monitor and control ingress and egress at anautomotive dealership.

[0022]FIG. 5 is a perspective view illustrating the approach of avehicle equipped with RF tags at a transition region between zones of anautomobile dealership.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

[0023] As mentioned above, the invention is described herein within thecontext of tracking movements of vehicles within an automobiledealership and specifically the strategic integration of such trackingwith an existing Key Track system, which is described in detail in theincorporated disclosure of U.S. Pat. No. 5,801,628. Many otherapplications and embodiments are possible and some are described in moredetail below. Further, the system and method of this invention makes useof a variety of electronic components such as RF tags and RF tagreaders. In general, the construction and operation of such componentsis beyond the scope of the present invention and will not be describedin detail. However, such components are commercially available and theiruse and electronic interconnections is generally known to those of skillin the art. For example, Radio Frequency Identification (RFID) products,including RF tags and readers are available from Texas Instruments,Inc., which markets both paper tags under the trade name “Tagit” andglass capsule tags. SCS, Inc. markets RFID products under various tradenames including DuraLabel and Trolleyponder and licenses the technologyof these devices. Other companies including Phillips and AEG also offerRFID products. Many of these commercially available products aresuitable for application in the present invention.

[0024] While a detailed description of RFID hardware and techniques isnot necessary, a general overview is helpful. Most commerciallyavailable RF tags and reading systems rely on low frequency magneticfield coupling for communication. RF tag readers in many instancesinclude a multi turn loop antenna with a large number of loops tomaximize the magnitude of the magnetic flux generated by the antenna andthus its range. Other types of antennae are possible includingcapacitively coupled antennas, dipole antennas, and the like. Many RFtags are passive devices that store a unique code and are powered bycapturing a fraction of the energy radiated by the reader's antenna whenthe tag is in the vicinity of the antenna. More specifically, RF tagstypically consist of a small antenna coupled to an integrated circuitchip, which includes a memory for storing an ID code and perhaps otherinformation and controlling mechanisms for transmitting the code to bereceived by the reader's antenna. These passive tags include powerregulation hardware to capture a fraction of the incident power from thereader's antenna and to charge a capacitor, which acts as a localbattery. The power-on/reset circuitry causes the integrated circuit toactivate and begin operation when operational power levels aresufficient.

[0025] Once energized and activated, the RF tag communicates with thereader by modulating the induced radio frequency currents with theunique ID code. The reader, in turn, includes demodulation circuitry,which interprets the received modulations to extract the code. In thisway, the unique code stored in the RF tag is transmitted to the reader.The reader can then convey this code through an appropriatecommunications link (for example a parallel or serial communicationsbuss, RS 232 link, ethernet link, wireless communications link, and thelike) to a remote controller or computer. Active RF tags are alsoavailable commercially as alternatives to passive tags. Generally, thesetags have an on board power source and many are able to receive andstore data as well as to communicate data to a reader, as do passivetags. Typical frequencies of operation of RF tags range from as low as125 KHz to 13.56 MHz and to as high as 2.4 GHz, although otherfrequencies are possible. It should be noted that whereas the term“radio frequency” is considered by some to include only the portion ofthe electromagnetic spectrum between 9000 Hz and 3000 GHz, this term, asused and intended in the present disclosure, is meant to include anyappropriate portion of the electromagnetic spectrum whether within oroutside this range.

[0026] With this background in mind, reference will now be made in moredetail to the drawings, in which like numerals refer to like partsthroughout the several views. FIG. 1 is a diagramatical plan view of anautomotive dealership 11 having a showroom 12 surrounded by a paved lot13. The lot 13 is partitioned into a number of discrete areas referredto herein as zones with each zone representing a region of the lot wherevehicles may be located from time to time. Zone 1, for example may be aparking area of the lot where vehicles are displayed for sale. Zone 2may be an additional parking area or perhaps a fueling or washing areawhile Zone 3 may be a service staging area and Zone 4 a servicefacility. Obviously, a lot may be subdivided into more or fewer zonesthan those illustrated in FIG. 1 and the zones may correspond to anynumber of types of regions where vehicles may be located. Also, Zone 5may be considered to be the region outside the lot and off the premisesof the dealership. The various zones of the lot 13 are separated bytransition regions, designated by the capital letter T in FIG. 1.

[0027] A Key Track system 21 as disclosed in U.S. Pat. No. 5,801,628 islocated in the showroom 12 of the dealership 11. In general, the KeyTrack system comprises one or more storage drawers 22 for storing keysand from which keys may be checked out and checked back in. A computeror microprocessor based central controller 23 is coupled to the storagedrawer 22 as described in said patent. In general, the controller 23receives requests from users for keys, opens the drawer 22 if therequest is from an authorized user, and logs when keys are removed fromand returned to the storage drawer.

[0028] An RF tag reader is located at each transition region Tseparating the various zones of the lot. For example, RF tag reader 28is located in the transition region T from Zone 2 to Zone 1, reader 33is located in the transition region T from Zone 1 to Zone 2, reader 38is located in the transition region between Zones 2 and 3, Reader 43 islocated in the transition region between Zones 3 and 4, and reader 49 islocated in the transition region, which is the lot exit, between Zones 1and 5, outside the lot. RF tag reader 28 comprises a pair of loopantennas 29 and 31 respectively, which preferably are buried in thepavement of the lot in the transition region T. Alternatively, theantennas can be located in vertical upstanding pylons or in an overheadstructure, but burial beneath the pavement is preferred and isconsidered to be the best mode of practicing the invention because theantenna is more secure, more tamper resistant, and hidden from view.

[0029] The loop antennas 29 and 31 are connected to a local controller32, which is configured to energize the antennas, to transmit andreceive modulated radio frequency signals therefrom, and to demodulatereceived signals to extract data, such as identifying codes, received bythe antennas. Similarly, reader 33 includes buried loop antennas 34 and36 connected to local controller 37, reader 38 includes buried loopantennas 39 and 41 connected to a local controller 42, reader 43includes loop antennas 44 and 46 connected to local controller 47, andreader 48 includes buried loop antennas 49 and 51 connected to localcontroller 52.

[0030] The local controllers 32, 37, 42, 47, and 52 are electronicallycoupled through appropriate communications links, generally indicated bydashed lines and the reference numeral 56, to the central controller 23of the Key Track system 21. As mentioned above, the communications linkscan be any of a number of connections appropriate for bi-directionalcommunication between the local controllers and the central controller23. Data transmission links, protocols, and techniques are well know tothose of skill in the art and need not be described in detail here. Amore detailed description of one type of data transmission techniquethat may be applicable to this invention is disclosed in theincorporated disclosure of U.S. Pat. No. 5,801,628. By means of thecommunications links 56, the various local controllers are able totransmit data and information to the central controller 23 and thecentral controller 23 can transmit data and information to the localcontrollers.

[0031] A vehicle, generally indicated at 24, is shown on the lot 13 andis arbitrarily located in Zone 1 of the lot. While only one vehicle isillustrated in FIG. 1 for clarity, it will be understood that adealership may house dozens or hundreds of vehicles and that the presentinvention applies equally to large numbers of vehicles on the lot. Thevehicle 24 is provided with one or more, and preferably a pair, of RFtags referred to with the reference numerals 26 and 27 in FIG. 1. RF tag26 is attached to the front of the vehicle while RF tag 27 is attachedto the rear of the vehicle. Several physical locations for attaching theRF tags are envisioned. In general, locations that offer easyinstallation of tags, that are not obvious to the casual viewer, andthat make it difficult to remove the tags are desirable. Potentiallocations include on plastic wheel wells inside the engine compartment,on fiberglass bumpers or other non-metal body parts, or embedded withinrubber tires. In general, RF tags need to be placed on non-metallicsurfaces; however, at least one manufacturer of RF tags reports tagfunctionality in close proximity to metal surfaces such as steelI-beams.

[0032] The system illustrated in FIG. 1 may be configured to carry outthe method of the present invention, in one embodiment thereof, asdescribed below. It should be understood that while each transitionregion T in FIG. 1 is illustrated with a pair of buried antennas and thevehicle is illustrated with a pair of RF tags, the invention alsocontemplates the use of a single antenna at each transition zone and/ora single RF tag on each vehicle or any combination thereof. Thesevarious configurations are described in more detail below.

[0033] When a salesperson or other authorized user desires to access avehicle on the lot for purposes, for example, of a test drive,maintenance, cleaning, etc., the Key Track system 21 is used asdescribed in U.S. Pat. No. 5,801,628 to retrieve the key to the vehicle.In general, the user enters his or her identification number into thecentral controller 23 and identifies the vehicle for which access isdesired. If the user is authorized to have access to the vehicle, theKey Track system unlocks the storage drawer 22 and indicates to the userwhich slot within the drawer the key is located. The user then takes thekey, whereupon the central controller 21 notes the time the key wastaken and the identity of the user who took it.

[0034] The user then uses the key to access the vehicle 24. As thevehicle is driven about or off of the lot 13, the readers in the varioustransition regions detect movement of the vehicle past each transitionregion by receiving the unique code of the vehicle from the RF tag ortags 26 and 27 on the vehicle. This information is transmitted via thecommunications links 56 back to the central controller 21. The centralcontroller may use the information to make a variety of decisions eachtime movement of the vehicle past a transition zone is detected. Forexample, if the user is a member of the maintenance crew, that user maybe authorized to move the vehicle only within the bounds of the lot 13and into Zone 4 for maintenance. In this event, if the centralcontroller receives the vehicles identification code from localcontroller 52 at the exit portal 50, a decision may be made that theuser who checked out the key to the vehicle is not authorized to removethe vehicle from the lot. The central controller may then generateappropriate alarms and/or send instructions back to the local controller52 via the communications link 56 instructing it not to open the exitgate. In this way, users not authorized to remove vehicles from the lotare prevented from doing so. The system also is uniquely suited toprovide automatic security without gates. For example, if a vehicle isdetected approaching an exit and the Key Track system determines thatthe key to the vehicle has not been checked out of the Key Track system,then a possible theft can be considered to be in progress and alarms canbe sounded, a signal can be sent to the RF tag on the vehicle to disablethe vehicle, etc. Thus, theft of vehicles on the lot is virtuallyeliminated.

[0035] If the user stays within the lot, the central controller receivesdata from the local controllers as the vehicle passes each transitionzone. The central controller can then create logs of vehicle movementfrom zone to zone, locate the vehicle in a particular zone if itswhereabouts in desired, and create reports useful to the dealership suchas, for example, maintenance schedules, times required for maintenance,etc. When the user finishes with the vehicle, the key is returned to theKey Track system 21, which notes that the key has been checked back inand its location within the storage drawer.

[0036] In another example, a salesperson may retrieve a key from the KeyTrack system to access a vehicle for a test drive. Since this user isauthorized to remove the vehicle from the lot, detection of the vehicleapproaching the exit portal 50 will result in an instruction from thecentral controller to open the gate to allow the vehicle to be removedfrom the lot. If there is no gate at the exit, which usually is thecase, the vehicle will simply be allowed to exit without an alarm beinggenerated. When the vehicle returns, it is again detected entering theexit portal and this information is transmitted via the communicationslink 56 to the central controller 23. From information such as this, thecentral controller can track the whereabouts of the vehicle, compileuseful reports regarding, for example, average lengths of test drivesfor each salesperson, ratios of sales to number of test drives forsalespersons, and the like, and provide security against unauthorizeduse or theft.

[0037] Some specific examples of applications of the present inventionin the context of an automotive dealership will be described in moredetail with reference to FIGS. 2 through 5. In general, however, it willbe seen that the method and system of this invention allows tracking notonly of the check out and check in of keys to vehicles, but also of themovement of vehicles about and off of the lot. A substantially enhancedlevel of tracking, control, and security is therefore possible. The zonein which each vehicle resides on the lot is known by the centralcontroller at all times and this information can be conveyed to a userwhen a key is checked out so that the vehicle can be located quickly onthe lot.

[0038] Further, while the zonal transition approach can be applied on amacro scale as indicated in FIG. 1 wherein several vehicles can belocated in a zone, it also can be applied on a micro scale or acombination of macro and micro scales if desired. In a microconfiguration of the invention, zones can be defined such that each zonecan contain only one vehicle. For example, micro zones might be definedas individual parking spaces on the dealership lot with each parkingspace being provided with its own RF tag reader. The readers at eachmicro zone are be in continuous communication with vehicles located inthe various parking spaces and transmit this information to the centralcontroller. In this way, the precise location of vehicles can bedetermined as well as detailed logs of when vehicles are removed fromparking spaces, when and in which parking space they are returned, andtheir movements about or off of the lot in the interim. In this regard,a micro zonal configuration of the invention is in some respects anextension of the Key Track system itself wherein the objects beingtracked are keys rather than vehicles and each micro zone corresponds toa slot in the storage drawer. Any combination of micro and macro zonescan be established.

[0039] The antennae, sometimes called the sensors, of the RF readersmost preferably are controlled by their respective local controllers,which also may be embedded or buried beneath the surface, instead ofbeing connected directly through a “dumb” local interface to the centralcontroller. The control functionality is distributed to the local levelto insure continued functionality if the data link to the centralcontroller of the Key Track system is disrupted. Further, the localcontroller is better able to sense tampering with the reader system. Forexample, if an antenna of a reader is cut or disconnected, the resultantchange in impedance can be detected easily by the local controllerwhereas the central controller connected through a dumb interface likelywould only see no signals from the antenna and the system would bevulnerable to defeat by tampering.

[0040] In a configuration where active two way RF tags are attached tovehicles, smart local controllers can send data and information to theactive RF tags. This allows a local controller whose link to the centralcontroller may be disrupted to attempt to transmit data by“piggybacking” on RF tags; i.e., storing information for the centralcontroller on an RF tag for being conveyed to the central controllerwhen the tag is encountered by a subsequent reader. In addition, activeRF tags make possible an embodiment of the invention wherein ID markersare positioned in the lot at various locations and are “read” by theactive tags as vehicles carrying the tags pass over the markers inmoving about the lot. The RF tags themselves are then responsible fortransmitting location information directly via radio frequencytransmission to the central controller. In a broader sense, the use ofRF tags that can receive and store information gives rise to thepossibility of a “virtual network” wherein information can betransmitted to and stored on the ID tags themselves for reading at alater time by another reader at another location. Service history, forexample, might be stored and automatically read each time a vehicle ispresented at a service center for maintenance or service.

[0041] Since the local controller in the preferred embodiment is inreal-time communication with RF tags passing its antenna, it can sendinformation to the tags, the central controller, and/or directly toactivate ancillary equipment such as, for example, security devices andalarms and video and/or audio capturing equipment. This is a powerfulattribute of the present invention. For example, if a series of capturedvideo frames of vehicles traversing a portal are OCR processed, thelicense plate of vehicles with inoperable or no RF tags can be noted(presumably some other sensor such as a laser beam indicating a portaltransition would alert the central controller, which would determinethat a vehicle traversed the portal but no signal was received from anRF tag). Cross linking to license plate databases to note potentialprospects who were not helped by a sales professional would provideextremely useful information to the dealership. Accordingly, it will beseen that the potential to monitor and adjust the day-to-day operationof the dealership can be enhanced significantly through application ofthe present invention.

[0042]FIG. 2 illustrates in more detail a transition region T betweentwo zones, Zone 1 and Zone 2, within a dealership parking lot.Preferably, but not necessarily, the transition region T is bordered bycurbs or other barriers 61 to force vehicles to traverse the transitionregion T at the proper location. A pair of spaced apart loop antennas 63and 64 are embedded or buried within the pavement 62 at the transitionzone T. The antennae are connected by appropriate cabling 66 and 67respectively to a local controller 68, which also may be buried ifdesired. The local controller 68, in turn, is connected via thecommunications link 56 to the central controller 23, which preferably ispart of a Key Track system.

[0043] As a vehicle bearing one or more RF tags moves from Zone 1 toZone 2, it traverses the transition region T and passes over theantennae 63 and 64. The RF tag is activated by and, in the case of apassive tag, draws power from the field generated by the antennae andtransmits its unique code, which is detected by the antennae,demodulated by the local controller 68, and conveyed via communicationslink 56 to the central controller for processing. The central controllerthen interprets the data to determine that the vehicle corresponding tothe code is passing from Zone 1 to Zone 2. Movement of vehicles fromzone to zone is thus tracked and monitored. FIG. 2 illustrates the tagreader with a pair of spaced antennae or sensors buried in the pavement.While this is a preferred configuration for purposes of systemrobustness, as detailed below, a single antenna may also be used withsimilar, albeit less robust, results.

[0044]FIG. 3 illustrates a particular application of the system andmethod of the invention applied to a fueling station at an automobiledealership. A fueling pump 73 is stationed by a curb 71 for deliveringfuel to vehicles. A pair of antennas 74 and 76 are embedded within thepavement 72 adjacent the pump 73. The antennae are connected viaappropriate cabling 77 and 78 respectively to a local controller 79which is coupled through communications link 81 to central controller23. The pump 73 is provided with a pump controller 82, which includes aswitch for activating the pump and may also include circuitry forcapturing information from the pump such as, for example, the amount offuel pumped at a filling, and conveying this information back to thelocal controller 79 for transmission to the central controller 23. Whena vehicle approaches the fuel pump 73 for fueling, the unique code ofits RF tag is captured and transmitted by the local controller to thecentral controller. The central controller then checks its Key Tracklogs to confirm that the user who checked out the keys to the vehicle isauthorized to fuel the vehicle. If not, the central controller maytransmit an instruction to the local controller not to activate the pumpand may also generate appropriate alarms to indicate an inappropriatefueling attempt.

[0045] If the user is authorized to fuel the vehicle, the centralcontroller may issue instructions to the local controller to activatethe pump, whereupon a signal is sent from the local controller to thepump controller to allow the pump to be operated. When fueling iscomplete, the pump controller may convey to the local controllerinformation regarding the amount of fuel used and this information isconveyed back to the central controller. Alternatively, the initialinstruction to the pump controller may be to pump only a predeterminedamount of fuel. Thus, unauthorized fueling is prevented and fuel usagecan be monitored and controlled on an individual vehicle level to insurethe most efficient use of fuel in the daily operation of the dealership.Preferably, the two antennae adjacent to the pump are spaced such thateach must receive a code from a respective RF tag on the vehicle toauthorize pumping. This ensures that the vehicle is properly positionedfor fueling and prevents fraud by, for example, stationing one vehiclewith one of its RF tags over an antenna while backing an unauthorizedvehicle up to the pump for illicit fueling.

[0046]FIG. 4 illustrates application of the invention at an exit portalof the dealership lot to monitor and control the comings and goings ofvehicles from the lot. The exit portal is bordered by curbs 89 and anantenna 91 is embedded within the pavement 92 of the portal. The antennais connected by cabling 93 to the local controller 94, which is coupledthrough communications link 96 to the central Key Track controller 23.The local controller is also connected by cabling 97 to a gate control88, which can be activated to raise and lower a gate 87 to allow orprevent a vehicle from passing through the exit 86. The local controller94 may also be connected to receive information from a key pad 101,which can be conveniently located on a key pad pedestal 98.

[0047] In operation, as a vehicle approaches the exit, the unique codeof its RF tag is transmitted to the local controller 94 and conveyed tothe central controller 23. The central controller consults its Key Tracklogs to determine the identity of the user who checked out keys to thevehicle. If the user is not authorized to remove the vehicle from thelot, the central controller may generate appropriate alarms and conveyinstructions to the local controller not to open gate, therebypreventing unauthorized removal of the vehicle from the lot. If the useris authorized to remove the vehicle from the lot, the central controllermay transmit instructions to the local controller to open the gate,whereupon an appropriate instruction is transmitted to the gate control88 to open the gate 87 and allow the vehicle to leave the lot.

[0048] The user may also be required to enter a PIN number into the keypad as a final confirmation that the vehicle is properly being removedfrom the lot. The PIN number is communicated to the local controller viacabling 99 and, possibly, on to the central controller 23. Only if it isdetermined that the vehicle is authorized to leave the lot, that theperson who checked out the keys is authorized to take the vehicle offthe lot, and the appropriate PIN number is entered will the gate beopened. Accordingly, in the event, for example, that a would be thiefdisables a salesman and attempts to remove a vehicle from the lot, thethief will not be able to drive the vehicle off the lot because theappropriate PIN number will not be entered. Such a system may also beused in other situations such as, for example, at the exits from anapartment complex to prevent vehicles of tenants from being stolen byrequiring both a proper identification of the vehicle through its RF tagand the proper PIN number before a gate is opened.

[0049]FIG. 5 will now be referenced as the foundation of a discussion ofthe various configurations of readers and RF tags and the advantages ofeach configuration. FIG. 5 illustrates a transition region T disposedbetween two adjoining zones, Zone 1 and Zone 2, on the lot of anautomobile dealership. A pair of spaced apart antennas 108 and 109 areembedded within the pavement 107 in the transition region T and each isconnected by cabling 111 and 112 respectively to a local controller 113.The local controller 113 is coupled through communications link 114 to acentral Key Track controller 23. A vehicle 116, indicated generally byphantom lines for clarity, is seen approaching the transition region Tin direction 124 from Zone 1 toward Zone 2. The vehicle 116 is providedwith a forward RF tag 117, which includes an antenna 118 connected to anintegrated circuit chip 119 containing the encoding, decoding, control,and memory circuits of the RF tag. A rear RF tag 121 is provided at theback of the vehicle and includes an antenna 122 connected to anintegrated circuit chip 123. The RF tags are shown very much larger thantheir typical actual size for clarity of illustration. In reality, RFtags can be as small as a postage stamp or even smaller and are easilyattached and hidden on the vehicle. In the case of smaller tags, thereader antenna can be larger to maintain operating range.

[0050]FIG. 5 shows a reader with two embedded antennae and two RF tagson the vehicle. However, the invention contemplates multiple variationsand combinations of reader antennae and RF tags including a singlereader antenna and single RF tag, double reader antennae and a single RFtag, and the double reader antenna double RF tag configurationillustrated in FIG. 5. The simplest of these configurations is a singlereader antenna and a single RF tag on the vehicle. With such aconfiguration, as the vehicle moves from one zone to an adjacent zone,it is confined to pass through the transition region T and over thereader antenna embedded in the pavement thereof. As the RF tag on thevehicle enters the field created by the reader antenna, it is activatedby the field and transmits its unique code as described above and thecode is received by the reader antenna and ultimately conveyed to thecentral controller. The RF tag may also accept and store information,which can be read by other readers on site or at another location. Forexample, RF tags might store information regarding the history of avehicle's progress through the manufacturing plant, shipping channels,dealerships, and ultimately to a customer.

[0051] Since only a single reader antenna and a single RF tag is used,the central controller's vehicle tracking routines must rely on pasthistory data to extrapolate and update the location of the vehicle. Morespecifically, since the last logged location of the vehicle (FIG. 5) isknown to be in Zone 1, and since it is now being detected in thetransition region T separating Zone 1 and Zone 2, a conclusion may bemade that the vehicle can now be considered to be in Zone 2 until againdetected at a transition region. While such a system is relativelysimple, it lacks a degree of rigor that is desired in many situations.For example, if the history data is corrupt and the vehicle is not inreality in the region that the central controller thinks it is, then aninaccurate conclusion as to the new location of the vehicle may be madeor an error condition may be generated. Error conditions may also becreated if, for example, a vehicle begins to pass through a transitionregion and then is reversed and backed into its original Zone.

[0052] It can thus be seen that while the single reader/single tagconfiguration may be useful in some situations, it can be subject tomistakes and errors that may not always be acceptable. One reason thaterrors may be generated is because, with a single reader and a singletag, no information is available to the system regarding the directionin which the vehicle is traversing the transition region. Only thelocation of the vehicle at the transition can be determined.

[0053] A more rigorous configuration of the invention is realized by theuse of two spaced reader antennas embedded in the pavement at thetransition region and a single RF tag attached to a vehicle. As thevehicle traverses the transition region, the first reader antennaencounters and activates the RF tag and reads its unique code, which isconveyed to the central controller. At this point, the second readerantenna cannot read the transmitted code because of the physicalseparation of the reader antennas. Eventually, the RF tag moves with thevehicle out of the range of the first reader antenna and enters therange of the second reader antenna. The RF tag is energized a secondtime by the second antenna and transmits its unique code, which isreceived by the second antenna.

[0054] It will thus be seen that the local controller first receives thecode from its first reader antenna and then receives the code from itssecond reader antenna. With this information, the central controller (orthe local controller for that matter) can safely conclude that since thevehicle traversed the transition region in a direction from the firstreader antenna toward the second reader antenna, the vehicle moved fromZone 1 into Zone 2. Since no reliance is made on knowledge of where thevehicle was located prior to its traversal of the transition region, atwo reader antenna/one RF tag configuration provides more rigor and isless susceptible to error and inaccurate location that the single readerantenna/single RF tag configuration. In fact, since the new Zone andtransition region traversed are safely known, if the location historydata base is corrupted or contains data inconsistent with thisdetermination, an error or suspicious condition can be flagged. A log ofsuch suspicious conditions can then be examined by key personnel todetermine if a pattern suggests that a particular reader is faulty orsomeone has tampered with the readers or RF tags. Thus, thisconfiguration is substantially more reliable than the simple onereader/one RF tag configuration.

[0055] Another more rigorous configuration of the invention is the onereader antenna/two RF tag configuration wherein two RF tags are placedon each vehicle and one reader antenna is embedded in a transition zone.Such an arrangement is feasible for use with vehicles since a typicalcar or truck is relatively large and the RF tags can be spaced apart adistance larger, and preferably at least twice as large, as theoperating range of the reader antennae. With such a configuration, as avehicle traverses a transition region, the RF tag on the front end ofthe vehicle encounters the reader antenna and transmits its codefollowed by the RF tag on the rear of the vehicle. The local controller,or alternatively the central controller, can access its data base toidentify the vehicle provided with the codes of the two RF tags andwhich of the two codes corresponded to the forward RF tag and which tothe rear RF tag.

[0056] Thus, the direction of traversal of the transition region isreliably determined from the encounter. If the vehicle stops in thetransition region and reverses course, either only 1 of the tags is reador the first tag's code is received twice with the second tag being readonly once or not at all. From this information, the activity of thevehicle in the transition region can be determined. However, in such asituation, since the direction of traversal is not obtainable from thedata, previous zone information still is needed to extrapolate the zonein which the vehicle is now considered to be located. While periodicdatabase inventory checks can mitigate the potential uncertainties ofrelying on previous zone information, the potential for errors stillexists.

[0057] The most rigorous configuration of the invention is the tworeader antenna/two RF tag configuration illustrated in FIG. 5. Such aconfiguration eliminates reliance on previous zone information and alsoprovides a level of redundancy that enhances the reliability of thesystem. For example, consider when a vehicle traverses a transitionregion T between Zone 1 to Zone 2. As the vehicle moves through thetransition region, the first reader antenna interrogates the first RFtag and then the second RF tag. The second reader antenna alsointerrogates the first and then the second RF tag, although this pair ofinterrogations occur later in time than the interrogations by the firstreader antenna. The local and/or the central controller can thendetermine, based on various combinations of this data, that a particularvehicle passed in a particular direction into a Zone adjacent to thetransition region. Thus, the precise zonal location of each vehicle canbe known at all times.

[0058] Further, because more data is collected than the minimumrequired, the extra data provides a level of redundancy. For example, ofone reader antenna malfunctions, the local controller can process thereceived information as if the system were configured as a two RFtag/one antenna system as discussed above. Similarly, if one of the RFtags malfunctions, the local controller can process the information asin a one RF tag/two reader antenna configuration. Finally, if both areader antenna and an RF tag malfunctions, then the data can beprocessed as if the system were configured in a one reader antenna/oneRF tag system. Such redundancy allows the local controller to continueto track zonal transitions and update the position database withdifferent levels of confidence and also allows for the detection andlogging of system malfunctions observed during each traversal of atransition region by a tagged vehicle. Defective RF tags can be flaggedfor replacement and faulty readers flagged for periodic maintenance.

[0059] In addition to providing direction of traversal information, aconfiguration incorporating two reader antennae can also estimate thespeed at which the vehicle traversed the transition zone or passed thereader. Such information can be helpful in controlling speeding within alot or other designated area.

[0060] Instead of requiring a relatively large physical separationbetween RF tags in multiple RF tag configurations, the two RF tags canalternatively be selected to operate at different radio frequencies.This allows the RF tags to be located closer together than the range ofthe reader antenna to a large degree. However, a key to a dual RF tagapproach is the exploitation of the order in which the RF tags areencountered to determine direction of travel. Therefore, in multiplefrequency systems, the area of non-overlap must remain large enough toallow sufficient communication time before the overlap region isencountered. In reality, the size of the non-overlap region does notneed to be very large because RF tag technology allows RF tags to beinterrogated in much less that 0.1 second. Obviously, the size of theregion of non-overlap is determined to some degree by the speed at whichvehicles traverse transition regions, but in a dealership situation,these speeds tend to be relatively low and do not present an obstacle toclose placement of the RF tags on vehicles.

[0061] Also, communication strategies exist that allow two closelyspaced RF tags operating on the same frequency and both within a readerantenna's range to be interrogated. These communication strategies allowthe readers to communicate with multiple RF tags in their range ofoperation. Generally, these strategies require one reader antenna to bedesignated master and the other the slave. Only one antenna, the master,issues a request for RF tags to relay codes to both receiving antennas(master and slave).

[0062] The invention has been described herein within the context of thetracking and control of keys and vehicles at an automobile dealership.While this is a preferred embodiment of the invention and representswhat is considered to be the best mode of carrying out the invention,the invention is far from limited to such a context and has a widevariety of applications outside automotive dealerships. For example,there exists a critical need within certain organizations such asclassified government installations, hospitals, and the like to controlaccess to and tracking of the location of confidential or classifiedfiles. The present invention can be applied to these situations to, forexample, prevent classified files from being removed from specifiedlocations by persons not authorized to remove them. Here, the filesthemselves are provided with RF tags and correspond to the vehicles ofthe preferred embodiment and the designated rooms (file rooms, reviewareas, and the like) correspond to the various zones. Locking doorscontrollable by the central controller preferably are provided at thetransitions between rooms and only unlocked if an individual attemptingto move a file from one room to another has authority to do so.

[0063] Another application is the tracking of personnel in automotivedealerships or otherwise. In such a scenario, an arm band might containan RF tag. Readers located at key doorways and/or key locationsinterrogate the tags of personnel moving through the doorways to trackthe location of personnel at all times. Personnel passing throughcertain designated doorways, e.g. sensitive area entrances or exits,might activate appropriate alarms.

[0064] Similarly, children in schools can be tracked by issuing IDbadges bearing RF tags to each child and adult. The passage ofindividuals through key portals is detected by readers located at theseportals. Secondary sensors note the passage of individuals and if no RFtag is read, then alarms can be generated to indicate that a non-badgedindividual passed through the portal.

[0065] Factories have problems with workers clocking in and then notgoing to their assigned work areas. Worker ID badges bearing RF tags andreaders at portals to work areas can be employed to track workers andinsure that they are at their designated stations. These and otherapplications of the object tracking and control system of this inventionare possible and all are envisioned to be within the scope of theinvention as set forth in the claims.

What is claimed is:
 1. A system for tracking the movement of objects ina predefined area, said system comprising: a central controller; areadable tag on each object to be tracked, each readable tag storing acode identifying its corresponding object; readers at preselectedlocations within said predefined area for reading the codes of saidreadable tags as the objects corresponding to said readable tags movepast said readers; a communications link between said readers and saidcentral controller for communication of codes read by said readers tosaid central controller; said controller being programmed to collectdata from said readers for tracking the movement of objects within thepredefined area.
 2. A system for tracking the movement of objects asclaimed in claim 1, wherein said readable tags are radio frequency (RF)tags.
 3. A system for tracking the movement of objects as claimed inclaim 2, wherein said readable tags are passive RF tags and aretriggered by said readers to transmit their codes.
 4. A system fortracking the movement of objects as claimed in claim 2, wherein saidreadable tags are active RF tags.
 5. A system for tracking the movementof objects as claimed in claim 1, wherein said readers include embeddedantennas.
 6. A system for tracking the movement of objects as claimed inclaim 5, wherein said readers further include local controllersconnected to said antennas, said local controllers extracting codesreceived by said antennas and conveying extracted codes to said centralcontroller.
 7. A system for tracking the movement of objects as claimedin claim 5, wherein said antennas are loop antennas.
 8. A system fortracking the movement of objects as claimed in claim 5, furthercomprising at least two antennas disposed in each selected location,said central controller being programmed to determine the direction ofmovement of a tagged object by analyzing data collected from saidantennas.
 9. A system for tracking the movement of objects as claimed inclaim 2 and further comprising at least two RF tags disposed in eachobject, said central controller being programmed to determine thedirection of movement of the object by analyzing data collected by saidreaders from said at least two RF tags.
 10. A system for tracking themovement of objects as claimed in claim 1 and wherein said preselectedlocations within said area correspond to transition regions betweenzones of said area and wherein said central controller is programmed todetermine movement of objects from one zone to an adjacent zone byanalyzing data collected by said readers as objects traverse saidtransition regions.
 11. A system for tracking the movement of objects asclaimed in claim 1 and wherein said data network comprises localcontrollers coupled to said readers and a communications link fortransmitting data between said local controllers and said centralcontroller.
 12. A system for tracking the movement of objects as claimedin claim 1 and further comprising at least one Key Track system having acentral controller, said data network connecting said readers to saidKey Track central controller for integration of data from said readerswith data from said Key Track system.
 13. A system for tracking themovement of objects as claimed in claim 12, wherein said Key Tracksystem is configured to detect removal and return of keys providingaccess to the objects.
 14. A system for tracking the movement of objectsas claimed in claim 12, further comprising means for generating reportson the movement of objects being tracked based on data from said readersand data from said Key Track system.
 15. A method of tracking themovement of an object between predetermined zones within an area, saidmethod comprising the steps of: (a) establishing transition regionsbetween the predetermined zones; (b) detecting the object as the objecttraverses a transition region; (c) identifying the object as it isdetected traversing the transition region in step (b); and (d)determining the zone in which the object is located based upon thedetection and identification of the object in steps (b) and (c).
 16. Themethod of claim 15 and wherein step (d) includes determining the zone inwhich the object is located by analyzing information indicative of thezone in which the object was last located and information derived fromthe detection and identification of the object in steps (b) and (c). 17.The method of claim 15 and wherein step (b) comprises detecting thedirection in which the object traverses the transition region andwherein step (d) includes determining the zone in which the object islocated by analyzing the direction in which the object traversed thetransition region.
 18. The method of claim 15 and wherein step (b)comprises providing the object with a readable tag and locating a readerin the transition region for reading the readable tag as the objecttraverses the transition region.
 19. The method of claim 18 and whereinthe readable tag is an RF tag and wherein the reader includes at leastone antenna for receiving RF signals transmitted by the RF tag.
 20. Themethod of claim 19 and further comprising providing the object with atleast two RF tags readable by the reader for determining the directionin which the object traverses the transition region.
 21. The method ofclaim 20 and wherein the at least two RF tags are spaced apart on theobject to be read in sequence by the reader for determining thedirection in which the object traverses the transition region.
 22. Themethod of claim 20 and wherein the at least two RF tags transmit signalsat different radio frequencies for determining the direction in whichthe object traverses the transition region.
 23. The method of claim 19and further comprising providing at least two readers at the transitionregion for determining the direction in which the object traverses thetransition region.
 24. The method of claim 23 and wherein the step ofproviding at least two readers includes locating at least two antenna atthe transition region, each antenna receiving RF signals from a tag onthe object as the object traverses the transition region.
 25. The methodof claim 24 and wherein the at least two antenna are spaced apart in thetransition region for receiving a signal from the RF tag on the objectin sequence as the object traverses the transition region.
 26. Themethod of claim 25 and further comprising the step of providing at leasttwo RF tags on the object, the at least two RF tags transmittinginformation to the at least two antenna as the object traverses thetransition region.
 27. A system for tracking and controlling themovement of objects in a predefined area comprising: a centralcontroller; an array of readers disposed at preselected locations in thepredefined area, said readers being in communication with said centralcontroller; a readable tag on each of the objects, each readable tagstoring a code identifying its corresponding object; said codes of saidreadable tags being detected by said readers as objects move past saidreaders and being communicated to said central controller; said centralcontroller being programmed to determine the location of each object byanalyzing the codes communicated by said readers.
 29. A system fortracking and controlling the movement of objects as claimed in claim 27and wherein said readable tags comprise RF tags for transmitting saidcodes via radio frequency transmission.
 30. A system for tracking andcontrolling the movement of objects as claimed in claim 29 and whereinsaid readers include antenna for receiving codes transmitted by said RFtags and a local controller for extracting the codes from receivedtransmissions and communicating the extracted codes to the centralcontroller.
 31. A system for tracking and controlling the movement ofobjects as claimed in claim 30 and further comprising providing eachobject with at least two RF tags for determining the direction in whichthe objects traverse said transition regions.
 32. A system for trackingand controlling the movement of objects as claimed in claim 30 andwherein each reader includes at least two antennae for determining thedirection in which the objects traverse said transition regions.
 33. Asystem for tracking and controlling the movement of objects as claimedin claim 32 and wherein each object is provided with at least two RFtags.
 34. A system for tracking and controlling the movement of objectsas claimed in claim 27 and wherein the objects are vehicles and thepredefined area is the lot of an automobile dealership.
 35. A system fortracking and controlling the movement of objects as claimed in claim 34and further comprising a Key Track system located at the automobiledealership, said central controller being a part of the Key Track systemand having access to information regarding the check out and check in ofkeys to vehicles at the automobile dealership.
 36. A system for trackingand controlling the movement of objects as claimed in claim 35 andwherein said central controller is programmed to analyze informationregarding the check out and check in of keys and to integrate suchinformation with information communicated by said readers and to reachconclusions regarding authorized movements of vehicles based on saidanalysis.
 37. The system of claim i and wherein said central controlleruses the integrated information to authorize movement of vehicles. 38.In a Key Track system for tracking the check out and check in of keysproviding access to objects, the improvement comprising means fortracking movement of each object in the interim between check out of thekey to the object and check in of the key to the object.
 39. Theimprovement of claim 38 and wherein the objects are vehicles and whereinsaid means for tracking movement of each object comprises a readable tagon each vehicle and tag readers at preselected locations within theregion of movement of the vehicles.
 40. The improvement of claim 39 andwherein said readable tags are RF tags and said readers include antennafor receiving RF signals transmitted by said tags as the vehicles movepast said readers.
 41. The improvement of claim 40 and wherein theregion of movement of the vehicles is a lot, said lot being subdividedinto predetermined zones separated by transition regions and saidreaders being disposed at said transition regions.