Privacy system for electronically tagged goods

ABSTRACT

Embodiments of the present disclosure generally relate to systems and methods for providing privacy to downstream owners of electronically tagged goods. In one implementation, the system may include at least one processor that may be configured to store IDs for a plurality of tags including at least a first owner ID and a second owner ID for a particular tag; associate first information of the particular tag with the first owner ID at a time when the first owner of the particular tag is recorded as owning the tag; record a transaction transferring ownership of the particular tag from the first owner to a second owner; and after the transfer of ownership, associate second information of the particular tag with the second owner ID, and prevent the second owner from accessing the first information.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of priority of U.S. ProvisionalPatent Application No. 62/832,397, filed Apr. 11, 2019, which is herebyincorporated by reference in its entirety.

TECHNICAL FIELD

The disclosed embodiments generally relate to systems and methods forwireless identification tags for association with products.

BACKGROUND

The ability to transfer data over a network provides many opportunitiesto enable various electronic devices to connect with other devices andnetworks, to perform increasingly autonomous operations, and to provideinteractive experiences for users. However, conventional systems andmethods for providing digital communication may use a certain amount ofhardware, energy consumption, costs, and other technical limitationsthat may prevent them from being implemented with respect to certainproducts, systems, and industries. Further, there are a multitude ofsecurity and privacy concerns related to the transfer of data that mayrender the implementation of such technologies impractical with respectto certain fields.

Therefore, there is a need for cost-efficient and unconventionalapproaches that efficiently, effectively, and safely enable the digitalself-representation of a wide range of products as well and/or themanagement such products.

SUMMARY

Embodiments consistent with the present disclosure provide systems andmethods generally relating to wireless identification tags forassociation with products. The disclosed systems and methods may beimplemented using a combination of conventional hardware and software aswell as specialized hardware and software, such as a machine constructedand/or programmed specifically for performing functions associated withthe disclosed method steps. Consistent with other disclosed embodiments,non-transitory computer readable storage media may store programinstructions, which are executable by at least one processing device andperform any of the steps and/or methods described herein.

Consistent with disclosed embodiments, systems, methods, and computerreadable media relating to a wireless identification tag for associationwith a product to enable product self-identification are disclosed. Theembodiments may include a tag including at least one antenna tuned toreceive energy transmitted at a first frequency within a frequency bandaround 900 MHz and at a second frequency within a frequency band around2.4 GHz, Some embodiments may further include at least one transmitter,configured to send at least one identification signal, and at least onecircuit configured to detect whether energy is received in the firstfrequency or the second frequency, and to cause the at least onetransmitter to operate in a first mode to send a first form ofidentification signal when the first frequency is detected, and tooperate in a second mode to cause the at least one transmitter to send asecond form of identification signal when the second frequency isdetected.

Consistent with disclosed embodiments, systems, methods, and computerreadable media for a wireless identification tag with a response timethat varies as a function of incoming signal frequency are disclosed.Some embodiments may include a wireless identification tag including atleast one antenna tuned to receive energy transmitted at a firstfrequency within a frequency band around 900 MHz and at a secondfrequency within a frequency hand around 2.4 GHz; at least onetransmitter; and at least one circuit. The at least one circuit may beconfigured to detect whether energy is received in the first frequencyor the second frequency, and cause the at least one transmitter totransmit an immediate response when the second frequency is detected,and to transmit a delayed response, having a longer delay compared tothe immediate response, when the first frequency is detected.

Consistent with disclosed embodiments, systems, methods, and computerreadable media relating to a wireless identification tag triggerable byan EAS gate while remaining invisible to the EAS gate are disclosed. Theembodiments may include a tag having at least one antenna tuned toreceive energy transmitted in at least one of a first EAS gate frequencyrange of about 7-13 MHz or a second EAS gate frequency range of about58-60 kHz, and configured to be non-detectable by the EAS gate. Someembodiments may further include at least one transmitter configured tosend at least one identification signal, and at least one energy storagecomponent, electrically connected to the at least one transmitter, forpowering the at least one transmitter. Embodiments may further includeat least one circuit connected to the at least one antenna armconfigured to detect energy transmitted from the EAS gate in at leastone of the first EAS gate frequency range or the second EAS gatefrequency range, and in response to detecting the energy transmittedfrom the EAS gate, cause the at least one transmitter to transmit to areceiver other than the EAS gate, the at least one identification signaltransmitted in a frequency outside the first EAS gate frequency rangeand the second EAS gate frequency range.

Consistent with disclosed embodiments, systems, methods, and computerreadable media for a wireless identification tag configured to harvestambient energy and transmit an identification signal intermittently aredisclosed. The embodiments may include at least one antenna configuredto receive ambient energy, at least one energy storage component,electrically connected to the at least one antenna, configured toaggregate and store the received ambient energy, at least onetransmitter electrically connected to the at least one energy storagecomponent, configured to transmit the identification signal, and atleast one circuit connected to the at least one transmitter andconfigured to implement an identification transmission rule, to causethe transmitter to delay sending the identification signal even whensufficient energy for the identification signal is aggregated and storedin the energy storage component.

Consistent with disclosed embodiments, systems, methods, and computerreadable media for a wireless identification tag configured to harvestambient energy and transmit an identification signal intermittently aredisclosed. The embodiments may include at least one transmitter,configured to transmit a first signal to a first receiver in a firstfrequency and to transmit a second signal to a second receiver in thefirst frequency. Embodiments may further include at least one energystorage component, electrically connected to the at least onetransmitter, for collecting and storing ambient energy and for poweringtransmission of the at least one transmitter. At least one circuit maybe connected to the at least one transmitter and to the at least oneenergy storage component, for monitoring energy stored in the energystorage component, and to prevent the at least one transmitter fromtransmitting the first signal to the first receiver in tire firstfrequency when the energy stored in the energy storage component isinsufficient to transmit the second signal to the second receiver in thefirst frequency.

Consistent with disclosed embodiments, systems, methods, and computerreadable media relating to a wireless identification fraud avoidancesystem are disclosed. The embodiments may include a system having atleast one transmitter configured to transmit a first signal in a firstfrequency band to a plurality of identification tags, and to therebycause the plurality of identification tags to transmit second signal ina second frequency band, the second signal indicating whether the firstsignal was received in the first frequency band. Some embodiments mayfurther include a first receiver configured for location proximate theat least one transmitter to receive transmissions of the second signalfrom the plurality of identification tags, a second receiver configuredto receive a third signal from a tag outside a transmission range of theat least one transmitter, wherein the second receiver is located furtherfrom the at least one transmitter than the first receiver, and at leastone processor configured to generate a potential fraud alert when thesecond receiver receives the third signal.

Consistent with disclosed embodiments, systems, methods, and computerreadable media relating to a fraud avoidance system for use with awirelessly tagged inventory are disclosed. The embodiments may include asystem having at least one processor configured to detect a signalassociated with a transmission in an EAS gate frequency, identify thesignal as emanating from a location that does not correspond to an EASgate location; based on the identified emanation location of the signal,determine that a suspected fraudulent event is in progress; and generatean alert of the suspected fraudulent event.

Consistent with disclosed embodiments, systems, methods, and computerreadable media for a wireless identification tag with varying IDtransmission timing are disclosed. The tag may include at least onetransmitter; at least one energy storage component, electricallyconnected to the at least one transmitter and configured to collect andstore ambient energy to power transmissions. The tag may additionallyinclude at least one circuit configured to cause the transmitter totransmit a sequence of identification signals in non-uniform intervalssuch that times between identification signal transmission of threeconsecutive transmissions vary.

Consistent with disclosed embodiments, systems, methods, and computerreadable media relating to a wireless identification tag with varyingidentity are disclosed. A wireless identification tag with varyingidentity may include at least one transmitter configured to transmit atag ID. The tag may further include at least one circuit configured toreceive a first trigger at a first time, and in response to the firsttrigger, generate in a quasi-random manner a first decipherable IDuniquely identifying the tag, and cause the at least one transmitter totransmit the first decipherable ID. Additionally, the circuitry may beconfigured to receive a second trigger at a second time after the firsttime, and in response to the second trigger, generate in a quasi-randommanner a second decipherable ID different from the first decipherable IDand uniquely identifying the tag, and cause the at least one transmitterto transmit the second decipherable ID.

Consistent with disclosed embodiments, systems, methods, and computerreadable media relating to providing privacy to downstream owners ofelectronically tagged goods are disclosed. The embodiments may includeat least one processor configured to store IDs for a plurality of tagsincluding at least a first owner ID and a second owner ID for aparticular tag. At a time when the first owner of the particular tag isrecorded as owning the tag, embodiments may associate first informationof the particular tag with the first owner ID. Then, a transaction maybe recorded transferring ownership of the particular tag from the firstowner to a second owner. After the transfer of ownership, secondinformation of the particular tag may be associated with the secondowner ID, and the first owner may be prevented from accessing the secondinformation.

Consistent with disclosed embodiments, systems, methods, and computerreadable media relating to simultaneous triggering and sequentialreading of a plurality of tags are disclosed. The embodiments mayinclude a non-transitory computer readable medium containinginstructions for causing a 2.4 GHz device to simultaneously trigger andsequentially read a plurality of tags. The instructions may includedisplaying an activatable element on a graphical user interface, theelement being configured to activate a 2.4 GHz transmitter. Uponactivation of the element, the 2.4 GHz transmitter may be caused to emitone or more signals for causing each of a plurality of tags in avicinity of the transmitter to send a unique tag ID to a receiverassociated with the transmitter. The instructions may further includereading a first group of the plurality of unique tag IDs during a firsttime interval, wherein the first group excludes a second group of theplurality of unique tag IDs. First information associated with the firstgroup may be read, after which, activation of the 2.4 GHz transmittermay be maintained or may otherwise continue during a second timeinterval, to cause transmission of at least some of tire unique tag IDsof the first group along with the unique tag IDs of the second group.After a receiver reads at least some of the unique tag IDs of the firstgroup along with the unique tag IDs of the second group, informationassociated with the second group may be recorded.

Consistent with disclosed embodiments, systems, methods, and computerreadable media relating to an appliance for holding electronicallytagged products and for recording an association between the taggedproducts and the appliance are disclosed. The appliance may include ahousing defining a cavity for retaining the electronically taggedproducts and an exciter, integrated with the housing, the exciter beingconfigured to trigger tags of the electronically tagged products for thetag of each product to transmit a unique tag ID. The appliance may alsoinclude a receiver for receiving transmission of each unique tag ID anda communicator for outputting indications of identities ofelectronically tagged products retained in the cavity.

Consistent with disclosed embodiments, systems, methods, and computerreadable media for a wireless identification tag configured to collectand store ambient energy for use in delayed transmission are disclosed.The tag may include a receiver for receiving ambient energy; a firstcapacitor for storing the ambient energy; a second capacitor forcollecting and storing the ambient energy, the second capacitor havinglower capacitance than the first capacitor; and an inductorinterconnecting the first capacitor and the second capacitor. The tagmay additionally include circuitry interconnecting the receiver, thefirst capacitor, and the second capacitor in a manner such that ambientenergy received by the receiver is initially stored in the secondcapacitor, and is subsequently transferred to and stored in the firstcapacitor. The tag may additionally include at least one transmitterelectrically connected to first capacitor, to enable the energy storedin the first capacitor to power the at least one transmitter.

Consistent with disclosed embodiments, systems, methods, and computerreadable media for providing access to information associated withelectronically tagged goods are disclosed. The embodiments may includeat least one processor configured to store tag IDs of a plurality oftags and receive a pairing between at least one particular tag ID and aproduct ID. The embodiments may further receive a pairing between the atleast one particular tag ID and at least one authorized entityassociated with the at least one particular tag ID. An authorized entitymay be associated with at least one of a current owner of a product, amanufacturer of the product, or a user of the product. The at least oneprocessor may further be configured to receive, from a requester, aquery to identify at least one of the product ID, the informationassociated with the at least one particular tag ID, the informationassociated with the product ID, or the at least one authorized entity,the query including an encrypted tag ID of the particular tag and todecrypt the encrypted tag ID to thereby look up the decrypted tag ID ofthe particular tag. Embodiments may fulfill the query if the requesteris the at least one authorized entity associated with the decrypted tagID. Otherwise, the query may be denied.

Consistent with disclosed embodiments, systems, methods, and computerreadable media relating to protection against distribution ofcounterfeit products are disclosed. The embodiments may include a systemhaving at least one processor configured to store tag IDs of a pluralityof electronic tags, wherein at least one specific electronic tag isassociated with a specific product. The system may store at least oneidentity of a first entity, the first entity being associated with atleast one of a seller of the specific product, a manufacturer of thespecific product, a current owner of the specific product, or a priorowner of the specific product. On behalf of a prospective subsequentcustodian of the specific product, the processor may receive anencrypted tag ID associated with the specific product, and a queryassociated with the at least one identity. The processor may thendecrypt the encrypted tag ID to identify the specific product associatedwith the specific electronic tag, and use information associated withthe specific electronic tag to access an ownership history for thespecific product. The processor may further check if the at least oneidentity identified in the query corresponds to an entity in theownership history, and cause one of: a transmission of an authenticityindication to the prospective subsequent custodian if the at least oneidentity identified in the query corresponds to an entity in theownership history, or a transmission of a non-authentic indication tothe prospective subsequent custodian if the at least one identityidentified in the query does not correspond to an entity in theownership history.

Consistent with disclosed embodiments, systems, methods, and computerreadable media relating to detecting misplaced items in an establishmentare disclosed. The embodiments may include at least one processorconfigured to receive, from at least one reader in the establishment,identification signals of identification tags read by the at least onereader; determine current locations of the identification tags based onthe received identification signals; record in at least one datastructure the current locations of the identification tags; access inthe at least one data structure a designated location in theestablishment for each of the identification tags; determine, bycomparing the current locations of the identification tags with thedesignated locations of the identification tags, a particularidentification tag with a current location that differs from thedesignated location of the particular identification tag; and generate anotification signal when the current location of the particularidentification tag does not match the designated location of theparticular identification tag.

Consistent with disclosed embodiments, systems, methods, raid computerreadable media relating to reporting a location of items in anestablishment are disclosed. Disclosed embodiments include at least oneprocessor configured to receive, from at least one reader in theestablishment, identification signals of identification tags read by theat least one reader; determine current locations of the identificationtags based on the received identification signals; record in at leastone data structure the current locations of the identification tags;receive a query for a location of a particular item in theestablishment; identify the location of the particular item based on anassociation between the particular item and a particular identificationtag and the current location of the particular identification tag; anddisplay, on a graphical user interface, the location of the particularitem to a user.

The forgoing summary provides certain examples of disclosed embodimentsto provide a flavor for this disclosure and is not intended to summarizeall aspects of the disclosed embodiments. Additional features andadvantages of the disclosed embodiments will be set forth in part in thedescription that follows, and in part will be apparent from thedescription, or may be learned by practice of the disclosed embodiments.The features and advantages of the disclosed embodiments will berealized and attained by the elements and combinations particularlypointed out in the appended claims.

It is to be understood that both the foregoing general description andthe following detailed description are examples and explanatory only andare not restrictive of the disclosed embodiments as claimed.

The accompanying drawings constitute a part of this specification. Thedrawings illustrate several embodiments of the present disclosure and,together with the description, serve to explain the principles of thedisclosed embodiments as set forth in the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated in and constitute apart of this disclosure, illustrate various disclosed embodiments. Inthe drawings:

FIG. 1 is a perspective view of an exemplary wireless identificationsystem including gates, a wireless identification tag incorporated intoan item worn by a user, and a wireless identification tag incorporatedinto an item held by the user, consistent with disclosed embodiments,

FIG. 2 is a block diagram of an exemplary wireless identification tag ofthe system of FIG. 1, consistent with disclosed embodiments.

FIG. 3 depicts the exemplary wireless identification tag of FIG. 2encapsulated within a fabric pocket, consistent with disclosedembodiments,

FIG. 4 depicts the exemplary wireless identification tag of FIG. 2attached to a garment tag, consistent with disclosed embodiments.

FIG. 5 depicts the exemplary wireless identification tag of FIG. 2 sewninto an item, consistent with disclosed embodiments.

FIG. 6 depicts the exemplary wireless identification tag of FIG. 2mounted onto a hanging tag, consistent with disclosed embodiments.

FIG. 7 depicts the exemplary wireless identification tag of FIG. 2embedded into a clothing item, consistent with disclosed embodiments.

FIG. 8 depicts the exemplary wireless identification tag of FIG. 2adhered to a container, consistent with disclosed embodiments.

FIG. 9 is a block diagram of exemplary system architecture for awireless identification tag, consistent with disclosed embodiments.

FIG. 10 is another block diagram of the exemplary system architecture ofFIG. 9, showing details of exemplary controller architecture, consistentwith disclosed embodiments.

FIG. 11 is a perspective view of a retail establishment incorporating anexemplary wireless identification system, consistent with disclosedembodiments.

FIG. 12 depicts an example of a wireless identification tag operating inan exemplary infrastructure-excitable mode, consistent with disclosedembodiments.

FIG. 13 depicts an example of a wireless identification tag operating inan exemplary user-excitable mode, consistent with disclosed embodiments.

FIG. 14 depicts an example of a wireless identification tag operating inan exemplary gate mode, consistent with disclosed embodiments.

FIG. 15 is a block diagram of a wireless identification tag includingantennae, transmitters, a circuit, and an energy storage component,consistent with disclosed embodiments.

FIG. 16 is a flow chart illustrating an exemplary embodiment of anaspect of the operations of a wireless identification tag, consistentwith some disclosed embodiments,

FIG. 17 is a circuit diagram of an exemplary circuit for a wirelessidentification tag, consistent with some disclosed embodiments.

FIG. 18 is a block diagram of an exemplary system architecture for awireless identification tag, consistent with some disclosed embodiments.

FIG. 19 is a flow diagram of an exemplary operation method, consistentwith disclosed embodiments.

FIG. 20 is a network diagram of an exemplary system for monitoring thelocation of items within an establishment, consistent with disclosedembodiments.

FIG. 21 is a flowchart of an exemplary computerized process forreporting a location of items in an establishment, consistent withdisclosed embodiments.

FIG. 22 is an illustration of an identification tag within aninfrastructure environment for identifying the particular location ofthe identification tag, consistent with disclosed embodiments.

FIG. 23 illustrates a system for providing privacy for downstream ownersof electronically tagged goods, consistent with disclosed embodiments.

FIG. 24 is a block diagram of an exemplary appliance for holdingelectronically tagged products and for recording an association betweenthe tagged products and the appliance, consistent with the presentdisclosure,

FIG. 25A illustrates an exemplary refrigerator for holdingelectronically tagged products and for recording an association betweenthe tagged products and the appliance, consistent with the presentdisclosure.

FIG. 25B illustrates an exemplary clothes washing or drying machine forholding electronically tagged products and for recording an associationbetween the tagged products and the appliance, consistent with thepresent disclosure.

FIG. 25C illustrates an exemplary pantry for holding electronicallytagged products and for recording an association between the taggedproducts and the appliance, consistent with the present disclosure.

FIG. 25D illustrates an exemplary wardrobe for holding electronicallytagged products and for recording an association between the taggedproducts and the appliance, consistent with the present disclosure.

FIG. 25E illustrates an exemplary deli very truck for holdingelectronically tagged products and for recording an association betweenthe tagged products and the appliance, consistent with the presentdisclosure.

FIG. 26 is a schematic diagram depicting an aspect of the operations ofthe wireless tag, consistent with disclosed embodiments.

FIG. 27 depicts an exemplary wireless identification system in use as acustomer leaves a store with a cart full of goods, raising a risk ofsignal collision, consistent with disclosed embodiments.

FIGS. 28A and 28B are examples of signal transmission timelines,consistent with disclosed embodiments.

FIG. 29 is a block diagram of a tag circuit, consistent with disclosedembodiments.

FIG. 30 is a transmission channel timeline consistent with disclosedembodiments.

FIG. 31 is a schematic illustration of an exemplary arrangement of atransmitter, a first receiver, and a second receiver in an exemplarywireless identification system, consistent with disclosed embodiments,

FIG. 32 is a block diagram of an exemplary flow of signals in a wirelessidentification system, consistent with some disclosed embodiments.

FIG. 33A illustrates a handheld device displaying an inventory searchgraphical user interface, consistent with disclosed embodiments.

FIG. 33B illustrates a handheld device displaying a product graphicaluser interface, consistent with disclosed embodiments,

FIG. 33C illustrates a handheld device displaying a product size searchgraphical user interface, consistent with disclosed embodiments,

FIG. 34 is a block diagram of exemplary system for harvesting andstoring ambient energy, consistent with disclosed embodiments.

FIG. 35 is a block diagram of another exemplary system for harvestingand storing ambient energy, consistent with disclosed embodiments.

FIG. 36 is a block diagram of a further exemplary system for harvestingand storing ambient energy, consistent with disclosed embodiments.

DETAILED DESCRIPTION

Exemplary embodiments are described with reference to the accompanyingdrawings. In the figures, which tire not necessarily drawn to scale, theleft-most digit(s) of a reference number identifies the figure in whichthe reference number first appears. Wherever convenient, the samereference numbers are used throughout the drawings to refer to the sameor like parts. While examples and features of disclosed principles aredescribed herein, modifications, adaptations, and other implementationsare possible without departing from the spirit and scope of thedisclosed embodiments. Also, the words “comprising,” “having,”“containing,” and “including,” and other similar forms are intended tobe equivalent in meaning and be open ended in that an item or itemsfollowing any one of these words is not meant to be an exhaustivelisting of such item or items, or meant to be limited to only the listeditem or items. It should also be noted that as used in the presentdisclosure and in the appended claims, the singular forms “a,” “an,” and“the” include plural references unless the context clearly dictatesotherwise.

Unless specifically stated otherwise, as apparent from the followingdescription, throughout the specification discussions utilizing termssuch as “processing,” “calculating,” “computing,” “determining,”“generating,” “setting,” “configuring,” “selecting,” “defining,”“applying,” “obtaining,” “monitoring,” “providing,” “identifying,”“segmenting,” “classifying,” “analyzing,” “associating,” “extracting,”“storing,” “receiving,” “transmitting,” or the like, include actionsand/or processes of a computer that manipulate and/or transform datainto other data, the data represented as physical quantities, forexample such as electronic quantities, and/or the data representingphysical objects. The terms “computer,” “processor,” “controller,”“processing unit,” “computing unit,” and “processing module” should beexpansively construed to cover any kind of electronic device, componentor unit with data processing capabilities, including, byway ofnon-limiting example, a personal computer, a wearable computer, smartglasses, a tablet, a smartphone, a server, a computing system, a cloudcomputing platform, a communication device, a processor (for example,digital signal processor (DSP), an image signal processor (ISR), amicrocontroller, a field programmable gate array (FPGA), an applicationspecific integrated circuit (ASIC), a central processing unit (CPA), agraphics processing unit (GPU), a visual processing unit (VPU), and soon), possibly with embedded memory, a single core processor, a multicore processor, a core within a processor, any other electroniccomputing device, or any combination of the above.

The operations in accordance with the teachings herein may be performedby a computer specially constructed or programmed to perform thedescribed functions.

As used herein, the phrase “for example,” “such as,” “for instance” andvariants thereof describe non-limiting embodiments of the presentlydisclosed subject matter. Reference in the specification to features of“embodiments,” “one case,” “some cases,” “other cases” or variantsthereof means that a particular feature, structure or characteristicdescribed may be included in at least one embodiment of the presentlydisclosed subject matter. Thus the appearance of such terms does notnecessarily refer to the same embodiment(s). As used herein, tire term“and/or” includes any and all combinations of one or more of theassociated listed items.

Features of the presently disclosed subject matter, are, for brevity,described in the context of particular embodiments. However, it is to beunderstood that features described in connection with one embodiment arealso applicable to other embodiments. Likewise, features described inthe context of a specific combination may be considered separateembodiments, either alone or in a context other than the specificcombination.

In embodiments of the presently disclosed subject matter, one or morestages illustrated in the figures may be executed in a different orderand/or one or more groups of stages may be executed simultaneously andvice versa. The figures illustrate a general schematic of the systemarchitecture in accordance embodiments of the presently disclosedsubject matter. Each module in the figures can be made up of anycombination of software, hardware and/or firmware that performs thefunctions as defined and explained herein. The modules in the figuresmay be centralized in one location or dispersed over more than onelocation.

Examples of the presently disclosed subject matter are not limited inapplication to the details of construction and the arrangement of thecomponents set forth in the following description or illustrated in thedrawings. The subject matter may be practiced or carried out in variousways. Also, it is to be understood that the phraseology and terminologyemployed herein is for the purpose of description and should not beregarded as limiting.

In this document, an element of a drawing that is not described withinthe scope of the drawing arm is labeled with a numeral that has beendescribed in a previous drawing may have the same use and description asin the previous drawings.

The drawings in this document may not be to any scale. Different figuresmay use different scales and different scales can be used even withinthe same drawing, for example different scales for different views ofthe same object or different scales for the two adjacent objects.

Consistent with disclosed embodiments, “at least one processor” mayconstitute any physical device or group of devices having electriccircuitry that performs a logic operation on an input or inputs. Forexample, the at least one processor may include one or more integratedcircuits (IC), including application-specific integrated circuit (ASIC),microchips, microcontrollers, microprocessors, all or part of a centralprocessing unit (CPU), graphics processing unit (GPU), digital signalprocessor (DSP), field-programmable gate array (FPGA), server, virtualserver, or other circuits suitable for executing instructions orperforming logic operations. The instructions executed by at least oneprocessor may, for example, be pre-loaded into a memory integrated withor embedded into the controller or may be stored in a separate memory.The memory may include a Random Access Memory (RAM), a Read-Only Memory(ROM), a hard disk, an optical disk, a magnetic medium, a flash memory,other permanent, fixed, or volatile memory, or any other mechanismcapable of storing instructions. In some embodiments, the at least oneprocessor may include more than one processor. Each processor may have asimilar construction or the processors may be of differing constructionsthat tire electrically connected or disconnected from each other. Forexample, the processors may be separate circuits or integrated in asingle circuit. When more than one processor is used, the processors maybe configured to operate independently or collaboratively. Theprocessors may be coupled electrically, magnetically, optically,acoustically, mechanically or by other means that permit them tointeract.

Disclosed embodiments may include and/or access a data structure. A datastructure consistent with the present disclosure may include anycollection of data values and relationships among them. The data may bestored linearly, horizontally, hierarchically, relationally,non-relationally, uni-dimensionally, multidimensionally, operationally,in an ordered manner, in an unordered manner, in an object-orientedmanner, in a centralized manner, in a decentralized manner, in adistributed manner, in a custom manner, or in any manner enabling dataaccess. By wav of non-limiting examples, data structures may include anarray, an associative array, a linked list, a binary tree, a balancedtree, a heap, a stack, a queue, a set, a hash table, a record, a laggedunion, ER model, and a graph. For example, a data structure may includean XML database, an RDBMS database, an SQL database or NoSQLalternatives for data storage/search such as, for example, MongoDB,Redis, Couchbase, Datastax Enterprise Graph, Elastic Search, Splunk,Solr, Cassandra, Amazon DynamoDB, Scylla, HBase, and Neo4J. A datastructure may be a component of the disclosed system or a remotecomputing component (e.g., a cloud-based data structure). Data in thedata structure may be stored in contiguous or non-contiguous memory.Moreover, a data structure, as used herein, does not require informationto be co-located. It may be distributed across multiple servers, forexample, that may be owned or operated by the same or differententities. Thus, the term “data structure” as used herein in the singularis inclusive of plural data structures.

Exemplary embodiments generally relate to wireless communication tagsconfigured to be embedded within, attached to, or otherwise associatedwith physical items in order to digitally represent each item on anexemplary digital platform. In some embodiments, an exemplary tag may beconfigured to harvest ambient energy and to use the harvested energy tosend an identification signal to a receiver. The identification signalmay include various types of data, including product, location, history,status, ownership, and/or characteristic data. Such data may be conveyedto a receiver associated with various types of platforms, depending onintended use. The platform may be, for example, a software program,running on one or more servers, for accomplishing one or more types ofproduct tracking and/or authentication. Examples of platforms with whichdisclosed embodiments may be employed include, but are not limited to,inventory management systems in business establishments such as storesand warehouses; kitchen management systems, for tracking supplies and/ortools; appliance management systems for tracking tagged materials usedwithin or in connection with appliances; manufacturing systems fortracking components used during the manufacture of products;transportation and distribution systems for tracking parcels and otherdeliverables through transit and delivery; other supply chainmanagement; wardrobe management systems for tracking clothing itemsstored in wardrobes and closets; clothing laundering systems fortracking the cleaning of clothing items and/or receipt of clothing to belaundered and the return of clothing to either a customer or adesignated location such as a closet or wardrobe; food delivery systems;systems for managing ownership of goods transferred to differing owners;systems for authenticating goods to prevent counterfeiting; vehicletracking systems; systems for tracking materials and or persons invehicles and/or in public and private domains; waste management systems;and all other systems where it may be beneficial to track and/orauthenticate people, animals, or objects.

In some embodiments, the exemplary tag may be configured to harvestenergy without a designated battery and to operate, in both an activetransmission state and an idle state, while consuming minimum amounts ofpower. Advantageously, the configuration of the exemplary tag may enableradio performance comparable to commercial battery-powered devices, at apower envelope comparable to a passive RFID device.

FIG. 1 illustrates a non-limiting embodiment of exemplary wireless tags1100 a and 1100 b in an environment of a security gate, such as anElectronic Article Surveillance (EAS) gate 1110, 1112. In someembodiments, one or both of tags 1100 a and 1100 b may be wirelessidentification tags. Tag 1100 a may be embedded, sewn, clipped,attached, or otherwise incorporated into an object, such as clothingitem 1106. Tag 1100 b may be attached to, or otherwise incorporatedwith, an item purchased or otherwise procured by user 1104 and heldwithin bag 1122. Tags 1100 a and 1100 b may be configured to receivewireless signals, such as signal 1118. Signal 1118 may be produced by anexternal system or device, such as EAS transmitter 1116, which may forma part of EAS gate 1110, 1112. In some embodiments, one or both of tags1100 a and 1100 b may be configured to receive gate signal 1118 and, inresponse, to generate and output a signal having a frequency differentfrom the frequency of gate signal 1118. For example, tag 1100 a mayoutput signal 1102 a upon receiving gate signal 1118, and tag 1100 b mayoutput signal 1102 b upon receiving gate signal 1118. In someembodiments, one or both of signals 1102 a and 1102 b may have afrequency within a frequency band around 2.4 GHz such that signals 1102a and 1102 b are not detected by EAS sensor 1120 and therefore do nottrigger alarm 1114 of EAS gate 1110, 1112.

In some embodiments, the exemplary system of FIG. 1 may include at leastone receiver/exciter device 1124 configured to receive broadcasts ofsignals from a plurality of wireless tags (such as signals 1102 a and1102 b) and also configured to deliver energy to be collected and storedby the wireless tags in order to power the wireless tags, as discussedin detail below. For example, device 1124 may include a transceiver, arouter, a duplexer, or any other device configured to both transmit andreceive signals. In some alternative embodiments, such as the exemplaryclothing retail establishment depicted in FIG. 11, the system mayinclude a plurality of receivers 11300 a-h configured to receivebroadcasts of signals from the wireless tags, as well as exciters 11400configured to deliver energy to be collected and stored by the wirelesstags. However, persons of ordinary skill will understand that exemplarysystems described herein may include only receiver/exciter devices (suchas device 1124), only receiver devices and exciter devices (such asreceivers 11300 and exciters 11400), or any desired combination thereof.Additionally, persons of ordinary skill will understand that exemplaryexciters and receivers described herein (such as receivers 11300 andexciters 11400) may be implemented as separate devices and/or ascombination receiver/exciter devices (such as receiver/exciter device1124), and vice versa.

In some embodiments, the exemplary wireless tag may include at least oneantenna, at least one transmitter, and at least one circuit. The atleast one antenna, the at least one transmitter, and the at least onecircuit may be provided on a flexible substrate. A substrate may be astructure on or in which components such as the at least one antenna,the at least one transmitter, and the at least one circuit may bedisposed. The substrate may be flexible, such that when encountering aforce, the substrate may be configured to be deformable in one or moredirections. For example, a flexible substrate may be one that allows thecomponents affixed thereto to conform to a desired shape, or to flexduring its use. Materials suitable for the flexible substrate mayinclude, but are not limited to, polyester (PET), polyimide (PI),polyethylene naphthalate (PEN), polyetherimide (PEI), polyether etherketone (PEEK), along with various fluoropolymers (FEP) and copolymersand/or any other substrate capable of at least in part conforming to adesired shape or flexing during use.

FIG. 2 is a block diagram of an exemplary wireless communication tag1100, which may include an EAS coil 2110, a 900 MHz antenna 2112, a 2.4GHz antenna 2114, a multi-source harvester 2102, a transmitter 2104, agate detection circuit 2106, and an energy storage circuit 2108, some orall of which may be formed on a substrate 2120. Substrate 2120 may beflexible such that the tag may function despite flexing or movement thatmight occur, for example, when the tag is affixed and/or embedded into apiece of clothing, such as the various products illustrated in FIGS.4-8, which are discussed below.

Various embodiments of the wireless tag may include an adhesive layerfor affixation to a product. The wireless tag, in some embodiments, maybe affixed, or otherwise disposed on products or packings of products.This affixation may be aided by one or more adhesive layers. Embodimentsof adhesive layer may include glue of various types, tape, cement, wax,mucilage, paste, epoxy, sealants, elastomer, and other suitablematerials that may promote cohesion between surfaces. By way of examplewith reference to FIG. 2, tag 1100 may include a substrate 2120 thatsupports its electronic components and may also include an adhesivelayer 2122 that may be positioned on a side of the substrate layeropposite the electronic components, or in cases where the electroniccomponents are encapsulated between two or more layers of the substrate,the adhesive layer may be positioned on either side of the multi-layersubstrate. Adhesive layer 2120 may enable the tag to be bound to certainitems, such as hanging tag 6100 in FIG. 6 or product 8000 in FIG. 8.

Disclosed embodiments may also include at least one material layer, suchas a fabric layer, that at least partially encapsulates the wirelesstag, the material layer configured for affixation by sewing.Alternatively, the tag may be connectable to the fabric by bonding or byincorporation into a pocket. The fabric may include any material thatcan be used in a garment, accessory, or any other object that employsfabric. The fabric may be woven, non-woven, fibrous, or non-fibrous. Itmay include any suitable material, including but not limited to silk,wool, linen, cotton, rayon, nylon, polyester, or inorganic material andrubber, plastic, manmade or natural, spunbound/spunlace, airlaid, drylaid, wetlaid, vinyl, sheet material or any other layer. In someembodiments, fabric may be flexible or deformable.

In some embodiments, the wireless tag may be incorporated into layers ofthe material. The wireless tag may be partially incorporated, where aportion of the wireless tag may be exposed or uncovered. Alternatively,the wireless tag may be completely incorporated, where the wireless tagmay be completely surrounded by the fabric. In some embodiments, thewireless tag may be partially or completely incorporated into the fabricby sewing. FIG. 3 illustrates a non-limiting embodiment of anencapsulated wireless tag in fabric. For example, tag 1100, as depicted,is encapsulated in fabric pocket 3000. FIG. 5 further illustrates aplacement of fabric pocket 3000, containing tag 1100 on product 5000,such as a garment.

As used herein, partially encapsulating the wireless tag may includepositioning at least one material layer around the wireless tag suchthat the wireless tag is fixed with a certain point or area, relative tothe material layer. The material layer may include fabric, othertextiles, or any other material that may suitably be affixed to anothermaterial through sewing, such as leather, rubber, paper materials, andthe like. By way of example, FIG. 3 illustrates tag 3100 encapsulatedwithin fabric pocket 3000. Fabric pocket 3000 may then be sewn intojacket 5000 depicted in FIG. 5 so that the wireless tag becomes affixedto jacket 5000.

FIGS. 4-8 illustrate non-limiting embodiments of products incorporatingtags 1100. For example, FIG. 4 depicts a garment, such as a dress 4000with a garment tag 4100; garment tag 4100 may be a care tag (forexample, with instructions for cleaning dress 4000) and/or a tagspecifying the size and brand of the dress 4000. In the example of FIG.4, tag 1100 may be sewn or otherwise affixed to the garment tag 4100.For example, tag 1100 may be encapsulated within fabric pocket 3000,which may be sewn to the garment tag 4100.

FIG. 5 depicts an embodiment of an exemplary tag 1100 encapsulatedwithin the fabric pocket 3000, which is sewn into a clothing item 5000(e.g., a jacket). FIG. 6 depicts an exemplary tag 1100 on a hanginglabel 6100, which may be attached to product such as a pair of pants6000. In another non-limiting embodiment as depicted in FIG. 7, tag 1100may be affixed to a product such as a t-shirt 7000 by being placedbetween layers of the t-shirt, such that tag 1100 may be hidden fromview. By way of another example, as depicted in FIG. 8, tag 1100 may beadhered to product packaging, such as a container 8000. Garments and acontainer are illustrated for illustrative purposes only. As previouslydescribed, the tag can be associated in virtually tiny way withvirtually any item.

In some embodiments, the exemplary tag 1100 may be configured to harvestenergy in multiple frequency bands, and to power operation thereof usingthe harvested energy. For example, tag 1100 may include one antenna forharvesting energy, two antennae for harvesting energy, three antenna forharvesting energy, or any other number of antennae to harvest energy ina desired number of frequency bands. In some embodiments, tag 1100 maybe configured to harvest energy in a frequency band around 900 MHz WWISM (e.g., an ultra-high frequency RFID band between 860 MHz and 960MHz). For example, FIG. 9 illustrates an embodiment of the tagarchitecture of tag 1100 with an antenna 2112 tuned to receive energy ina frequency below 1 GHz (e.g., energy in a frequency band around 900MHz) and to convey received energy to a 900 MHz harvester 9012.Additionally, or alternatively, the exemplary tag may be configured toharvest energy in a frequency band around 2.4 GHz WW ISM (e.g., ambientand intentional energy sources around 2.45 GHz, such as Bluetooth andWi-Fi). For example, the exemplary tag architecture depicted in FIG. 9may additionally include an antenna 2114 tuned to receive energy in afrequency band around 2.4 GHz, and to convey received energy to a 2.4GHz harvester 9014. In some embodiments, harvested energy may beconveyed to a power manager 9010, which may store energy in an energystorage circuit 2108 or provide the harvested energy to powertransmission of signals from the tag to one or more receivers.

In some embodiments, an exemplary wireless communication tag 1100 mayinclude at least one transmitter configured to transmit a signal fromthe tag to one or more receivers. For example, tag 1100 may transmit aunique ID signal (optionally, along with status indicators and/or otherdata) in a frequency band around 2.4 GHz WW ISM. In some embodiments, anantenna configured to harvest energy may additionally be configured totransmit the tag's signal. For example, transmitter 2104 depicted inFIG. 9 may be configured to transmit signals having a frequency around2.4 GHz using antenna 2114; thus, antenna 2114 may be configured to bothharvest energy and to transmit tag signals. The exemplary tag 1100 mayadditionally include a switch 9034 configured to control the behavior ofantenna 2114 and to cause antenna 2114 to switch between a transmissionmode and an energy harvesting mode (e.g., under control of a beaconcontroller 9030 of transmitter 2104). In some alternative embodiments,the exemplary tag 1100 may include a signal transmitter that isconnected to an additional antenna, separate from the energy harvestingantennae.

In some embodiments, the exemplary wireless communication tag 1100 mayinclude at least one antenna configured to detect electromagneticfields, including fields generated by EA8 systems. In some embodiments,the antenna for detecting electromagnetic fields may include at leastone coil. For example, as depicted in FIGS. 2 and 9, tag 1100 mayinclude EAS coil 2110. Additionally, or alternatively, other types ofantennae for detecting electromagnetic fields may be incorporated in tag1100. Tag 1100 may include one antenna for detecting electromagneticfields, two antennae for detecting electromagnetic fields, three antennafor detecting electromagnetic fields, or any other number of antennae todetect a desired number of electromagnetic fields.

In some embodiments, EAS coil 2110 may be configured to detectelectromagnetic fields operating in one or more predetermined frequencyhands. For example, EAS coil 2110 may be configured to detect fields ina frequency band between 7-13 MHz and fields in a frequency band between58-60 kHz. As illustrated in FIG. 10, EA8 coil 2110 may include a tuningcapacitor 10200 controlled by controller 9020 to tune coil 2110 betweena mode for detecting fields in a first frequency band (e.g., 7-13 MHz)and a mode for detecting fields in a second frequency band (e.g., 58-60kHz). In some embodiments, EAS coil 2110 may be configured not toactivate a nearby EAS gate, even when coil 2110 detects an incident EASfield. That is, unlike traditional EAS tags that emit a detectablesignal (or create a detectable interference) when they receive anincident EAS field, coil 2110 may be configured to detect the EAS fieldwithout emitting a signal that will trigger the EAS gate alarm. In someembodiments, EAS coil 2110 may detect an incident electromagnetic fieldand gate detection circuit 2106 may determine if the field is receivedfrom an EAS gate (for example, if the field is in a frequency bandbetween 7-13 MHz or between 58-60 kHz). When an EAS field is detected,circuit 2106 may output an EAS detection signal to controller 9020,which may alter one or more signal transmission parameters of thetransmitter 2104 in response to detection of the EAS field, as discussedbelow.

Harvesting energy from multiple sources, in multiple frequency bands, asdescribed above, may provide several benefits for the exemplary tag.First, different frequency bands may have varying regulatory limits indifferent jurisdictions, allowing the tag to supplement its energyharvesting in a second band if there is insufficient power to beharvested in a first band.

In addition, harvesting energy from multiple sources may also enable theexemplary tag to adapt its behavior, including the ID signal beingtransmitted by transmitter 2104, based on a context in which the tag isoperating. In some embodiments, the tag's top level controller 9020 maybe configured to determine the type of energy being received by the tagand to control the operation of transmitter 2104 based on the type ofenergy received. For example, controller 9020 may be configured todetermine when antenna 2112 receives energy in at least onepredetermined frequency band (e.g., energy in a frequency below 1 GHz orenergy in a frequency band around 900 MHz) and to control transmitter2104 to operate in a first transmission mode based on the determination.Additionally, or alternatively, controller 9020 may be configured todetermine when antenna 2114 receives energy in at least onepredetermined frequency band (e.g., energy in a frequency band around2.4 GHz) and to control transmitter 2104 to operate in a secondtransmission mode based on the determination. Additionally, oralternatively, controller 9020 may be configured to determine when EAScoil 2110 receives energy in at least one predetermined frequency band(e.g., energy in a frequency band between 7-13 MHz and/or energy in afrequency band between 58-60 kHz) and to control transmitter 2104 tooperate in a third transmission mode based on the determination.Advantageously, the tag may be configured to identify its environmentbased on the frequency of incident energy and to adjust its behavior,including the control parameters of transmitter 2104, according to theidentified environment.

In some embodiments, the exemplary tag may be configured to store energylocally (e.g., in energy storage circuit 2108) and to transmit only itsunique ID signal in some embodiments (rather than, for example, a signalwith large amounts of data). This may reduce the amount of powerrequired to operate the transmitter, and the digital content of the tagas a whole, to levels much lower than those of prior, battery-drivendevices. For example, the exemplary tag may consume around 500 μA orless in an active state (e.g., while transmitter 2104 transmits one ormore signals) and may only require an idle current on the order ofnanoamperes. Additionally, or alternatively, the exemplary tag may beconfigured to power transmitter 2104 to actively transmit unsynchronizedBluetooth Low Energy (BLE) signals at around −10 dBm using onlyharvested energy, without the need for a battery or other power source.The foregoing examples are for non-limiting illustrative purposes only.Devices that use significantly more or less energy are also within thescope of this disclosure.

Advantageously, low levels of required power may enable the tag'stransmitter 2104 to achieve a transmission range of 10 meters or moreand, in embodiments in which the tag transmits unsynchronized BLEsignals, may enable more reliable reception of the tag's transmittedsignal than signals transmitted by RFID devices. This is driven mainlyby the use of Backscatter reception techniques in RFID protocols, whichmakes them significantly more sensitive to environmental interference,reflections and blocking, as compared to other communications protocols,such as BLE. For example, in some embodiments a reader receiving thetransmissions of the exemplary wireless communication tag may achievereceiver sensitivity levels of between −93 to −96 dBm, which is around10 dB better than prior RFID reader chips.

FIGS. 12-14 depict exemplary operation modes of a wireless communicationtag within the retail space illustrated in FIG. 11. It is to beunderstood that the subject matter discussed below is merely exemplaryand should not be regarded as limiting. The principles discussed beloware applicable to the numerous other platforms listed earlier. FIG. 12illustrates tag 1100 operating in a first mode referred to herein as“infrastructure-excitable mode” (an example of which may include a storemode), FIG. 13 illustrates tag 1100 operating in a second mode referredto herein as “user-excitable mode” (an example of which may include anInternet of Things (IoT) mode). FIG. 14 illustrates tag 1100 operatingin a third mode referred to herein as “gate mode.”

Tag 1100 may be configured to operate in the infrastructure-excitablemode of FIG. 12 when the tag is powered by environmental exciters, suchas exciters 11400 arranged throughout the establishment. In this mode,for example, a location where goods are stored or presented for sale cankeep track of its inventory. Each tag on each item can broadcast an ID,letting the system know it is still present in the establishment.Location tracking might also augment such a system so that not only isthe presence of the item tracked, but also its location. For example,the strength of the ID signal received might indicate an approximatelocation of the item relative to a particular receiver, or multiplereceives might be used to identify a more precise location, based on,for example, triangulation. Additional information stored in a systemdatabase might provide added value to a user. For example, the historyof an item's movement or ownership might be stored in a database, alongwith characteristics of the item. Thus, the transmission of a single IDfrom a tag, might provide a user with rich information when coupled withprestored data about the item. In some embodiments, additionalcharacterizing data may be stored on the tag for transmission.

Although FIG. 12 only illustrates a single exciter, tag 1100 may besimultaneously powered by multiple exciters. The exciters 11400(including, for example, exciter 11400 d) may be configured to deliverenergy 12100 to the tag in an RFID frequency band between 860-960 MHz.Additionally, or alternatively, tag 1100 may receive energy from othersources having a frequency around 900 MHz. Energy 12100 may be receivedby antenna 2112 and may be stored in the energy storage circuit 2108 topower operation of the tag.

When infrastructure-excitable mode is triggered, tag 1100 may controlthe transmitter 2104 to broadcast the tag's ID signal 12200 in afrequency band around 2.4 GHz with a low repetition period. For example,the tag may transmit ID signal 12200 with a minimum repetition period of10 minutes, with an added randomized period of up to five minutes,resulting in one broadcast every 12.5 minutes on average. Alternatively,the repetition period for a tag may be longer or shorter (e.g., lessthan five minutes, hours, or days). In some cases, a transmission of theID signal 12200 may have a duration of around 300 μs; however, thetransmission duration may be longer or shorter in alternativeembodiments.

In the example illustrated in FIGS. 11-14, a plurality of receivers11300 a-h may be arranged throughout an establishment and configured toreceive broadcasts of the ID signals 12200 from all of the wirelesscommunication tags within, or in proximity to, the establishment.Because transmitter 2104 may have a broadcast range of 10 meters or more(e.g., 15 meters in some cases or more), the transmitted ID signal 12200may be received by multiple receivers 11300 e and 11300 f in some cases,thus reducing the probability of signal misdetection. In other cases,one receiver may receive the broadcast of ID signal 12200. When areceiver receives an ID signal 12200 from a tag, the signal may berelayed to one or more processors (such as a processor within theestablishment and/or a remote platform server) for processing, analysis,and/or storage. As discussed above, the exemplary system mayadditionally or alternatively include one or more receiver/exciterdevices, such as device 1124, which may be configured to deliver energy12100 to the wireless communication tags (similar to exciters 11400) andto receive broadcasts of the ID signals 12200 from the wirelesscommunication tags (similar to receivers 11300); that is, device 1124may act both as an exciter and a receiver. In some alternativeembodiments, such as the embodiment illustrated in FIG. 11, exciters11400 and receivers 11300 may be configured as separate devices.

In embodiments in which multiple wireless identification tags are usedwithin the same establishment, three or more channels in the BLEstandard (between 2.400-2.4835 GHz WW ISM) may be used for the tags tobroadcast their respective ID signals to the receivers. For example,each tag may randomly select one of the three advertisement channels pertransmission. This use of multiple channels, combined with the shortduration and low repetition period of each signal transmission, mayminimize the likelihood of collisions between different tags'transmissions. In addition, each tag may conserve harvested energy whilein the infrastructure-excitable mode due to the infrequency of signaltransmission and the small amount of power required for eachtransmission.

Tag 1100 may be configured to operate in the user-excitable mode of FIG.13 when the tag receives energy from ambient and intentional 2.4 GHzsources, such as Bluetooth and Wi-Fi devices. In some embodiments, auser may trigger the user-excitable mode in tag 1100 by scanning the tagwith a 2.4 GHz device, such as a smartphone, tablet, or any other deviceconfigured to transmit a 2.4 GHz trigger signal 13100 to the tag. Thismay permit a user to receive information about an item based on a scanof its tag. For example, when the scan occurs, an ID may be transmittedto a server (e.g., either via network infrastructure or via areceiver/transmitter in a device controlled by the user.) The server canthen perform a look up of information and transmits it to the user'sdevice. The user might be enabled to define the type of informationrequested to tailor the output to the user's needs. In an alternativeembodiment, the relevant data may already be stored on the user'sdevice, and the lookup may occur on the user's device instead of beingsent to a server for analysis.

In the example shown in FIG. 13, the user may activate theuser-excitable mode in tag 1100 within a retail establishment; however,user-excitable mode may be triggered in other locations andcircumstances, such as when a user scans an item (or a shelf of items intheir closet) at home using their smartphone, or during manual inventoryscanning (e.g., in a warehouse or other storage facility).

When user-excitable mode is triggered, tag 1100 may harvest the incident2.4 GHz energy to charge the energy storage circuit 2108. Additionally,when tag 1100 determines that 2.4 GHz energy was received by antenna2114, transmitter 2104 may transmit ID signal 12200 in a frequency bandaround 2.4 GHz. However, beacon controller 9030 may adjust therepetition period of the ID signal to be much faster than the repetitionperiod of the ID signal in the infrastructure-excitable mode. Forexample, transmitter 2104 may broadcast the ID signal 12200 less than 10seconds after the 2.4 GHz signal 13100 is received by antenna 2114, fora signal duration of about 300 μs. Alternatively, longer or shorterrepetition periods may be implemented in the user-excitable mode. Byimplementing a shorter response period in user-excitable mode, the tagmay provide a prompt response to the user when the user-excitable modeis triggered; in comparison, such a prompt response may not be needed inthe infrastructure-excitable mode. In some embodiments, beaconcontroller 9030 may also lower the transmission power when the tagenters user-excitable mode from infrastructure-excitable mode, in orderto minimize the chances of interference with other devices operating inthe 2.4 GHz frequency band at the same time.

In some embodiments, the tag may broadcast ID signal 12200 back todevice 11200 in user-excitable mode. Additionally, or alternatively, thetag may broadcast ID signal 12200 to one or more receivers around theestablishment (e.g., receiver 11300 c in FIG. 13). In some embodiments,tag transmissions in user-excitable mode may be broadcast over one ofthe three or more BLE channels discussed above, with each tag randomlyselecting one of the three channels per transmission.

Tag 1100 may be configured to operate in the gate mode of FIG. 14 whenEAS coil 2110 receives an EAS signal 14100 from EAS gate 1112, 1114. Insome embodiments, EAS signal 14100 may have a frequency within a bandbetween 7-13 MHz or a band between 58-60 kHz. EAS gate 1112, 1114 may beinstalled near the exit of the establishment and may emit signals 14100that are more localized than RFID, Wi-Fi, Bluetooth, or otherradio-frequency transmissions, providing an accurate indication of whena tagged item passes through the gate (rather than merely walking nearthe gate). For example, instead of requiring customers to visit acheckout station or register, the user might be permitted to walk out ofthe store with tagged items. The gate may then read the tags and anidentity of the user, such as through the user's mobile device, and sendan inventory of the items to be purchased to a server which looks up theprices of the items and automatically charges the user's credit or debitaccount, or automatically transfers funds from the user's electronicwallet to the seller.

When gate mode is triggered, beacon controller 9030 may control thetransmitter 2104 to transmit a short, powerful burst of the ID signal12200. For example, transmitter 2104 may transmit the ID signal at itsfull output power for a period of approximately 200 ms, with arepetition period of between 10-80 ms, such that, multiple transmissionsoccur during a very short time-frame. The ID signal 12200 may bereceived by a dedicated receiver 11300 h in proximity to the EAS gate;however, the EAS gate itself may not be triggered by the tag 1100 due tothe configuration of EAS coil 2110 and its associated circuitry. In someembodiments, tag 1100 may be configured to operate in the gate mode fora predetermined length of time or for a predetermined number oftransmissions of the ID signal 12200, after which it may revert to thetag's previous operation mode or to a default mode (which may be, forexample, infrastructure-excitable mode).

Disclosed embodiments may include a wireless identification tag forassociation with a product to enable product self-identification. Awireless identification tag may include any wirelessly detectabledevice, such as, for example, a radio-frequency identification (RFID)device, a Bluetooth Low Energy (BLE) beacon device, a device including amicrocontroller powered by radio-frequency energy, or any otherstructure configured to transmit signals capable of detection. A productmay include any item with which a tag may be associated. By way ofnon-limiting examples, a product may include tools, clothing,electronics, consumer goods, equipment, vehicles, consumables,packaging, accessories, supplies, materials, artistry, animals, persons,instruments, pallets, containers, pharmaceuticals, commodities,articles, devices, machinery, implements, mechanisms, furniture, or anyother object. A wireless identification tag may be associated with aproduct to enable the product, via the tag, to provideself-identification. A wireless identification tag may be associatedwith a product through adhesive, embedding, sewing, mounting, bonding,friction fit, pocketing, tying, wrapping, fastening, or any other typeof physical association. For example, if a product is made of fabric, atag may be sown into the fabric, embedded between layers of fabric,adhered to the fabric, attached to the fabric via a hanging tag, orconnected to the fabric in any other wav that enables a physicalassociation. Self-identification may, for example, include communicatingor transmitting data containing identification information, such as anidentifying inventory number, a barcode, or any other data formcontaining information enabling product identification, identificationof one or more product characteristics, or information related in someway to the product, its operation, or its use. Embodiments of a wirelessidentification tag may include any device suitable to attach to anyobject for the purpose of identifying the object visually, tactilely,audibly, or electronically without the use of externally connectedcables or wires. Other embodiments may be embedded into an item as partof the manufacturing process or later, for example by a retailer. Insome embodiments, the wireless identification tag may not require abattery but may operate on harvested energy (as disclosed herein). Insome embodiments the wireless identification tag may include a devicesmall enough to be embedded into an item, for example, clothing, duringmanufacture. In some embodiments, the embedded tag may not be readilydetected by a wearer. Other embodiments may remain embedded or attachedto an item for long periods of time, for example, many years. Someembodiments of the wireless identification tag may be resistive to dustand water, such as up to IP67 standards. Other embodiments may beresistive to washing, drying, dry-cleaning, and ironing.

In disclosed embodiments, the tag may include at least one antenna tunedto receive energy. An antenna may include any structure configured totransmit or receive electromagnetic waves. For example, an antenna mayinclude one or more conducting elements and/or non-conducting dielectricelements arranged in a manner enabling the transmission and/or receptionof radio signals, or any other component and/or device configured forreceiving and/or transmitting energy from the air or from any othermedium in which the antenna is placed. The antenna may also beelectrically coupled to at least one separate receiver and/ortransmitter, directly or wirelessly, and may be configured to transmitand receive energy in all directions equally (omnidirectional antennae)or preferentially in one or more particular directions (directional or“beam” antennae). In some embodiments, an antenna may also be configuredto intercept at least a portion of the energy contained in a radio waveor other electromagnetic wave to produce an electric current at one ormore of its terminals.

In some embodiments, an antenna may also include a circuit used totransform a signal from a conducted input to a radiated output (intransmission) and/or to transform a signal from a radiated input to aconducted output (in reception). The radiated signal may beelectromagnetic radiation, or electric fields or magnetic fields, andthe conducted signal may be a time-varying voltage or current signalover a physical connection such as a metal wire or printed circuit (alsoknown as a conductor). In some embodiments, the radiated signal may beacoustic (such as in sonar applications) or optical (such as in laserapplications). An antenna may be passive (which means that no externalpower is needed other than the signal to be transmitted or received) oractive (which means that an external power source is needed to power theactive circuits). A passive antenna may be implemented as a series ofconductors printed on a printed circuit board (PCB), and may beconnected to the rest of the circuit either through direct connection,through electrical or magnetic coupling, or any other suitable form ofelectronic connection.

By way of example, wireless identification tag 1100 illustrated in FIG.15 may include antennae 15002A, 15002B, and 15002C. Antennae 15002A,15002B, and 15002C may be configured to transmit and/or receivedifferent types of electromagnetic signals. In some embodiments, anycombination of antennae 15002A, 15002B, and 15002C may be integratedwithin a single antenna unit.

Disclosed embodiments may include at least one antenna tuned to receiveenergy transmitted at a first frequency within a frequency band around900 MHz and at a second frequency within a frequency band around 2.4GHz. Consistent with the present disclosure, energy may refer to aquantity which measures an ability to perform mirk, or to exert powerfor a certain length of time (e.g., the product of the power and thelength of time being equal to the energy spent). Energy may betransferred in many forms, such as electrical, magnetic,electromagnetic, kinetic, acoustic, thermal, photonic, or other sources.Energy may also be stored in many forms, such as electrostatic,magnetic, chemical, kinetic, thermal, or other forms. In the context ofelectrical or electronic circuits, electrical energy may include DC(direct current) or AC (alternating current), although other forms ofelectric energy may also be used in connection with disclosedembodiments.

Consistent with the present disclosure, a frequency hand may refer to aportion of a radio spectrum and/or an electromagnetic spectrum. Forexample, a frequency hand may refer to a portion of a spectrum reservedinternationally for particular industrial, scientific, and medical (ISM)purposes. In this context, the term “reserved” may refer to designatinga frequency band, or range of frequencies, for a single purpose orapplication. In many jurisdictions, frequency bands may be reservedand/or designated by law, regulation, or any other applicable standardsor protocols. In general, a frequency band may refer to any spectrumportion that may be used in the fields such as broadcasting,radiocommunication, wireless telecommunications (e.g., cell phones),near field communications (NFC), wireless computer networks (e.g.,Wi-Fi), or for any other means of wireless communication, as well asother fields and/or uses such as radar, scientific measurements,beacons, guard bands separating between frequency bands dedicated fordifferent uses and kept empty to reduce interference, and other fieldsand/or uses requiring the transmission or reception of electromagneticenergy.

In general, a frequency band around 900 MHz may refer to any one or moreportions of the ultra-high frequency (UHF) band generally reserved forRFID purposes. The specific portion of the UHF band reserved for RFIDpurposes, however, may vary depending on region and/or jurisdiction. Forexample, many jurisdictions may reserve one of two standard frequencyhands, such as 902-928 MHz (e.g., United States) and 865-868 MHz (e.g.,European Union), for UHF RFID technology; however, some jurisdictionsmay adopt multiple bands and/or other unique bands outside of thisstandard. One such country (e.g., Japan) previously used two uniquefrequency bands for UHF RFID purposes (952-956.4 MHz and 952-957.6 MHz),both of which are outside the standard range, but for purposes of thisdisclosure and in this context, are within a frequency band around 900MHz. Further, designated frequency bands tire subject to change. Forexample, Japan later changed the designated frequency band for UHF RFIDtechnology to 916.7-920.9 MHz, which for purposes of this disclosure andthis context are within a frequency band around 900 MHz. Therefore,reference to a particular frequency band within the context of thisdisclosure is not necessarily fixed, but rather is subject to changingregulations, standards, protocols and industry norms. Accordingly, it isto be understood that “a frequency band around 900 MHz” may refer to awide range of potential frequency bands, consistent with the presentdisclosure.

Consistent with the present disclosure, a frequency band of around 2.4GHz may refer to any one or more portions of the UHF band designated forthe use of radiofrequency energy in a wide variety of scientific,medical, and industrial applications. Some non-limiting examples ofdevices that may operate within a frequency band of mound 2.4 GHz mayinclude cell phones, desktops, laptops, video game consoles,smartphones, tablets, smart TVs, digital audio players, cars, modernprinters, and other devices capable of wireless communication. Servicesand users of a frequency band of around 2.4 GHz may use certainradiocommunication technologies, such as Wi-Fi, Bluetooth Low Energy(BLE), and Classic Bluetooth, for wireless local area networking andpersonal area networking. Many jurisdictions may reserve one or more ofa plurality of frequency bands in the standard 2.4 GHz range for suchtechnologies; however, some jurisdictions may adopt multiple bandsand/or other unique bands outside of this standard.

As with frequency hands generally designated for UHD RFID, the frequencybands around 2.4 GHz designated for similar purposes may vary accordingto region and jurisdiction and may be subject to change. For example,according to the Institute of Electrical and Electronics Engineers(IEEE) 802.11, a set of local area network (LAN) protocols specifies aset of media access control (MAC) and physical layer (PHY) protocols forimplementing WLAN Wi-Fi communications in frequencies includingfrequency bands around 2.4 GHz and is the world's most widely usedstandard for wireless computer networking. Over time, the IEEE hasamended 802.11 to designate frequency bands outside of the 2.4 GHz rangefor similar purposes, such as 5 GHz and even 60 GHz. Therefore, it maybe contemplated that the standard frequency ranges for wireless computernetworking may be subject to change in the future. Accordingly, it is tobe understood that “bands around 2.4 GHz” may refer to a wide range ofpotential frequency bands, consistent with the present disclosure.

Disclosed embodiments may include at least one antenna including a firstantenna tuned to receive energy transmitted at a frequency within afirst frequency range of 900 MHz WW ISM; and a second antenna tuned toreceive energy transmitted at a frequency within a second frequencyrange of 2.4 GHz WW ISM. In general, a frequency range of 900 MHz WW ISMand 2.4 GHz WW ISM may refer to frequency ranges of around 900 MHz and2.4 GHz, respectively, as previously discussed. The term “WW ISM” mayrefer generally to frequency ranges that have been designated forvarious industrial, scientific, and medical (ISM) purposes byinternational, or world-wide (WW), protocols and/or standards, such asIEEE protocols or ITU guidelines, for example. Although certainfrequency bands may be designated for particular purposes by aninternational authority, organization, and/or regulatory institutions,the particular frequency bands used for such purposes may vary dependingon region or jurisdiction, such that some regions and jurisdictions maydesignate frequency bands that are outside the frequency rangesdesignated by international standards and/or protocols but arenonetheless used for similar purposes. Accordingly, it is to beunderstood that a WW ISM frequency range may refer to a wide range offrequency bands that may or may not fall within international standardsand/or protocols.

In some embodiments, however, at least one antenna may include one ormore antennae tuned to receive energy transmitted in one or morefrequency bands or frequency ranges. For example, a single antenna maybe tuned to receive energy transmitted in multiple frequency bands ofaround 900 MHz, multiple frequency bands of around 2.4 GHz, or both.Accordingly, an antenna tuned to receive energy transmitted at afrequency within a frequency range of around 900 MHz WW ISM may also betuned to receive energy transmitted at a frequency within anotherfrequency range, and an antenna tuned to receive energy transmitted at afrequency within a frequency range of around 2.4 GHz WW ISM may be tunedto receive energy transmitted at a frequency within another frequencyrange.

By way of example, FIGS. 9 and 10 illustrate exemplary structures of awireless identification tag. In these figures, antenna 2112 may be tunedto receive energy transmitted at a frequency within a frequency range ofaround 900 MHz, and antenna 2114 may be tuned to receive energytransmitted in a frequency band of around 2.4 GHz. However, the wirelessidentification tag may also include any number of these antennae, andeach antenna may be tuned to receive energy transmitted in one or moreof any frequency bands and may also be configured to transmit signalthemselves.

Disclosed embodiments may include at least one transmitter configured tosend at least one identification signal. A transmitter may be configuredto send a signal over a communication medium. The signal may carry data(as in the case of communication systems such as Wi-Fi, Bluetooth,cellular communication, Ethernet communication or any otherstandards-based or proprietary protocol) and/or carry energy (as in thecase of exciters for some RFID devices, X-ray imaging or radar). In somecontexts the term “transmitter” may involve wireless communication, suchthat the signal is an electric signal, a magnetic signal or anelectromagnetic signal, and the medium is over-the-air wirelesscommunication. In general, however, a transmitter may include anycomponent or device capable of sending a signal, consistent with thepresent disclosure.

In some embodiments, an identification signal may include a collectionof data, transmitted over an agreed communication medium using an agreedcommunication protocol, which includes amongst the transmitted data aunique identifier. The communication medium may include acoustictransmission, visual transmission, wireline communications, wirelesscommunications, fiber-optic communication, or any other suitable mediumfor carrying transmitted signals. The communication protocol may be astandards-based protocol such as 802.3 Ethernet, AD8L/VDSL/8DSL wiredprotocols, Wi-Fi, Bluetooth, GSM, 3G, LTE, 5G, ZigBee, Z-wave wirelessprotocols, a proprietary protocol agreed on by the transmitter andreceiver, or any other set of rules with reference to communicationbetween various electronic devices. Regardless of the underlyingcommunication protocol, however, the data may be encrypted, scrambled orotherwise disguised by the transmitter in a manner which is decipherableby the receiver, as long as such encryption, scrambling or disguise wereagreed upon between the transmitter and receiver at a previous point intime as part of the communication protocol. The data may include theunique identifier alone, or it may include other fields such aspreambles, midambles, and postambles, addresses and other identifiers,status fields and/or any other data which may be transmitted from thetransmitter to the receiver. In general, however, an identificationsignal may be any signal containing information associated with thetransmitter and/or transmitting device. By way of example, signals15104A, 15104B, and 15104C depicted in FIG. 15 may include or otherwiseconstitute an identification signal.

Disclosed embodiments may include at least one circuit. A circuit mayinclude two or more interconnected components. Some non-limitingexamples may include a combination of components and/or de vices,implemented as part of a silicon chip, as part of a printed-circuitboard, as pint of a connectorized system or as a combination of any ofthe above, connected in a manner enabling the performance of a desiredfunction or reaction. The function or reaction may as a response to oneor more inputs, stimuli and/or triggers, generated internally inside thecircuit or external to it. The function or reaction may include controlof other circuits, generating visual, audible, or otherwise communicablealerts or signals, performing predefined coded operations, or any otherelectronic-based function. For example, the components and/or devicesmay include resistors, capacitors, inductors, conductors, transistors,diodes, transmission lines, inverters, buffers, logic gates, latches,flip-flops, amplifiers, comparators, voltage sources, current sources,switches, or any other components and/or devices configured to controlelectronics. The inputs, stimuli, and/or triggers may include a voltagelevel change, a current level change, a frequency, amplitude or phasechange of a received signal, a digital input, a digital pulse, a controlword, or any other form of input configured to generate a response fromthe circuit. In general, however, a circuit may include any components,devices, or combinations thereof configured to perform any one or moreof the electronic functions consistent with the present disclosure.

By way of example, in FIG. 2, tag 1100 may include at least one circuit,such as gate detection circuit 2106 and energy storage circuit 2108. Asillustrated in FIG. 15, wireless identification tag 1100 may includecircuit 15006. Further, FIGS. 9 and 10 illustrate an exemplaryconfiguration of circuits that may be used to perform certain functionsconsistent with the present disclosure.

Disclosed embodiments may also include at least one circuit configuredto detect whether energy is received in tire first frequency or thesecond frequency. Detecting whether the energy is received in the firstfrequency or the second frequency may include discovering, identifying,or otherwise discerning the presence of a signal and/or energy in thefirst and/or second frequency in the environment of the wirelessidentification tag. For example, the circuit may be electricallyconnected to the at least one antenna, such that the at least oneantenna may cause at least one form of input, stimulus, or triggerassociated with received energy in the first and/or second frequency tobe received by the at least one circuit. The circuit may be configured,upon receipt of at least one form of input, stimulus, or trigger, todetermine whether the input, stimulus, or trigger includes energy in thefirst and/or second frequency. By way of example with respect to FIG.15, antennae 15002A, 15002B, and 15002C may be tuned to differingfrequencies, and circuit 15006 may be configured to detect the presenceof energy 15102A, energy 15102B, and/or energy 15102C associated with afirst, second, and/or third frequency, respectively, by detecting theantenna through which the signal was received. In addition, oralternatively, the tag may include circuitry to detect a characteristic,such as a frequency, of the incoming signal. In such instances, a singlemultifrequency antenna may be employed instead of the multiple antennaeillustrated in FIG. 15.

Disclosed embodiments may also include at least one circuit configuredto cause the at least one transmitter to operate in a first mode to senda first form of identification signal when the first frequency isdetected, and to operate in a second mode to cause the at least onetransmitter to send a second form of identification signal when thesecond frequency is detected. For example, a first mode may refer to astep where a first signal is sent, and a second mode may refer to a stepwhere a second signal sent. The first and second modes, may also referto differing operating characteristics. These characteristics mayinclude communication medium, communication protocols, frequencies,frequency ranges, frequency bands, types of encryption, scrambling,and/or disguising, data content, timing of transmission, and/or anyother distinguishable characteristic that may be associated with theidentification signal to be transmitted. For example, the at least onecircuit, upon detecting that energy received in the first frequency fromthe at least one antenna, may cause the at least one transmitter tooperate in a first mode, wherein the first mode is associated with anidentification signal having any one or more characteristics orcombinations of characteristics as described above. In some embodiments,however, the first mode may also be associated with non-transmission, orthe prevention of transmission, of an identification signal. Similarly,the at least one circuit may cause the at least one transmitter tooperate in a second mode upon detecting that energy in the secondfrequency has been received by the at least one antenna.

By way of example, circuit 15006 in FIG. 15 may detect energy 15102Areceived by one or more of antennae 15002A-C. In response to thisdetection, circuit 15006 may cause any one or more of transmitters15004A-C to operate in a first mode. Operating in the first mode, forexample, may include transmitting one or more of signals 15104A-C,wherein signals 15104A-C may have different characteristics such thateach signal is distinguishable from one another in at least one aspect.Circuit 15006 may also detect receipt of energy 15102B by one or more ofantennae 15002A-C. In response to this detection, circuit 15006 maycause any one or more of transmitters 15004A-C to operate in a secondmode. Operating in the second mode, tor example, may includetransmitting one or more of signals 15104A-C, wherein one or more ofsignals 15104A-C may be different, either alone or in combination, fromthe signals 15104 A-C transmitted in the first mode.

Consistent with some disclosed embodiments, at least one of a first formof identification signal or a second form of identification signal mayinclude a unique identifier of the wireless identification tag. A uniqueidentifier may include a number, string, or other form of data which issingularly associated with an identified entity, such that no singleentity is associated with the same unique identifier as any otherentity, and any single entity may have only a single unique identifierassociated with it. Unique identifiers may include serial numbers,unique EPC codes, database entries (as long as each database entryrepresents a single entity, and all relevant entities are represented byexactly one entry in the database), or any other form of data singularlyassociated with an identified entity. By way of example, wirelessidentification tag 1100 depicted in FIG. 15 may transmit at least oneform of identification signal, such as signals 15104A-C, depending on atriggering input signal, such as 15102A-C.

In disclosed embodiments, at least one transmitter may be configured tosend the first form of identification signal and the second form ofidentification signal at a same transmission frequency. In other words,the at least one transmitter, while operating in the first mode, maytransmit a first form of identification signal that has the same orsubstantially similar frequency (e.g., 2.4 GHz) to that of the secondform of identification signal transmitted when the transmitter operatesin the second mode. Thus, the frequencies associated with the first formof identification signal and the second form of identification signalmay not necessarily be different. However, the first form ofidentification signal may nonetheless be associated with any number ofcharacteristics that are distinguishable from the characteristics of thesecond form of identification signal (e.g., content of informationtransmitted, communication medium, communication protocols, types ofencryption, scrambling, and/or disguising, data content, timing oftransmission). By way of example, at least one of transmitters 15004A-Cmay transmit a first form of identification signal 15104A whileoperating in a first mode and may transmit a second form ofidentification signal 15104B while operating in a second mode. Althoughsignal 15104A and signal 15104B may be associated with distinguishablecharacteristics, the transmitters may nonetheless be configured totransmit them at the same frequency.

In some embodiments, the transmission frequency of the first and secondform of identification signals is the second frequency. For example,regardless of the information transmitted, transmission of the first andsecond forms of identification signal may occur in a common frequency,such as the second frequency. Thus, for example, the at least onetransmitter, while operating in the first mode, may transmit a firstform of identification signal that has the same or substantially similarfrequency to the transmission of the second form of identification. Thecommon frequency, for example, may be within a frequency band of around2.4 GHz. With reference to the example of FIG. 15, at least one oftransmitters 15004A-C may transmit a first form of identification signal15104A while operating in a first mode and may transmit a second form ofidentification signal 15104B while operating in a second mode. Althoughsignal 15104A and signal 15104B may be associated with distinguishablecharacteristics, the transmitters may nonetheless be configured totransmit them at the same frequency of the second energy 15102B receivedby at least one of antennae 15002A-C.

Disclosed embodiments may include at least one transmitter configured tosend the first form of identification signal and the second form ofidentification signal at different power levels. A transmitter may bedesigned to send its signals over the communication medium at a certainmagnitude. This magnitude may be used to calculate certain properties ofthe propagation of the signal over the communication medium,establishing such parameters as the range a signal may be detected at,the signal-to-noise ratio, interference properties etc. In the contextof wireless communication, this magnitude may be measured in units ofpower, usually either Watts or dBW (decibel-Watts or dB-Watts) which isa logarithmic unit related to Watts (or sometimes in units of dBm, whichis related to milliwatts in the same manner dBW is related to Watts). Inthat sense, a “power level” may refer, for example, to a powermeasurement immediately at the output of the transmitter, while thetransmitter is actively transmitting. A transmitter may be designed tohave a configurable power level, such that in response to certain inputsit may transmit a signal at one of two or more different power levels.

By way of example, at least one of transmitters 15004A-C may transmit afirst form of identification signal 15104A while operating in a firstmode and may transmit a second form of identification signal 15104Bwhile operating in a second mode. Although signal 15104A and signal15104B may be transmitted at the same frequency, the power level ofsignal 15104A may be different than the power level of signal 15104B.

In some disclosed embodiments, at least one transmitter may beconfigured to send the second form of identification signal less thanten seconds after the second frequency is detected. For example, thetransmitter may be configured to send the second form of identificationsignal immediately upon detecting the second frequency. In someembodiments, however, the transmitter may be configured to send thesecond form of identification signal after a delay period, which may beunder ten seconds, following the detection of the second frequency. Byway of example, transmitter 15004B may be configured to transmit asecond form of identification signal 15104B five seconds after (or anyother time period after) energy 15102B in a second frequency is detectedby circuit 15006. This time period may include inherent delays in thesystem (such as response times of the detector used to detect energy15102B received by antenna 15002B, or the processing time required bythe circuit 15006 to receive the indication from the detector, processthe input, arrive at the conclusion that transmitter 15004B is requiredto transmit the second form of identification signal 15104B, and relaysuch a command, control, or signal to transmitter 15004B to perform thisoperation). Additionally, or alternatively, this time period may includeintentional delays, such as pauses, wait-times, swallowed clock-cycles,timers and watch-dog mechanisms, which may be configured to cause anaction to occur at a later time and not immediately.

In some disclosed embodiments at least one transmitter may, in a firstmode, be configured to send the first form of identification signal witha first repetition period. A repetition period may refer to a timeinterval between pulses of an identification signal sent by thetransmitter. For example, in some embodiments, transmitting anidentification signal may not necessarily include continuouslytransmitting the signal without interruption, and may instead includetransmitting short bursts of the signal with a fixed or variable timeinterval in between bursts. In this respect, a repetition period mayrefer to the temporal periodicity of the signal bursts. By way ofexample, transmitter 15004A may be configured to send a first form ofidentification signal 15104A with a first repetition period, wherein therepetition period refers to the fixed amount of time between the strutof a burst and the start of the next burst. In some disclosedembodiments, at least one transmitter may, in a second mode, beconfigured to send the second form of identification signal with asecond repetition period, shorter than the first repetition period. Byway of example, transmitter 15004B may be configured to send a secondform of identification signal 15104B with a second repetition period,where the second repetition period is shorter than the repetition periodof tire first form of identification signal 15104A.

In some embodiments, the first form of identification signal may differfrom the second form of identification signal in at least one of arepetition period, a frequency channel, a transmission power, ortransmitted data associated with the identification signal sent. Asdiscussed previously, a repetition period may refer to the periodicityof bursts of the given identification signed. A frequency channel mayrefer to a single frequency, frequency range, or frequency band that maybe used for a particular purpose. The different forms of identificationsignals may also differ in their transmission power, which may refer tothe power levels previously discussed and/or the magnitude of thetransmission. The transmitted data may include a unique identifier butmay also contain any other type of information. By way of example, afirst form of identification signal 15104A and a second form ofidentification signal 15104B may have any number of the differentcharacteristics listed above. For example, they may have different arepetition period, a frequency channel, a transmission power, and/ortransmitted data associated with the identification signals sent.

Disclosed embodiments may also include at least one energy storagecomponent electrically connected to the at least one antenna. The energystorage component may include any element or circuit enabled toaccumulate energy. Non-limiting examples include capacitors,supercapacitors, and batteries. By way of example, the at least oneenergy storage component may include an electrical element or a circuitdesigned to receive energy from a source in one form (e.g., a waveform),store it locally in a second form (e.g., a voltage), and make itavailable for usage by other circuits, components, and/or deviceselectrically connected to it, either immediately or at a later timeafter receiving the energy. This may be accomplished, for example, withrectifying circuitry, or a rectenna. The antenna portion of a rectennacan be almost any form of antenna suitable for the frequency band ofinterest. Options include a monopole, dipole, or microstrip patchfabricated on printed-circuit board (PCB) inverted-F structures, arraysof such or other antenna elements, as well as many other antenna types,along with rectifying circuitry based on nonlinear rectifying devices(such as Schottky or IMP ATT diodes, or diode-connected transistors).The antenna may be joined to the rectifying circuitry by means ofimpedance-matching circuitry and filters, such as lowpass filters, toblock any harmonics generated by the diodes. In the context ofelectronic circuits, energy storage components may include capacitors,supercapacitors, batteries, or any other circuits, components, ordevices capable of receiving energy, storing energy, and making energyavailable. By way of example, an energy storage component may includeone or more of components depicted in FIGS. 2, 9, 10, and 15, such asenergy storage circuit 2108, storage capacitor 10300, and/or energystorage component 15008. Any one or more of the components, for example,may be configured to receive energy from antennae 2112, 2114, and/or15002A-C, store the received energy, and make the energy available toother components in tag 1100. In one example, energy received in oneform may be stored in a second form and may be provided to components ina third form.

Disclosed embodiments may further include at least one energy storagecomponent configured to store the energy received by the at least oneantenna. For example, once any one or more of the antennae of a wirelessidentification tag receive energy in any frequency, the wirelessidentification tag may be configured such that the received energy istransferred to and received by the at least one energy storagecomponent. By way of example, antenna 15002A may receive energy 15102A.The components of the wireless identification tag may be configured suchthat this energy is transferred to energy storage component 15008.Energy storage component may, for example, receive this energy and storethe energy in another form in response thereto.

In some embodiments, at least one energy storage component may beconfigured to store energy received in the first frequency and thesecond frequency. For example, regardless of the incoming frequency ofan input signal, the energy storage component, through association withappropriate circuitry or intermediate components, may receive and storeassociated energy. By way of example, antennae 15002A and 15002B mayreceive energy 15102A and 15102B in a first frequency and in a secondfrequency, respectively. The components of the wireless identificationtag may be configured such that both energy 15102A and 15102B may betransferred to energy storage component 15008. Energy 15102A and 15102Bmay be received by the antennae in RF form and may be stored in theenergy storage component 15008 as electrostatic charge, or as chemicalbonds in a medium residing between two battery electrodes; both of thesemechanisms may result in a voltage output of the energy storagecomponent that can be used by other circuit and components in thewireless identification tag. The energy 15102A and 15102B mayalternatively be stored in the energy storage component 15008 in oilierforms suitable for later use of the stored energy for powering variouscomponents of the wireless identification tag.

According to some disclosed embodiments an energy storage component maybe configured to utilize the energy received by the at least one antennato power the wireless identification tag. For example, the at least oneenergy storage component may be configured in such a manner that anycomponent that requires power to operate may have access to the storedenergy. The at least one energy storage component may, for example, beelectrically connected to several of the components of the wirelessidentification tag in order to power the components by providing themwith the stored energy. By way of example, energy storage component15008 may be configured to power wireless identification tag 1100 byproviding its stored energy to any one or more of the components ofwireless identification tag 1100 (e.g., transmitters 15004A-C, circuit15006), as necessary.

In some embodiments, the at least one energy storage component mayinclude at least one capacitor. A capacitor may refer to ceramiccapacitors, film capacitors, power film capacitors, electrolyticcapacitors, supercapacitors, class X and class Y capacitors, othermiscellaneous or variable capacitors, or any other device suitable forstoring electrical energy in an electric field using two terminals. Byway of example, energy storage circuit 2108 may contain at least onestorage capacitor 10300.

Disclosed embodiments may also include at least one circuit configuredto power the at least one transmitter using energy from the at least onecapacitor in order to send the at least one identification signal. Insome embodiments, powering the at least one transmitter may includereceiving the energy stored in the capacitor and forwarding the energyto the transmitter, or any other suitable method for controlling theflow of energy in wireless identification tag 1100 so that the energymay be provided to at least one of transmitters 15004A-C. By wav ofexample, capacitor 15100, which may be part of energy storage component15008, may store energy received from any one of antennae 15002A-C.Capacitor 15100 may be used to power circuit 15006 as well astransmitters 15004A-C. Circuit 15006, for example, may include logic fordetermining an appropriate signal for transmission. Thus, in oneexample, the circuit 15006 may be both powered by capacitor 15100 andmay regulate energy from the capacitor to an appropriate transmitter.While energy storage component 15008 is illustrated schematically with asingle box designating capacitor 15100, it is to be appreciated thatsuch a designation is intended to refer to one or more capacitors. Forexample, as is described in other portions of this disclosure, multiplecapacitors having the same or differing capacitance may be employed.

According to disclosed embodiments, at least one circuit may beconfigured to cause the at least one transmitter to transmit in thesecond mode using energy received in at least one of the first frequencyor the second frequency. For example, the at least one circuit may beconfigured to cause the at least one transmitter to transmit in thesecond mode using either or both of energy received in the firstfrequency and energy received in the second frequency. As illustrated inthe example of FIG. 15, circuit 15006 may be configured to causetransmitter 15004B to transmit in a second mode, which may includetransmitting signal 15104B. Circuit 15006 may be configured use energystored in energy storage component 15008 that has accumulated energy15102A received in a first frequency and/or energy 15102B received inthe second frequency to power the transmission in the second mode.However, circuit 15006 may also cause transmitter 15004B to transmit inthe second mode using just the energy 15102A received in the firstfrequency or just the energy 15102B received in the second frequencyusing, for example, multiple energy storage components (e.g., energystorage component 15008).

According to some disclosed embodiments, at least one antenna may betuned to receive energy transmitted in a third frequency range. By wayof example, wireless identification tag 1100 may include at least oneantenna (e.g., antenna 15002C) that may be tuned to receive energy(e.g., energy 15102C) from a third energy range. The third frequencyrange may be lower than the first frequency range and the secondfrequency range. By way of example, if energy 15102A is in a firstfrequency band of around 900 MHz and if energy 15102B is in a secondfrequency band of about 2.4 GHz, then energy 15102C may be in a lowerfrequency band than that of 15102A and 15102B (i.e., energy 15102C willbe in a lower frequency band than the frequency band of around 900 MHzof energy 15102A). In instances where a third frequency range isemployed, at least one circuit may be configured to detect whetherenergy is received in the third frequency range. Detecting whether theenergy is received in the third frequency may include discovering,identifying, or otherwise discerning the presence of a signal and/orenergy in the third frequency in the environment of the wirelessidentification tag. For example, the circuit may be electricallyconnected to the at least one antenna, such that the at least oneantenna may cause at least one form of input, stimulus, or triggerassociated with received energy in the third frequency to be received bythe at least one circuit. The circuit may be configured, upon receipt ofat least one form of input, stimulus, or trigger, to determine whetherthe input, stimulus, or trigger is associated with energy associatedwith the third frequency. By way of example, circuit 15006 may beconfigured to detect the presence of energy 15102C associated with athird frequency, respectively, by detecting whether antenna 15002C hasreceived the respective energy associated with the respectivefrequencies, based on at least on input, stimulus, or trigger receivedfrom said antennae. While three frequency ranges are illustrated by wayof example, more than three frequency ranges may be employed consistentwith this disclosure.

In some disclosed embodiments, at least one circuit may be configured tocause the at least one transmitter to operate in a third mode to send athird form of identification signal when the third frequency range isdetected. A third mode may refer to a step where a third signal is sent,or may refer to differing operating characteristics. Thesecharacteristics may include communication medium, communicationprotocols, frequencies, frequency ranges, frequency hands, types ofencryption, scrambling, and/or disguising, data content, timing oftransmission, and/or any other distinguishable characteristic that maybe associated with the identification signal to be transmitted. Forexample, the at least one circuit, upon detecting that energy has beenreceived in the third frequency from the at least one antenna, may causethe at least one transmitter to operate in a third mode, wherein thethird mode is associated with an identification signal having any one ormore characteristics or combinations of characteristics as describedabove. In some embodiments, however, the third mode may also beassociated with non-transmission, or the prevention of transmission, ofan identification signal.

By way of example, circuit 15006 may detect energy 15102C received byone or more of antennae 15002A-C. In response to this detection, circuit15006 may cause any one or more of transmitters 15004A-C to operate in athird mode. Operating in the third mode, for example, may includetransmitting one or more of signals 15104A-C, wherein signals 15104A-Cmay have different characteristics such that each signal isdistinguishable from one another in at least one aspect, and wherein oneor more of signals 15104A-C may be different, either alone or incombination, from the signals 15104 A-C transmitted in the first modeand second modes.

Embodiments of the present disclosure may relate to methods, systems,devices, and computer readable media for a wireless identification tagwith a response time that varies as a function of incoming signalfrequency. For ease of discussion, a method is described below, with theunderstanding that aspects of the method apply equally to systems,devices, and computer readable media. For example, some aspects of sucha method may occur electronically over a network that is either wired,wireless, or both. Other aspects of such a method may occur usingnon-electronic means. In the broadest sense, the method is not limitedto particular physical and/or electronic instrumentalities, but rathermay be accomplished using many differing instrumentalities.

Disclosed embodiments may include a wireless identification tag. Such awireless identification tag may include any device, object, system,component or circuitry, that may wirelessly transmit identifyinginformation. The identifying information may include, as describedherein, any form of identification or characterizing information. Forexample, the tag may have a unique serial number or other identifyingcode that may be transmitted. Such identifying information may later beused to look up information about an object with which the tag isassociated. Alternatively or additionally, the identifying informationmay include one or more characteristics of the object, such as theobject's location, status, power reserve, history or any otherinformation unique to the object or the tag.

According to some embodiments, the wireless identification tag may havea response time that varies as a function of incoming signal frequency.By way of non-limiting example, an incoming signal may propagate throughWi-Fi, cellular, mobile, RF and other forms of electromagneticcommunication platforms, or other types of signals, such as acoustic,photonic, mechanical, magnetic, whether used for communication or forother purposes.

An incoming signal may be characterized by various parameters, includingenergy, power, phase, amplitude, modulation, waveform, frequency, and/orother signal characteristic that may be detected or measured. Thefrequency of the incoming signal may refer to a carrier frequency, oneor more signal component frequencies, and/or a hit rate of an encodedsignal contained therein.

A response time may be an elapsed duration between events, measured inseconds, milliseconds, microseconds, or other unit of time. For example,the response time may be a duration (or delay) between an event A and anevent B. In some instances, the response time may be influenced by aprocessing time of the circuit architecture tag, which may introducedelays and propagation time. Consistent with some disclosed embodimentsthe response time may be part of the tag design. In such instances, aspecific response time between two events may be programmed, configured,or otherwise implemented. For example, event B may be implemented tooccur after a predetermined time (or delay) following an occurrence ofevent A. In various embodiments, the response time may be a function oftire incoming signal frequency, i.e., the response time may be longer orshorter, depending on the incoming signal frequency. For example,different incoming frequencies may signal different levels of responseurgency. In some embodiments, if a handheld device (e.g., a tablet orsmartphone) is used to request information relating to a wirelessidentification tag, an immediate response may be required from thewireless communication system. On the other hand, an inventorymanagement system operating in a different frequency to maintain anup-to-date inventory might be less urgent (i.e., the system may operatewithin design parameters if a response to a trigger is received withinminutes rather than immediately.) Therefore, a system may be configuredto operate such that the EAS gateway frequency (or any other frequencyemployed at an exit) triggers an immediate response from tags, while aninventory management signal (e.g., such as from a 900 MHz transmitter)might trigger a delayed response. This may occur as the result of thetag's software or hardware, that distinguishes incoming signals, andprioritizes responses. The tag, for example, may be designed to ignoreall but one incoming inventory-management signals in a prescribed timeperiod (or all but a few such signals) to prevent wasting tag energy andto prevent unnecessary return traffic.

FIG. 1 illustrates an exemplary embodiment of wireless identificationtags 1100 a and 1100 b in an environment of an EAS gate 1110, 1112. Oneor both of tags 1100 a and 1100 b may be a wireless identification tag.As discussed above, tags 1100 a and 1100 b may be configured to receivewireless signals, such as signal 1118, and to produce or transmitsignals in response, such as signals 1102 a and 1102 b. An externalsystem or device, such as device 1124 may be configured to receive thesignals transmitted by the fags.

In various embodiments, the wireless tag includes at least one antenna.An antenna may include at least one conductor, such as a wire. Anantenna may also be a circuit used to transform a signal from aconducted input to a radiated output for transmission, and/or totransform a signal from a radiated input to a conducted output forreception. The radiated output or input may take the form ofelectromagnetic radiation, electric fields, or magnetic fields, and theconducted input or output may take the form of a time-varying voltage orcurrent signal over a physical connection such as a metal wire, aprinted circuit, or other conductors. In some embodiments, the radiatedform may be acoustic, such as sound energy. In some embodiments, theradiated form may be optical, such as visible light.

The at least one antenna may be passive, requiring no external energyfor operation, other than the energy in signal to be transmitted orreceived. Alternatively, the at least one antenna may be active, whichmay require a power source such as a battery. When functioning in atransmission mode, the at least one antenna may be powered byelectronics within the tag itself, such as one or more capacitors asdescribed herein. In some embodiments, a passive antenna may beimplemented as a series of conductors, which may be coupled to otherportions of circuits which may be present. Passive antennae may beprinted on a PCB (printed circuit hoard), with printed wires or otherconductive paths coupling the antenna to the other portion of thecircuit. In some embodiments, a passive antenna may be coupled to theother portion of the circuit wirelessly, such as through electrical ormagnetic coupling.

Some embodiments of the at least one antenna may include an isotropictype antenna, dipole type antenna, monopole type antenna, antenna array,loop type antenna, aperture type antenna, traveling-wave type antenna,and other device capable of receiving or transmitting signals or energy.

As discussed above, the at least one antenna may be timed to energytransmitted at a first frequency within a frequency band around 900 MHzand at a second frequency within a frequency band around 2.4 GHz. Forexample, the frequency band around 900 MHz (i.e., the first frequencyband) may be 900 MHz WW ISM. Similarly, the frequency and around 2.4 GHz(i.e., the second frequency band) may be 2.4 GHz WW ISM. The firstantenna and the second antenna may be separate structures, or they maybe combined in a single antenna structure. In a non-limiting exampleillustrated in FIG. 9 and FIG. 10, the first antenna may be 900 MHzantenna 2112, and tire second antenna may be 2.4 GHz antenna 2114.

Various embodiments of the present disclosure may include at least onetransmitter. A transmitter may be any component, group of components, orcircuitry capable of sending a signal over a communication medium. Thecommunication may take the form, for example, of Wi-Fi, Bluetooth,cellular communication, Ethernet communication or any otherstandards-based or proprietary protocol. In some embodiments, atransmitter may encompass one or more of an oscillator, modulator,amplifier and/or frequency tuner.

The transmitter may be designed to send signals over the communicationmedium at a certain magnitude, which may define parameters such assignal range, signal-to-noise ratio (SNR), interference properties,and/or other signal properties. In the context of wirelesscommunication, the magnitude may be measured in units of power, such asWatts or dBW (decibel-Watts or dB-Watts). The power level at which thetransmitter transmits may be a measurement of power immediately at theoutput of the transmitter during active transmission. In someembodiments, the transmitter may be designed to have an adjustable powerlevel, such that in response to certain inputs, the transmitter maytransmit a signal at one or more different power levels.

In a non-limiting example illustrated in FIG. 9, the transmitter mayinclude beacon 2104, which may include beacon controller 9030 and beacontransmitter 9032. Beacon 2104 may be commanded by top level controller9020, which may output to transmission control interface parameters suchas power, timing, frequency and/or transmission data, which may bereceived by beacon controller 9030. Based on the transmission controlparameters, beacon controller 9030 may instruct beacon transmitter 9032to transmit as commanded. In some embodiments, there may be furtherprovided switch 9034 controlled by beacon controller 9030. Throughswitch control generated by beacon controller 9030, switch 9034 mayalternate between a transmission mode, during which 2.4 GHz antenna 2114is coupled to beacon transmitter 9032, and a receiving mode, duringwhich 2.4 GHz antenna 2114 is coupled to 2.4 GHz harvester 9014.

In yet another non-limiting example illustrated in FIG. 10, beacontransmitter 9032 may include a PLL 10110, which may be coupled tocrystal oscillator 10022 having crystal 10020, and beacon controller9030; VCO 10112 coupled to PLL 10110; and VGA 10114 coupled to receiveinputs from VCO 10112 and beacon controller 9030, and to provide outputto 2.4 GHz antenna 2114 through switch 9034. In some embodiments, VCO10112 may provide modulation of signals to variable gain amplifier (VGA)10114 based on the output of phase-locked loop (PLL) 10110. In someembodiments, PLL 10110 may provide phase-locking for reference clockfrom oscillator 10022 to the rest of beacon transmitter 9032 (asillustrated in FIG. 9). In some embodiments, beacon controller 9030receives a reference clock input from oscillator 10022, and slow clockfrom real time clock 10022. In turn, beacon controller 9030 may providea reference clock control to oscillator 10022. In some embodiments,beacon controller 9030 provides frequency control and transmission datato PLL 10110, and provides power control to VGA 10114.

Various embodiments of the present disclosure may include at least onecircuit configured to detect whether energy is received in the firstfrequency or the second frequency. A circuit, as used in the presentdisclosure, may refer to a component, or a combination of components,elements, and/or devices, which may be electronically coupled by wiredor wireless connections. In some embodiments, a circuit may beimplemented as part of a silicon chip, as part of a printed-circuitboard, as part of a connectorized system or as a combination of any ofthe above, connected in a manner enabling the performance of a desiredfunction or reaction as a response to some inputs, stimuli and/ortriggers, generated either internally or externally. A desired functionor reaction includes, but not limited to, control of other circuits,generating visual, audible, or otherwise communicable alerts or signals,causing a transmission, and/or performing any other operation. Forexample, the components, elements, and/or devices may include, but arenot limited to, resistors, capacitors, inductors, conductors,transistors, diodes, transmission lines, inverters, buffers, logicgates, latches, flip-flops, amplifiers, comparators, voltage sources,current sources, switches, and/or other electrical devices. Inputs,stimuli and/or triggers may include, but are not limited to, a voltagelevel, a voltage level change, a current level, a current level change,a frequency, amplitude or phase change of a received signal, a digitalinput, a digital pulse, a control word, and/or other signals in variousforms of energy.

In a non-limiting example illustrated in FIG. 9, the at least onecircuit may include multi-source harvester 2102, gate detection circuit2106, and memory 9022 (or a portion of the foregoing), which may also becoupled to top level controller 9020, which may also constitute the atleast one circuit. In some embodiments, multi-source harvester 2102 mayinclude 2.4 GHz harvester 9014, which may be coupled to 2.4 GHz antenna2114 through switch 9034; 900 MHz harvester 9012, which may be coupledto 900 MHz antenna 2112; and power manager 9010, which may be coupled totop level controller 9020. It should be noted that each of the forgoingcomponents may be made up of multiple circuits, and therefore referenceto a circuit may relate to a single component or portion thereof.

In some embodiments, the at least one circuit may detect whether energyis received in the first frequency or the second frequency based onwhether the energy is received by the first antenna or the secondantenna. The first frequency and the second frequency may be spacedapart with sufficient separation in the frequency spectrum, such that anantenna configured to receive energy at the first frequency is unlikelyto be excited by an energy at the second frequency, and that an antennaconfigured to receive energy at the second frequency is unlikely to beexcited by an energy at the first frequency. For example, when the firstantenna is tuned to receive energy transmitted at a frequency within afirst frequency range of 900 MHz WW ISM, and the second antenna is tunedto receive energy transmitted at a frequency within a second frequencyrange of 2.4 GHz WW ISM, there is unlikely to be cross-interferencebetween energies at these different frequencies. The at least onecircuit may determine that the energy received by the first antenna isin the first frequency range, and the energy received by the secondantenna is at the second frequency range.

In some embodiments, the at least one circuit may perform signalprocessing on the received energy. Signed processing may be carried outby analog components, such as a combination of amplifiers, filters, andsignal detectors. In some other embodiments, digital signal processorsof various design may perform signal processing on the received energy.The received energy may be decomposed into its different frequencycomponents by various signal processing methods, and the at least onecircuit may determine whether the received energy is at the firstfrequency or the second frequency based on analyzing the differentfrequency components of the received energy. Signal processing methodssuch Fourier's transforms, and/or fast Fourier transforms (FFT), may beemployed with some embodiments to decompose the received energy intofrequency components. Other methods, such as filters, matched filters,and frequency discriminators may additionally or alternatively be used,either individually or in combination. The at least one circuit maydetermine that when the received energy has frequency components withhigher strength around the first frequency than around the secondfrequency, the energy may be at the first frequency. Similarly, the atleast one circuit may determine that when the received energy hasfrequency components with higher strength around the second frequencythan around the first frequency, tire energy may be at the secondfrequency.

In some embodiments, the received energy may be modulated to containinformation, such as a codes, such as one code to indicate that theenergy is at the first frequency, and a different code to indicate thatthe energy is at the second frequency. The at least one circuit maydetermine whether the energy is at the first frequency or the secondfrequency based on the codes.

In a non-limiting example illustrated in FIG. 9, power manager 9010 maydetermine whether received energy is at 900 MHz or 2.4 GHz. Powermanager 9010 may receive inputs from 2.4 GHz harvester 9014. 900 MHzharvester 9012, or both, and provide one of 900 MHz detection and 2.4GHz detection to top level controller 9020.

Consistent with some embodiments the at least one circuit may beconfigured to cause the at least one transmitter to transmit animmediate response when the second frequency is detected. An immediateresponse may be an action performed or directed by the at least onecircuit, and may include the generation of an input or trigger. Due todesign parameters or inherent delay in circuitry, the immediate responsemay not be instantaneous. There may be a time interval between detectionof the second frequency and the response. A time interval may be aperiod of time that may be measured between the occurrence of two eventsin the system. The two events may be, for example, an input, stimulus ortrigger into a circuit and the output or action performed by thecircuit, or two occurrences of an input, stimulus, or trigger, or twooccurrences of an output or action of the same circuit or of differentcircuits. In some embodiments, when measuring time intervals betweenrepeating occurrences of the same event, whether such events may beinputs or outputs, an average time interval may be referred to as theperiodicity of the events and to the deviation from the average timeinterval as the variance in the periodicity. For example, in such caseswhere periodicity occurs, the frequency of the events may be calculatedas the inverse of the average time interval between events, and the dutycycle of the events as the ratio between the average time length of eachevent and the average time interval between events.

The time interval between the input or trigger and the action may be aminimum time interval, may result from the internal structure of the atleast one circuit and inherent delays, and not result from added delays,pauses, and/or functional wait periods. Such inherent delays may be theresult of finite rise-time or fall-time of internal functions,processing time limited by dock speeds, delays caused by the speed ofcommunication between different parts of the circuit, and other timelagging present not by design. In some embodiments, for example, animmediate response may be an output of an inverter changing from logic‘1’ to logic ‘0’ in response to its input changing from logic ‘0’ tologic ‘1’, or a comparator changing its output in response to a changein the direction of its inputs.

In various embodiments, at least one circuit may be configured to causethe at least one transmitter to transmit the immediate response when thereceived energy has been determined to have been received in the secondfrequency. If, for example, the second frequency is in the 2.4 GHzrange, energy in that range may be received by 2.4 GHz antenna 2114,which in turn may provide the receive energy to 2.4 GHz harvester 9014.2.4 GHz harvester 9014 may then provide an indication to power manager10112 that energy is received, which may enable power manager 9010 todetermine that a 2.4 GHz frequency signal was received. Top levelcontroller 9020 may determine that the second frequency is detected whenit receives a 2.4 GHz detection signal from power manager 9010. Then,top level controller 9020 may configure beacon controller 9030 throughtransmission control interface to transmit an immediate response.

In some embodiments, as illustrated in FIG. 10, beacon controller 9030may provide frequency control and transmission data to PLL 10110 tocause transmission of the immediate response.

In some embodiments of the present disclosure, the at least one circuitis configured to transmit a delayed response, having a longer delaycompared to the immediate response, when the first frequency isdetected. A delayed response occurs when a more than a minimum orinherent time interval is introduced between the trigger and theresulting action. The minimum time interval may be a function of theinternal structure of the circuit and its inherent delay, as previouslydescribed. The delayed time interval between the trigger and the actionmay be due to delays, pauses, and/or wait periods incorporated into thefunctionality of the design to achieve a desired purpose. For example,the logic built into a tag may recognize that certain frequenciesrequire a more immediate response than others. For example, whenemployed in a retail setting, the frequency of a signal at either acheckout counter or a scan by a customer might require an immediateresponse, because there is urgency in completing a financial transactionor responding to customer requests. In contrast, when product is sittingidly on a shelf and the system listens for transmissions from tags forinventory purposes, an immediate response may not be particularlyurgent. Because differing frequencies are employed in these differingscenarios, the detection of the incoming frequency may determine theimmediacy of the need for response, and hence the response time.

The first frequency for triggering the delayed response may, forexample, be in 900 MHz range, received by 900 MHz antenna 2112, which inturn provides the received energy to 900 MHz harvester 9012. 900 MHzharvester 9012 may then provide an indication to power manager 10112that energy is received, thereby enabling power manager 9010 todetermine that 900 MHz frequency is received. Top level controller 9020may determine that the first frequency is detected when it receives a900 MHz detection signal from power manager 9010. Top level controller9020 may then direct beacon controller 9030 through transmission controlinterface signals to transmit the delayed response.

In some embodiments, as illustrated in FIG. 10, beacon controller 9030may provide frequency control and data transmission to PLL 10110 totransmit the delayed response.

In some embodiments, as described earlier, the immediate response andthe delayed response may correspond to different modes of operation ofthe wireless tag. For example, the wireless tag may carry out differentfunctions, or carry same functions with different levels of intensitydepending on the frequency of the received signal. In some embodiments,the different functions may include, but are not limited to, employingdifferent processing protocols or different algorithms; transmittingdifferent signals; transmitting signals with introduced periods ofdelay; selecting from differing types or quantities of data transmitted;selecting between different power intensities or processing speeds; orany other difference depending on the particular implementation.

In a non-limiting example, the immediate response may correspond to auser-excitable mode (e.g., an IoT mode), and the delayed response maycorrespond to an infrastructure-excitable mode (e.g., a store mode). Theuser-excitable mode may include instances when the tag is intentionallyscanned by individuals using devices such as mobile phones, tablets,wearables, scanners or other mobile devices, and where a long responsetime may be undesirable. In the context of an establishment thatmaintains an inventory of goods such as a warehouse or retailestablishment, in user-excitable mode, employees of the establishmentmay scan a tag when an item is being processed, such as when the item isreceived, unpacked, placed on a rack, shelves, or display, or checkedout at a payment station or register. Alternatively or additionally, theuser-excitable mode may also include instances when the tag is scannedby customers at the establishment. For example, customers (or otherindividuals) using mobile devices, may scan the tag in order to accessinformation about the tagged item. The information may include, by wayof non-limiting examples, a link to a web portal associated with theitem (e.g., a website associated with the brand, store, manufacturer, orcurrent owner), information regarding the specific item (e.g., laundryinstructions for cloths, manuals for electronic devices, usageinstructions for medications, recommended recipes for food items, etc.),or advertisements for related products or services. The informationmight also enable actions through the individual's social mediaaccounts. In some embodiments, the user-excitable mode may be associatedwith applications installable on mobile devices, such that a scan of thetag causes access to an installed application that either providesinformation directly, or provides information through access to anassociated website.

The infrastructure-excitable mode may include instances when the tag isscanned by devices that may form a part of an establishment'sinfrastructure, such as RFID, Wi-Fi, or Bluetooth exciters located aboutthe establishment. In the infrastructure-excitable mode, inventoryinformation may be automatically updated based on the responses from thetag. Additionally, the location of the item within the store may bedetermined based the responses from the tag. Since there may not be timeurgency in receiving these responses, the tag may transmit the delayedresponse in the infrastructure-excitable mode.

In an egress mode (e.g., gate mode), the tag may respond immediatelywhen excited by infrastructure near an egress such as a store exit,where it may be important to immediately identify objects leaving anestablishment or other defined space.

While the forgoing tri-mode example is provided in the context ofestablishments such as stores and warehouses, the differing modes ofoperation may similarly apply in differing applications. By way of othernon-limiting examples, in a home or in an appliance, inventories ofitems such as food, supplies, or clothing might occur ininfrastructure-excitable mode, user scans of such items might occur inuser-excitable mode, and removal of items from an appliance, pantry,closet, or other defined space may be detected in egress mode. Inaddition, depending on implementation, additional or fewer modes may beemployed.

As illustrated in FIG. 10, top level controller 9020 may further includeone or modules to perform operations of the user-excitable mode and theinfrastructure-excitable mode, respectively. For example, top levelcontroller 9020 may include user-excitable mode FSM 10004 to command orcontrol the immediate response, and infrastructure-excitable mode FSM10002 to command or control the delayed response.

At least one energy storage component may be electrically connected tothe at least one antenna, the at least one energy storage componentbeing configured to store the energy received by the at least oneantenna. This connection may occur through wiring or wirelessly, throughelectric, magnetic, or electromagnetic coupling. In some embodiment, theenergy received by the antenna may be converted into voltages andcurrents, may also be stored as electric energy.

In a non-limiting embodiment illustrated in FIG. 10, energy storagecircuit 2108 may be coupled to power manager 9010, which may be in turncoupled to 900 MHz antenna 2112 and 2.4 GHz antenna 2114. Power manager9010 may provide energy harvested by multi-source harvester 2102 toenergy storage circuit 2108, to be stored in storage capacitor 9126.

In some embodiments, at least one energy storage component may beconfigured to utilize the energy received by the at least one antenna topower the wireless identification tag. For example, the at least oneenergy storage component may be connected, either directly, orindirectly, to different components of the at least one circuit. Anindirect connection may be a connection, such as a wired connection,between two point, with other components disposed in between the twopoints. In some embodiments, in absence a chemical energy source such asa battery or a fuel cell, and with no external connection, the at leastone circuit may be powered by the energy stored in the at least oneenergy storage device.

As illustrated in FIG. 10, power manager 9010 may receive energy fromstorage capacitor 9126. Power manager 9010 may in turn be connected to avoltage supply signal (VDD), and may provide energy to rest of thecircuit components.

In some embodiments the at least one energy storage component mayinclude at least one capacitor configured to power the wirelessidentification tag independently of received power. For example, atleast one capacitor may be connected either directly or indirectly tothe various other circuit components. In some embodiments, the at leastone capacitor may store energy that can be supplied to the wirelessidentification tag in absence of received power. For example, even whenenergy received from ail antenna is unable to provide the immediatepower needed for a specific function, on board energy stored in one ormore capacitors may be used to power the tag.

In some embodiments, storage capacitor 10300 may provide energy to powermanager 9010, which in turn may be coupled to the VDD supply voltage oftag 1100. When, for example, storage capacitor 10300 has stored energy,tag 1100 may be powered by storage capacitor 10300 even in absence ofany received energy from 900 MHz antenna 2112 or 2.4 GHz antenna 2114.

By way of a few non-limiting examples, the immediate response may be setto occur less than 10 seconds after the second frequency is detected, ormay be set to occur at a time greater than the inherent circuit delay,but less than or equal to a predetermined value. The predetermined valuemay be, for example, 10 seconds. In some embodiments, the delayedresponse may be set to occur seconds, minutes, hours, or even days afterthe first frequency is detected.

In some embodiments, the at least one circuit may be configured toimplement a transmission rule. The transmission rule, may be aprocedure, implemented as part of the at least one circuit used tocontrol the transmitter to determine, based on triggers, inputs and/orstimuli received by the at least one circuit, properties of thetransmitter's operation. The properties may include data content of atransmitted signal, a power level, a communication protocol used fortransmission, frequency bands used for transmission, the timing of thetransmission, a determination of whether to transmit or not to transmit,or any other characteristic or decision regarding a transmission.Examples of such procedures include a decision to send a data packetover Wi-Fi protocol if an indication was received that Wi-Ficommunication was detected by the at least one circuit, and to send thesame data packet over Bluetooth protocol if an indication was receivedthat Bluetooth communication was detected by the at least one circuit.In some embodiments, other such procedures may dictate the power levelused in transmission based on a desired range for the packet, or thedata content of tire packet based on intended recipients or on the setof inputs, triggers or stimuli that serve as the basis for thetransmission.

In some embodiments, the transmission rule may be implemented by beaconcontroller 9030 and provided to PLL 10110, as illustrated in FIG. 10.Alternatively or additionally, the transmission rule may be implementedby top level controller 9020 and provided to beacon controller 9030.

The transmission rule may command the at least one circuit to cause thetransmitter to delay sending at least one of the immediate response orthe delayed response, even when sufficient energy for transmission ofthe at least one response is aggregated and stored in an energy storagecomponent. This may occur for example, as the result of proactivitybuilt into the design, to enable the tag to preserve energy for otheractivities that may occur in the future. For example, to prevent theftor to otherwise manage inventory in a retail or other establishment itmay be beneficial for a tag to retain enough energy so that in thefuture, if an individual leaves tire establishment with an itemcontaining the tag, the tag will retain enough energy to transmit itsidentity to a receiver at the establishment's exit. Depending onparticular design parameters, the tag may be configured to retain evenmore energy for additional eventualities. Thus, if inventory managementinfrastructure in the establishment sends a signal to the tag totransmit its identity, and a response would otherwise cause the tag toretain energy below a threshold, the tag may be configured either not torespond or to wait to respond until after sufficient energy is collectedand stored. Of course, this feature has value in many use cases. In asystem associated with an appliance, storage facility, or othermonitored space, tags may be designed to ensure that they have enoughenergy on board at all times to transmit their identity when they leavea monitored space, area, or region. A predetermined time interval for adelay in transmission or other energy usage may be determined at thetime of design, manufacture, installation, initialization, or any timeprior to implementing the transmission rule.

Power consumed by the at least one circuit may be integrated over theduration of the performance of a particular action, resulting in a totalamount of energy measured in Joules. This total amount of energy may bethe energy required by the circuit to perform the action. For example, acircuit consuming 10 mW (ten milli-watts) of power for a duration of 1ms (one milli-second) may be required have 10 μJ (ten micro-Joules) ofenergy to transmit a data packet. In some cases, the energy sufficientto perform a certain action may depend on the characteristics of theaction, such characteristics may be controlled by inputs, triggers,and/or stimuli received by the at least one circuit. For example, atransmitter transmitting a longer or shorter signal at a fixed powerconsumption may require more or less energy, respectively, due to themultiplication of power and time. In another example, to avoidsurpassing particular power usage limits, a tag's internal logic mayregulate operating parameters, such as transmitter modulation, datacontent, signal transmission duration, signal strength, or otherparameters influencing energy consumption.

In order to ensure proper power management, energy stored in in the atleast one circuit may be monitored. For example, when energy is storedin the form of an electrostatic charge in a capacitor and is provided toother components or circuits (see above) in the form of DC voltage,voltage measurement may provide an accurate estimation of the energystored in the capacitor. When energy is stored in the form of chemicalbonds in a battery, a voltage measurement at several load conditions maydetermine a level of available stored energy.

In some embodiments, the transmission rule may define a time intervalbetween at least one of two consecutive immediate responses, or twoconsecutive delayed responses. Thus, a delay may be interposed betweenany two consecutive responses, and the delay may be set based on theparticular use case or on particular design parameters.

In some embodiments, the transmission rule may be configured to randomlyselect a time interval between two consecutive responses. By selecting arandom delay, many tags in an area that receive the same trigger signalwill transmit a response at different times. This can help ensure that areceiver configured to receive tag transmissions is not overwhelmed withsimultaneous responses.

In some embodiments, an antenna may be tuned to receive energy at athird frequency, which may be different from first and secondfrequencies that the antenna is also tuned to receive. Additionalfrequencies may permit the tag to harvest energy from more sources. Andeach additional frequency may enable an additional level of logic. Forexample, the tag may be configured to provide differing responses toeach differing frequency received. Thus, for example, in someembodiments, the at least one circuit may be further configured todetect whether energy is received in the third frequency. The method ofdetermining whether energy is received in the third frequency may besimilar to the method previously described for determining whetherenergy is received in the first or second frequency. Detecting theincoming frequency of energy may permit the tag to provide a responseunique to the frequency of the incoming energy.

In a non-limiting embodiment illustrated in FIG. 10, EAS coil 2110 maybe configured to receive energy at the third frequency, gate detectioncircuit 2106 may be coupled to EAS coil 2110, and may determine that EAScoil 2110 receives energy in the third frequency. Gate detection circuit2106 may provide EAS detection to top level controller 9020, enablingbeacon controller 9030 to generate the third response (in this instance,through TX Ctrl. I/F, as depicted by the transmission arrow between toplevel controller 9020 and beacon controller 9030.

In some embodiments, the third response may correspond to a mode ofoperation of the wireless tag different from the previously describedimmediate and delayed response modes. In a non-limiting example, thethird response may correspond to a gate mode. The gate mode may includeinstances the tag interacts with certain infrastructures of theestablishment, such as an EAS gate. For example, when the tag detectsthat it is being removed from a monitored area based on an incomingsignal frequency associated with a gate. Such a signal my trigger thehighest priority response of the tag, overriding any other priorities ofthe tag. This may be accomplished, for example, through a structure suchas illustrated in FIG. 10, where top level controller 9020 may includeone or modules to perform gate mode operations such as gate mode FSM10006 to command or control the gate response.

In some embodiments, the at least one circuit may be further configuredto cause the at least one transmitter to transmit a third response,different from the immediate response and the delayed response, when thethird frequency is detected. In some embodiments, the third response maybe delayed by a time interval different from the time interval of theimmediate response and the delayed response. Alternatively, or inaddition, the third response may have a different transmission power,phase, amplitude, frequency or may be encoded with a different signal,or it may be repeated a different number of times than the first andsecond response. As discussed previously, the ability of the tag todetect additional frequencies, like the third frequency, may addadditional logic to the tag and/or may permit the tag to harvest energyfrom additional sources. In a non-limiting embodiment illustrated inFIG. 10, beacon controller 9030 may provide frequency control signalsand transmission data to PLL 10110 to transmit the third response.

In some embodiments, a signal associated with the third response differsfrom signals associated with the immediate response and delayedresponse. For example, a signal associated with the third response maydiffer from the other signals in at least one of repetition period and atime interval between two consecutive responses. In some embodiments,the third frequency may be lower than the first frequency and the secondfrequency. For example, the third frequency may be part of a frequencyband beneath the other frequencies.

In some embodiments, the at least one circuit may be configured tomonitor energy stored in the energy storage component. When energy isstored in an energy storage component, it may be desirable to determinean amount of stored energy in the energy storage component.

Various parameters of the energy storage component may provideindication as to the amount of energy being stored. For example, in acapacitive element such as a capacitor, the amount of energy stored isproportional to a number charges stored. A voltage level of a capacitiveelement may provide indication of the number of charges stored, andhence provide indication of an amount of energy stored. In someembodiments, a voltage detector may be provided to monitor a voltagelevel of the energy storage device. In some embodiments, when the energystored in the form of chemical bonds in a battery, a voltage measurementat several load conditions may determine the amount of energy stored. Inyet some other embodiments, when energy may be stored as other forms ofenergy, monitoring may include measuring a speed of a flywheel todetermine the amount of kinetic energy stored, measuring the temperatureof a thermal storage device to determine the amount of thermal energystored, or measuring a length of a loaded spring to determine the amountof potential energy stored.

In a non-limiting embodiment illustrated in FIG. 10, power manager 9010may monitor an energy level of storage capacitor 10300. For example,power manager 9010 may measure a voltage level of storage capacitor10300.

In some embodiments, the at least one circuit is configured to preventthe at least one transmitter from transmitting the delayed response whenthe energy stored in the energy storage component is determined to beinsufficient to transmit the immediate response when the secondfrequency is detected. As discussed previously, since signals triggeringimmediate responses may take priority over those triggering delayedresponses, before a delayed response occurs, the tag may first checkwhether sufficient energy is in storage to complete an immediateresponse that may subsequently be triggered. If insufficient energy ismaintained in storage, despite a call for a delayed response, tiredelayed response may be prevented. Whether the energy stored in theenergy storage component is insufficient may be determined by acomparison of an amount of energy obtained from the monitoring, and astored or calculated indicator of an amount of energy that might beneeded to transmit a future call for an immediate response. In anon-limiting embodiment illustrated in FIG. 10, power manager 9010 maymonitor an energy level of storage capacitor 10300. The result of themonitoring may be provided to top level controller 9020, where a it maybe determined whether sufficient energy is present for beacon controller9030 to transmit an immediate signal.

In some embodiments, the at least one circuit is configured to monitorenergy stored in the energy storage component, and cause, in response todetection of the second frequency, the at least one transmitter totransmit a signal requiring less energy to transmit than an amount ofenergy required for tire immediate response, when the energy stored inthe energy storage component is determined to be insufficient totransmit a normal immediate response. For example, if the tag ends up ina state requiring an immediate response and yet insufficient power isrequired to send the typical immediate response, the tag may transmit atruncated or alternative version of the typical immediate response inorder to avoid a situation where no response is sent. A truncatedversion may contain just key information, or may occur at a power levelor duration lower than the typical immediate response. An alternativesignal may be a form of distress signal indicating that the tag isrunning out of power, requiring, for example, manual intervention. Insuch a situation, the alternative signal may trigger an alert to promptan attendant to perform a manual inspection. Such a manual inspectionmay involve using a hand-held exciter adjacent a suspect parcel or itemto power the tag and obtain a normal tag reading. Thus, the tag may beconfigured to transmit a normal immediate response when sufficienton-board power exists, and a low-power immediate response, when thepower is depleted beneath a threshold. The low-power immediate responsemay require less energy for transmission than the normal immediateresponse. For related reasons, the at least one circuit may monitorenergy stored in the energy storage component, and prevent the at leastone transmitter from transmitting the immediate response when the energystored in the energy storage component is determined to be below apredetermined energy level.

In some embodiments, a signal associated with the delayed responsediffers from a signal associated with the immediate response in at leastone of a repetition period, a frequency channel, a transmission power,or transmitted data associated with the response sent. A repetitionperiod may be a time between two actions or responses. For repeatedoccurrence of a same event, whether such events are inputs or outputs,an average time interval, or periodicity of the events may be consideredthe repetition period. The frequency channel may be a carrier frequencyor frequency hand, and transmission power may be the power consumed bythe at least one transmitter, or a power contained in a transmission ofthe immediate response. The power contained in the transmission of theimmediate response may be characterized by its energy density,magnitude, or amplitude of the transmission.

The at least one of the delayed response or the immediate response mayinclude unique identifier data of the wireless identification tag. Theunique identifier data may be a number, string, code or other form ofinformation capable of uniquely identifying a tag. In some embodiments,no single tag may be associated with the same unique identifier as anyother tag, such that any single tag has only one unique identifier thatis not associated with any other tag. Tints architecture permits taggedobjects to be traced not only through common physical characteristics,but also through identification of non-physical characteristics such asthe specific data of manufacture, date of receipt, manufacturer,transporter, or any other characterizing information that my otherwisenot be discemable simply by viewing the tagged product. Uniqueidentifiers may include serial numbers, unique EPC codes, and databaseentries (where each database entry represents a single entity, and allrelevant entities are represented by exactly one entry in the database).In some embodiments, a specific wireless identification tag may have itsown unique identifier data.

As illustrated in FIG. 10, unique identifier data may be stored in tagID ROM 10010, which may be coupled to, and retrievable by top levelcontroller 9020, top level controller 9020 may provide the uniqueidentifier data to beacon controller 9030 for transmission eitherdirectly or in a modified form.

FIG. 16 is a flow chart illustrating an example of operations, which maybe carried out by at least one circuit, including a transmission rule ofthe wireless identification tag. In step 16002, the wireless tag mayreceive energy. In some embodiments, the received energy may be wirelessenergy received by the at least one antenna. In step 16004, storedenergy may be monitored. In some embodiments, the stored energy may bestored in the energy storage component, which may include a capacitor.The stored energy may be re-charged as energy is received. In step16006, a frequency of the received energy may be determined. In someembodiments, the at least one circuit may determine whether the receivedenergy is at the first, second or third frequency.

In step 16008, in response to a determination at step 16006 that thereceived energy is at the second frequency, the at least one circuit,based on monitoring of the stored energy, determines whether sufficientenergy is present to the energy storage component. If the determinationis No, i.e., the stored energy is below a predetermined energy level,hence not sufficient, further action is not taken. In some embodiments,a delay results. If the determination is Yes, i.e., the stored energy isabove a predetermined energy level, hence sufficient, the process mayproceed to Step 16010. In some embodiments, energy may be consideredsufficient if a sufficient amount exists to output a tow-power immediateresponse.

In step 16008, the at least one circuit may determine if the energystored in the energy storage component is sufficient to transmit anormal immediate response. If the determination is No in step 16008, asignal requiring less energy, i.e., the low-power immediate response istransmitted by the at least one transmitter in step 16014. If thedetermination is Yes, a Normal Immediate response is transmitted by theat least one transmitter in step 16012.

In some embodiments, in connection with step 16012, the at least onecircuit may be configured to cause the transmitter to send the immediateresponse in a predetermined time interval. In some embodiments, thepredetermined time interval may be less than 10 seconds (as one example)after the second frequency is detected in step 16006.

In step 16016, in response to a determination at step 16006 that thereceived energy is at the first frequency, the at least one circuit,based on monitoring of the stored energy, may determine whethersufficient energy is present in the energy storage component. If thedetermination is No, i.e., the stored energy is below a predeterminedenergy level, hence not sufficient, further action is not taken. In someembodiments, a delay results. If the determination is Yes, i.e., thestored energy is above a predetermined energy level, hence sufficient,the process proceeds to step 16018. In some embodiments, the sufficientenergy may be a quantity of energy required to transmit the NormalImmediate Response.

In step 16018, a delayed response may be transmitted by the at least onetransmitter, provided sufficient energy is available for transmission.In some embodiments, the at least one circuit is configured to cause thetransmitter to send the delayed response in a predetermined timeinterval. Such a predetermined time interval may be within a range ofmilliseconds, seconds, minutes, hours, or even days, depending on designparameters.

In step 16020, in response to a determination at step 16006 that thereceived energy is at the third frequency, the third response may betransmitted by the at least one transmitter, provided sufficient energyis available for transmission.

Embodiments of the present disclosure may relate to methods, systems,devices, and computer readable media associated with a wirelessidentification tag triggerable by an Electronic Article Surveillance(EAS) gate while remaining invisible to the EAS gate. For ease ofdiscussion, in some instances related embodiments are described below inconnection with a system or method with the understanding that thedisclosed aspects of the system and method apply equally to each otheras well as devices, and computer readable media. Some aspects of arelated method may occur electronically over a network that is eitherwired, wireless, or both. Other aspects of such a method may occur usingnon-electronic means. In the broadest sense, the methods and computerreadable media are not limited to particular physical and/or electronicinstrumentalities, but rather may be accomplished using many differinginstrumentalities.

Disclosed embodiments may involve an EAS gate. EAS gates are oftenincorporated in surveillance or theft-deterrent systems used to detectan article as the article passes through a detection system in, forexample, a retail store, a library, a museum, a warehouse, anentertainment facility, confidential and proprietary file storingfacilities, a sports arena, or any other space where it may be desiredto monitor the passage of objects. The detection may be used to alertstaff members that an unauthorized removal of items is being attempted.In some embodiments, an EAS gate may include one pedestal, twopedestals, three pedestals, or any number of pedestals, based on factorsincluding, but not limited to, a distance range, space availability, orcustomer traffic. If an EAS gate includes more than one pedestal, thepedestals may be spaced a distance apart to allow patrons to enter andexit the facility with minimum hindrance, while the pedestals are withina close enough range of each other to be triggered by a passing taggedobject.

In some embodiments, EAS systems may include concealed EAS gates,electro-magnetic EAS components, acousto-magnetic (AM) components,radio-frequency (RF) components, or microwave (MW) components, amongother detection components. Concealed EAS gates may include one or morepedestals installed such that they are not visible and cause minimalhindrance to the patrons. For example, a pedestal may be installed belowthe floor, above the ceiling, or behind the walls. Concealed EAS systemsmay be used, for example, to enhance the effectiveness of surveillance,enhance the shopping experience for customers, or enhance any otherfacility where the monitoring of objects is desired.

By way of example, FIG. 1 illustrates an exemplary embodiment of awireless identification tag in an environment of an EAS gate 1110, 1112.In some embodiments, as illustrated, tag 1100 may be a wirelessidentification tag. Tag 1100 may be embedded, sewn, clipped, bonded,attached, or otherwise incorporated into an object, such as clothingitem 1106. In some embodiments, tag 1100 may be configured to receive awireless signal, such as signal 1118. Signal 1118 may be produced by anexternal system or device, such as EAS transmitter 1116, which may forma part of EAS gate 1110, 1112. Signal 1118 may include electromagneticenergy, or an electric field or magnetic field or electromagnetic fieldcaused by electric, magnetic or electromagnetic waves having afrequency, for example, in the range of 58-60 kHz (AM-EAS waves) or 7-13MHz (RF-EAS waives). As an example, the electromagnetic energy of thewireless signal transmitted from the EAS gate may be received by anantenna of the wireless identification tag, thereby activating ortriggering the wireless identification tag. Upon activation, inconventional EAS detection systems, a security tag would transmit an EASdetection signal when triggered by EAS signal 1118, which isconventionally received by an EAS receiver, such as EAS receiver 1120.Upon identifying the characteristics of the transmitted or reflectedsignal from the conventional security tag, the EAS receiver wouldtrigger an alarm indicating the presence of an active security tag,rendering the tag “visible” to the EAS gate. In such a scenario, thesecurity tag is triggerable and visible to the EAS gate.

In contrast to these conventional security tags, in some embodiments theexemplary wireless identification tag may be triggerable by an EAS gatewhile remaining invisible to the EAS gate. An identification tag may betriggerable when it receives a signal from the EAS gate, and takes someform of responsive action, such as transmitting an identificationsignal. A tag may remain invisible to an EAS gate if a signaltransmitted by the tag does not trigger a response by the EAS gate. Forexample and as discussed above, in a retail environment, when a productwith a traditional EAS security tag passes an EAS gate, an alarmtypically sounds, alerting the proprietor of possible theft. Withdisclosed embodiments, in contrast, the tag itself may be triggered bythe EAS gate, but the tag's response may not trigger a warning by thegate. In some disclosed embodiments, the tag may trigger a warning fromcomponents other than an EAS gate, if for example, a receiver in thevicinity of the EAS gate receives a signal from the tag, and that signalis associated with an object that is not authorized to be removed fromthe establishment.

However, in some embodiments of the present disclosure, the wirelessidentification tag may be configured to be triggered by the EAS gatesignal 1118, but in response, not to transmit a signal to the EASreceiver 1120. In such a scenario, the wireless identification tag istriggered by the EAS transmitter of EAS gate while remaining in visibleto the EAS gate because the tag does not transmit an acknowledgmentsignal to the EAS receiver of the EAS gate. Instead, the tag that isinvisible to the EAS gate may transmit a signal recognized via areceiver other than an EAS receiver. This occurs, for example, when thetag transmits in frequency outside a range recognized by the EASreceiver.

In some embodiments, the tag may comprise at least one antenna tuned toreceive energy, such as the antenna described above. In some disclosedembodiments, the antenna may be tuned to receive energy transmitted in adesirable frequency range. A tuned antenna may include an antenna wherethe impedance of the antenna varies over frequency such that it ismatched to tire impedance of the communications medium (e.g., the airbetween the gate and the tag) at its radiated port, and matched to thereceiver or transmitter at its conducted port, only over a givenfrequency band. In electronic circuits, the impedance of an antenna mayvary based on characteristics of inductive, capacitive, ortransmission-line elements of the antenna. In some embodiments, atransmitter or receiver may include an antenna tuning unit (notillustrated) or a matching network. By way of example, as illustrated inFIG. 10, EAS coil 2110 may include a tuning capacitor 10200 controlledby controller 9020 to tune coil 2110 between a mode for detecting fieldsin a first frequency band (e.g., 7-13 MHz) and a mode for detectingfields in a second frequency band (e.g., 58-60 kHz).

FIG. 17 illustrates a circuit diagram of an exemplary circuitarchitecture for a wireless identification tag. As illustrated, BIAScoil 2110 may include a tuning capacitor 10200 to tune the antenna orthe EAS coil 2110 to match the impedance with the impedance of the EAStransmitter configured to transmit the signal. Gate detection circuit2106, analogous to gate detection circuit 2106 of FIG. 10, may beconfigured to detect the incident EAS signal from the EAS transmitterand feed it to controller 9020. In some embodiments, gate detectioncircuit 2106 may include operational amplifier 17100, which isconfigured to amplify the differential input from the tuned circuit ofthe EAS coil 2110 and tuning capacitor 10200. As discussed herein, anoperational amplifier includes a circuit having two inputs, and avoltage output that is proportional to the voltage difference betweenthe two inputs. Because the EAS signal received in EAS coil 2110 may beof very low magnitude, operational amplifier 17100 may amplify thereceived signal such that it can be better detected by the gatedetection circuit 2106. In order to further improve the sensitivity ofdetection, gate detection circuit 2106 may also include an integratorwhich may be implemented using a diode and a capacitor, in order toconvert the amplified signal at the output of operational amplifier17100 to a digital signal that may be detectable and usable bycontroller 9020. Controller 9020 may then, for example, alter one ormore signal transmission parameters of the transmitter 2104 in responseto detection of the EAS field, determine the type of energy beingreceived by the tag, and control operation of transmitter 2104 based onthe type of energy received, among other functions.

In some embodiments, the at least one antenna includes a first antennatuned to receive energy transmitted within a frequency range of 900 MHzWW ISM; a second antenna tuned to receive energy transmitted within afrequency range of 2.4 GHz WW ISM. As discussed above, at least oneantenna may additionally or alternatively include one or more antennaetuned to receive energy transmitted in one or more frequency bands orfrequency ranges. In some embodiments, the tag may include at least oneantenna tuned to receive energy transmitted in at least one of a firstEAS gate frequency range of about 7-13 MHz or a second EAS gatefrequency range of about 58-60 kHz. A non-limiting example includes the58 kHz AM-EAS (Acousto-Magnetic Electronic Article Surveillance)frequency band, ranging from about 58 kHz to about 60 kHz, which is usedby various theft-prevention systems around the world.

In some embodiments, tin AM-EAS system may operate in a frequency rangeof 58-60 kHz. In an AM-EAS system, a signal transmitter such as EAStransmitter 1116 in FIG. 1 may be configured to emit magnetic energy ora time-variable magnetic field having a frequency in the range of 58 kHzto 60 kHz, or wavelength in the range of 0.5000 m to 5168 m,approximately. The emitted energy may create a magnetic field, forexample, around the exit area of a store, configured to trigger awireless identification tag associated with an item influenced by themagnetic field. In some embodiments, the energy emitted from the EAStransmitter of the EAS gate may be pulsed. In the context of thisdisclosure, a pulse may refer to a short burst of energy. The pulse mayassume a rectangular waveform, a double exponential waveform, a sinewavewaveform, other short-duration patterns of waveform, or any waveformcapable of detection by a wireless identification tag. The wirelessidentification tag may be configured to receive the magnetic energytransmitted by the EAS transmitter of the EAS gate having a frequency inthe acousto-magnetic range, in some embodiments, the AM-EAS may operatein a frequency range of 58 kHz to 132 kHz.

In some embodiments, an RF-EAS system may operate in a frequency rangeof 7-13 MHz. In an RF-EAS system, a signal transmitter such as EAStransmitter 1116 may be configured to emit electromagnetic energy orelectromagnetic waves having a frequency in the range of 7 MHz to 13MHz, or wavelength in the range of 23 m to 43 m, approximately. In someembodiments, the operating frequency of a RF-EAS transmitter may be 8.2MHz.

When used in RF-EAS systems, some wireless identification tags (e.g., RFtags) may include an electric oscillation circuit with a capacitor and acoil (e.g., antenna) that may be set to oscillation at a resonancefrequency. The electromagnetic field of an EAS gate may varyharmonically about 10-20% around the resonance frequency of the RF tag,and the oscillation circuit may be powered by the electromagnetic energyof the electromagnetic fields. When the identification tag is exposed tothe electromagnetic field of the EAS gate, a weakening of theelectromagnetic field in the EAS gate detector is measured, anddetection of the RF wireless identification tag may trigger an alarm.

In some embodiments, the tag may include at least one antenna tuned toreceive energy transmitted in at least one of a first EAS gate frequencyrange of about 7-13 MHz or a second EAS gate frequency range of about58-60 kHz, and configured to be non-detectable by the EAS gate.Consistent with the disclosed embodiments, non-detectability may referto a property of an element (e.g., antenna) which prevents the elementfrom being detected at predefined locations and/or areas at a predefinedtime or time interval. An EAS gate includes a receiver coupled to acontroller which may trigger a warning if the frequency of tin incomingsignal is within a predefined EAS gate range. A tag may be invisible totin EAS gate if the tag's transmission is either non-detectable by thereceiver of the EAS gate, or, if detectable, is not recognized by theassociated EAS gate controller as a signal that triggers a response(e.g., a warning or other form of notice). In some embodiments, thenon-detectability of the at least one antenna enables the tag to avoidtriggering the EAS gate, and therefore, the wireless identification tagmay be non-detectable by virtue of comprising a non-detectable antenna.

In some embodiments, the at least one antenna may include at least oneEAS antenna configured to receive the energy transmitted in the at leastone EAS gate frequency range. For example, an EAS antenna in the tag maybe tuned to the transmission frequency of an EAS gate. In this way, thetag may receive energy from the EAS gate's transmitter. The EAS antennamay take on any suitable form. With reference to FIG. 10, for example,EAS antenna may be a coil 2110 configured to receive electric, magnetic,or electromagnetic energy transmitted in one or more predeterminedfrequency ranges of the EAS gate. For example, EAS coil 2110 may beconfigured to receive energy in a frequency range between 7-13 MHz andenergy in a frequency range between 58-60 kHz. In some embodiments, EAScoil 2110 may detect an incident electric, magnetic, or electromagneticfield and gate detection circuit 2106 may determine if the energy isreceived from an EAS gate (for example, if the energy is in a frequencyband between 7-13 MHz or between 58-60 kHz).

In some embodiments, the tag may include at least one transmitterconfigured to send at least one identification signal. For example, theat least one transmitter may be configured to send the identificationsignal via at least one of a Bluetooth protocol, Bluetooth Low Energy,Wi-Fi, ZigBee, Z-wave, or radio-frequency identification (RFID)protocol. As discussed above, the communication protocol may, forexample, be a standards-based protocol such as 802.3 Ethernet,Asymmetric Digital Subscriber Line (ADSL), Very high speed DigitalSubscriber Line (VDSL), Symmetric Digital Subscriber Line (SDSL) wiredprotocols, Wi-Fi, Bluetooth, GSM, 3F, LTE, 5G, ZigBee, or Z-wavewireless protocols, a proprietary protocol agreed on by the transmitterand receiver only, or any other set of rules with reference tocommunication between various electronic devices.

In some embodiments, the at least one transmitter may be furtherconfigured to transmit at least one alert signal for causing at leastone of an audible alert, a visual alert, or a digital message. An alertsignal or a notification signal may refer to a signal generated by acomponent of one system, used to alert another component of the system,or a different system, or a person, or any combination thereof. Thenotification signal may be an audible signal, a visual signal, oranother sensory signal such as a haptic signal, or a digital signal(such as a notification signal to an app on a mobile device, aninterrupt signal to a CPU in an electric circuit board, or an entry in asystem alert log) among other forms of notification.

In some embodiments, the at least one alert signal may be a component ofthe at least one identification signal. In this instance, theidentification signal may not only include identifying informationassociated with the tag, but it also might include an alert component aswell. As discussed above, an alert signal may be information thatcauses, following receipt, an audible alert, a visual alert, anaudio-visual alert, a sensory alert such as a haptic alert, or a digitalmessage, among other notification techniques. In some embodiments, theat least one alert signal is separate from the at least oneidentification signal. So, for example, the tag's transmitter may sendtin identification signal in one transmission, and an alert signal in aseparate transmission.

In some embodiments, the tag may include at least one energy storagecomponent that is electrically connected to the at least onetransmitter, for powering the at least one transmitter. Such electricalconnection may occur when a conductive path exists between an energystorage component and a transmitter. Electrical components may or maynot be interposed in the conductive path. Thus, components that areindirectly connected through other components are considered to beelectrically connected. As illustrated in FIGS. 9 and 10, for example,various components indirectly connect transmitter 9032 with storagecapacitor 10300, which are nevertheless considered electricallyconnected to each other. As the result of an electrical connection,energy may be transferred from energy storage component (e.g., storagecapacitor 10300) to a transmitter (e.g., transmitter 9032).

In some embodiments, the energy transferred from the energy storagecomponent to the transmitter may be used to power the transmitter.Powering the transmitter may include, but is not limited to, activatingthe transmitter, operating the transmitter, charging the transmitter, orproviding any form of energy necessary for the transmitter to performrelevant functions.

In some embodiments, the at least one energy storage component may beconfigured to store the energy received by the first antenna and thesecond antenna, and power the at least one transmitter with the storedenergy. In some disclosed embodiments, the at least one energy storagecomponent may include at least one capacitor. A capacitor may refer toceramic capacitors, film capacitors, power film capacitors, electrolyticcapacitors, supercapacitors, class X and class Y capacitors, MOMcapacitors (Metal-Oxide-Metal capacitors) implemented inside asemiconductor device, M-I-M capacitors (Metal-Insulator-Metalcapacitors) implemented inside a semiconductor device, MOS capacitors(Metal-Oxide-Semiconductor capacitors) implemented inside asemiconductor device, other miscellaneous or variable capacitors, or anyother device suitable for storing electrical energy in an electric fieldusing two terminals. By way of example, energy storage circuit 2108 inFIG. 10 may contain at least one storage capacitor 10300. Further, insome embodiments, the energy storage component may be configured tostore the energy received by the first antenna, such as 2112, and thesecond antenna such as 2114. The stored energy in capacitor 10300, forexample, may be used to power the transmitter 9032 (or transmitter 2104in FIG. 18).

As an example, FIG. 18 illustrates a block diagram of an exemplarywireless identification tag 1100 including a first antenna 2112 and asecond antenna 2114, at least one of which is configured to receiveelectric, magnetic, or electromagnetic radio frequency energytransmitted from the EAS gate or from other intentional or ambientsources in the tag's environment. The received energy may be stored inat least one capacitor 10300 of energy storage circuit 2108. The energystorage circuit may include more than one capacitor, as appropriate. Thecapacitor may be configured to discharge a portion of the stored energyor substantially all of the stored energy to power a transmitter 2104,for example.

As discussed above, tire tag may include at least one circuit that isconnected to at least one antenna. The connection may be direct orindirect, as discussed earlier. By way of example, exemplarymulti-source harvester circuit 2102 may be directly connected to antenna2112, and exemplary energy storage circuit 2108 may be indirectlyconnected to antenna 2112 through multi-source harvester circuit 2102,as illustrated in FIGS. 9 and 10, for example. In some embodiments, acircuit may be connected to one or more antennae, or more than onecircuits may be connected to one antenna. In the context of thisdisclosure, connection between a circuit and an antenna may refer to anelectrical connection such that the circuit and the antenna formcomponents of a circuit.

In some embodiments, the tag may be configured to detect energytransmitted from the EAS gate in at least one of the first EAS gatefrequency range or tire second EAS gate frequency range. Differing BIASgates may operate in differing frequency ranges. A tag may be configuredto detect energy in the differing ranges through incorporation ofmultiple antennae tuned to the differing frequency ranges, or throughthe incorporation of a single antenna tuned to tire differing frequencyranges. A tag may be configured to detect only one of the two EASfrequencies, or it may be configured to detect both EAS frequencies butonly one of the two frequencies at any given time, or to detect bothfrequencies simultaneously.

For example, in some embodiments, the EAS transmitter 1116 of EAS gate1110 in FIG. 1, may be configured to transmit electromagnetic energy inthe form of a signal 1118. The frequency range of the transmittedelectromagnetic signal 1118 may be in a range of 58-60 kHz (e.g., AMrange) or in a range of 7-13 MHz (e.g., RF range). In some disclosedembodiments, the circuit may be configured to detect the electric,magnetic, or electromagnetic energy having a frequency in both the AMrange and the RF range. Detecting the transmitted energy may includereceiving the electric, magnetic, or electromagnetic energy using one ormore antennae, and identifying the presence of an electric, magnetic, orelectromagnetic signal and/or electric, magnetic, or electromagneticenergy in the first EAS gate frequency range or the second BIAS gatefrequency range. For example, in FIG. 15, antenna 15002A might be tunedto the first frequency range, and antenna 15002B might be tuned to thesecond frequency range. Roth antennae may be electrically connected tocircuit 15006, which may determine in which of the first and secondfrequency ranges the incoming signal falls. Alternatively, antenna15002A might be tuned to both the first and second frequency ranges, andcircuit 15006 might be configured to differentiate the signals.

In some embodiments, the at least one circuit may be connected to the atleast one antenna and configured to, in response to detecting the energytransmitted from the EAS gate, cause the at least one transmitter totransmit to a receiver other than the EAS gate, the at least oneidentification signal transmitted in a frequency outside the first EASgate frequency range and the second EAS gate frequency-range.

Although the circuit may receive energy transmitted from the EAS gate,the circuit may respond by transmitting a signal outside the typicaldetection range of an EAS gate. For example, circuit 15006 in FIG. 15,may receive an EAS gate signal via antenna 15002 tuned to an EAS gatefrequency. In response, circuit 15006 may cause transmitter 15004C totransmit an identification signal in a frequency other than an EAS gatefrequency. In this way, the identification signal may be received andinterpreted via a wireless receive other than that of an EAS gate. Inthis way, the tag is identified without triggering the EAS gate.

By way of another example, a circuit of the wireless identification tag,such as gate detection circuit 2106 in FIG. 2 may be configured to causea transmitter, such as transmitter 2104 of the wireless identificationtag 1100 to transmit the identification signal to a receiver differentfrom the receiver of the EAS gate (e.g., 1124). In some embodiments, theidentification signal frequency range may be outside the first EAS gatefrequency range and the second EAS gate frequency range, rendering thewireless identification tag non-detectable and invisible to the EASgate. In some embodiments, the frequency outside the first and secondEAS gate frequency ranges may be within a frequency range of 2.4 GHz WWISM.

In some embodiments, the at least one circuit may be configured to causethe at least one transmitter to transmit the at least one identificationsignal less than ten seconds after the energy-transmitted from the EASgate is detected. The circuit may be so configured through circuitdesign that prevents a delay of more than 10 seconds following receiptof an EAS signal. Particularly with EAS gates which tend to be locatednear egresses of establishments to detect tags leaving theestablishment, a shorter delay may correspond to design specifications.Of course EAS gates can be used to detect incoming tagged objects, andcan be used for other purposes where up to a 10 second delay may bewithin design specifications.

Thus, the transmitter of the wireless identification tag may beconfigured to send the identification signal immediately, or after ashort delay period, which may be under ten seconds, following thedetection of the energy transmitted from the EAS gate. In someembodiments, the delay-period may be set to a maximum of ten secondsafter the energy transmitted from the EAS gate is detected by thecircuit such as the gate detection circuit 2106. The delay period may benine seconds or less, eight seconds or less, seven seconds or less, sixseconds or less, five seconds or less, four seconds or less, threeseconds or less, two seconds or less, one second or less, a less than500 milliseconds, or any other appropriate delay time less than tenseconds.

In some embodiments, the at least one energy storage component may beconfigured to store radio frequency energy received by the at least oneantenna. For example, once any one or more of the antennae of a wirelessidentification tag receive energy in any frequency, the wirelessidentification tag may be configured such that the received energy istransferred to and received by the at least one energy storagecomponent. Energy storage component may, for example, receive thisenergy and store the energy in another form in response thereto. Forexample, regardless of the incoming frequency of an input radiofrequency signal, the energy storage component, through association withappropriate circuitry or intermediate components, may receive and storeassociated radio frequency energy.

As illustrated by way of example in FIG. 15, energy 15102A-C received byone or more of antennae 15002A-C, may be stored in capacitor 1500 ofenergy storage component 15008. In some embodiments, the received radiofrequency energy may be characterized by a frequency outside of thefirst EAS gate frequency range and outside the second EAS gate frequencyrange. As disclosed herein, a frequency outside of the first EAS gatefrequency range and outside the second EAS gate frequency range mayrefer to frequency ranges of 900 MHz WAV ISM or 2.4 GHz WAV ISM, forexample. In general, a frequency range of 900 MHz WW ISM and 2.4 GHz WWISM may refer to frequency ranges of around 900 MHz and 2.4 GHz,respectively. In some embodiments, a single antenna may be tuned toreceive energy transmitted in multiple frequency bands of around 900MHz, multiple frequency bands of around 2.4 GHz, or both. Accordingly,an antenna tuned to receive energy transmitted at a frequency within afrequency range of around 900 MHz WAV ISM may also be tuned to receiveenergy transmitted at a frequency within another frequency range, and anantenna tuned to receive energy transmitted at a frequency within afrequency range of around 2.4 GHz WAV ISM may be tuned to receive energytransmitted at a frequency within another frequency range.

In some embodiments, the at least one transmitter may be configured tosequentially send a plurality of repetitions of the identificationsignal in response to detecting the energy transmitted from the EASgate. Identification signals may be sent in multiple times in responseto detecting the transmitted energy from the EAS gate. For example, theidentification signal may not be sent as a single continuous signal ormay not be sent continuously without interruption, and may insteadinclude short bursts or repetitions of the identification signal with afixed or a variable time interval in between two consecutive bursts. Theshort periodic bursts are referred to as pulses, and the identificationsignal sent may be a pulsed identification signal. The transmitter ofthe wireless identification tag, such as transmitter 15004A in FIG. 15,may be configured to send multiple bursts of the identification signal15104A in a repetitive pattern. In some embodiments, the multiple burstsmay not follow a specific pattern. The redundancy may ensure that awireless receiver does not miss the transmission.

In some embodiments, the at least one transmitter may be configured todynamically delay each of the plurality of repetitions of theidentification signal, to thereby avoid signal collision. Dynamic delaymay refer to a time interval between consecutive repetitions of theidentification signal, which is not necessarily fixed but rather may becontrolled by, and changes in accordance with, a predefined rule. Inthis way, a delay between a first and a second identification signal maybe different from a delay between the second and the following thirdidentification signal. Signal collision may refer to an overlap in timeof identification signals resulting in misreads of a tag, or entirelymissing a tag, among other problems. Using dynamic delay between each ofthe plurality of repetitions of identification signals may substantiallyminimize problems associated with signal collision. This may conformwith design parameters in a system that expects to receive many tagreadings in a short time span. For example, if multiple items forpurchase are carried past an EAS gate 11308 in FIG. 11, all the tags inone bag 11212 may be triggered simultaneously. Brief dynamic delays mayensure that the various tags transmit at different times, such that eachtag is detected by one or more of wireless infrastructure receivers11106.

In some embodiments, the at least one transmitter may be configured torandomly delay at least one of the repetitions of the identificationsignal, to thereby avoid signal collision. Random delay refers to a timeinterval between consecutive repetitions of the identification signal,which varies randomly. For example, the time interval between a firstand a second identification signal may be different from the delaybetween the second and the following third identification signal, andmay not be based on a predefined rule, a relationship, or a pattern.

The wireless identification tag may be configured for association with aspecific product to thereby transmit a unique identification signal thatdiffers from identification signals from tags associated with otherinstances of a same product. The tag may be configured for such use byincluding within memory of the tag a unique identification code thatdiffers from other identification codes of other tags. Therefore, forexample, when establishments stock multiple instances of the sameproduct (e.g., multiple instances of the same food item, clothing item,or any other goods or objects), each instance will have its own uniquecode. This may enable precise tracking of when each instance of productwas received, placed on shelves, purchased, returned, where andprecisely when each instance was manufactured, as well as instances ofcounterfeiting and fraud.

In some embodiments, the at least one circuit may be configured toimplement an identification transmission rule for regulating the atleast one circuit in a manner causing the at least one transmitter todelay sending the identification signal. As discussed elsewhere in thepresent application, a transmission rule in the context of thisdisclosure may refer to a procedure implemented as part of a circuitwhich is used to control a transmitter. In some embodiments, thetransmission rule may cause the transmitter to delay sending anidentification signal. The delay in sending the identification signalmay be random or dynamic.

In some embodiments, the at least one circuit may be configured toimplement an identification transmission rule for regulating the atleast one circuit in a manner causing the at least one transmitter todelay sending the identification signal, even when sufficienttransmission power for transmitting the identification signal isaggregated and stored in the energy storage component.

In some embodiments, the delay in sending the identification signal bythe transmitter of the wireless identification tag may be causedregardless whether the energy storage component has adequatetransmission power stored. The delay period in sending theidentification signals may be fixed or variable. The delay may beintroduced to substantially minimize signal collisions.

In some embodiments, the at least one circuit may be configured toimplement the identification transmission rule to cause the transmitterto send the identification signal in a predetermined time interval. Atime interval may include a period of time between signal transmissions.The time interval may also key-off other system events such as, forexample, an input, stimulus, or trigger into a circuit, the output oraction performed by the circuit, multiple occurrences of an input,stimulus or trigger, or two occurrences of an output or action of thesame circuit or of different circuits. When measuring time intervalsbetween repeating occurrences of the same event, a periodicity may bedefined as an average time interval between the events and may include adeviation from the average time interval as the variance in theperiodicity. When a time intervals is defined by periodicity, the timeinterval may include a frequency of the events as the inverse of theaverage time interval between events, a duty cycle of the events as theratio between the average time length of each event (from the start ofthe event to its finish time), and the average time interval betweenevents (as measured from the start of one event to the start of thesucceeding event). The time interval may be predetermined according tothe identification transmission rule. For example, the circuit may beconfigured to cause the transmitter to send the identification signal inparticular second, minute, or hour intervals. The selection of theinterval may depend on use requirements.

In some embodiments, the at least one circuit may be configured toimplement the identification transmission rule to define a time intervalbetween transmission of two consecutive identification signals. Forexample, a circuit may be configured to implement a transmission rulewhich causes the transmitter to wait to send a second identificationsignal for a predetermined time interval after a first identificationsignal is sent. By way of non-limiting example, the time interval forsome embodiments may be at least ten minutes while in other embodimentsthe time interval between transmission of two consecutive identificationsignals may be a number of microseconds.

In some embodiments, the at least one circuit may be configured toimplement the identification transmission rule to randomly select a timeinterval between two consecutive identification signals. In someembodiments, a set of inputs, triggers, or stimuli received by thecircuit, may randomize the timing of transmission of identificationsignals such that the time interval between two consecutiveidentification signals is not predetermined, not predefined, orunpredictable. Such random selection typically results in the intervalvarying from signal transmission to signal transmission. Randomtransmission, in the context of some embodiments may includepseudorandom transmissions. In some embodiments, the randomly selectedtime interval may be between ten and fifteen minutes while in otherembodiments the randomly selected time interval may be a number ofmicroseconds. In other embodiments, a threshold may be imposed on randomtransmissions such that no two sequential transmissions may occur priorto a predetermined time lapse from the first transmission to the secondtransmission, or from a first group of transmissions to a second groupof transmissions.

In some embodiments, the at least one circuit may be configured toconserve energy by activating for a first predetermined length of timeand deactivating for a second predetermined length of time, in arepeating manner. For example, the circuit may be designed to ensurethat enough energy remains on board to carry out prioritized functions.By way of example, a prioritized function may be transmitting a tagidentity in response to an EAS gate trigger. If the tag does not retainenough energy to meet that prioritized function, the tag's controllermay not permit any other transmissions until reserve energy issufficiently replenished. By way of mother example, after a tag hastransmitted its identity to an inventory management system, the tag mayconserve energy by not transmitting its identity again within apredetermined period of time, even though the tag may receive a signalprompting transmission. Then, after the time period elapses, the tag maybe enabled to transmit its identity, after which it may return, in arepeating manner, to a sleep mode.

Energy conservation may be achieved by programmed or otherwisepre-determined rules. For example, the rules may be based on a number offunctions performed, duration of transmission of identification signals,power level, amount of data transmitted, among other functions thecircuit is configured to perform. Based on the work load, the circuitmay remain activated for a predetermined amount of time (e.g.,milliseconds). In some embodiments, the circuit may be configured to bedeactivated for a second predetermined length of time, based on theamount of reserve energy available, amount of reserve energy needed, thenumber of transmissions remaining, and other relevant factors. If thestored energy is below a threshold and nevertheless the transmission ofan identification signal is required, the circuit may mediate thesituation by causing the additional signal to be transmitted using lessenergy than the original delayed signal. The lower use of energy mayoccur as a result of the circuit limiting a magnitude of power and/or aduration of power for the transmission. Alternatively, or additionally,the circuit may also limit the volume of information transmitted inorder to conserve power. The limitation on the volume of information maybe based, for example, on the content of previous transmissions. Forexample, if characteristics of a product were previously transmitted andthose characteristics have not changed, they may be omitted from theadditional transmission. The activation and deactivation of the circuitmay be repeated in a pattern to conserve the stored energy and maximizethe energy efficiency. In some embodiments, the first and the secondpredetermined lengths of time may be substantially similar orsubstantially dissimilar. As an example, the circuit may be configuredto stay active for a few seconds to a few minutes, and the circuit maystay inactive or may be deactivated for a few seconds to a few minutes.

Embodiments of the present disclosure may relate to methods, systems,devices, and computer readable media for a wireless identification tagconfigured to harvest ambient energy and transmit an identificationsignal intermittently. For ease of discussion, a device is describedbelow, with the understanding that aspects of the device apply equallyto systems, methods, arm computer readable media. For example, someaspects of such device may include electrical connections over a networkthat is either wired, wireless, or both. Other aspects of such a methodmay occur using non-electric means. In the broadest sense, the device isnot limited to particular physical and/or electronic instrumentalities,but rather may be accomplished using many differing instrumentalities.

In various embodiments of the present disclosure, a wirelessidentification tag may include any device associated with an item wherethe device provides identification information about the item or aboutthe device itself. In one embodiment the wireless identification tag mayprovide identification information such as a serial number associatedwith the item or the device. In another embodiment, the wirelessidentification tag may provide a Bluetooth low energy (“BLE”)advertising beacon. The wireless identification tag may further besensitive to Electronic Article Surveillance (“EAS”) magnetic fields andcommunicate with an EAS gate. Other embodiments may provide a location,product information, a price, matching products, or other informationrelating to the item. Such information may be stored on the deviceitself, or may be retrieved from a data structure after the devicetransmits identifying information to a processor that performs a lookupin the data structure.

In some embodiments, an exemplary wireless identification tag may beconfigured to harvest ambient energy. Ambient energy may be defined byan ability to perform work, or to exert power for a certain length oftime. Such energy may be represented by the product of the power and thelength of time being equal to the energy spent. Ambient energy may betransmitted and harvested in many forms, such as electrical, magnetic,electromagnetic, kinetic, acoustic, thermal, photonic or other types ofenergy. Energy may also be stored in many forms, such as but not limitedto electrostatic, magnetic, chemical, kinetic, electrical, thermal orother types of energy. In the context of electrical or electroniccircuits, energy will most often be used as electric energy, either as adirect current (“DC”) source or as an alternating current (“AC”) source.However, the ordinary artisan wall understand that other forms ofelectrical ambient energy may also be harvested. Ambient energy mayinclude energy from ambient sources including at least sunlight, wind,vibration, sound, heat, radio frequency. Additionally, or alternatively,ambient energy may include energy received from one or more exciters,such as an RFID exciter or dedicated exciters configured to useproprietary protocols at the RFID frequency band, the 2.4 GHz ISM band,or any other licensed or unlicensed frequency band that transmits energyin one or more frequencies recognizable by the tag. In some embodiments,exciters may be positioned in an environment to cover any area, such as,for example, a store, warehouse, floor, room, interior of an appliance,outdoor area, road, walkway, conveyor, vehicle, storage facility, or anyother location or establishment in which tag identification or trackingmay be desirable. Additionally or alternatively, ambient energy mayinclude energy transmitted in Bluetooth or Wi-Fi frequency bands by cellphones, Wi-Fi routers, automobiles, personal computers (such as laptopor desktop computers), smart tablets, wearable electronics such assmartwatches, smart glasses, televisions, speakers and headphones, homesecurity devices or systems, baby monitors, microwave ovens, garage dooropeners, or any other device capable of wirelessly transmitting energy,such as in a Bluetooth or Wi-Fi frequency band.

In some embodiments, harvesting ambient energy may include capturing andstoring energy from an ambient source, such as from one or more excitersor from one or more alternative sources of energy situated within thesame environment as the tag. The harvesting may be done via one or moreantennae, and may include a circuit, configured to capture energy, suchas radio frequency-energy, and store the captured energy. Such a circuitmay include a combination of components and devices and be implementedas part of a silicon chip, a printed-circuit board, a connected system,or as a combination thereof. The components and devices may be connectedin a manner enabling the performance of a desired function or reactionas a response to an input, stimulus, or trigger which may be generatedinternally or externally. The function or reaction of a circuit mayinclude controlling other circuits; generating visual, audible, orotherwise communicable alerts or signals; and/or performing predefinedcoded operations. For example, the components and devices may include,but are not limited to, resistors, capacitors, inductors, conductors,transistors, diodes, transmission lines, inverters, buffers, logicgates, latches, flip-flops, amplifiers, comparators, voltage sources,current sources, switches, and any other component or device suitablefor use in a circuit to achieve the aforementioned exemplary functions.The input, stimulus, or trigger may include, but is not limited to, avoltage level change; a current level change; a frequency, amplitude, orphase change of a received signal; a digital input; a digital pulse; acontrol word; or any other signal that may be received by a circuit. Asused herein the term “circuit” may include two or more electricallyconnected components, which may be considered a single circuit ormultiple circuits.

In some embodiments, tar exemplary wireless identification tag may beconfigured to transmit an identification signal intermittently.Intermittent transmission may include any non-continuous timing oftransmissions. For example, the intermittent transmissions may occur atperiodic, random, or regular intervals. Intermittent transmission mayenable lower energy consumption by the wireless identification tag byconserving energy in the tag's energy storage component.

As alluded to previously, an exemplary wireless identification tag maybe configured to transmit at various intervals or in response to atrigger. In one embodiment, the wireless identification tag may beconfigured to transmit at an interval for the purpose of conservingenergy, even when the tag receives a trigger to transmit outside thepredetermined interval. For example, the wireless identification tag maybe configured to transmit within a minimum repetition period, such asevery ten minutes. The minimum repetition period may require an initialtrigger such that in the absence of a trigger signal within a prescribedtimeframe, the tag enters sleep mode and does not transmit (or transmitsmuch less frequently). Then, upon receipt of a trigger, the tag mightreturn to its periodic mode of operation, according to a transmissionrule. After a prescribed period without any trigger, the tag may thenreturn to sleep mode.

In another example, the wireless identification tag may be configured totransmit a minimum repetition period (e.g., identification transmissionsspaced apart by a number of seconds, minutes, or hours) with arandomized delay between transmissions. By way of non-limiting example,a minimum repetition period may be ten minutes, and the random delaybeyond ten minutes may be each second between ten minutes arm fifteenminutes. In this way, the space between transmissions may vary randomlyfrom ten to fifteen minutes. In another embodiment, the wirelessidentification tag may be configured to make multiple transmissionswithin a short interval. For example, the wireless identification tagmay be configured to make six transmission within an interval of 200 ms,and then sleep for a period of time. In another embodiment, the wirelessidentification tag may be configured to make multiple transmissionswithin a short interval with a lower power level as discussed below.

Disclosed embodiments may include, at least one antenna configured toreceive ambient energy. In some embodiments, an exemplary wirelessidentification tag may include one antenna, two antennae, threeantennae, or any number of antennae. An antenna may include a conductorconfigured to receive transmitted or ambient energy. The conductor mayinclude, for example, a metal wire or a printed circuit. The antenna maybe connected to or may include a circuit configured to transform asignal from a conducted input to a radiated output (in transmission). Inanother embodiment the circuit may be configured to transform a signalfrom a radiated input to a conducted output (in reception). The radiatedform may be electromagnetic radiation, electric fields, or magneticfields. The conducted form may be a time-varying voltage or a currentsignal over a physical connection. In other cases, the radiated form maybe acoustic (such as in sonar applications) or optical (such as in laserapplications). An antenna may be passive or active. A passive antennamay require no external power other than the signal received by theantenna. An active antenna may rely on an external source of power. Apassive antenna may be implemented as a series of conductors printed ona printed circuit board (“PCB”) and connected to the rest of the circuiteither through direct connection, electrical or magnetic coupling, orother means for connecting a circuit component to a circuit. As anexample, the exemplary tag 1100 illustrated in FIG. 9 may include anantenna 2112 tuned to receive energy in a frequency below 1 GHz (e.g.,energy in a frequency band around 900 MHz) and to convey harvestedenergy to a 900 MHz harvester 9012. Additionally, or alternatively, theexemplary tag may include an antenna 2114 tuned to receive energy in afrequency band around 2.4 GHz, and to convey harvested energy to a 2.4GHz harvester 9014.

Disclosed embodiments may include at least one energy storage component,electrically connected to the at least one antenna, configured toaggregate and store the received ambient energy. In the context ofelectric circuits, energy storage components may include capacitors,supercapacitors, batteries (both single-use and rechargeable), anycombination thereof, and any other circuit component capable of storingenergy. In various embodiments, the energy storage component may includea component configured to aggregate energy collected. In someembodiments a circuit may facilitate ambient energy aggregation. Ambientenergy may be aggregated from a single source or from multiple sources.For example, energy from differing transmitters operating at differingfrequencies may be aggregated in the energy storage component. Theenergy from the varying sources may be received on a common antenna oron multiple antennae, and may be received sequentially orsimultaneously. The energy storage component may include or beassociated with a circuit designed to receive energy in one or moreforms or from one or more sources and store received energy within acommon energy storage component or a group of energy storage components.That is, a wireless tag may include one energy storage component, twoenergy storage components, or any number of energy storage components,and those components may store energy from differing sources.

In various embodiments, at least one energy storage component mayinclude a circuit designed to receive energy from a source in one form,store it locally in the circuit in a second form, and make it availablefor usage by other circuits connected to it, either immediately or at alater time after receiving the energy, in the second form or in a thirdform of energy.

As illustrated in FIG. 2, wireless tag 1100 may include a multi-sourceharvester 2102, an energy storage circuit 2108, a 900 MHz antenna 2112,and a 2.4 GHz antenna 2114. Antennae 2122 and 2114 may be configured toreceive ambient energy. The multi-source harvester 2102 may be connectedto the energy storage circuit 2108 and configured to harvest ambientenergy received from its own associated antenna (not shown) or by the900 MHz antenna 2122 and 2.4 GHz antenna 2114. Regardless of the source,the received ambient energy may be stored in the energy storage circuit2108. While illustrated with two antennae and a multi-source harvester,not all such components may be needed, depending on application. Forexample, the tag may be designed to only harvest energy from a singlesource, or from less than all sources. Similarly, additional antennaemay be employed if additional sources of ambient energy are expected toexist in a use environment.

Aspects of disclosed embodiments may further include at least onetransmitter electrically connected to the at least one energy storagecomponent, configured to transmit the identification signal. In variousembodiments, a transmitter may include a conductor such as a metal wireor a printed circuit. Such a circuit may be designed to perform theaction of sending a signal over a communication medium such as Wi-Fi,Bluetooth, cellular, Ethernet or any other standards-based orproprietary protocol Alternatively or additionally, the transmittedsignal may carry energy, for example exciters for RFID, X-ray imaging orradar. The transmitted signal may alternatively, or additionally, carrydata, such as a unique identifier, information about an associated item,information about tag operating parameters, or any other type ofrelevant information, depending on use case The signal may take the formof an electric signal, a magnetic signal or an electromagnetic signal,transmitted wirelessly over-the-air. A transmitter may be configured tosend signals in a certain magnitude. This magnitude may be used tocalculate certain properties of signal propagation to establishparameters such as the signal's detection range, the signal-to-noiseratio, and interference properties. In the context of wirelesscommunication, this magnitude may be measured in units of power, usuallyeither Watts or dBW (decibel-Watts or dB-Watts) which is a logarithmicunit related to Watts (or sometimes in units of dBm, which is related tomilliwatts in the same manner dBW is related to Watts). Thus, the powerlevel at which the transmitter transmits may be a measurement of powerimmediately at the output of the transmitter, while the transmitter isactively transmitting. A transmitter may be designed to have aconfigurable power level, such that in response to certain inputs it maytransmit a signal at one of two or more different power levels. Forexample, the exemplary tag 1100 illustrated in FIG. 9 may include atransmitter 2104 configured to transmit signals having a frequencyaround 2.4 GHz using antenna 2114; thus, antenna 2114 may be configuredto both harvest energy and to transmit tag signals. The exemplary tag1100 may additionally include a switch 9034 configured to control thebehavior of antenna 2114 and to cause antenna 2114 to switch between atransmission mode and an energy harvesting mode (e.g., under control ofa beacon controller 9030 of transmitter 2104). In some alternativeembodiments, the exemplary tag 1100 may include a signal transmitterthat is separate from the energy harvesting antennae. As illustrated inFIG. 2, beacon 2104 may be electrically connected to the energy storagecircuit 2108 to power the beacon's transmission of an identificationsignal.

Aspects of disclosed embodiments may further include at least onecircuit connected to the at least one transmitter and configured toimplement an identification transmission rule, to cause the transmitterto delay sending the identification signal even when sufficient energyfor transmission of the identification signal is aggregated and storedin the energy storage component. The circuit may include any combinationof electrical components interconnected to implement an identificationtransmission rule. In various embodiments, an identificationtransmission rule may include any procedure or protocol characterizing atransmission. The rule may be implemented as part of a circuit used tocontrol a transmitter, such that the procedure defines properties of thetransmitter operation. Those properties may include the data content ofa transmitted signal, its power level, the communication protocol usedfor transmission, the frequency band used for transmission, the timingof the transmission, and even whether to transmit or not to transmit atall. Examples of such procedures may include instructions to send a datapacket over Wi-Fi protocol if an indication was received that Wi-Ficommunication was detected by the circuit, and to send the same datapacket over Bluetooth protocol if an indication was received thatBluetooth communication was detected by the circuit. Other suchexemplary procedures may dictate the power level used in transmissionbased on the desired range for the packet, or the data content of thepacket based on the intended recipient or on the set of inputs, triggersand stimuli associated with the transmission. A transmission rule may beautomatically implemented or may be implemented based on a receivedtrigger, input, or other stimulus. Implementation of transmission rulesmay be hierarchical. For example, a transmission required by one set ofinputs may be blocked or prevented by a separate, superseding input withhigher priority.

Consistent with disclosed embodiments, the circuit may determine thatthere is sufficient energy to transmit a given signal when an amount ofenergy stored in the energy storage component is equal to, or greaterthan, the sum of the energy required to transmit the signal in questionand an amount of reserve energy. The amount of reserve energy may be thesum of one or more of: an amount of energy required to power the tag,not including the transmitter, for a predetermined time period; anamount of energy required to be stored in the energy storage component,below which the energy storage component cannot power the transmitter;and an amount of energy required to power the transmitter for thetransmission of a predetermined number of transmissions of anidentification signal.

In some embodiments, an exemplary wireless identification tag may beconfigured to send a transmission signal at regular intervals inresponse to the wireless identification tag receiving ambient energy ina first frequency band. In another embodiment, an exemplary wirelessidentification tag may be configured to send a transmission signal aftera time delay in response to the wireless identification receivingambient energy in a second frequency band. In yet another embodiment, anexemplary wireless identification tag may be configured to send multipletransmission signals within a short time interval in response to thewireless identification receiving ambient energy in a third frequencyband. Other embodiments may include a wireless identification tagconfigured to send at regular time intervals, transmission signals inresponse to ambient energy received within various frequency bands.However, the tag may be configured to send the signals only ifsufficient energy is stored in the energy storage component, or the tagmay be configured to limit the power of transmission as a function ofthe amount of energy stored in the tag. These are but a few examples.Transmission protocols may be based on a combination of these factors orany other factors.

As illustrated in FIG. 10, wireless tag 1100 may include a top levelcontroller 9020 and a multi-source harvester 2102. The multi-sourceharvester 2102 may include a power manager 9010 or other componentcapable of detecting a frequency or source of received energy. Themulti-source harvester 2102 may be further configured to send a signalto the top level controller 9020 indicating the frequency or source ofthe received energy. The top level controller may include one or morefinite state machines (“FSMs”), for implementing various identificationtransmission rules.

In some embodiments, the at least one circuit is configured to implementthe identification transmission rule to cause the transmitter to sendthe identification signal in a predetermined time interval. A timeinterval may include a period of time between signal transmissions. Thetime interval may also key-off other system events such as, for example,an input, stimulus, or trigger into a circuit, the output or actionperformed by the circuit, multiple occurrences of an input, stimulus ortrigger, or two occurrences of an output or action of the same circuitor of different circuits. When measuring time intervals betweenrepeating occurrences of the same event, a periodicity may be defined asan average time interval between the events and may include a deviationfrom the average time interval as the variance in the periodicity. Whena time interval is defined by periodicity, the time interval may includea frequency of the events as the inverse of the average time intervalbetween events, a duty cycle of the events as the ratio between theaverage time length of each event (from the start of the event to itsfinish time), and the average time interval between events (as measuredfrom the start of one event to the start of the succeeding event). Thetime interval may be predetermined according to the identificationtransmission rule. For example, the circuit may be configured to causethe transmitter to send the identification signal in particular second,minute, or hour intervals. The selection of the interval may depend onuse requirements.

In some embodiments, the at least one circuit may be configured toimplement identification transmission rule to define a time intervalbetween transmission of two consecutive identification signals. Forexample, a circuit may be configured to implement a transmission rule towhich causes the transmitter to wait to send a second identificationsignal for a predetermined time interval after a first identificationsignal is sent. By way of non-limiting example, the time interval forsome embodiments may be at least ten minutes while in other embodimentsthe time interval between transmission of two consecutive identificationsignals may be a number of milliseconds.

In some embodiments, the at least one circuit may be configured toimplement the identification transmission rule to randomly select a timeinterval between two consecutive identification signal transmissions.Such random selection typically results in the interval varying fromsignal transmission to signal transmission. Random transmission, in thecontext of some embodiments may include pseudorandom transmissions. Insome embodiments, the randomly selected time interval may be between tenand fifteen minutes while in other embodiments the randomly selectedtime interval may be a number of milliseconds. In other embodiments, athreshold may be imposed on random transmissions such that no twosequential transmissions may occur prior to a predetermined time lapsefrom the first transmission to the second transmission, or from a firstgroup of transmissions to a second group of transmissions.

In some embodiments, the at least one antenna may be configured toreceive energy transmitted at a frequency within at least of a firstfrequency band around 900 MHz or second frequency around 2.4 GHz. Afrequency band may refer any portion of a radiofrequency orelectromagnetic spectrum. For example, a frequency band may refer to aportion of tire spectrums reserved internationally for particularindustrial, scientific, and medical (“ISM”) purposes. In this context,the term “reserved” may refer to designating a frequency band, or rangeof frequency, for a single purpose or application. In manyjurisdictions, frequency bands may be reserved and/or designated by law,regulation, or any other applicable standards or protocols. In general,a frequency band may refer to any portion of the spectrums that may beused in the fields such as broadcasting, radiocommunication, wirelesstelecommunications (e.g., cell phones), near field communications(“NFC”), wireless computer networks (e.g., Wi-Fi), or for any othermeans of wireless communication.

In some embodiments, the at least one circuit of the exemplary tag maybe configured to cause the transmitter to transmit the identificationsignal in the second frequency band using energy received in at leastone of the first frequency band or the second frequency band. Forexample, the wireless identification tag may harvest ambient energyusing an antenna configured to receive ambient energy in a frequencyband around 900 MHz, using an antenna configured to receive ambientenergy in a frequency band around 2.4 GHz, or both. The energy harvestedfrom either and all antennae may then be stored in the at least oneenergy storage component. The energy stored in the energy storagecomponent may then be used by a transmitter to transmit theidentification signal in the frequency band around 2.4 GHz by anassociated antenna, independent of the frequency of the received ambientenergy.

For example, referring to FIG. 2, the multi-source harvester 2102 ofwireless identification tag 1100 may harvest energy received by eitherthe 900 MHz antenna 2112, the 2.4 GHz antenna 2114, or by both.Harvested energy may be stored in the energy storage circuit 2108. Theenergy may then be used either antenna 2114, 2112 to transmit theidentification signal as discussed above.

In some embodiments, the at least one energy storage component may beconfigured to power the wireless identification tag with the storedreceived ambient energy. For example, the harvested energy stored in theenergy storage component may be used to power the wirelessidentification tag to enable the tag to perform harvesting,transmission, and other functions.

In some embodiments, the at least one energy storage component includesat least one capacitor configured to power the wireless identificationtag without a battery. A capacitor may include any capacitive structureused to store an electrical charge through the use of charged platesseparated by insulation. Examples of capacitors may include ceramiccapacitors, film capacitors, power film capacitors, electrolyticcapacitors, supercapacitors, class X and class Y capacitors, MOMcapacitors (Metal-Oxide-Metal capacitors) implemented inside asemiconductor device, MIM capacitors (Metal-Insulator-Metal capacitors)implemented inside a semiconductor device, MOS capacitors(Metal-Oxide-Semiconductor capacitors) implemented inside asemiconductor device, other miscellaneous or variable capacitor. By wayof example, in FIG. 10, energy storage circuit 2108 may contain at leastone storage capacitor 10300. Consistent with disclosed embodiments, awireless identification tag may include an energy storage which does notinclude a battery (By way of example, a battery may include one or moreelectrochemical cells that store electric charges).

As discussed above, the exemplary tag may be configured to harvestenergy without a designated battery and to operate, in both an activetransmission state and an idle state, while consuming minimum amounts ofpower. Advantageously, the configuration of the exemplary tag may enableradio performance comparable to commercial battery-powered devices, at apower envelope comparable to a passive RFID device.

In some embodiments, the at least one circuit may be configured toimplement the identification transmission rule when the at least oneantenna receives ambient energy of a first predetermined frequency. Forexample, when ambient energy is received by an antenna configured toreceive ambient energy of a first predetermined frequency or ambientenergy received from an exciter that transmits energy at firstpredetermined frequency, the circuit may implement the identificationtransmission rule as discussed above. In some embodiments, the firstpredetermined frequency may be a frequency of about 900 MHz, asdiscussed above.

In some embodiments, the at least one circuit may be further configuredto cause the transmitter to send the identification signal less than tenseconds after the at least one antenna receives ambient energy in asecond predetermined frequency. For example, when ambient energy isreceived by an antenna configured to receive ambient energy of a secondpredetermined frequency or ambient energy received from an exciter thattransmits energy at a second predetermined frequency, the circuit maycause the transmitter to send the identification immediately. In someembodiments, however, the circuit may cause the transmitter to send theidentification after a delay period, which may be, for example, amaximum of ten seconds. Other longer or shorter delay periods may alsobe used, consistent with disclosed embodiments. In some embodiments, thesecond predetermined frequency may be about 2.4 GHz, as discussed above.

In some embodiments, the at least one circuit may be further configuredto determine that sufficient energy is aggregated and stored when anamount of energy stored in the energy storage component is equal to orgreater than a sum of a first amount of energy required foridentification signal transmission and a second predetermined amount ofreserve energy. For example, prior to transmission, the circuit maycheck to determine that there is both enough energy available to powerthe transmission, while leaving enough reserve on hand for laterfunctions. Thus, in order to achieve this functionality, it may bedesirable for the circuit to have the capability to determine orestimate a current amount of energy in the energy storage component. Thestored energy may be determined through measurements or calculations.For example, energy stored in the form of electrostatic charge in acapacitor may need to be converted to DC voltage for supply to othercomponents or circuits. A voltage measurement on the capacitor mayprovide an accurate estimation of the energy stored in the capacitor.While some embodiments may avoid the use of a battery, with embodimentsemploying a battery, a voltage measurement at several load conditionsmay be taken to determine a more precise level of available storedenergy.

The required energy may vary based on an associated action or set ofactions to be completed. Therefore, it may be desirable to ascertain theneeded actions, calculate the energy required to perform those actions,and then compare the required energy with a calculation or measurementof actual stored energy (plus any required reserve). In the context ofelectrical or electronic circuits, power may be supplied as eitherdirect or alternating current, but other forms are also possible. Inmost cases, the expected power to be consumed by the circuit may beintegrated over the duration of the performed action, resulting in atotal energy requirement, which may be calculated in Joules. Forexample, a circuit consuming 10 mW (ten milli-watts) of power for aduration of 1 ms (one milli-second) in order to process a single packetof data may require 10 μJ (ten micro-Joules) of energy in order toprocess the packet. In some cases, the energy required to perform acertain action may depend on the characteristics of the action, such ascontrolled by the inputs, triggers and stimuli received by the circuit.For example, a transmitter transmitting a longer or shorter signal at afixed power consumption may require more or less energy, respectively,due to the multiplication of power and time. Thus, energy can be savedby adjusting operating parameters (modulation, amount of datatransmitted, power levels, duration of transmission etc.) to suitparticular use cases.

For example, the at least one circuit may determine that the amount ofenergy stored in the energy storage device is at least the sum of theamount of energy required to transmit an identification signal and apredetermined amount of required reserve energy. In some embodiments,the predetermined amount of required reserve energy includes energy forpowering at least one portion of the wireless identification tag, apartfrom the at least one transmitter, for a predetermined time period. Therequired reserve energy may also constitute an amount necessary totransmit one or more identification signals in the future. The systemmay require such reserve in the event the energy storage component doesnot receive sufficient replenishment before a next transmission iscalled for or required. Tints, in some embodiments, the predeterminedamount of reserve energy may include a mini mum amount of energy for theenergy storage component to power the at least one transmitter for adesired period following a current transmission. This may includesufficient energy to send a predetermined number of future transmissionsof the identification signal. In other embodiments the predeterminedamount of reserve energy may include a minimum amount of energy in orderfor the wireless identification tag to function without reducing theamount of energy stored below a level of required energy.

In some embodiments, the at least one circuit may be configured tomonitor energy stored in the energy storage component, and cause the atleast one transmitter to transmit an additional identification signal,the additional identification signal requiring less energy to transmitthan the delayed identification signal, when the ambient energy storedin the energy storage component is determined to be below apredetermined threshold level. For example, when stored energy is belowa threshold and nevertheless the transmission of an identificationsignal is required, the circuit may mediate the situation by causing theadditional signal to be transmitted using less energy than the originaldelayed signal. The lower use of energy may occur as a result of tirecircuit limiting a magnitude of power and/or a duration of power for thetransmission. Alternatively, or additionally, the circuit may also limitthe volume of information transmitted in order to conserve power. Thelimitation on the volume of information may be based, for example, onthe content of previous transmissions. For example, if characteristicsof a product where previously transmitted and those characteristics havenot changed, they may be omitted from the additional transmission.

In some embodiments, the identification signal includes uniqueidentifier data of the wireless identification tag. For example, theidentification may include a number, string, or other form of data whichis singularly associated with the wireless identification tag, such thatno single wireless identification tag is associated with the same uniqueidentifier as any other wireless identification tag, and any singlewireless identification tag can only have a single unique identifierassociated with it. Examples of unique identifiers may include serialnumbers, alphanumeric strings, and any other data that may uniquelydistinguish one tag from another.

Embodiments of the present disclosure may relate to methods, systems,devices, and computer readable media for a wireless identification tagconfigured to harvest ambient energy and transmit and identificationsignal intermittently, instrumentalities. Disclosed embodiments mayinclude at least one transmitter, such as transmitter 2104 illustratedin FIG. 2. In some embodiments, the at least one transmitter may beconfigured to transmit a first signal to a first receiver in a firstfrequency, and to transmit a second signal to a second receiver in thefirst frequency. Additionally or alternatively, some exemplarytransmitters may be configured to transmit one or more signals in one ormore frequencies to one or more receivers. The one or more signals maybe triggered by different frequencies of received ambient energy, asdiscussed above. The different types of received energy may correspondto different tag operating modes. In one mode, the tag may send onesignal to one or more specified receivers. In another mode, tire tag maysend another signal to different specified receivers. The signals may besent via different frequencies, or in the same frequency. For example,the first signal may be a wireless tag identification signal sent to areceiver located within an establishment, and may be sent in a frequencyband around 2.4 GHz WW ISM. The second frequency may be a wireless tagidentification signal sent to a receiver in proximity to an EAS gate ofthe establishment. The second signal may also be sent in a frequencyband around 2.4 GHz WW ISM. A receiver may include a fixed receiver inan environment, a wireless user device, a handheld receiver, or anyother circuit or component that receives signals.

For example, as depicted in FIG. 13, tag 1100 may send an ID signal12200 in a frequency band around 2.4 GHz to receiver 11300 c in responseto a 2.4 GHz trigger signal 13100 emitted by handheld device 11200. Inanother example, as depicted in FIG. 14, tag 1100 may send, an ID signal12200 in a frequency band around 2.4 GHz to receiver 11300 h in responseto an EAS signal 14100 from EAS gate 1112, 1114.

Aspects of the disclosed embodiment may include at least one energystorage component, as described elsewhere in the present application.Various embodiments may also include a circuit designed to make energyreceived available for usage by a transmitter circuit to transmit asignal over a communication medium, as disclosed above. The exemplarytag may include at least one circuit connected to the at least onetransmitter and to the at least one energy storage component, the atleast one circuit being configured to monitor energy stored in theenergy storage component. For example, FIG. 2 is a block diagram of anexemplary wireless communication tag 1100 which may include at least onetransmitter 2104 connected to an energy storage circuit 2108. FIG. 9depicts an embodiment of the tag architecture of lag 1100 with a powermanager 9010. Energy storage circuit 2108 and transmitter 2104 may beconnected to power manager 9010. Power manager may be configured tomonitor the amount of energy stored in the energy storage circuit 2108.

Aspects of disclosed embodiments may further include at least onecircuit configured to prevent the at least one transmitter fromtransmitting the first signal to the first receiver in the firstfrequency when the energy stored in the energy storage component isinsufficient to transmit the second signal to the second receiver in thefirst frequency. Consistent with disclosed embodiments, the circuit maydetermine that there is insufficient energy for the at least onetransmitter to transmit the second signal to a second receiver when theamount of energy stored in the energy storage component is equal to, orless than, the sum of the energy required to transmit the first signalto the first receiver and an amount of reserve energy. The amount ofreserve energy may be the sum of one or more of: an amount of energyrequired to transmit the second signal to the second receiver; an amountof energy required to power the tag, not including the transmitter, fora predetermined time period; an amount of energy required to be storedin the energy storage component, below which the energy storagecomponent cannot power the transmitter; and an amount of energy requiredto power the transmitter for the transmission of a predetermined numberof transmissions of an identification signal. If the circuit determinesthat there is insufficient energy to transmit the first signal, then thecircuit may prevent the at least one transmitter from transmitting thefirst signal.

In some embodiments, the at least one circuit may be configured todetermine that insufficient energy is stored in the energy storagecomponent when an amount of energy stored in the energy storagecomponent is less than a sum of a first amount of energy required fortransmission of the first signal to the first receiver and a secondamount of energy required for transmission of the second signal to thesecond receiver after the transmission of the first signal to the firstreceiver. For example, the tag may be configured to ensure that if itcompletes a first task, the tag will retain sufficient reserve energy tocomplete art expected second task. If not, the tag may not proceed withthe first task. Thus, for example, if a first task involves sending anidentification signal to an infrastructure receiver for purposes ofinventory management, and a second task involves sending anidentification signal to a receiver at an egress in response to an EASgate trigger in order to ensure that removal of a tagged object from theestablishment is recorded, the tag may block the first task to ensureenough energy remains in reserve for the second task.

In some embodiments, the at least one circuit may be configured todetermine that insufficient energy is stored in the energy storagecomponent when an amount of energy stored in the energy storagecomponent is less than a sum of a first amount of energy required fortransmission of the second signal to the second receiver and a secondpredetermined amount of reserve energy. For example, a circuit may beconfigured to determine the insufficiency of energy using a measurementcomponent configured to monitor the amount of energy in reserve andcalculates whether it is sufficient to enable continued functioning ofthe tag. A first amount of energy required for transmission may bedetermined based on a lookup of one or more predefined threshold values,or may be calculated based on known characteristics of the transmissionand/or known information about how much energy may be required tocomplete the transmission. The second amount of energy may bepredetermined in that the tag may always be required to maintain aparticular energy reserve. The predetermined amount of energy maycorrespond, for example to one or more of an amount of energy needed forthe tag to perform internal functions for a predetermined period, or forthe fag to make a predetermined number of future transmissions, such asa gate mode transmission. If calculated, the first amount of energy maybe determined based on variables such as a distance between the tag andone of the receivers, such as the second receiver. Or it may becalculated or determined based on an amount of energy required in thepast for a similar transmission. Alternatively, as previously mentioned,the first amount of energy may also be an amount of energy predeterminedfor such transmissions. If the sum of the first amount of energy and thesecond amount of energy exceed a threshold, the tag may make adetermination that the amount of energy in reserve is insufficient.

Additionally, or alternatively, the circuit may be configured todetermine that stored energy is sufficient or insufficient based on asingle measurement, calculation, or threshold, without evaluation of twoseparate amounts of energy. For example, calculation of the sum of thefirst and second amounts of energy described above may be determined inadvance, either by a component of the tag or a processor external to thetag (e.g., by implementing a pre-engineered threshold or measurementthat incorporates the first and second amounts).

With reference to FIG. 9, such functionality may be carried out, by wayof example, with power manager 9010, which may monitor the state ofenergy storage module 2108. Data on threshold amounts of required energy(and historical data, if relevant) may be maintained in memory 9022, orwithin internal memory within power manager 9010. Alternatively,determining the insufficiency of energy may be determined within theenergy storage circuit 2108 itself or within or with the aid of toplevel controller 9020.

In some embodiments, the predetermined amount of reserve energy mayinclude a minimum amount of energy for powering at least one componentof the wireless identification tag, apart from the at least onetransmitter, for a predetermined amount of time. A tag may have multiplecomponents, as discussed herein, and reserve energy may be needed notjust for transmissions, but for other internal functions of the tag.Thus, the minimum amount of energy required may account for any one ormore components of the tag. For example, with reference to FIG. 9, thepredetermined amount of reserve energy may include an amount of energyrequired to power, for a predetermined amount of time, the detectioncircuit 2106, tire top level controller 9020, the multi-source harvester2102, or the memory 9022. The predetermined amount of energy required topower at least one component of the wireless identification tag may alsoinclude the amount of energy required to power any other circuit orcircuit component included in the wireless tag for a predeterminedamount of time. The predetermined amount of time may be pre-programmed,depending on system design constraints. For example, the predeterminedamount of time may include a number of seconds, minutes, hours, days,months, or years.

In some embodiments, the predetermined amount of reserve energy mayinclude a minimum amount of energy for powering the at least onetransmitter to send a predetermined number of transmissions of the firstsignal. For example, the predetermined amount of reserve energy mayinclude the amount of energy required for the tag to transmit apredetermined number of transmissions while operating in gate mode,infrastructure-excitable mode (e.g., store mode), or user-excitable mode(e.g., IoT mode). The predetermined number of transmissions may be basedon design parameters of the system. For example, if the system designconstraint is that tag must always keep in reserve enough energy to beable to transmit six gate mode signals, three gate mode signals, or anyother number of gate mode signals, then the predetermined amount ofenergy reserve will include the amount of energy at least equal to theamount of energy required for six gate mode transmissions, three gatemode transmissions, or any other number of gate mode transmissionsaccording to the system design constraint. The design constraints mayalso require energy reserve for other internal functions, all of whichmay be included as part of the minimum amount of energy required.

In some embodiments, the predetermined amount of reserve energy mayinclude at least a minimum amount of energy for the energy storagecomponent to power the at least one transmitter after the transmittersends the predetermined number of transmissions of the first signal. Forexample, on top of the energy required to send the predetermined numberof transmissions of a first signal, the tag may be designed to storeadditional reserve energy to transmit other signals. These additionalsignals may include, for example, transmissions of a second or thirdsignal in the same or different frequency from the first signal. Theadditional signal(s) may include an identification signal, or a distresssignal, alerting the system that the tag contains insufficient energy onreserve. This might prompt the infrastructure to wirelessly transmitenergy to replenish the tag's reserve. Thus, for example with referenceto FIG. 9, the predetermined amount of reserve energy may include atleast a minimum amount of energy for the energy storage circuit 2108 topower the at least one transmitter 2104 after the transmitter 2104 sendsa predetermined number of transmissions.

As previously discussed with reference to FIG. 9, the power manager 9010may determine necessary reserve energy requirements. By way of anotherexample, the power manager 9010 may communicate the amount of energystored in the energy storage circuit 2108 to the top level controller9020. The top level controller 9020 may then determine if there issufficient energy to power the transmitter 2104 to transmit a signal andthereafter permit or prevent the transmitter 2104 from transmitting asignal. The top level controller 9020 may further determine the amountof energy required to send one or more transmissions and determine ifthere is sufficient energy to power the transmitter for the one or moretransmissions based on the amount of energy stored in the energy storagecircuit 2108.

As discussed above, the first frequency band may be within a frequencyband of 2.4 GHz WW ISM and the second frequency may be within afrequency band of 900 MHz WW ISM. In some embodiments, the at least oneenergy storage component may be configured to store energy received inthe first frequency and energy received in a second frequency that islower than the first frequency, and to power the at least onetransmitter using the stored energy. Regardless of differences infrequencies of energies received, the energy storage component may beconfigured, through interconnection with differing frequency receivers,through interconnection to differing antennae, or throughinterconnection to one or more circuits, to receive energy derived fromboth a higher frequency and a lower frequency. For example, a first,higher frequency may be in a 2.4 GHz range while a second, lowerfrequency may be in a 900 MHz range.

In various embodiments, at least one energy storage component mayinclude a circuit designed to receive energy from a source in one form,store it locally in the circuit in a second form, and make it availablefor usage by other circuits connected to it, either immediately or at alater time after receiving the energy, in the second form or in a thirdform of energy. For example, the at least one energy storage componentmay make stored energy available to power the at least one transmitter.

As illustrated in FIG. 9, wireless tag 1100 may include a transmitter2104. Transmitter 2104 may be connected to energy storage circuit 2108and may be configured to use energy stored in the energy storage circuit2108 to power the transmitter 2104.

In some embodiments the at least one energy storage component mayinclude at least one capacitor configured to power the wirelessidentification tag without a battery. This may include, for example,storage capacitor 10300 of energy storage circuit 2108.

In some embodiments, the circuit may configured to determine whether tocause the at least one transmitter to operate in a first mode fortransmitting the first signal to the first receiver or to operate in asecond mode for transmitting the second signal to the second receiverbased on the frequency of a signal received by the wirelessidentification tag. Based oil any number of factors within system designparameters, a circuit in the tag may cause the tag to operate inalternate modes of operation. One factor that may influence the mode ofoperation is the frequency of the signal received by the tag. Onefrequency signal may cause the tag to operate in a first mode, while asecond frequency signal may cause the tag to operate in a second mode.Thus, as discussed above, the wireless tag may include a circuit capableof determining the frequency of a received signal and to alter the tag'smode of operation as a function thereof.

FIG. 19 is a flow diagram of an exemplary operation method of a wirelesstag. The tag may receive ambient energy as reflected in block 19102 anddetermine the frequency in which the ambient energy is received asreflected in block 191104. If the tag determines that energy is receivedin a 7-13 MHz band or 58-60 kHz band as reflected in block 19106, one ormore circuits in the tag may cause the tag to operate in gate mode, asreflected in block 19112. This may result in transmissions of bursts ofidentification signals at full output power, as reflected in block19118. Alternatively, the tag may determine that energy is received in a900 MHz WAV ISM band as reflected in block 19108 and cause the tag tooperate in an infrastructure-excitable mode which, in the case of aretail establishment, may be referred to as store mode, as reflected inblock 19114. As a result, transmission of an identification signal maybe delayed, as reflected in block 19120. As a further alternative, thetag may determine that energy is received in a 2.4 GHz WW ISM band asreflected in block 19110, and cause the tag to operate in a modereferred to as user-excitable mode, IoT inode, or home mode as reflectedin block 19116. This in turn causes transmission of an immediateresponse identification signal as reflected in block 19122.

In some embodiments, the circuit may be further configured to cause theat least one transmitter to operate in the first mode when the wirelessidentification tag receives a signal in at least one of a firstfrequency band of 900 MHz WAV ISM or a second frequency band of 2.4 GHzWW ISM. For example, the first, mode may be triggered by one of a 900MHz WW ISM signal or a 2.4 GHz WW ISM signal. Alternatively, either ofthe 900 MHz WAV ISM signal or a 2.4 GHz WAV ISM signal may trigger thefirst mode of operation. Similarly, the circuit may be furtherconfigured to cause the at least one transmitter to operate in thesecond mode when the wireless identification tag receives a signal in atleast one of a first frequency band of about 7-13 MHz or a secondfrequency band of about 58-60 kHz. One of a 7-13 MHz signal or a 58-60kHz may trigger the second mode. Alternatively, regardless of which ofthe two ranges of signals are received, the second inode may betriggered. In these examples, the first mode may be an infrastructureexcitable mode and the second mode may be a gate mode. The frequencyband of about 7-13 MHz may include any frequency compatible with radiofrequency (“RF”) EAS systems. Operating frequencies for RF-EA8 systemsmay include any frequency in the range of 1.8 MHz to 13 MHz. Thefrequency band of about 58-60 kHz may include any frequency compatiblewith acousto-magnetic (“AM”) EAS systems. Operating frequencies forAM-EAS systems may include any frequency in the range of 58-60 kHz.

In some embodiments, the at least one transmitter may be configured totransmit to the first receiver in a first location different from alocation of the second receiver, and the at least one transmitter may befurther configured to transmit the second signal after a shorter delaythan a delay before transmitting the first signal. Depending on designparameters, some signals might be transmitted more quickly than othersignals. For example, the first receiver may be located in the interiorof an establishment or in any location not associated with an EAS gatewhile the second receiver may be located near an EAS gate or inproximity to an EAS gate. In this exemplary scenario, since receipt ofan identification signal may have greater criticality than receipt of arecurring signal from an inventory management system, a tag may bedesigned to send an identification signal with lesser delay to areceiver in a vicinity of an EAS gate than to a receiver that is not ina vicinity of an EAS gate.

In the example shown in FIG. 12, the tag 1100 may be configured totransmit to receiver 11300 e or receiver 113001, located in the interiorof a retail store after a delay (depending on design parameters,fractions of a second to minutes or even hours). In the example shown inFIG. 13, the tag 1100 may be configured to transmit to receiver 11300 cor a receiver located in a device 11200 after a shorter delay of, forexample, less than ten seconds. In the example shown in FIG. 14, the tag1100 may be configured to transmit to receiver 11300 h or a receiverlocated near a gate with a minimal delay of, for example, less than 200ms.

In some embodiments, the at least one circuit may be further configuredto detect whether energy is received in a frequency other than the firstfrequency, and to cause the at least one transmitter to send the secondsignal to the second receiver less than ten seconds after the energyreceived in the other frequency is detected. For example, the wirelesstag may include a circuit that is able to determine the frequency inwhich energy is received. When the circuit determines that the receivedenergy is in a frequency band other than a frequency band associatedwith infrastructure-excitable mode (e.g., store mode), the circuit willcause a transmitter in the wireless tag to send a signal to a receiverwithout delay or with a delay on the order of fractions of a second. Inone example, the circuit will cause a transmitter in the wireless tag tosend a signal to a receiver no longer than ten seconds after the circuitdetects that the energy received is in a frequency other than thefrequency band associated with store mode.

Referring to FIG. 10, the power manager 9010 may detect the frequency inwhich energy is received and send a signal to the top level controller9020 indicating the frequency in which the energy was received. The toplevel controller 9020 may then implement transmissions according to auser-excitable mode such as IoT mode FSM 10004 or gate mode FSM 10006.

In some embodiments, the first signal differs from the second signal inat least one of repetition period, a time interval between twoconsecutive responses, a data encryption mechanism, a transmissionpower, or data content of the transmission. The first and second signalsmay differ in frequency, as discussed previously, but alternatively, oradditionally, may differ in other respects. For example, a signal mayrepeat periodically to ensure receipt by the receiver. The first orsecond signals may have a repetition period that differs from the other.Similarly, the tag may not permit a signal to be sent until apredetermined time period elapses from a prior transmission. The firstand second signals may differ in these time intervals. Likewise,different signals may be encrypted differently, may differ in theirpower, or may contain differing information. These are just a fewexamples. The identification signal may vary in any oilier signalparameter.

In some embodiments, a transmission sent while the wireless tag isoperating in infrastructure-excitable mode (e.g., store mode) may have arepetition period of ten minutes. In other example, a transmission sentwhile the wireless tag is operating in infrastructure-excitable mode(e.g., store mode) may have a repetition period of ten minutes with anadditional randomized delay period between zero and five minutes.

Data encryption mechanisms may include a process of encoding a messageor information in such a way that only authorized entities can access itand those who are not authorized cannot. Encryption by itself may notprevent interference with a data transmission, but it may block thosewithout knowledge of the decryption process from interpreting themessage or information. An encryption processes may include the use ofan encryption key, which may be a piece of data that is shared betweenthe transmitter of the message and the intended recipient at a point intime prior to the transmission of the encrypted message. The use of anencryption key enables multiple parties to use common encryptionprocesses, while still maintaining the secrecy of the messages as longas the keys are unique and kept secret. A message would be considereddecipherable or readable by a receiving party if it is transmitted inaccordance with a protocol that is agreed upon by both the sending andthe receiving party. In the case of an encrypted message, the messagemay be decipherable or readable if the receiving party also has all thedetails of the type of encryption used, including the encryption key.

Data content may include a unique identifier associated with thewireless tag, a status of the wifeless tag, a location of the wirelesstag, a power level of the wireless tag, pricing information, ownershipinformation, styling information, data relating to the trigger thatinitiated the transmission, or any information conveyed by the signal.

In some embodiments, the first signal may include first identificationdata and the second signal includes second identification data, and atleast one of the first identification data or the second identificationdata may include a unique identifier of the wireless identification tag.For example, the tag, operating in infrastructure-excitable mode (e.g.,store mode), may send a signal. The data content of the signal mayinclude identification data. The identification data may include aunique identifier associated with the wireless tag. Additionally, oralternatively, the tag, operating in user-excitable mode (e.g., IoTmode) or gate mode, may send a signal. The data content of that signalmay also contain identification data which may also include the uniqueidentifier associated with the wireless tag.

In some embodiments, when the energy stored in the energy storagecomponent is determined to be below a predetermined threshold level, theat least one circuit may be configured to cause the at least onetransmitter to transmit an alternative signal to the first receiver withless energy than is required to transmit the first signal to the firstreceiver. For example, the wireless tag may include a circuit configuredto monitor energy stored in the energy storage component. When theenergy stored in the energy storage component is less than apredetermined threshold level, such as an amount of reserve energy, asdiscussed above, the wireless tag may cause the transmitter to transmitan alternative signal to a receiver using less energy than thetransmitter would use if the energy stored in the energy storagecomponent was above a predetermined threshold level. The alternativesignal might be a form of the first signal, containing less information,it may be a distress signal, or it may simply be identical to the firstsignal in all respects other than power level.

Referring to FIG. 10, wireless tag 1100 may include a power manager 9010which monitors the amount of energy stored in the energy storage circuit2108. The power manager 9010 may communicate the amount of energy storedin the energy storage circuit 2108 to the top level controller 9020. Thetop level controller 9020 may determine if the amount of energy storedin the energy storage circuit 2108 is below a predetermined thresholdlevel. If the top level controller determines that the amount of energystored in the energy storage circuit 2108 is below a predeterminedthreshold level, then the top level controller 9020 may cause thetransmitter 2104 to transmit a signal with less energy than is typicallyrequired. This may occur by altering any number of characteristics ofthe signal, as discussed above.

In some embodiments, the at least one circuit may be configured toimplement an identification transmission rule for regulating the atleast one circuit in a manner causing the at least one transmitter todelay sending the first signal to the first receiver, even whensufficient energy is stored in the energy storage component fortransmitting the second signal to the second receiver. For example, evenif sufficient reserve energy exists to permit subsequent transmission,another transmission rule might block a transmission from occurring. Therules may vary based on design parameters of a particular system.

Referring to FIG. 10, power manager 9010 or top level controller 9020may implement a rule that governs signal transmission. If that rulewould be violated, a transmission might not be sent, or might bedelayed. In some embodiments, the at least one circuit may be furtherconfigured to implement the identification transmission rule to causethe transmitter to send the first signal to the first receiver in apredetermined time interval. For example, tire wireless tag may includea circuit designed to implement store mode, as disclosed above. Whileoperating in store mode, the tag may send a signal to a receiver in apredetermined time interval, as discussed above.

In some embodiments, the at least one circuit may be further configuredto implement the identification transmission rule to randomly select atime interval between two consecutive transmissions of the first signalto the first receiver. Randomness may prevent signals from overlapping,creating collisions, and overwhelming the receiver. For example, ininfrastructure-excitable mode (e.g., store mode), when infrastructuremay excite many tags simultaneously, a random response from each tag mayspace apart the transmissions to prevent the receiver from beingoverwhelmed.

In some embodiments, the at least one circuit may be configured toconserve energy by activating for a first predetermined length of timeand deactivating for a second predetermined length of time, in arepeating manner. For example, after a signal is transmitted, the tagmay be deactivated for a period so as not to continue to send the samesignal repetitively. This, in turn, conserves energy. For example, in anestablishment where the infrastructure repeatedly excites many tags, atag that has already responded may be configured not to respond to thesame signal until a predetermined time period has elapsed. Whileoperating in infrastructure-excitable mode (e.g., store mode), forexample, the tag may conserve energy by activating for a firstpredetermined amount of time and then deactivating for a secondpredetermined amount of time. The first and second predetermined amountof time may be the same amount of time, different amounts of time, orrandomized amounts of time, as discussed above.

Embodiments of the present disclosure may include a system for detectingmisplaced items in an establishment. An establishment may include anyarea, building, or structure in which an inventory of items may be ormaintained, such as, for example, a retail establishment, store,warehouse, distribution center, logistics center, fulfillment center,manufacturing area, shipping area, storage area, home, medical facility,eating establishment, kitchen, or any other area where it may bebeneficial to track items. An item may include any object that may bestored within an establishment. By way of non-limiting examples, an itemmay include, food, clothing, electronics, consumer goods, equipment,vehicles, consumables, packaging, accessories, supplies, materials,artistry, animals, persons, instruments, pallets, containers,pharmaceuticals, commodities, articles, devices, machinery, implements,mechanisms, tools, furniture, or any other object that may be present inan establishment.

Consistent with disclosed embodiments, the term “misplaced items” mayrefer to one or more items that are not located within a designatedlocation associated with the one or more items within an establishment.For example, an establishment may be organized in such a way thatcertain locations within the establishment may be associated with one ormore items, or that one or more items are associated with one or moreparticular locations. A location within the establishment may includeone or more storage areas, such as, for example, a storage unit, shelf,cabinet, rack, room, or any other storage structure or area that may beassociated with one or more items. A location may also not be associatedwith any items whatsoever. For example, a fitting room, checkout lane,restrooms, empty floor space, or any other area location that is notassociated with the storage of items may also be a location in theestablishment, consistent with disclosed embodiments. In this context,for example, a misplaced item may be an item located on the wrong shelfor rack, in the wrong department, or in any location not designated forthe object (e.g., clothes in a fitting room).

By way of example, FIG. 11 is a perspective view of a retailestablishment, which may contain a plurality of clothing items. Withinthis exemplary establishment, there may be one or more locationsdesignated for certain purposes, such as the storage and/or display of aparticular item or the facilitation of other activities relating tooperation of the establishment. For example, the establishment maycontain rack 11250 and shelf 11240 that are designated for the storageand/or display of a certain item, such as a particular article ofclothing. The establishment may also contain other locations, such asfitting room 11230, that are not associated with the storage and/ordisplay of items but enable customers to perform certain activitieswithin the establishment, such as trying on different clothing items.Disclosed embodiments may provide systems, such as item locationmonitoring system 20000 in FIG. 20, and methods that enable, forexample, the detection of a misplaced item, such as an item located infitting room 11230, instead of its designated location on rack 11250.

Disclosed embodiments may also include a system for reporting a locationof items in an establishment. A system consistent with disclosedembodiments may, for example, monitor the location of items in theestablishment and report the locations to a device, person, or any otherentity. Reporting may include generating a signal to be transmittedthrough a suitable medium indicating the location of an item,displaying, on a graphical user interface, the location of the item tothe user, or any other suitable communication indicating the location ofan item. By way of example, in FIG. 20, system 20000 may monitor thelocation of location tags 1110 and may be configured to report thelocations, for example, by generating a signal 20204 that causesgraphical user interface 20100 on device(s) 20008 to display informationindicating the location of the item.

Disclosed embodiments may include at least one processor. A processormay be any physical device or group of devices having electric circuitrythat performs a logic operation on input or inputs. For example, the atleast one processor may include one or more integrated circuits (IC),including application-specific integrated circuit (ASIC), microchips,microcontrollers, microprocessors, all or part of a central processingunit (CPU), graphics processing unit (GPU), digital signal processor(DSP), field-programmable gate array (FPGA), server, virtual server, orother circuits suitable for executing instructions or performing logicoperations. The instructions executed by at least one processor may, forexample, be pre-loaded into a memory integrated with or embedded intothe controller or may be stored in a separate memory. The memory mayinclude a Random Access Memory (RAM), a Read-Only Memory (ROM), a harddisk, an optical disk, a magnetic medium, a flash memory, otherpermanent, fixed, or volatile memory, or any other mechanism capable ofstoring instructions. In some embodiments, the at least one processormay include more than one processor. Each processor may have a similarconstruction, or the processors may be of differing constructions thatare electrically connected or disconnected from each other. For example,the processors may be separate circuits or integrated in a singlecircuit. When more than one processor is used, the processors may beconfigured to operate independently or collaboratively. The processorsmay be coupled electrically, magnetically, optically, acoustically,mechanically or by other means that permit them to interact. By way ofexample, as illustrated in FIG. 20, a system 20000 for monitoring thelocation of items in an establishment may include processors(s) 20004,which may be configured to implement and/or execute one or more of theprocesses and methods consistent with the present disclosure.

Consistent with the present disclosure, disclosed embodiments may alsoinvolve a network. A “network” may constitute any type of physical orwireless computer networking arrangement used to exchange data. Forexample, a network may be the Internet, a private data network, avirtual private network using a public network, a Wi-Fi network, a LANor WAN network, and/or other suitable connections that may enableinformation exchange among various components of the system. In someembodiments, a network may include one or more physical links used toexchange data, such as Ethernet, coaxial cables, twisted pair cables,fiber optics, or any other suitable physical medium for exchanging data.A network may also include a public switched telephone network (“PSTN”)and/or a wireless cellular network. A network may be a secured networkor unsecured network. In other embodiments, one or more components ofthe system may communicate directly through a dedicated communicationnetwork. Direct communications may use any suitable technologies,including, for example, Bluetooth™, Bluetooth Low Energy™ (BLE), Wi-Fi,near field communications (NFC), or other suitable communication methodsthat provide a medium for exchanging data and/or information betweenseparate entities. By way of example, as illustrated in FIG. 20, asystem 20000 for monitoring the location of stems in an establishmentmay include network 20002, which may enable the exchange of data and/orinformation of devices in the system (e.g., processor(s) 20004, datastructure(s) 20006, device(s) 20008, reader(s) 11300 a-g, etc.).

Disclosed embodiments may include receiving, from at least one reader inthe establishment, identification signals of identification tags read byfoe at least one reader. A reader may include one or more devices,circuits, components, or combinations thereof capable of receiving andprocessing electromagnetic signals. For example, a reader and/or circuitmay include two or more interconnected components. As discussed above,non-limiting examples may include a combination of components and/ordevices, implemented as part of a silicon chip, as part of aprinted-circuit board, as part of a connectorized system or as acombination of any of the above, connected in a manner enabling theperformance of a desired function or reaction.

An establishment may be equipped with readers 11300 a-g, as illustratedin FIGS. 11-13. The retail establishment may house a plurality of itemscontaining identification tags, such as product containingidentification tag 11210. The identification tags associated with theproducts may, for example, be tag 1100 as illustrated in FIGS. 3-8, 15,and 20. Readers 11300 a-g may be capable of receiving one or moreidentification signals from the tags, such as signal 12200 asillustrated in FIGS. 12-13 or signals 15102 a-c as illustrated in FIG.15. By way of ex ample and as illustrated in FIG. 21, receiving, from atleast one reader in the establishment, identification signals ofidentification tags read by the at least one reader may occur at step21002 of exemplary computerized process 21000 for reporting a locationof items in an establishment, consistent with disclosed embodiments.

According to some disclosed embodiments the at least one reader mayinclude at least one of a handheld scanner or a fixed scanner configuredto automatically read signals transmitted by the identification tags. Ahandheld scanner may be a device provided to an employee or customer bythe establishment for use during working routines or in a shoppingsession, a mobile communications device of such an individual, or anyother handheld device capable of performing the functions of a reader,consistent with disclosed embodiments. A fixed scanner may be a devicefixed to any wall, ceiling, or any other affixable structure that iscapable of performing the functions of a reader. By way of example, inFIG. 11, readers 11300 a-h may be fixed scanners affixed to certainstructures (e.g., walls, ceilings, fixtures) in the establishment. Acustomer or employee may, for example, use handheld device 11200 as ahandheld scanner, which may be a device dedicated to scanning or anyother mobile device capable of performing the functions of a reader,consistent with the present disclosure.

In some disclosed embodiments, an identification tag may be configuredto receive and store ambient energy, and to power transmission of theidentification signals using foe stored ambient energy. Ambient energymay refer to energy present in the environment of an identification tag.As discussed above, the energy may be produced by environmental factors,electromagnetic signals transmitted in the environment, or any otherenergy source. For example, fixed scanners 11300 a-h may serve assources of ambient energy, as may Wi-Fi or other electromagneticinfrastructure. Exemplary tag 1100 may include components such as energystorage circuit 2108, storage capacitor 10300, and/or energy storagecomponent 15008. Any one or more of the components, for example, may beconfigured to receive energy from antennae 2112, 2114, and/or 15002A-C,store the received energy, and make the energy available to othercomponents within the tag. In one example, energy received in one formmay be stored in a second form and may be provided to components in athird form. According to some disclosed embodiments, ambient energy maybe used to power transmission of the identification signals.

In some disclosed embodiments, an identification tag may be configuredto transmit the identification signals according to a predeterminedtiming sequence. A predetermined timing sequence may, for example,include timing patterns governing when identification signals may betransmitted from the identification tag. The timing sequence may includea constant, random or variable periodicity at which the identificationsignal is transmitted (e.g., twice an hour, at 1:20 p.m. and 1:45 p.m.,etc.). Alternatively, or additionally, the timing sequence may follow anincoming trigger signal (e.g., upon receipt of a trigger signal, the tagtransmits a response one or more limes, according to a rule; and/or whenstored energy reaches a threshold level, the reaching of the thresholdmay trigger a transmission). Indeed, any programmed condition or rulemay drive the transmission of an identification signal. By way ofexample, in FIG. 20, identification tag 1110 may transmit identificationsignal 12200 multiple times a day, regardless of any input from thecomponents of system 20000. Or, a transmission may occur as the resultof a signal sent from an exciter to tag 1110. Depending onimplementation, that signal might emanate from one or more of readers11300 a-g, or any other source.

Consistent with the present disclosure, at least one identification tagmay be configured to operate in a first transmission mode when the atleast one identification tag receives energy in a first frequency, andto operate in a second transmission mode when the at least oneidentification tag receives energy in a second frequency that is higherthan the first frequency, wherein the first transmission mode differsfrom the second transmission mode in at least one of a repetition periodof a transmitted signal, a transmission power level, or data content ofthe transmission. For example, a first mode may refer to a step where afirst signal is sent, and a second mode may refer to a step where asecond signal sent. The first and second modes, may also refer todiffering operating characteristics. These characteristics may includecommunication medium, communication protocols, frequencies, frequencyranges, frequency bands, types of encryption, scrambling, and/ordisguising, data content, timing of transmission, and/or any otherdistinguishable characteristic that may be associated with theidentification signal to be transmitted.

By way of example, circuit 15006 in FIG. 15 may detect energy 15102Areceived by one or more of antennae 15002A-C. In response to thisdetection, circuit 15006 may cause any one or more of transmitters15004A-C to operate in a first mode. Operating in the first mode, forexample, may include transmitting one or more of signals 15104A-C,wherein signals 15104A-C may have different characteristics such thateach signal is distinguishable from one another in at least one aspect.Circuit 15006 may also detect receipt of energy 15102B by one or more ofantennae 15002A-C, wherein energy 15102B is in a frequency that ishigher than the frequency of energy 15102A. In response to thisdetection, circuit 15006 may cause any one or more of transmitters15004A-C to operate in a second mode. Operating in the second mode, forexample, may include transmitting one or more of signals 15104A-C,wherein one or more of signals 15104A-C may be different, either aloneor in combination, from the signals 15104A-C transmitted in the firstmode.

Disclosed embodiments may include determining current locations of theidentification tags based on the received identification signals. Forexample, an identification tag within an establishment may transmit asignal that may be received by one or more readers in the establishment.However, depending on the proximity to the one or more readers, thepower level of the signal received by each of the one or more readersmay differ in magnitude. This magnitude may be used to calculate certainproperties of the propagation of the signal over the communicationmedium, establishing such parameters as the range a signal may bedetected at, a value representative of the relative or actual distanceat which the signal has been transmitted, the signal-to-noise ratio,interference properties etc. In the context of wireless communication,this magnitude may be measured in units of power, usually either Wattsor dBW (decibel-Watts or dB-Watts) which is a logarithmic unit relatedto Watts (or sometimes in units of dBm, which is related to milliwattsin the same manner dBW is related to Watts). In that sense, a “powerlevel” may refer, for example, to a power measurement immediately at theinput of the signal at the reader, while the reader is activelyreceiving one or more signals.

In some embodiments, determining the current locations of theidentification tags may occur by comparing the power level of thereceived signals at each reader, and determining the current locationsof the identification tags based on the comparison. For example, thepower level of an identification signal received from an identificationtag and by the reader may be higher than the power level of theidentification signal received by other readers in the establishment dueto the identification tag being closer to the reader than to the oilierreaders. The reader may be associated with a given location, andtherefore, based on the reader receiving the strongest signal and itsassociation with the given location, it may be determined that theidentification tag is located at that location. Similarly, multiplesignal strengths detected by differing readers may be used to estimate atag's location. For example, using three signal strengths detected bythree readers, the system might triangulate to estimate or determine thetag's location.

By way of example, an item located in fitting room 11230 may contain anidentification tag 1100 that transmits an identification signal 12200.Due to the proximity of tag 1100 to reader 11300 f, which may beassociated with fitting room 11230, the power level of the signal 12200received by reader 11300 f may be higher than the power level of thesigned 12200 received by readers located further away from tag 1100(e.g., readers 11210 a-e and g-h). Therefore, it may be determined thatthe item is located in fitting room 11230 due to the association ofreader 11300 f to fitting room 11230. For example, this determinationmay, in FIG. 21, occur at step 21004 of process 21000. In someembodiments, step 21004 of process 21000 may include determining currentlocations of the identification tags based on the receivedidentification signals.

Signal strength patterns might be determined in advance for locationpurposes. For example, measurements taken by different readers from atag in fitting room 11230 might result in a recognizable pattern thatcan be matched to determine a tag's location in the future. Uponinstallation of a system, tag readings may be collected from mound theestablishment to correlate signal strength with actual location. Thecorrelations may be stored in a data structure. Then, in the future, alook-up may be performed on actual readings to identify a tag's locationbased on the stored data. Similarly, the system may learn over time,using artificial intelligence.

In some disclosed embodiments, the at least one reader may include aplurality of readers configured to receive the identification signals,and the at least one processor may be configured to access position dataof the plurality of readers. For example, as discussed above, aprocessor may access a common incoming data signal received at multiplereaders, for use in identifying a location of the tag from which thecommon signal emanates. The identified position may be a precise,measurable location within the establishment, or it may be a generalizedposition, such as a room, appliance, department, region, area, rack,shelf, or any other position, depending on system design and foegranularity a particular system affords.

Alternatively, specific readers may be associated with specificlocations. For example, a single reader may be associated with a singleroom, such that a signal from that reader indicates that a tag is withinthe associated room. Or a single reader (or group of readers) may beassociated with a region or area, such that a corresponding readingindicates that a tag is located in that region or area. In FIG. 11, forexample, readers 11300 c and 11300 d may be associated with racks 11250,reader 11300 e may be associated with shelf 11240, and reader 11300 fmay be associated with fitting room 11230. In FIG. 20, for example, thispositioning data may be stored in data structures 20006 and may beaccessible by processor(s) 20004 through network 20002.

According to some disclosed embodiment, the at least one processor mayalso be configured to identify the locations of foe identification tagsbased on foe position data of the plurality of readers and power levelsof the identification signals received by the plurality of readers.Determining the location of a certain point (e.g., location of anidentification tag) in space may be achieved through the use of distancemeasurements from the point to at least three other points (e.g.,readers) whose location is known in advance (i.e., reference points).The method may involve determining, for each of the reference points,the equation or formula describing the sphere whose center lies at thereference point, and whose radius is equal to the distance measured fromthe reference point to foe measured point. Assuming the distancemeasurement is accurate, the measured point will be found at some pointon the surface of the sphere, for each of said spheres. Given at leastthree such spheres (and assuming the three reference points areappropriately spaced), there will usually be no more than two points inspace in which the three spheres all intersect at a single point. Inmost realistic systems, determining which of the two solutions is theright location of the measured point can be done using prior knowledge(for example, when the three reference points are at ground level, oneof the solutions will be below ground, which can easily be ruled out).Also, learned data about the establishment might be used to rule outimprobable solutions. For example, if one of a number of solutions wouldplace shoes in a jewelry department and another solution locates theshoes in the shoe department, the first solution might be discarded bythe system as less probable, and the second solution accepted. This mayoccur as the result of stored initialization data recording expectedlocations for various items, or it may occur through machine learning,by detecting and recording where items are typically located.

The distance measurement may be performed in multiple ways, such asdirect tape or ruler measurement, measuring the time-of-flight for alight signal or radio signal to travel from the reference point to themeasured point (or vice versa, based on the fact that the speed of lightis constant and finite regardless of the location or movement of thereference points or the measured point), or by measuring the power levelat which a signal is received at the reference point (e.g., a reader)when a transmission at a known power level is transmitted from themeasured point (basing the measurement on the fact that radio waves areattenuated in free space by a ratio proportional to the square of thedistance).

For ease of discussion, FIG. 22 illustrates a network in which thelocations of an identification tag may be determined based on positiondata of a plurality of readers and power levels of the identificationsignals received by the plurality of readers. For example, althoughidentification tag 1110 may transmit an identification signal at asingle known power level, the power level of the identification signalreceived by each one of readers 11300 a-c are not the same due tovariances in distances between identification tag 1110 and each ofreaders 11300 a-c. Based on the differences between the knowntransmitted power level and the received power level, a processor (e.g.,processor(s) 20004 in FIG. 20) may determine that the identification tag1110 is at (1) a distance equal to radius 220Ra from reader 11300 a; (2)a distance equal to radius 220Rb from reader 11300 b; and (3) at adistance equal to radius 220Rc from reader 11300. Using the knownposition data of the plurality of readers and the distances of eachreader, a processor may triangulate or otherwise determine the preciselocation of identification tag 1110 (arcs 220Aa-c intersect at only onepoint). Although this illustrates a method on a two-dimensional medium,it is to be understood, as described above, that these methods orsimilar methods may be used to precisely locate identification tags in athree dimensional environment, consistent with the present disclosure.

Disclosed embodiments may include recording, in at least one datastructure, the current locations of identification tags. A datastructure may include any collection of data values and relationshipsamong them. The data may be stored linearly, horizontally,hierarchically, relationally, non-relationally, uni-dimensionally,multidimensionally, operationally, in an ordered manner, in an unorderedmanner, in an object-oriented manner, in a centralized manner, in adecentralized manner, in a distributed manner, in a custom manner, or inany manner enabling data access. By way of non-limiting examples, datastructures may include an array, an associative array, a linked list, abinary tree, a balanced tree, a heap, a stack, a queue, a set, a hashtable, a record, a tagged union, ER model, and a graph. For example, adata structure may include an XML database, an RDBMS database, an SQLdatabase or NoSQL alternatives for data storage/search such as, forexample, MongoDB, Redis, Couchbase, Datastax Enterprise Graph, ElasticSearch, S plunk, Solr, Cassandra, Amazon DynamoDB, Scylla, HBase, andNeo4J. A data structure may be a component of the disclosed system or aremote computing component (e.g., a cloud-based data structure). Data inthe data structure may be stored in contiguous or non-contiguous memory.Moreover, a data structure, as used herein, does not require informationto be co-located. It may be distributed across multiple servers, forexample, that may be owned or operated by the same or differententities. Thus, the term “data structure” as used herein in the singularis inclusive of plural data structures.

According to disclosed embodiments, recording the current locations ofidentification tags may include inserting into, updating, or otherwisemodifying data values contained in the data structure so that at leastone or more data values represents a current location of anidentification tag and/or a designated location of an identificationtag. The data values may include and/or represent a time stampassociated with the time the identification signal was received or atime the location was determined and/or recorded, a name and/orcoordinates of the location, an identity of one or more readers thatreceived the identification signal and associated power levels received,or any other suitable identifier or data values representing the currentlocation of an identification tag. According to disclosed embodiments,the data contained in the data structure may be updated on a periodicbasis (e.g., bi-hourly, hourly, daily, etc.), in real-time (i.e.,continuously updating data), or upon any sort of trigger or input ofdata and/or information into the system.

By way of example, as illustrated in FIG. 20, processor(s) 20004 may beconfigured to record the current locations of identification tag(s) 1110into data structure(s) 20006. Data structure(s) 20006 may contain arecord of current locations of identification tags, and may beconfigured to insert data into, update, or otherwise modify the datastructure, consistent with the present disclosure. For example, in FIG.21, this action may occur at step 21006 of process 21000. In someembodiments, step 21006 of process 21000 may include recording thedetermined current locations of the identification tags in at least onedata structure.

Disclosed embodiments may also include accessing, in the at least onedata structure, a designated location in the establishment for each ofthe identification tags. As discussed previously, a data structure maymaintain a record including items in the establishment, identificationtags associated with the items, current locations of the items and/oridentification tags, and designated locations for the items and/oridentification tags. A designated location may be an assigned locationwithin the establishment associated with the identification tag forstorage and/or display and/or use of the associated item within theestablishment. A designated location within the establishment mayinclude one or more such areas, such as, for example, a storage unit,shelf, cabinet, rack, room, workbench, enclosure, or any other storagestructure or area that may be associated with one or more items fordisplay and/or storage and/or use.

By way of example, in FIG. 11, an item having an identification tag11210 may be associated with a designated location, such as rack 11250or shelf 11240. The association between tag 11210 and its designatedlocation may, in FIG. 20, be recorded in data structure(s) 20006, sothat other devices in system 20000 may access this information.Accessing this information, as illustrated in FIG. 21, may occur at step21012 of process 21000. In some embodiments, step 21012 of process 21000may include accessing the current locations of the identification tagsin the at least one data structure.

Disclosed embodiments may also include determining, by comparing thecurrent locations of the identification tags with the designatedlocations of the identification tags, a particular identification tagwith a current location that differs from the designated location of theparticular identification tag. As discussed previously, disclosedsystems may maintain and monitor a record of designated locations andcurrent locations of identification tags. Comparing the currentlocations of the identification tags with the designated locations mayoccur immediately after a tag identifies itself or at some timethereafter, consistent with rules implemented within the system. When anidentification tag is located somewhere that is not its designatedlocation, disclosed embodiments may determine a mismatch by comparingthe current tag location with the designated tag location.

By way of ex ample, in FIG. 11, a customer may leave a product (e.g.,item having an identification tag 11210) in fitting room 11230. Basedthe identification signal picked up by reader 11300 f, the system isable to determine that the current location of the item is fitting room11230; however, the designated location for the item may be rack 11250.In FIG. 20, the current location, (i.e., fitting room 11230) and thedesignated location (i.e., rack 11250) may be recorded and accessible indata structure(s) 20006. Processor(s) 20004 may access this informationthrough network 20002, for example, and determine through a comparisonthat the current location is different than the designated location. Forexample, in FIG. 21, this may occur at step 21014 of process 21000. Insome embodiments, step 21014 of process 21000 may include determining,by comparing the current locations of the identification tags with thedesignated locations of the identification tags, a particularidentification tag with a current location that differs from thedesignated location of the particular identification tag.

In some disclosed embodiments, the at least one reader may be configuredto receive gate signals from the identification tags when theidentification tags are in at least one predetermined location. Gatesignals may refer to a particular type of signal or transmissions duringcertain modes n (e.g., gate mode) that the identification tag may beconfigured to transmit when the identification tag is located in apredetermined location. The predetermined location may be associatedwith a point of sale, such as a checkout counter, a security gate area,an entry/exit of the establishment, or any other area in which it may bedesirable for a tag to transmit a gate signal, for example, a customerin possession of an item containing an identification tag, may take theitem into an area in which the infrastructure transmits a gate trigger,causing the tag to respond with transmission of a gate signal.

In some embodiments, the at least one processor is configured todetermine that the specific item is being sold when a specified readerreceives the gate signal from the identification tag associated with thespecific item. For example, a gate signal may be transmitted by anidentification tag when a customer brings an item containing the tag toa predetermined location associated with sales of items. When a readerreceives the gate signal, the at least one processor in the system maybe configured to determine that a sale has occurred. By way of example,in FIG. 14, a customer may bring a product containing identification tag1100 into a gate area at the exit of an establishment, such as betweengates 1112 and 1114. Signals 14100 transmitted by one or more of gates1112 and 1114 may, for example, cause tag 1100 to transmit gate signal12200, which may be received by reader 11300 h. Based on receiving thegate signal, at least one processor, such as processor(s) 20004 in FIG.20, may determine that a sale of the specific item associated withidentification tag 1100 is occurring. In this instance, the customer maynot be required to visit a cashier, but may automatically check outsimply by leaving the establishment. In other embodiments, a customermight have tags read at the time of checkout (e.g., in a checkout linesuch as with a user-activated exciter or infrastructure in the cashierarea), and again at the egress gate, which may provide a notificationfor items that were not recorded at the cashier (or cause an automaticadditional charge to the customer for items not recorded at thecashier).

In some disclosed embodiments, the at least one processor may be furtherconfigured to determine that a specific identification tag is associatedwith a specific item being sold, and update the at least one datastructure to remove the specific item from the establishment'sinventory. As discussed, at least one processor may be able to determinethe occurrence of a sale due to data signals transmitted by anidentification tag and received by a reader. In response to determiningthe existence of a sale, the processor may remove the specific tag froman inventory associated with the establishment. An inventory may, forexample, include list of current items raid associated identificationtags held at an establishment or any other inventory record in the atleast one data structure accessible to the at least one processor. Aninventory may also include a collection of items, usually in the contextof items available for sale which are located at a store, warehouse ordistribution center. For example, in a retail store, an inventory mayinclude all items which are currently on the shelves as well as in theback room, and may also include items which are in the hands ofcustomers but have not yet been purchased. In some embodiments, however,an inventory may not include damaged items that were returned bycustomers or identified by staff, or items that have already beenpurchased but awaiting delivery or pick up. An inventory may include,other than the list of items (usually as a list of SKU's and possiblyserial numbers), other attributes of each item, such as its size andcolor, associated department, category and style, manufacturing history,item images, laundry instructions etc.

Removing the record of the identification tag from inventory may includedeleting a record of the identification tag, flagging the record of theidentification tag as being sold, moving the record of theidentification tag from an inventory associated with the establishmentto a record of sold items, or any other modification of an inventoryindicating that the product associated with the specific identificationtag was sold. By way of ex ample, in FIG. 20, once processors) 20004determine that a product associated with a particular identification tag1110 is sold, processor(s) 20004 may modify or update an inventoryrecord in data structure(s) 20006 so that the sold product is removedfrom the inventory.

According to some embodiments the at least one processor may be furtherconfigured to modify the data structure to store a unique tag identifierand at least one item attribute for each of the identification tags inthe establishment, the at least one item attribute for eachidentification tag corresponding to at least one of a size, a color, ora style of the item associated with the identification tag. A unique tagidentifier may be a number, string, or other form of data which issingularly associated with an identified entity, such that no singleentity is associated with the same unique identifier as any otherentity, and any single entity can only have a single unique identifierassociated with it. Some non-limiting examples of unique identifiers areserial numbers, unique EPC codes, database entries (as long as eachdatabase entry represents a single entity, and all relevant entities arerepresented by exactly one entry in the database) or any other uniqueidentifier associated with a singular entity.

The at least one processor may store a unique tag identifier, forexample, when an item associated with a unique identifier is received bythe establishment from a supplier, when an item associated with a uniqueidentifier is returned to the establishment by a customer, or any othersituations that cause inventory changes. In addition to storing theunique tag identifier, the processor may be configured to storeinformation regarding attributes of the item, such as a size, color,style, function, price, or any other characteristic of the item. Thisinformation may be recorded and stored at the time of manufacture or maybe later entered manually or through an automatic process such asautomatic scanners, smart shelves, machine vision, sensor fusion, etc.As items pass through the distribution chain from manufacturer, tosupplier, to retailer and to customer, some or all of the storedinformation may be passed downstream electronically. Thus, when a retailestablishment receives pallets, cartons or racks of tagged products forsale, the tag data associated with each of the products may betransmitted to the retailer as part of the transaction. Upon receipt,the data may be quickly uploaded to the retailer's inventory system, sothat tire retailer has a detailed, characterizing record of each productreceived. The retailer's system can then independently scan all tagsassociated with received products to ensure that all purchased productswere actually received and moved into inventory.

As data is passed up the chain, the data may change. For example, themanufacture might not send to the distributor the name of tin individualinvolved in manufacturing the product, although that data may beretained by the manufacturer for lookup should there ever be adownstream complaint about a product's quality. Similarly, thedistributor might choose not to pass downstream the price it paid forthe product, although it is likely to retain that data in its system.And, to the extent data is made accessible to the customer, the customermay only be able to access a record of the purchase price, date and timeof purchase, and information characterizing the product. Of course,although the customer might not be able to access upstream data, if aquestion ever arises about a product, a scan of the tag made availableto upstream supply chain entities may enable those entities to quicklyassess data not accessible by downstream custodians, or such entitiesmay decide to make some or ail of that data accessible to saiddownstream custodians if they so choose.

By way of ex ample, the establishment illustrated in FIG. 11 may havereceived a shipment of red, button-down shirts of various sizes, eachassociated with an identification tag with a unique tag identifier. InFIG. 20, system 20000 may receive identification signals 12200 fromidentification tag(s) 1110 associated with the shirts, eachidentification signal containing a unique identifier associated with thecorresponding shirt. Based on the signals, processor(s) 20004 may modifydata in data structure(s) 20006 to store the unique tag identifiers andthe attributes (e.g., red color, button-down, medium sized, slim fit,etc.) associated with each shirt. Alternatively, processor(s) 20004 mayseparately have access to an inventory list sent from a prior custodianof the goods, and confirm that all the goods on the inventory list werereceived into inventory.

Disclosed embodiments may include generating a notification signal whenthe current location of the particular identification tag does not matchthe designated location of the particular identification tag. Anotification signal may be a signal indicating that a product ismisplaced. It may be generated, for example, by a system component, andused to alert another system component of either the same or a differentsystem. The notification may also be configured to alert a person, orany other entity or component capable of receiving a notification, orany combination of the above. The notification signal might include anaudible alert (e.g., beeping), visual alert (e.g., flashing lights), orany other sensory signal (e.g., vibration), or a digital signal (such asa notification signal to tin application on a mobile device, aninterrupt signal to a CPU in an electric circuit board, or an entry in asystem alert log) or any other signal suitable for alerting an entity ofthe occurrence of one or more misplaced items.

In one embodiment, the notification signal may be configured to causethe generation of a textual misplaced item notice identifying aparticular product that is misplaced, including an indication of itscurrent incorrect location and an indication of its designated correctlocation. The notice may be caused to appear at a terminal that may becapable of generating a report. Alternatively, it may be generated on ahandheld device of an employee (such as an employee in an area of themisplaced item) with instructions for locating and returning the productto the correct designated location.

Consistent with disclosed embodiments, the notification signal may begenerated once it is determined that the current location of theidentification tag does not match the designated location. A currentlocation and a designated location may not “match” when they are notidentical or similar to some degree. By way of example, in FIG. 11 thecurrent location of an identification tag may be fitting room 11230while its designated location may be racks 11250. As illustrated in FIG.20, because the current and designated locations do not “match,” anotification signal (e.g., signal 20204) may be generated. For example,in FIG. 21, generation of the notification signal may occur at step21016 of process 21000. In some embodiments, step 21016 of process 21000may include generating a notification signal when the current locationof the particular identification tag does not match the designatedlocation of the particular identification tag.

According to some embodiments, generating the notification signal mayinclude sending a signal to cause a user device to output at least oneof an audible indicator or a visible indicator of the current locationassociated with the particular identification tag. For example,generating a notification may cause a user device to emit a sound, suchas a ping, ringtone, or any other audible alert. The visible indicator,as discussed above, may include at least an indication of an identity ofa misplaced product and an indicator of its current location.

Generating the notification signal may include sending a signal to causea user device to display, on a graphical user interface, the currentlocation associated with the particular identification tag, and whereindisplaying the current location includes at least one of displaying anindication of the current location on a map, displaying directions tothe current location, or displaying a name associated with the currentlocation. Additionally, the display may include any form of informationindicating the location of the item or directing a user to the locationof the item. By way of example, in FIG. 20, system 20000 may be used togenerate a notification signal (e.g., signal 20204) to be transmitted toone or more user devices 20008. The signal may cause the device to makean audible noise to capture the user's attention, or audibly direct theuser to the misplaced item. User device(s) 20008 may also have agraphical user interface 20100 that may, for example, display a map ofthe establishment with the location of the particular item highlighted,a visual representation of the establishment (e.g., as illustrated inFIG. 11), or directions to the particular item from the user's location.

According to some disclosed embodiments the at least one processor isfurther configured to modify the data structure to change the designatedlocation of the particular identification tag to the current locationassociated with the particular identification tag. For example, an itemmay be in a current location that is different than the designatedlocation associated with the item. In such an instance, rather thanmaintain an inventory record of where the item should be, the inventoryrecord may be updated to indicate where the item is actually located.Once the item is returned to its proper designated location, theinventory may be updated yet again to record the correct currentlocation. By way of example, in FIG. 11, the current location of anidentification tag may be racks 11250 while its designated location isshelf 11240. Rather than incorrectly maintaining in the inventory systemthe preferred location as the actual location, when, as is illustratedin FIG. 20, readers 11300 a-g detect the incorrect location andprocessor(s) 20004 recognizes the new location, processor 20004 mayupdate data structure 20006 to note the incorrect location as thecurrent location.

Disclosed embodiments may also include receiving a query for a locationof a particular item in the establishment. A query may include anyrequest for data or information relating to the location of a particularitem in the establishment. For example, a customer seeking to locate aparticular size of garment not present on a shelf where that size shouldbe located, may input the item number and the desired size. In response,processors) 20004 in FIG. 20 might check the data structure(s) 20006 todetermine if such a garment is located in the establishment, and mayprovide the user with directions to the garment. The user in such ailinstance may be a customer or may be an employee of the establishment.The device may be a ceil phone, wearable technology (e.g., electronicglasses, wearable camera or other portable image sensor), a tablet, aself-service kiosk, a dedicated scanner provided by the establishment,or any other device capable of requesting information related to thelocation of one or more items in an establishment. By way of example, inFIG. 20, system 20000 may include device(s) 20008 configured to send aquery (e.g., signal 20202), which may be received by one or more devicesin system 20000 (e.g., processor(s) 20004, reader(s) 11300 a-g, datastructure(s) 20006, etc.). For example, in FIG. 21, receiving the querymay occur at step 21022 of process 21000. In some embodiments, step21022 of process 21000 may include receiving a query for a location of aparticular item in the establishment.

Disclosed embodiments may also include identifying the location of theparticular item based oil an association between the particular item anda particular identification tag and the current location of theparticular identification tag. As discussed previously, disclosedsystems may maintain a record of tags and the products associated withthem. Similarly, disclosed systems also maintain records of where tags(and hence their associated products) are currently located. Using thisdata, the location of a particular item may be determined. A query abouta particular item may cause a look up of one or more tags associatedwith that item (e.g., there may be multiple tags that match the itemdescription if, for example, the store has duplicates of the same item,though each item would still be associated with a unique tag and aunique identifier.) Then, one or more current locations of those itemsmay be identified. For example, an employee may send a query regardingthe location of an item of interest, or a customer may send a queryregarding the location of an item they may wish to inspect or purchase.Disclosed systems may, in response to such a query, determine thelocation of the item by consulting a record containing the currentlocation of the item or an identification tag associated with the item.By way of example, in FIG. 20, processors) 20004 may be configured toreceive a query regarding the location of a particular item, and uponreceiving the query, consult a record accessible in data structure(s)20006 containing the current location of the particular item. Thecurrent location of the identification tag associated with theparticular item stored in data structure(s) 20006 may be racks 11250,and thus processor(s) 20004 may identify the location of the particularitem as racks 11250. For example, in FIG. 21, identifying the locationof the particular item may occur at step 21024 of process 21000. In someembodiments, step 21024 of process 21000 may include identifying thelocation of the particular item based on an association between theparticular item and a particular identification tag, and the location ofthe particular identification tag.

Disclosed embodiments may include displaying, on a graphical userinterface, the location of the particular item to a user. A graphicaluser interface may include a map or other visual identifier of thelocation of an item. Such other visual identifiers may include textdescribing a location, arrows pointing the way to the location, a rackor shelf number, or any other data that might assist an individual infinding the location. The display may be interactive, through featuressuch as window's, icons, menus, gestures, animations, or any other formof user interface that enables user interaction with one or moredevices. A “user” in this context may refer to a customer of anestablishment or an employee of an establishment. However, a “user” mayalso refer to any person and/or entity that may utilize a graphical userinterface, consistent with the present disclosure. Some non-limitingexamples of displaying the location may include at least one ofdisplaying an indication of the current location of the particularidentification tag on a map, displaying directions to the currentlocation of the particular identification tag, displaying a nameassociated with the current location of the particular identificationtag, or displaying any form of information indicating the location ofthe item or directing a user to the location of the item. For example,in FIG. 21, displaying the location of the particular item to a user mayoccur at step 21026 of process 21000. In some embodiments, step 21026 ofprocess 21000 may include displaying, on a graphical user interface, thelocation of the particular item to a user; displaying the location mayinclude at least one of displaying an indication of the current locationof the particular identification tag on a map, displaying directions tothe current location of the particular identification tag, or displayinga name associated with the current location of the particularidentification tag.

By way of example, in FIG. 20, device(s) 20008 may have graphical userinterface 20100. The user of device(s) 20008 may, through the device,send a query to system 20000 regarding the location of a particularitem. In response, system 20000 may determine that the particular itemis located, as illustrated in FIG. 11, racks 11250 and display, ongraphical user interface 20100, the location of the particular item. Forexample, graphical user interface 20100 may display a map of theestablishment with the location of the particular item highlighted, avisual representation of the establishment (e.g., as illustrated in FIG.11), or directions to tire particular item from the user's location.

Disclosed embodiments may include receiving a query for an inventory ofthe plurality of items in the establishment, identify the plurality ofitems in the establishment based on associations between the pluralityof items and the identification tags, and the current locations of theidentification tags stored in the data structure, and display, on agraphical user interface, an inventory indication of the identifieditems in the establishment. Thus, for example, disclosed methods andsystems for reporting locations of items may be employed to reportlocations of a plurality of items in an establishment, a portion of aninventory of items in the establish, or an entire inventory of items inthe establishment, consistent with the present disclosure. An inventoryindication may include one or more responses to the received query, thelocations, number, and/or availability of each item in the plurality ofthe items in the establishment, or any other information relating to theinventory of the plurality of items in the query. By way of example, inFIG. 20, system 20000 may receive a query (e.g., signal 20202 for aninventory of a plurality of items in the establishment, wherein eachitem in the plurality of items is associated with one or moreidentification tag(s) 1110. In response to the query processor(s) 20004may, by associating each item with a corresponding identification tag(s)1110, identify the locations, quantity, and/or availability of each itemand display that information on graphical user interface 20100.

Disclosed embodiments may include a system for providing privacy todownstream owners of electronically tagged goods. Privacy may refer tothe concept of keeping one's personal matters and information secret,and deciding which oilier persons or parties can receive access to saidpersonal matters and information and which such persons or parties areprevented from receiving such access. For example, in most developedcountries, a person's privacy is protected, among other means, by therequirement of law enforcement to obtain legal search warrants beforeentering a person's home or accessing one's electronic correspondence(such as email, text messages, messaging services, etc.). As acounter-example, assuming a personal item owned by a person and presentwith that person in the public sphere and the item is capable oftransmitting a distinct and uniquely identifiable radio signal, aviolation of privacy may occur, since this transmission enables otherparties capable of receiving and deciphering the radio signal to trackthe person in the public sphere without that person's explicit consent.

In the context of tagged goods, privacy may be an issue because, forexample, a centralized data structure may maintain information about theowners of the goods, pricing of the goods, location of the goods atdifferent times, who may have used tagged goods, and other privateinformation. By way of one example, a manufacture of an exercise bikemight embed a tag with a unique ID in the bike. The ID may be stored ina centralized data structure, accessible via the internet, along withinformation about when fee bike was made, who made it, the cost ofmaterials, and when it was sold. A manufacturer may then sell the biketo a distributor at which time the centralized record may be updatedwith the identity of the distributor as the new owner, the purchaseprice, and other private information about the distributer. The recordmay be updated further when the bike is sold to a retail store, yetagain when the bike is sold to a customer, and once again when the bikeis sold on eBay by the customer to a subsequent purchaser. All along thechain of ownership, private information may be added to the recordassociated with the tag in the exercise hike. Such private informationmay include pricing, owner identity, information about when and how theproduct was used, and/or anything else that an owner might haverecorded, or that might have been recorded unbeknownst to an owner. Inorder to maintain privacy of upstream owner data, various systems,methods and computer readable media innovations are described herein.Some disclosed embodiments may involve an owner. An owner, as the termis used herein, may include any individual or entity that has a right orpermission to possess, control, or track some “thing”. In fee exercisebike example, the owner may be any of the entities described above, orit might even include an employee of any entity a friend of any entity,or any entity provided permission by the then owner. In the case oftagged items, the “thing” possessed, controlled, or tracked may includeanything tangible such as an item, an animate or inanimate object,article, equipment, belonging, gear, vehicle, produce, disposable,wearable, person, animal, utensil, device, implement, tool, accessory,machine, or any other of an infinite number of things. As used herein,any such thing may be referred to interchangeably as a “thing,”“something,” a “product,” a “good,” an “item” or an “object.” In somecases, the thing might be of a type where ownership transfer istypically recorded, such as when vehicle transfers are recorded incommonly-accessible registers, enabling ownership history and transfersto be tracked. In other instances, the thing may be of a type whoseownership is not typically tracked, such as food or clothing items, orany other goods available through a retail establishment.

Some disclosed embodiments may involve a downstream owner. The term“downstream” may refer to a subsequent owner who receives something fromanother. Downstream owners may include individuals or entities thatacquire ownership of something or may acquire ownership of something inthe future. Thus, although disclosed embodiments may be discussed withreference to providing privacy for a first owner, a second owner, andtransactions between fee first owner and second owner, it is to beunderstood that disclosed embodiments may similarly be employed toprovide privacy to a third owner or any subsequent owner of anelectronically tagged good. In this sense, a first owner may also beconsidered the third owner in a situation where ownership passes fromthe first owner, to a second owner, and then back to the first owner.Thus, any subsequent owner of an electronically tagged good may beconsidered a downstream owner, even if that owner was previouslyupstream.

By way of example, FIG. 23 illustrates a system 23000 for providingprivacy for downstream owners of electronically tagged goods. Althoughdisclosed embodiments may be discussed with reference to owner 23100 asa first owner and owner 23200 as a second owner of electronically taggedgood 23300, one or each of owners 23100 and 23300 may be a first owner,a second owner, a third owner, or any subsequent owner that may acquireownership of electronically tagged good 23300, consistent with thepresent disclosure.

An electronically tagged good may include a good that is associated witha wireless identification tag, as discussed in detail above. By way ofexample, FIG. 11 is a perspective view of a retail establishmentincorporating an exemplary wireless identification system, consistentwith disclosed embodiments. In such an establishment, a transfer ofownership of electronically tagged good 11210 may occur, such thatownership transfers from the retail establishment to a customer.Disclosed embodiments may be employed, for example, to ensure theprivacy of the customer by preventing access to information transmittedby electronically tagged good 11210 after purchase.

Disclosed embodiments may include at least one processor. By way ofexample, as illustrated in FIG. 23, system 23000 may includeprocessors(s) 23004, which may be configured to implement and/or executeone or more of the processes and methods consistent with the presentdisclosure. Additionally, or alternatively, system 23000 may alsoinclude a network 23002, which may enable the exchange of data and/orinformation of devices in the system (e.g., processor(s) 23004, datastructure(s) 23006, device(s) 23104 and 23204, etc.).

Disclosed embodiments may involve storing IDs for a plurality of tagsincluding at least a first owner ID and a second owner ID for aparticular tag. An owner ID may include a name, number, string, code orany other form of information or data that may enable the owner to beidentified. Such identification may be augmented through access tostored ownership information relating to an electronically tagged good.Storing IDs may include recording the IDs in a register, such as adatabase or any other form of data structure.

A data structure consistent with some embodiments of tire presentdisclosure may include an ordered storage of information, saved in acomputer-accessible form on a medium which is both readable andwritable. Some non-limiting examples include databases, spreadsheets,directories, tables, and other data types. Data structures may bedesigned to enable targeted retrieval of portions of the data accordingto various criteria, and at different levels of aggregation. Suchretrievals, or queries, may include searching for a single stored pieceof information, searching for specific information associated in thedata structure with a known piece of information, searching for multiplepieces of information sharing some characteristic, etc. A data structuredesigned to allow queries and retrieval of information may define astandard interface, including both a medium, tunnel or protocol throughwhich to receive queries and return responses, as well as a language,format, application or other definition for the structure and content ofthe queries as well as the structure and content of the responses. Suchan interface (e.g., an API) enables person, entity or device with accessto the interface, and knowledge of the format of queries and responses,to retrieve information from the data structure. Such a person, entityor device, referred to as a requester, may be required to provide someform of credentials, log-in, certificate or identification, in order todetermine whether the requester is authorized to access the informationstored in the data structure. Such authorization data may be general forthe entire data structure, or it may be specific for each and everypiece of stored information.

By way of example, system 23000 may include processor 23004 configuredto store IDs for identification tag(s) 1100, such as owner ID 23102associated with owner 23100 or owner ID 23202 associated with owner23200. Identification tag 1100 may be physically associated with anelectronically tagged good 23300, which may be owned by owner 23100 orowner 23200. Depending on the ownership and/or ownership history ofelectronically tagged good 23300, processor 23004 may be configured tostore owner ID 23102 and/or owner ID 23202 in an accessible register,such as data structure 23006.

Disclosed embodiments may include associating first information of theparticular tag with the first owner ID at a time when tire first ownerof the particular tag is recorded as owning the tag. Information of aparticular tag may include an identifying inventory number, serialnumber, identity code, ID, or any other data form identifying theparticular tag or an object associated with the particular tag. Inaddition to or as an alternative, the information may include dataidentifying of one or more object characteristics, or informationrelated in some way to the object, its operation, its use, or itsownership. In some embodiments, the first information may also includeat least one of a location, a transaction history, owner name,manufacturer name, a unique identifier of the tag, or an encryption keyassociated with the tag.

Associating information of a particular tag with an owner ID may includepairing the information of the particular tag with the owner ID. Pairingmay include any process for assigning a one-to-one relationship betweenone set of one or more objects, items, numbers or pieces of information,and a second set of one or more objects, items, numbers or pieces ofinformation. Pairing is often used for identification purposes. Forexample when an ID chip is epidermally implanted in a pet, the chip ispaired to the animal (meaning that the unique ID of the chip is assignedto the records of the specific pet), and the pairing is stored in someaccessible database (such as a local government's animal registry, or aveterinary hospital patients file) anyone with access to those recordswho reads the unique ID of the chip can immediately receive all relevantavailable information about the animal in which it is implanted.Similarly, the same process occurs, and similar capabilities may begained, when a retailer pairs electronic tags (e.g., tags describedherein) with products for sale, when a credit-card company provides adebit card number to a customer and pairs that number with the person'sbank account (and credit history), or when a mobile payments processorassigns a QR-code to each customer, pairing that QR-code with thecustomer's electronic wallet and allowing them to send and receivepayments using such a code. The association of information of aparticular tag with an owner with the owner ID may occur at the time theowner obtains physical possession of the good associated with the tag,upon the owner's purchase of the good, or at any other time associatedwith the owner's acquisition or expected acquisition of ownership of theitem.

For example, in some embodiments, at least one processor may beconfigured to store a unique tag ID of each tag and to associate the tagID of the particular tag with the owner ID of the recorded owner of theparticular tag. A unique ID may include a number, string, code or otherform of data which is singularly associated with an identified entity,such that no single entity is associated with the same unique identifieras any other entity, and any single entity can only have a single uniqueidentifier associated with it. Some non-limiting examples of uniqueidentifiers are serial numbers, unique EPC codes, database entries (aslong as each database entry represents a single entity, and ail relevantentities are represented by exactly one entry in the database) etc.Thus, by storing the unique tag ID of a tag and associating the uniquetag ID with an owner ID, information of the particular tag is associatedwith the owner ID.

Some disclosed embodiments may involve encryption. Specific embodimentsof encryption techniques implemented in the present disclosure aredescribed elsewhere in the present application.

By way of example with reference to FIG. 23, an owner 23100 may be aretail establishment that, acquires ownership of electronically taggedgood 23300 by virtue of purchasing electronically tagged good 23300 froma supplier or any other previous owner. At the time owner 23100 acquiresownership of electronically tagged good 23300 (e.g., at the time ofpurchase or delivery), processor 23004 may be configured to associateinformation of ID tag 1100 with owner ID 23102 by storing informationregarding the ownership of electronically tagged good 23300 in datastructure 23006. The processor may be prompted to make the associationin any way that enables the goods and the owner to be paired. Forexample, when a pallet of goods arrives at the establishment of owner23001, infrastructure in the facility or a handheld de vice may triggerthe tags of the incoming products to provide their tag IDs to areceiver. Upon receipt, processor 23004 associated with such a receivermay initiate a process to cause the ownership records of the taggeditems to be updated with the owner ID 23100. Alternatively, at the timeof sale or transfer, the manufacturer (or other current owner) may sendtag IDs to owner 23100. Upon receipt by processor 23004, processor 23004may update the ownership records to associate owner ID 23102 with thegoods.

According to some disclosed embodiments, the at least one processor maybe configured to receive an association between the tag ID of theparticular tag and at least one authorized entity associated with therecorded owner of the particular tag. The authorized entity may be anyperson or device that may be noted as having a connection to theparticular tagged good or item associated with the tag. The associationmay be simply for record keeping purposes or may enable the associatedentity to have access to information in a stored record associated withthe tag or an object associated with the tag. Receiving the associationmay include receiving data or information from a device associated witha retail establishment, a customer, owner, or any entity. In someembodiments, the at least one authorized entity may include at least oneof a computing device, an application executed on a computing device,person or group provided with permission by the recorded owner, toeither access or modify information associated with the electronicallytagged good. By way of example, owner 23100 may be the recorded owner ofelectronically tagged good 23300 containing ID tag 1100. Processor 23004may be configured to associate a unique tag ID of ID tag 1100 with ownerdevice 23104, which owner 23100 has authorized to access and/or modifyinformation associated with the tagged good 23300. In this way, personsusing device 23104 may be able to retrieve or modify stored informationabout good 23300.

Consistent with the present disclosure, the at least one processor maybe configured to receive a request to modify a list of the authorizedentities associated with the particular tag, to confirm that the requestto modify is received from an authorized entity of the particular tag,and to modify the list following confirmation that the request wasreceived from the authorized entity of the particular tag. A request tomodify a list may include the transmission of a message or informationthrough a network or any other appropriate medium indicating that thelist of authorized entities associated with the particular tag should bemodified. The information in the request may include an identifier ofthe requesting device, a passcode, or any other information that mayenable the verification of the requesting entity, or the information maybe transmitted using a protocol, mode of encryption, or any other meansof transmission that may be associated with an authorized entity and/orthe recorded owner. Upon receipt of such a request, the at least oneprocessor may confirm that the request was received from an authorizedentity by comparing information received in the request with informationcontained in the list of authorized entities, by analyzing the mode oftransmission of the request, or by any suitable means of verifying thesource of the request. The list may be recorded in a data structure orany other information storage medium, and upon confirming that therequest was received from an authorized entity, may be modified bydeleting one or more authorized entities from the list, adding one ormore authorized entities from the list, changing information containedin the list, or otherwise updating any information contained in tirelist.

By way of example, device 23104 may be an authorized entity associatedwith first owner 23100, and may send a request to processor 23004through network 23002 to modify a list of authorized entities containedin data structure 23006. The request may be to add or remove a seconddevice (not shown) associated with first owner 23100 to the list ofauthorized entities. The request may include a passcode or may beencrypted such that processor 23004 can confirm that the request wassent from an authorized entity associated with first owner 23100. Uponconfirmation, processor 23004 may add or remove the second deviceassociated with first owner 23100 to the list of authorized entitiescontained in data structure 23006. In another example, device 23104 may,upon a sale of electronically tagged good to second owner 23202, send arequest to processor 23004 to delete itself from a list of authorizedentities and add device 23204 associated with second owner 23200 to thelist, consistent with the present disclosure. As an alternative todeletion, the processor 23004 may simply modify the record to indicate anew owner, while masking or limited access by the new owner or anysubsequent downstream owner to information about tire history of thetagged good. Similarly, the ownership change may prevent the currentowner from being able to access the record associated with the goodafter transfer is made to the new owner.

Disclosed embodiments may include recording a transaction transferringownership of the particular tag from the first owner to a second owner.A transaction may include the purchase or sale of a good, the conveyanceof a good, or any other interaction between two or more entitiesresulting in the transfer of ownership of a good from one owner toanother owner. Recording may refer to the act of saving, writing,tabulating or otherwise storing data. This may occur using a mediumwhich is both writeable and readable. The recorded data may include boththe available data itself, as well as other relevant pieces ofinformation associated with the data such as time-stamp, signalstrength, the entity performing the recording, or any other informationregarding the circumstances of the recording of the data which may beuseful at a later time. For example, the location and exact time anddate at which data was recorded may be useful, and well as otherinformation gleaned from other sources. For example, if a tag istriggered to send its ID via a mobile phone, information in the phonemay also be associated with the record or the transaction. This couldinclude an identity of the phone or of an owner of the phone. An imagecaptured by the phone might also be associated with the record ortransaction. Other data associated with a transaction that may berecorded may include the price, time of purchase, the seller/conveyor,the buyer/conveyee, the good purchased/conveyed, or any otherinformation relating to the transaction.

By way of example, second owner 23200 in FIG. 23 may be a customer offirst owner 23100—a retail establishment that has ownership ofelectronically tagged good 23300 having ID tag 1100. A transaction mayoccur between first owner 23100 and second owner 23200, where secondowner 23200 agrees to pay the first owner 23100 in exchange forownership of good 23300. Upon the occurrence of this transaction,processor 23004 may record the transaction in data structure 23006. Therecord may include one or more of the ID of the second owner, the timeand date of sale, and the purchase price, for example.

In some disclosed embodiments, the particular tag may be attached to aparticular item, and recording the transaction transferring ownership ofthe particular tag enables tracking of a change in ownership of theparticular item. Recording the transaction may enable the tracking of achange of ownership of the particular item because the transactionbecomes a part of a record that may be accessed in order to determinethe ownership status of the particular item.

Upon a sale of any one of these goods by first owner 23100 to secondowner 23200, processor 23004 may record the transaction in datastructure 23006 as to enable the tracking of a change in ownership ofthe good.

In some disclosed embodiments, the at least one processor may beconfigured to control the particular tag to change at least oneparameter of a signal transmitted by the particular tag when a transferof ownership of the particular tag is recorded. Controlling the tag tochange at least one parameter may include transmitting or otherwisecausing the transmission of, electromagnetic waves that, when receivedby the particular tag, causes the tag to change at least one parameterof a signal that the tag transmits. The change in parameter may serve asan indication of an ownership change. For example, as part of a changein ownership a processor may send a signal to the tag causing the tag tochange its ID, to add additional information to the ID or to change someother parameter of its subsequent communication to thereby indicate insubsequent transmissions that a new owner possesses the tag.Alternatively, the tag transmissions may remain the same across owners,with a data structure on the back end recording the ownership change.

According to some embodiments, at least one parameter may also includeat least one of a repetition period of the signal transmitted by theparticular tag, a time interval between two consecutive signalstransmitted by the particular tag, a data encryption mechanism, anencryption key, a signal transmission power, a packet format, or datacontent of a transmission from the particular tag. At least oneparameter may also include communication media, communication protocols,frequencies, frequency ranges, frequency bands, types of encryption,scrambling, and/or disguising, data content, timing of transmission,and/or any other distinguishable characteristic that may be associatedwith the signal transmitted by the particular tag. For example, althoughthe tag ID may remain the same after a change in ownership, encryptionof the tag ID may change so that a previous owner is no longer able toread the tag, or is permitted to read future private informationassociated with the subsequent owner. Thus, the purchase of a taggeditem at a point of sale may cause the tag to change some but not all ofits transmissions characteristics, blocking the prior owner from readingsubsequent private information from the tag, while still enabling areceiver in an area of an EAS gate to record that the item purchased atthe point of sale was removed from the establishment.

By way of example, in FIG. 20, ID tag 1100 may be configured to transmitsignal 12200. In FIG. 23, ID tag 1100 may be associated withelectronically tagged good 23300. Upon a transaction transferringownership of good 23300 from a first owner 23100 to a second owner23200, processor 23004 may be configured to record the transactiontransferring ownership and thereafter cause a transmission of a signal(e.g., in the form of electromagnetic waves) to ID tag 1100 that, whenreceived by ID tag 1100, causes ID tag 1100 to change one or more of theabove-described parameters of signal 12200.

According to some disclosed embodiments, the at least one processor maybe configured to control the particular tag to transmit a first signalusing a first encryption key associated with the first owner ID beforethe transfer of ownership is recorded and control the particular tag totransmit a second signal using a second encryption key associated withthe second owner ID after the transfer of ownership is recorded. Anencryption key may be associated with an owner ID, for example, in orderto protect the owner's privacy by enabling, restricting, or otherwisecontrolling access to information contained in the signal transmitted bythe particular tag.

By way of example, while first owner 23100 owns electronically taggedgood 23300 having ID tag 1100, processor 23004 may be configured tocontrol ID tag 1100 to transmit a first signal using a first encryptionkey associated with first owner ID 23102 which allows first owner 23100,or an authorized device associated with first owner 23100 (e.g., device23102), to access information contained in the first signal. However,upon the sale of electronically tagged good 23300 to second owner 23200,processor 23004 may control ID tag 1100 to transmit a second signalusing a second encryption key associated with second owner ID 23200which allows second owner 23200, or an authorized device associated withsecond owner 23200 (e.g., device 23202), to access information containedin the second signal or restricts other entities from accessinginformation contained in the second signal.

According to some disclosed embodiments, recording the transactiontransferring ownership of the particular tag may include receiving, froma device associated with the first owner ID, an ownership transfernotification identifying at least the second owner ID and a tag ID ofthe particular tag. A device associated with the first owner ID may, forexample, refer to a device used to facilitate the transactiontransferring ownership of the particular tag, such as a cash register, ahandheld scanner, a smart phone, or any other device associated with thefirst owner capable of sending an ownership transfer notification. Anotification may include a signal generated by a component of one systemused to alert another component of tire system, a different system, or aperson (or any combination of the above) of the occurrence of a certainevent. In this context, an ownership transfer notification may be anynotification indicating that a transaction transferring ownership of anID tag. By way of example, a transaction transferring ownership of IDtag 1100 by virtue of a sale of electronically tagged good 23300 from afirst owner 23100 to a second owner 23200 may occur. Upon occurrence ofsuch a transaction, processor 23004 may receive an ownership transfernotification from device 23204 that identifies the second owner ID 23202for association with ID tag 1100.

Consistent with the present disclosure, recording the transactiontransferring ownership of the particular tag may also include receiving,from at least one reader, an identification signal transmitted by theparticular tag, accessing a tag ID associated with the particular tagbased on the received identification signal, and receiving anassociation between the second owner ID and the tag ID associated withthe particular tag.

Consistent with disclosed embodiments, receiving information between thesecond owner ID and the tag ID associated with the particular tag mayinclude receiving information from a device associated with the secondowner, a device associated with the first owner, or any other devicecapable of positively identifying the second owner, that indicates orotherwise enables a determination that the second owner has purchased anitem associated with the particular tag. For example, in the context ofsome disclosed self-checkout systems, the at least one processor may beconfigured to receive an association between the second owner ID and thetag ID when it is determined that a device associated with the secondowner exits an establishment at the same time as the particular tagassociated with the tag ID exits the establishment, thereby reflectingthat a transaction transferring ownership of the particular tag to thesecond owner has occurred.

A second owner may be positively identified in a number of differentways. For example, when the individual picks up an item, the individualmight scan it with a handheld device, which associates that particulartag ID with a shopping cart. The shopping cart might include an identityof the individual. Upon purchase, either at a point of sale or byexiting the establishment, all goods in the shopping cart may transferownership to the owner of the shopping cart. If an individual attemptsto leave the establishment with an item not scanned into a shoppingcart, a receiver associated with a data structure where contents ofshopping carts are stored may recognize the item as not being in anactive shopping cart, and may trigger an alarm. FIG. 14 provides aperspective view of a customer purchasing an electronically tagged itemhaving ID tag 1100, by means of bringing the electronically tagged itemthrough gates 1112. At the time the customer passes through gate 1112,the ownership record may be updated making the customer the second owner23200. Reader 11300 h may receive an identification signal 12200transmitted by ID tag 1100, and processor 23004 may receive theidentification signal 12200 from reader 113001 h, to thereafter access atag ID associated with signal 12200 from data structure 23006. Processor23006 may, at the same time, receive an association between second ownerID 23202 and the tag ID associated with ID tag 1100

In some disclosed embodiments, recording the transaction transferringownership of the particular tag may include recording, in at least onedata structure, at least one of an updated association between the tagID and the first owner ID, an updated association between the tag ID andthe second owner ID, inventory information associated with the firstowner ID, or inventory information associated with the second owner ID.Updating may occur when the system records an identity of the new ownerin place of the prior owner; when the second owner's identity isincluded in the data structure; when the first owner's inventory isreduced as the result of the transaction; and/or when the second owner'sinventory is updated as the result of the transaction. One or more ofthese updates may occur in a common data structure accessible, tovarying extents by the first and second owners, and/or in differing datastructures unique to each owner. In some embodiments, updating inventoryinformation associated with an owner may occur when one or more partiesinvolved in a transaction transfer ownership of a good maintained in aninventory. For example, a first owner may be an establishment or otherentity that maintains inventory information relating to electronicallytagged goods in at least one data structure. Upon sale of such a good toa second owner, the good is no longer a part of the first owner'sinventory. The second owner may also be an establishment or other entitythat maintains an inventory, and upon sale of the good to the secondowner, the good become a part of the second owner's inventory. In such asituation, or any other situation involving the transfer of ownership ofgoods, disclosed embodiments may be employed to update inventoryinformation of the first owner raid of the second owner stored in atleast one data structure.

By way of example, first owner 23100 and second owner 23200 may eachmaintain an inventory of electronically tagged goods. Upon the transferof ownership of good 23300 from first owner 23100 to second owner 23200,processor 23004 may record the transaction transferring ownership ofgood 23300 by updating inventory information stored in at least one datastructure 23006 and associated with first owner 23100 so thatelectronically tagged good 23300 is removed from inventory recordsassociated with first owner 23100. Processor 23004 may also record thetransaction by updating inventory information stored in at least onedata structure 23006 associated with second owner 23200 so thatelectronically tagged good 23300 is inserted into inventory recordsassociated with second owner 23200.

Disclosed embodiments may include associating second information of theparticular tag with the second owner ID and preventing the first ownerfrom accessing the second information after the transfer of ownership.Second information may be any data associated with the second owner orwith the tag after transfer of ownership occurs. For example, after thefirst owner is divested of ownership, the first owner may no longer beable to access information added to a record associated with the tag. Insome embodiments, the second information may also include at least oneof a location, a transaction history, owner name, manufacturer name, aunique identifier of the tag, or an encryption key associated with thetag. Preventing the first owner from accessing the second informationmay include one or more of denying the first owner access to some or aildata in the data structure, deleting the information from an area of thedata structure with which the first owner has access, encrypting some orall of the data using an encryption key that is unknown to the firstowner, denying a request to access the information from the first owneror an associated entity, or otherwise restricting access to theinformation by tire first owner.

In some embodiments, however, the at least one processor may beconfigured to permit the first owner to access the first informationafter the ownership transfer. In other words, although the first ownermay be prevented from accessing the second information of the particulartag associated with the second owner ID, the first owner may still, insome embodiments, be permitted to access the first information of theparticular lag associated with the first owner ID. Permitting access tothe first information may include allowing the first owner to use anencryption key to access the first information, accepting a request toaccess the information from the first owner or an associated entity, orotherwise allowing access to the first information by the first owner.

By way of example, processor 23004 may be configured to, upon atransaction transferring ownership of electronically tagged good 23300from first owner 23100 to second owner 23200, prevent first owner 23100from accessing second information associated with second owner ID 23202,for example, by encrypting the second information using an encryptionkey not known to first owner 23100. Nevertheless, another encryption keymay be known by first owner 23100 that may enable processor 23004 topermit access, by first owner 23100 or an associated authorized entity,to first information associated with first owner ID 23102.

According to some disclosed embodiments, the at least one processor maybe configured to prevent the first owner from accessing the firstinformation prior to the time when the first owner is recorded as owningthe particular tag. In other words, just as a first owner may beprevented from accessing second information associated with a secondowner ID after an ownership transfer, the first owner may also beprevented from accessing the first, information associated the firstowner ID before the first owner acquires ownership of an electronicallytagged good, such as, for example, before a prior owner transfersownership to the first owner. By wav of example, processor 23004 may beconfigured to prevent first owner 23100 from accessing first informationassociated with first owner ID 23102 prior to first owner 23100acquiring ownership of electronically tagged good 23300. Similarly, inanother example, owner 23200 may be a first owner and owner 23100 may bea prior owner, and processor 23004 may prevent owner 23200 fromaccessing first information associated with owner ID 23202 before atransfer of ownership of electronically tagged good from owner 23100 toowner 23200.

Consistent with the present disclosure, the least one processor may befurther configured to receive an association between a particular ownerID and at least one authorized entity associated with the particularowner ID and permit the authorized entity to access informationpertaining to at least one of the particular owner ID, a tag associatedwith the particular owner ID, or an item associated with the particularowner ID. As previously discussed, an owner of goods may be associatedwith various entities who may become authorized to access informationrelating to goods after the owner receives access. This may occurthrough a manual process by the owner of authenticating entities, or itmay occur automatically. For example, the data structure may be updatedwith a list of entities associated with a new owner such that when thenew owner acquires goods, the authorized entities are given access tothe records associated with each of tire acquired goods. The at leastone processor may receive such an association any time prior to,following, or at the time of a transaction transferring ownership of anelectronically tagged good, or the association may occur independentlyregardless of the occurrence of a transaction. By way of example, upon atransaction transferring ownership of electronically tagged good fromfirst owner 23100 to second owner 23200, processor 23004 may receive anassociation between second owner ID 23202 and device 23204 or any otherauthorized entity associated with second owner ID 23202. Processor 23004may then permit device 23204 to access information relating to secondowner ID 23202, ID tag 1100, or electronically tagged good 23300.

As discussed previously, disclosed embodiments may be further employedto provide privacy for downstream owners, such as a third owner or anysubsequent owner, of an electronically tagged good. For example,disclosed embodiments may include recording a transaction transferringownership of tire particular tag from the second owner to a third owneror a subsequent owner and, after the transfer of ownership to the thirdowner or subsequent owner, associate third information of the particulartag with an owner ID of the third owner and prevent the second ownerfrom accessing the third information. Furthermore, the third owner orany subsequent owner may be the first owner, and the at least oneprocessor may be configured to associate the third information of theparticular tag with the first owner ID. In some embodiments, however,the third owner or subsequent owner may be different from the firstowner, and wherein the at least one processor is further configured toprevent the first owner from accessing the third information.Additionally, consistent with disclosed embodiments, the at least oneprocessor may be configured to permit the first owner to access thefirst information and to permit the second owner to access the secondinformation after the transfer of ownership to the third owner or anysubsequent owner.

Disclosed embodiments may include an appliance for holdingelectronically tagged products and for recording an association bet weenthe tagged products and the appliance. Some non-limiting examples ofappliances include devices for home use, such as washing machines,dryers, refrigerators, humidifiers, dishwashers, food preparationdevices, cabinets, pantries, closets, wardrobes, drawers, storage boxes,toolsheds, garages, etc., devices for commercial use such as lockers,refrigerated storage boxes, shipping containers, delivery trucks,sterilization devices etc., and devices for industrial use such asvaporizers, toolboxes, warehouses, manufacturing devices, hazardouswaste disposal devices, etc. In general, however, the term “appliance”may refer to anything capable of retaining electronically taggedproducts for any amount of time. By way of example, refrigerator 25000Ain FIG. 25A, clothes washer or dryer 25000B in FIG. 25000B, pantry25000C in FIG. 25C, wardrobe 25000D in 25D, and delivery truck 25000E inFIG. 25000E are each examples of appliances within the meaning of thisdisclosure.

Recorded data, in the context of appliances, may include tag IDs ofitems placed in the appliance, time stamps of when the items were placedin the appliance, expiration dates associated with the items, timestamps of when items were removed from the appliance, informationlinking items that were removed from the appliance on or about the sametime, items that were removed but not returned to the appliance, and anyother direct, indirect or derivative data that may relate to an itemthat was contained within an appliance.

Disclosed embodiments may include a housing denning a cavity forretaining the electronically tagged products. A housing may include anystructure defining a cavity or any space or structure capable ofretaining electronically tagged products for any amount of time. Thecavity may be permanently opened or may include an enclosure such as oneor more doors. The housing may be constructed of any suitable material,consistent with the nature of the associated appliance. By way ofexample, appliance 24000 may include housing 24002 defining cavity24004. Electronically tagged product(s) 24006 having tag(s) 1100 may beretained within cavity 24004. Housing 24002 may also contain or beotherwise integrated with exciter 24008, receiver 24100, communicator24102, and processor(s) 24104. However, it is to be understood that theaforementioned components and devices may not necessarily need to bedisposed within cavity 24004 and may be configured in any suitablemanner, consistent with the present disclosure.

By way of example, refrigerator 25000A in FIG. 25A includes housing24002 and cavity 24004. Clothes washer or dryer 25000B in FIG. 25Bincludes housing 24002 and cavity 24004. Pantry 25000C in FIG. 25Cincludes housing 24002 and cavity 24004. Wardrobe 25000D in 25D includeshousing 24002 and cavity 24004. And delivery truck 25000E in FIG. 25Eincludes housing 24002 and cavity 24004.

Disclosed embodiments may include an exciter integrated with thehousing. The exciter may be configured to trigger tags of theelectronically tagged products to cause the tag of each product totransmit a unique tag ID. An “exciter” may refer to a device, such as atransmitter, that emits a constant, intermittent or periodical signal.The signal may have characteristics that match those expected by asecond device which is triggered to perform a predefined action once itreceives the signal. The signal may be a radio signal, a magnetic orelectric field, an audible or ultrasound signal, a light signal, amechanical vibration etc., and its characteristics may include anamplitude or power level, a frequency, a modulation, a repetitionperiod, a communication protocol, a set of transmitted data etc. By wayof non-limiting example, an AM-EAS (Acousto-Magnetic Electronic ArticleSurveillance) gate acts as an exciter to an AM-EAS tag by periodicallyemitting a pulse of magnetic field at a frequency of 58 kHz, causingmechanical vibration in the magnetoelastic metal strip inside the tag.This vibration may then be detected by the gate, indicating that a taghas passed through. As another example, a RFID reader acts both as anexciter (charging the RFID tags in its field with the energy requiredfor them to receive and transmit RFID signals) as well as a transceiver(transmitting and receiving data to and from the tags). Consistent withdisclosed embodiments, an exciter may emit RF energy at either the 900MHz band or at the 2.4 GHz band, in either a constant mode or anintermittent mode. This energy may charge the tags, and causes them totransmit in a mode dependent on the frequency received.

An exciter may be integrated with the housing in order to cause tags totransmit and be detected by the appliance, and may be placed eitherinside the cavity of the appliance in another way that causes tagsinside the appliance to sense the exciter's signal. Alternatively, theexciter may be placed at an opening or door of the appliance, affixed toan exterior surface of tire appliance or connected in any other way tothe appliance. For example, an appliance may be accompanied by atethered exciter that can be mounted adjacent an appliance. As usedherein all of the forgoing examples constitute exciters integrated withan appliance.

A unique tag ID may include a number, string, or other form of datawhich is singularly associated with an identified entity, such that nosingle entity may be associated with the same unique identifier as anyother entity, and any single entity may only have a single uniqueidentifier associated with it. Examples of unique identifiers are serialnumbers, unique EPC codes, database entries (as long as each databaseentry represents a single entity, and all relevant entities arerepresented by exactly one entry in the database) etc. A unique tag IDmay be transmitted, for example, in an identification signal transmittedby tag; the meaning of identification signal, as used herein, isdiscussed in detail elsewhere in the present application.

By way of example, appliance 24000 may include exciter 24008 configuredto emit a signal that triggers tag(s) 1100 to transmit transmission24204, which may contain a unique tag ID. Exciter 24008 may be inside ofcavity 24004 and may be configured to cause tag(s) 1100 of produces)24006 to transmit transmission 24204, or it may by attached on or nearto an opening of cavity 24004 (e.g., a door) and may be configured tocause tag(s) 1100 to transmit transmission 24204 upon product(s) 24006entering or exiting the cavity.

For ease of discussion, disclosed embodiments may include“identification circuitry.” In the context of disclosed appliances,“identification circuitry” may refer to any one or more components ordevices used to either excite a tag, receive a response from a tag, orinterpret a response form a tag. Thus, identification circuitry mayinclude one or more of a receiver, a communicator, an exciter, at leastone processor, or any other components or devices capable of performingany one or more functions of identifying tags within appliances.

By way of example, in FIG. 24, circuit 24500 may include at leastreceiver 24100, communicator 24102, processor(s) 24104, and/or exciter24008. In refrigerator 25000A of FIG. 25A, clothes washer or dryer25000B of FIG. 25B, pantry 25000C of FIG. 25C, wardrobe 25000D of FIG.25D, and delivery truck 25000E of FIG. 25E, identification circuitry25500 may include at least an exciter, and may also, but may notnecessarily include depending on design specifications, other componentsillustrated in the identification circuitry of FIG. 24. It should benoted that while, for ease of illustration, identification circuitry25500 is illustrated with a single icon, that icon may representmultiple components either co-located or disbursed throughout theappliance.

Other examples of exciters integrated with a housing includeidentification circuitry 25500 associated with housing 25002A ofrefrigerator 25000 in FIG. 25A; identification circuitry 25500associated with housing 25002B of clothes washer or dryer 25000B in FIG.25B; identification circuitry 25500 associated with housing 25002C ofpantry 25000C in FIG. 25C; identification circuitry 25500 associatedwith housing 25002D of wardrobe 25000D in FIG. 25D; and identificationcircuitry 25500 associated with housing 25002E of delivery truck 25000Ein FIG. 25E.

According to some disclosed embodiments, the exciter may be configuredto transmit energy at a frequency within at least one of a firstfrequency band around 900 MHz or a second frequency band around 2.4 GHz.In general, a frequency range of 900 MHz WW ISM and 2.4 GHz WW ISM mayrefer to frequency ranges of around 900 MHz and 2.4 GHz, respectively,as previously discussed. By way of example, exciter 24008 may beconfigured to transmit energy 24202 in a first frequency band around 900MHz, a second frequency band of 2.4 GHz, or both, consistent with thepresent disclosure.

Consistent with the present disclosure, the exciter may be configured totransmit energy to the tags of the electronically tagged products tothereby enable each tag of the tagged products to harvest the energyfrom the exciter and use the harvested energy for powering each tag. Theenergy may be harvested, for example, by a harvesting circuit and storedby an energy storage component of the tag or any element or circuitsenabled to accumulate energy. By way of example, In FIG. 24, exciter24008 may be configured to transmit energy 24202 in such a manner thattag(s) 1100 may harvest the energy for powering tag(s) 1100. Discussionsof disclosed harvesting methods and devices are discussed, for example,with reference to some non-limiting embodiments illustrated in FIGS. 9,10, and 15. The circuit of FIG. 24 may be incorporated into theappliances illustrated in FIGS. 25A-E.

According to some disclosed embodiments, the exciter may be configuredto receive a trigger command and to trigger the tags of theelectronically tagged products in response to receiving the triggercommand. Receiving a trigger command may include receiving a wirelesstransmission, a direct digital signal, or any other communication thatmay cause the exciter to trigger the tags of the electronically taggedproducts. The trigger command may be received from a device, a componentof a device, an individual, or any other entity, either internal orexternal to the appliance, capable of causing a trigger command to bereceived by the exciter. In this context, a “trigger” may refer to astimulus or input that may be received by the tags that causes the tagto perform one or more actions consistent with the present disclosure,such as transmitting a signal or changing a characteristic of atransmitted signal. For example, in some disclosed embodiments, the tagsof the electronically tagged products may each be configured totransmit, after receiving the energy transmitted from the exciter, theunique tag ID thereof for receipt by the receiver in the secondfrequency band. By way of example, exciter 24008 may receive command24302 from processor(s). Alternatively, exciter 24008 may receivecommand 24302 from any other source (e.g., communicator 24102, 24400, orany other source not shown in FIG. 24). Upon receiving command 24302,exciter 24008 may trigger tag(s) 1100 by transmitting energy 24202within a frequency hand that causes tag(s) 1100 to transmit transmission24204.

Disclosed embodiments may include a receiver for receiving transmissionof each unique tag ID. A receiver may include a circuit designed toperform the action of receiving signals sent over a communicationmedium. The signals may carry data (as in the case of communicationsystems such as Wi-Fi, Bluetooth, cellular communication, Ethernetcommunication or any other standards-based or proprietary protocol) orjust carry energy (as in the case of exciters for RFID, X-ray imaging orradar). The term “receiver” is most often used in the context ofwireless communication, such that the signal is ail electric signal, amagnetic signal or an electromagnetic signal, the medium is over-the-airwireless communication, and the signal carries data of some formaccording to an agreed-upon communication protocol.

The action of “receiving” or “reading” may refer to interpreting andconverting to legible information a signal sent over a wirelesscommunication medium. In this sense, a receiver may operate in anunpredictable environment in which at any given point in time a newsignal might come in and needs to be handled as it is received. This isdue to the fact that, absent complicated recording equipment that cansave the inputs arriving over the communication medium over extendedperiods of time, the receiver may need to act immediately upon detectionof an incoming signal, process it, interpret it and convert it to ameaningful form usable by the rest of the system without unacceptabledelay. A receiver may need to perform this action intermittently, whensignals arrive over the communication medium in a sparse manner, orsequentially one after the other, if signals arrive over thecommunication medium with little to no delay between consecutivesignals.

In some disclosed embodiments, the exciter may be configured to triggerthe tags of the electronically tagged products according to apredetermined timing sequence. By way of example, in FIG. 24, exciter24008 may transmit energy 24202 multiple times a day, regardless of anyinput from the components of appliance 24000. Additionally, during atriggering period, tags may be triggered multiple times in order toensure that no tag IDs were missed due to signal collision or thereceiver having been overwhelmed. This periodic triggering during atriggering interval or period may also be considered a timing sequencewithin the meaning of this disclosure.

Disclosed embodiments may include a communicator for outputtingindications of identities of electronically tagged products retained inthe cavity. A communicator may include any circuit or device capable ofproviding received tag identities to any other circuit or device. Thecommunicator may be configured to communicate the tag identities via awired or wireless transmitter, a wired connection, a direct digitalsignal channel, or any other device, circuit, mechanism or channelcapable of facilitating communications between the appliance and anotherdevice, platform, or any other entity. The communicator may, throughdisclosed communication methods, output identifications of theelectronically tagged products retained in the cavity. A “retained”product may refer to a product that is associated with the cavity, suchas a product that is inside of a cavity, a product that isentering/exiting a cavity, or any other product with a determinableassociation with the cavity and/or appliance.

In some disclosed embodiments, the indications outputted by thecommunicator may reflect identities of the electronically taggedproducts derived from received unique tag IDs. An identity of theelectronically tagged product may include information relating to thetype of product or certain characteristics of the product. An identitymay include one or more of a product name, brand, model, SKU, physicalattribute, price, owner, or any other information identifying theproduct. For example, for an electronically tagged t-shirt, thecommunicator may output one or more of a brand, color, size, price orany other characteristics or features related to the t-shirt. Thisinformation may be determined from or may be based on the receivedunique tag ID, information contained in the received unique tag ID, orinformation looked up in a data structure based on the unique tag ID.

By way of example, in FIG. 24, appliance 24000 may be a refrigerator,such as refrigerator 25000A in 25A, and product 24006 may be a gallon ofmilk. Communicator 24102 may be configured to derive tire identity ofproduct 24006 from the unique tag ID of tag(s) 1100 received byreceiver. Indication 24206 of the identity of product 24006 may includethe brand, type, and amount of the milk, and other information that maybe associated with the milk, such as an expiration date, the amount oftime gallon of milk 24006 has been retained in refrigerator 24000, orthe number of times the gallon of milk 24006 was removed from therefrigerator 24000 for a period of more than a half hour.

According to some disclosed embodiments, the indications outputted bythe communicator may include at least one of an inventory report, aninventory change, an inventory history, or a log of a particular taggedproduct. The meaning of inventory, as used herein, is discussed indetail elsewhere in the present application.

An inventory list, in the context of refrigerator 25000A in FIG. 25A mayinclude a list of ail products 24006 (i.e., packaged and electronicallytagged food items) contained in the refrigerator's cavity 24004. In thecontext of the clothes washer or dryer 25000B in FIG. 25B, the inventorylist may include all garments (products 24006) or other items within theassociated cavity 24004. For the pantry 25000C in FIG. 25C, theinventory list may include all packaged and electronically tagged fooditems in the pantry's cavity 24004. For the wardrobe 25000D in 25D, theinventory list may include all tagged clothing items in wardrobe cavity24004. And for the delivery truck 25000E in FIG. 25E, the inventory listmay include all parcels (products 24004) within cavity 24004 at anygiven time.

Consistent with disclosed embodiments, an inventory report may include alist, in the form of a table, a database, a spreadsheet etc., includingall the items which are part of an inventory, along with relevantattributes or any other information required to inform decisionsregarding the management of said inventory. The information may includea recent sales history of each item (e.g., to gauge the rate at whichitems are being sold, predict when the inventory will run out and needto be replenished, and/or to assess shrinkage as the difference betweenthe starting inventory minus sales and the current inventory), acomparison between the available items in the inventory and the standardsize-curve associated with said items (e.g., to determine the sizedistribution for future orders), or a list price against current pricefor each item (e.g., to compare the list value of the inventory againstthe current mark-down value of the inventory in order to plan futurepricing). This report may be presented as a set of top-line aggregatefigures (e.g., a number of items, total value, total shrinkage, etc.)and/or an interactive report allowing various filtering and sortingoptions needed to drive business and management decisions regarding theinventory. A log of a particular product may include sales history,ownership history, location history, or any other historical informationrelating to the particular tagged product.

By way of example, communicator 24102 may be configured to outputindication 24206. Indication 24206 may include an inventory reportregarding ail of the product(s) 24006 previously or currently retainedin appliance 24000. The information contained in the inventory reportmay include a sales history, list price, current price, or othercharacteristics of each one of product(s) 24006.

Consistent with disclosed the communicator may be configured to outputinformation associated with the electronically tagged products. Theinformation may include at least one of a period of time the productswere retained in the cavity, a period of time since the previous timethe products were retained in the cavity, or recommendations associatedwith the products. Recommendations may be based at least in part oninformation derived from unique tag IDs associated with the productsretained within the cavity. For example, the processor may be able topredict additional products that a user (e.g., a requester) may want topurchase and recommend that the user should purchase the additionalproducts by relaying this information via the communicator. In anotherexample, the processor may recommend to a user to restock a particularproduct in the appliance due to the amount of the particular productretained in the appliance dropping below a threshold amount. In yetanother example, the recommendation may be to discard a product becausethe product has expired. These examples are non-limiting, and it is tobe understood that the communicator may be configured to output a widearray of recommendations associated with the products based on thereceived unique tag IDs of the products retained within the appliance.

By way of example, indication 24206 may include information relating toproduct(s) 24006, such as the amount of time produces) 24006 has beenretained in cavity 24004. However, if the product(s) 24006 are notretained in cavity 24004 at the time communicator 24102 outputsindication 24206, indication 24206 may contain information relating tothe last time product 24206 was retained in cavity 24004. For example,in the context of washer or dryer machine 25000B of FIG. 25B,identification circuitry 25500 may be able to track and record whenitems were last put through the washer/dryer.

Communicator 24102 may also be configured to include a recommendation inindication 24206 to the user to purchase more of product(s) 24006 orproducts related to product(s) 24006. For example, in the context ofrefrigerator 25000A of FIG. 25A and pantry 25000C of FIG. 25C, whenidentification circuitry 25500 is used to identify products historicallypresent but currently missing from the refrigerator, a recommendationmay be provided to replenish such products. Such recommendation mayinclude an automatic entry on a shopping list, or a display or a reportto a user. In the context of wardrobe 25000D in FIG. 25D, identificationcircuitry 25500 may track combinations of clothes that have been worntogether (based on time of removal), and output recommendations forclothing combinations on an interface, or advise when an item was lastworn.

In some disclosed embodiments, the receiver may include an antennaconfigured to receive the transmission of each unique tag ID at afrequency within a frequency band around 2.4 GHz. By way of example,appliance 24000 may include receiver 24100 having an antenna 24102.Antenna 24102 may be configured to receive transmissions within aparticular frequency band, such as a frequency band of around 2.4 GHz.Antenna 24102 may therefore receive transmission 24204 containing aunique ID of tag 1100 as long as transmission 24204 is transmittedwithin a frequency band of around 2.4 GHz.

In some disclosed embodiments, the exciter may be configured tosimultaneously trigger a plurality of tags of the electronically taggedproducts. Furthermore, according to some disclosed embodiments, tirereceiver may be configured to sequentially read transmissions of theunique tag IDs of the simultaneously-triggered tags. In the context ofdisclosed embodiments, sequential reception may refer to the ability todetect, receive and interpret one signal at a time or one group ofsignals at a time. In that sense, if, during tire reception of a signal,another signal appears, the reception of both signals would beirreversibly compromised in what is called a “collision”, and neithersignal would be accurately received and interpreted (the exception wouldbe if the second signal is weak enough in comparison to the firstsignal, that it is within the required signal-to-noise ratio forcorrectly receiving the first signal, in which case the second signalmay be ignored, and the first signal accurately received andinterpreted). Such receivers can be said to be sequential receivers, inthe sense that at any given time no more than one signal or group ofsignals can be received and interpreted, and at the output of thereceiver the received signals can be listed in an ordered,non-overlapping, sequential list. Some receivers may have the capabilityto receive more than one signal simultaneously, using methods such asMIMO, SDMA, digital beamforming etc. Such receivers may be referred toas “parallel” or “simultaneous” receivers, as opposed to sequentialreceivers. In some cases, signals may be sent to the receiver in arandom or pseudo-random manner, which means that one cannot guaranteethat any particular signal will be accurately received and interpreteddue to the fact that it is statistically possible that another signalwill be sent in parallel to the particular signal, causing a collisionand blocking the reception of both signals. The chance of such anoccurrence may depend on the rate of signals over the channel and thelength of time if each signal. However, after removing all collisionsignals (which, assuming the signals are short enough and sparse enough,may constitute a very small portion of all signals), all remainingsignals may be accurately-received and interpreted by a sequentialreceiver, and result in a sequential list of received signals.Embodiments relating to the simultaneous triggering of electronic tagsare disclosed in greater detail herein.

According to some disclosed embodiments, the communicator may further beconfigured to receive, from a requester, a request to identify theelectronically tagged products retained in the cavity at a specifiedtime, and output to the requester an indication of the identities of theelectronically tagged products retained in the cavity at the specifiedlime. For example, the communicator may include a communication channelor an interface (usually called an API) that enables persons with accessto the communicator, and knowledge of the format of queries andresponses, to retrieve information from the communicator. Consistentwith the present disclosure, such a person may be referred to as arequester. In some embodiments, the requester may be required to providesome form of credentials, log-in, certificate or identification, inorder to verify whether the requester is authorized to access or receiveinformation through the communicator. Such authorization data may begeneral for the entire appliance, or it may be specific for each andevery piece of stored information. A requester may desire to know whatitems are contained within the appliance at any given time, and mayreceive such information in an indication from the communicator inresponse to a request for such information.

In some embodiments, the communicator may be further configured toreceive, from a requester, a request to locate a particularelectronically tagged product; and output to the requester an indicationof whether the particular electronically tagged product is retained inthe cavity. In other words, in contrast to a request to identify itemsthat are contained within the appliance, a requester may desire tolocate one or more particular items, and may receive an indication fromthe communicator indicating that the one or more particular item are orare not contained in the appliance.

For example, in FIG. 24, requester 24400 may desire to know whatelectronically tagged products are currently stored or contained inappliance 24000. Requester 24400 may send request 24208 to communicator24102 requesting such information, and in return, communicator 24102 mayoutput indication 24206 to the requester indicating that product(s)24006 are retained in cavity 24004. In another example, requester may beattempting to determine the location of product(s) 24006 and may sendrequest 24208 to communicator 24102 for an indication as to whetherproduct(s) 24006 are retained in cavity 24004. If produces) 24006 arenot in cavity 24004 at the time of tire request, communicator 24102 mayoutput indication 24206 to requester 24400 indicating that product(s)24006 are not in cavity 24004.

According to some disclosed embodiments, for a particular tag of anelectronically tagged product, at least one of the unique tag ID of theparticular tag or the indication of the identity of the productassociated with the particular tag may be encrypted. In some embodimentsthe communicator may be configured to send an encrypted tag ID to atleast one processor for decryption by the at least one processor. The atleast one processor may be external to the appliance and may becommunicatively coupled with the communicator of the appliance. Forexample, the at least one processor may be associated with a cloud-basedplatform that is in wired and/or wireless communication with thecommunicator (e.g., via a network). Consistent with disclosedembodiments, any suitable communication channel between the communicatorand any external entity may be established. However, alternatively oradditionally, the communicator may be configured to locally decrypt theat least one unique tag ID independent of any processing component.Examples of encryption and decryption devices and techniques aredescribed in other locations herein.

By way of example, in FIG. 24, transmission 24204 may include anencrypted unique tag ID of tag(s) 1100. Communicator 24102 may beconfigured to send the encrypted unique tag ID to external processor(s)24105, which may apply an encryption key to decrypt the unique tag ID.Communicator 24102 may be configured to send the encrypted unique tag IDto external processor(s) 24105 through a network or any other suitablecommunication channel. However, communicator 24102 may also beindependently capable of decrypting the unique fag ID withoutprocessors) 24105, consistent with the present disclosure. In someembodiments, communicator 24102 may be configured to output anindication 24206 that is also encrypted.

According to some disclosed embodiments, the appliance may also includeat least one processor configured to cause information related to eachunique tag ID to be stored in memory. A processor may include acomponent or circuit configured to perform a logic operation, asdisclosed in greater detail herein. The information may be stored, forexample, in at least one data structure, either internal or external tothe appliance, as also described in greater detail herein. According todisclosed embodiments, storing the information may include insertinginto, updating, or otherwise modifying data values contained in the datastructure so that at least one or more data values represents theinformation related to each unique tag ID. According to disclosedembodiments, the data contained in the data structure may be updated ona periodic basis (e.g., bi-hourly, hourly, daily, etc.), in real-time(i.e., continuously updating data), or upon any sort of trigger or inputof data and/or information into the system.

In some disclosed embodiments, the stored information may include, foreach product associated with each unique tag, an indication of at leastone of a time when each product was placed in the cavity, when eachproduct was removed from the cavity, a number of times each product wasremoved from the cavity, a number of times each product was returned tothe cavity, a total amount of elapsed time when the each product wasoutside the cavity, an amount of elapsed time since each product waswithin the cavity, an indication of when the each product associatedwith each tag ID was last in the cavity, or a list of products otherthan a particular product that were in the cavity at the same time asthe particular product.

By way of example, in FIG. 24, appliance 24000 may include processors)24104. The processor(s) 24104 may be communicatively coupled to one ormore components of appliance 24000 (e.g., communicator 24102) and may beconfigured to execute one or more of the disclosed processes. Forexample, processor 24104 may be configured to store information relatedto each unique tag ID associated with tag(s) 1100 of product(s) 24006.

Consistent with disclosed embodiments, the at least one processor may beconfigured to distinguish multiple instances of a same product based onassociated unique tag IDs. By way of non-limiting example, there may betwo or more identical white t-shirts present in a washing machine.However, each of the electronic tags associated with the white t-shirtsmay transmit their own unique tag ID, and the at least one processor maybe configured to distinguish them despite each white t-shirt beingidentical to one another. In FIG. 24, product(s) 24006 may includemultiple identical products, and processor 24104 may be configured todistinguish between identical products 24006 based on the unique tag IDsof tag(s) 1100 contained in transmissions 24204.

According to some disclosed embodiments, the at least one processor maybe configured to recognize products expected to be in the cavity and tocause the communicator to output a notification if an expected productis missing from the cavity. Similarly, the at least one processor may beconfigured to recognize products in the cavity that are not expected tobe in the cavity, and to cause the communicator to output a notificationif a product not expected to be in the cavity is within the cavity. Anotification may be generated, for example, by a system component, andused to alert another system component of either the same or a differentsystem. The notification may also be configured to alert a person, orany other entity or component capable of receiving a notification, orany combination of the above. The notification signal might include anaudible alert (e.g., beeping), visual alert (e.g., flashing lights), orany other sensory signal (e.g., vibration), or a digital signal (such asa notification signal to an application on a mobile device, an interruptsignal to a CPU in an electric circuit board, or an entry in a systemalert log) or any other signal suitable for alerting an entity of theoccurrence of one or more misplaced items. A notification may appear astext on a display or in a report.

A product may be expected or not expected to be in a cavity based onhistorical collected data, a predetermined schedule, a relationshipbetween the product and the appliance, a condition being met by tireunique tag ID, or any other identifiable association or non-associationbetween the product and the appliance. For example, a washing machinemay include at least one processor and may cause the communicator tooutput a notification when a wool sweater that is placed in the washingmachine based on the unique tag ID of the wool sweater if the woolsweater is not machine washable and therefore not expected to be in thewashing machine. The notification may similarly be output via thecommunicator when the chosen washing cycle is inconsistent withlaundering instructions on a garment. Similarly, a clothes dryer mayoutput a notification when a garment (e.g., a sock) was recently presentin a washer, but never made its wav into the dryer. The processor mayalso be programmed, designed, and/or configured to expect or not expectthe presence of a particular product based on user preference or anyother set of rules. By way of example, it may be expected that produces)24006 are to be retained in cavity 24004 during a particular timeperiod. If, during that time period, produces) 24006 are not retained incavity 24004, processor(s) 24104 may recognize the non-presence ofproduct(s) 24006 and cause communicator 24102 to output a notificationthat produces) 24006 are not within cavity 24004.

In the context of refrigerator 25000A of FIG. 25A, identificationcircuitry 25500 may track items that are expected to be inside of therefrigerator and may generate a notification if items are missing fromthe refrigerator. In yet another example, the food item products 24006removed from the refrigerator may be tracked, and a potential spoilagealert may be triggered if removal time surpasses a threshold. Similarsystems may be employed, for example, in pantry 25000C in FIG. 25C. Forexample, a notification may be provided of food item products 24006nearing their expiration dates, to encourage use of the perishablesbefore they expire. In the context of delivery truck 25000E in FIG. 25E,identification circuitry 25500 may expect a parcel to remain in thetruck until it arrives at its intended deli very location. If the parcelis removed earlier, identification circuitry may detect prematureremoval and circuit 24500 may generate an alarm signal.

Embodiments of the present disclosure may relate to methods, systems,devices, and computer readable media for providing access to informationassociated with electronically tagged goods. For ease of discussion, adevice is described below, with the understanding that aspects of thedevice apply equally to systems, methods, and computer readable media.For example, some aspects of such device may include electricalconnections over a network that is either wired, wireless, or both.Other aspects of such a method may occur using non-electric means. Inthe broadest sense, the device is not limited to particular physicaland/or electronic instrumentalities, hut rather may be accomplishedusing many differing instrumentalities.

Disclosed embodiments may include a system for providing access toinformation associated with electronically tagged goods. Goods mayinclude tangible things that are produced, bought, sold, used and/orconsumed. More generally, as described herein, the term “goods” may besynonymous with “things,” and may include animate and inanimate objects,including items, people and animals. Goods can take the form ofcollections of items found in a particular location and/or owned by aparticular owner, such as the items of a person's wardrobe includingclothes that person owns, regardless of whether they are in a closet, inthe laundry, currently worn by the person, or temporarily lent to afriend to use. A collection may also include food items stored in akitchen, pantry, refrigerator or freezer including items which ruecurrently in use, or unopened. An electronic device or tag may beembedded within, attached to, or otherwise associated with physicalitems in order to digitally represent each item on an exemplary digitalplatform. An electronic device may include any combination of electricalcircuits or components that is capable of storing information.

Disclosed embodiments may include at least one processor, as previouslydescribed herein, which may store a plurality of tag IDs. As previouslydescribed, the tag IDs may include data identifying the tag. A processormay store tag IDs in differing ways consistent with disclosedembodiments. For example, in some embodiments, storing may includeaccessing a data structure (as defined herein) in order to insert into,update, or otherwise modifying data values in the data structure.Storing may also include writing data into memory of the processor.Regardless of how the processor records the data, the data may be storedpermanently or updated on a periodic basis (e.g., bi-hourly, hourly,daily, etc.), in real-time (i.e., continuously updating data), or uponany sort of trigger or input of data and/or information into the system.

Disclosed embodiments may include storing a paring between each tag IDand at least one owner ID. In some embodiments, a pairing may include arelationship that results from a process of associating two pieces ofinformation. For example, a pairing may be a one-to-one relationship abetween a first object, item, number, or piece of information, and asecond object, item, number, or piece of information. A pairing may bestored, for example, when two pieces of data are in some way associatedwith each other. Accordingly, storing a pairing may occur when a logicalconnection is formed between pieces of data. One or more of the piecesof data may be preexisting in a data structure and the storing of thepairing may occur when the two pieces of data are linked, such as byassociating them with a common marker. By way of another example,storing may occur when two pieces of data are associated with each otherin a table. Thus, when, in either memory or a data structure, some formof logical connection is made between the ID of a tag and an ID of anowner, it said that a pairing of the two is stored.

In some embodiments, the at least one owner ID of each tag ID isassociated with at least one of a current owner of a product associatedwith the tag ID, a seller of the product, a manufacturer of the product,or a user of the product. A current owner of the product may include anyentity that currently has a right or permission to possess, control, ortrack the product. Similarly, a seller of the product may include anyentity offering a product for sale, as well as associated entities suchas an employee or authorized agent, or equipment of such individuals orentities. A manufacturer of the product may include any person or entitythat makes, builds, fabricates, assembles, designs, or otherwiseproduces the product. A user of the product may include a potentialcustomer or an actual purchaser of the product, or an entity renting,leasing or otherwise borrowing (for free or for a fee) a product foruse. In some instances, the user may be the same as the owner, and inother instances, the user may be a person, entity or equipmentauthorized by the owner.

In some embodiments, a single tag ID may be paired with more than oneowner ID, indicating shared ownership of the electronically tagged good.In some embodiments, a single owner ID may be paired with more than onetag ID, indicating a single entity's ownership of multipleelectronically-tagged goods.

Disclosed embodiments may involve receiving a pairing between at leastone particular tag ID and a product ID. Each tag may have its own uniquetag ID which may be provided to the tag at the time it is manufacturedor programmed. The tag ID may uniquely identify a tag in a mannerdistinguishing it from other tags; the meaning of uniquely identify, asused herein, is discussed in detail elsewhere in the presentapplication. For example, uniquely identifying a tag may occur byassigning to the tag a unique serial number, code, or other data string,for example. In some use cases, a tag supplier may provide to a consumerproducts company volumes of tags to be associated with the products ofthe consumer products company. The tags may arrive from the supplierpreprogrammed with tag IDs, or the IDs might be programmed by theconsumer products company. Either way, with at least some embodimentsdisclosed herein, a correlation is made between a particular tag and aparticular product. For example, a custom furniture manufacture may makeeight copies of its Legacy table in two different finishes. It mightaffix a tag to each product before shipment, and associate in a datastructure the tag number with information about the product as follows:

Tag ID Model Finish Mfg Date Inspected By AABBCC12341 Legacy Table MatteBlack 01/16/30 GSP AABBCC12342 Legacy Table Matte Black 01/16/30 GSPAABBCC12343 Legacy Table Matte Black 01/17/30 AXP AABBCC12344 LegacyTable Matte Black 01/17/30 SWB AABBCC12345 Legacy Table Glossy Black01/18/30 AXP AABBCC12346 Legacy Table Glossy Black 01/18/30 SWBAABBCC12347 Legacy Table Glossy Black 01/19/30 GSP AABBCC12348 LegacyTable Glossy Black 01/19/30 AXP

A tag scanner may be used to scan the tag and an employee may inputidentifying data, such as the exemplary data in the table above.Alternatively, a manufacturer of 24 oz boxes of Crystal Cleandishwashing detergent may order 50,000 tags, preprogrammed from a tagsupplier. The preprogramming may include a unique tag ID for each tag.In some embodiments, preprogramming may also include the product nameand size, with each tag having a unique tag ID. The tag supplier maythen send a data file to the dishwashing detergent manufacturer or anagent of the same. The data file may include an indication that the50,000 tag IDs are associated with 24 oz boxes of Crystal Cleandishwashing detergent. Alternatively, the data file may simply includethe tag IDs. If the file already contains product-identifying data, whenthe file is received and uploaded into a data structure, a pairing issaid to have been received between tag ID and product ID. If thedatafile lacks product identifying information, at the time the consumerproducts company associates the product ID information with the tags, apairing is said to have been received (in tire system) between tag IDand product ID. In another use, the consumer products company may simplyreceive tag IDs in text accompanying the tags, and the consumer productscompany might need to input the tag IDs and associate them with productIDs. When that association occurs, the pairing is said to have beenreceived between the tag ID and the product ID. In yet anotherembodiment, the consumer products company may simply receive tags withpreprogrammed IDs. The consumer products company might then perform abatch intake procedure where the consumer products company scans the tagIDs to import the tag IDs into the system and associate the batch with aproduct line so that multiple instances of the same product on that linereceive a tag from the batch. During the association, batch product IDinformation may be entered, and when that batch product ID is enteredinto the system and associated with a product ID of the product line, aparing of tag ID and product ID is said to have occurred. In someinstances, the consumer products company might also have an ability toprogram the tag with ranges of tag IDs of the company's choosing. Insome instances, tags may be shipped with some printed information(either individually on each tag, or in a batch of multiple tags),allowing an optical scanner to optically scan the tags and receive theirrespective ID's, enabling the pairing to be done by alternative meanswithin the company's systems. These are just a few examples of how a tagID may be associated with a product ID. It is to be understood that anyother way of pairing is within the scope of this disclosure, so long asthe result is that a tag ID and a product ID are in some way associatedwith each other. Moreover, the consumer products example is provided tostreamline discussion. Similar approaches may be used with tiny objector thing.

Regardless of the use case or how the pairing occurs, a processor mayreceive a pairing between a tag ID and a product tag ID, where the tagID includes a unique tag identifier and the product ID may include oneor more pieces of additional information characterizing the product.Thus, in the table above, columns 2-5 may individually, collectively, orin some combination be considered to contain a product ID, because theinformation in those columns in one way or another identifies theproduct. Receiving the pairing may occur when the association between atag ID and a product ID arrives at or occurs with a processor. In someembodiments, the association may simply be an indicator to join twopieces of previously stored information. For ex ample, a data structuremight be preloaded with tag IDs and product IDs. and receiving thepairing might involve receiving an indication that a particular tag IDis associated with a particular product ID.

A paring between a particular tag ID and a product ID may include arelationship that results from the process for assigning a one-to-onerelationship between a particular tag ID and a product ID. In someembodiments, a single tag may be associated with a single item. Forexample, a tag ID may be paired with a product ID. This pairing may bereceived by the system and stored in memory associated with the system.

Disclosed embodiments may include storing information associated withthe at least one particular tag ID and the product ID. Storing ofinformation may occur when data is written to a data structure ormemory, or electronically retained in any way. The stored informationrelating to the at least one particular tag ID and the product ID, mayin some instances include the association between the tag ID and theproduct ID. In other instances, it may include any additionalinformation about the tag ID, the product ID or their pairing. Suchadditional information may include information on when the tag ID waspurchased, when the tag ID was associated with the product ID,characterizing information about the associated product, historicalinformation about the tag's transmission history, product acquisitioninformation, information about changes in location of the tag over time,and/or information about changes in tag/product ownership. Informationassociated with a tag ID or a product ID, as disclosed above, may beinitially stored within the tag itself, or may be stored in a datastructure after the tag transmits its ID over a communications channeland the tag ID is received by a processor that causes the data to bestored. Alternatively or additionally, the information may be storedsolely in a data structure accessible by a processor, having theprocessor update, maintain, and otherwise handle the informationwhenever and wherever a transmission of the tag ID is received over acommunication channel along with the associated information about thecircumstances of the transmission, the characteristics, identity, andintent of the device receiving the transmission. For example, FIG. 20includes an identification tag 1100. When the product with which tag1100 is associated is removed from tin area monitored by tin EAS gate,the gate may trigger the tag to emit its ID as a signal 12200 to areader 11300 h. The reader 11300 h may then forward the incident vianetwork 20002 to processor 20004, which recognizes reader 11300 h asbeing associated with an egress. The processor might then cause anindication that the product associated with tag 1100 passed the egressat a particular time to be stored in memory or data structure 20006.This in turn, may cause processor 20004 to remove the product associatedwith tag 1100 from inventory.

In some embodiments the information associated with each of theplurality of tags may include a list of authorized entities associatedwith each tag ID. A list may include a series of words or numeralsrepresenting information. For example, a list may contain informationrepresenting authorized entities associated with a tag ID. An authorizedentity may include a person, or device, such as a smartphone or laptop,associated with an owner of the product or an application executed on acomputing device. In some embodiments, the at least one authorizedentity is at least one of a computing device or an application executedon a computing device. Computing devices may include cell phones,desktop computers, laptops, video game consoles, smartphones, tablets,smart televisions, digital audio players, automobile communicationssystems, printers, and other devices capable of performing computations.An application executed on a computing device may include a program orgroup of programs designed for interaction by a user that performs afunction, such as for personal, education, or business use. Thecomputing device or application executed on a computing device may be anauthorized entity associated with a tag ID. Once authorized, that entitymay be provided with access or rights associated with the tag. Forexample, authorized entities may be able to perform look ups of data ormay be able to change data associated with a tag. In some instances,multiple applications on a single computing device may or may not beauthorized entities. For example, a retail establishment may allowpersonnel in the establishment to install a proprietary applicationreserved for staff use on personnel's private devices such assmartphones or tablets. In such a case, the staff application may beincluded in the list of authorized entities allowed to accessinformation regarding the tags in the retail establishment, while other,personal applications installed on the same device (such as calendarapplications, mall applications, or even the same retailer'sconsumer-facing application) may not be included in the list ofauthorized entities.

In some embodiments, the at least one authorized entity is associatedwith at least one of a current owner of a product corresponding to theproduct ID, a seller of the product, a manufacturer of the product, or auser of the product. A seller of the product may include a person orentity, or an employee or authorized agent of the person or entity,offering the product for sale. A manufacturer of the product may includeany person or entity that makes, builds, fabricates, assembles, designs,or otherwise produces the product. A user of the product may include anactual or potential customer or a purchaser of the product, or an entityrenting, leasing or otherwise borrowing (for free or for a fee) aproduct for use. A user may also be an authorized entity permitted touse the product by an owner.

Disclosed embodiments may include receiving a pairing between the atleast one particular tag ID and at least one authorized entityassociated with tire at least one particular tag ID. For example, eachtag ID may be paired with at least one authorized entity. This pairingmay be received by the system and stored in memory associated with thesystem. Similar to how the term pairing is defined above, a pairing of aparticular tag ID and at least one authorized entity may be consideredreceived when an indication is provided indicating the association. Forexample, when data is received in a processor identifying a new owner ofa tag, an association may be said to have been received. Or, forexample, when a new tag is associated with an owner and the owner'spreexisting list of permissions is associated with the new tag, anassociation may be said to have been received.

In some embodiments, the at least one processor may be configured tostore and access a list of authorized entities associated with each tag.Storing a list may include waiting identifying information for one ormore entities provided with permission or authorization into memory or adata structure. Or it may include linking a preexisting list with a newtag. Once stored, accessing refers to an ability to look up, read, addto, alter, delete, or share information associated with a tag. Forexample, in FIG. 20, processor 20004 may cause an authorization list fora particular tag or category of tags (e.g., all tags owned by owner x;or a subgroup of products owned by owner x) to be stored in datastructure 20006. If device 20008 is on the list, then it may be able toaccess data about the tag in data structure 20006 via network 20002. Forexample, using interface 20010, an authorized user may read, alter, add,remove, or share, via the network 20002, the information related to atag for which authorization was provided.

In some embodiments, the at least one processor may be configured toreceive a query to modify the list of authorized entities of theparticular tag, and if the query is received from an authorized entityof the particular tag, perform the requested modification of the list. Aquery may include any request for data or information associated withthe tag ID or product ID. A query may further include any request toread, alter, add, modify, remove, or share items or information on thelist. For example, a query may include a request to modify the list ofauthorized entities associated with a particular tag by altering, addingto, or removing an entity from the list of authorized entities.Advantageously, only an authorized entity may read, alter, add, modify,remove, or share items or information on the list. Thus, the processorwill only perform the modification if the query is received from anauthorized entity associated with the particular tag.

For example, FIG. 20 depicts a device 20008. Device 20008 may submit aquery to modify the list of authorized entities of an identification tag1100 stored in data structure 20006. Processor 20004 may determine ifdevice 20008 is an authorized entity by accessing the list of authorizedentities paired with a particular tag ID. If device 20008 is anauthorized entity, then processor 20004 may modify the list ofauthorized entities of an identification tag 1100 stored in datastructure 20006.

In some embodiments, when the list of authorized entities of theparticular tag ID is modified, the at least one processor is configuredto control the tag associated with the particular tag ID to change atleast one parameter of a signal transmitted by the tag. In someembodiments, the at least one signal transmission parameter of theparticular tag may include at least one of a repetition period of asignal transmitted by the tag, a time interval between two consecutivesignals transmitted by the tag, a data encryption mechanism, anencryption key, a signal transmission power, a packet format, or datacontent of a transmission from the tag. The wireless identification fagmay be configured to transmit within a minimum repetition period, suchas every ten minutes. The meaning of repetition period, as used herein,is discussed in detail elsewhere in the present application.

In accordance with the present disclosure, encryption algorithms can beclassified into two classes with regards to their use of encryptionkeys: symmetric algorithms and asymmetric algorithms. Symmetricalgorithms use the same encryption key for both encryption anddecryption. Asymmetric algorithms have one key used for encryption and adifferent key used for decryption of the same message. Common types ofsymmetric encryption algorithms include AES, 3DES, Blowfish, X-TEA andothers. Common types of asymmetric algorithms are RSA and ECC andothers. The advantage of asymmetric algorithms over symmetric ones isthat the key used to encrypt the data (called “public key”) does notneed to be maintained as a secret because only parties with access tothe key used for decryption (called the “private key”) can decipherencrypted data. This allows the public key to be shared freely betweenthe parties without having to be kept secret which greatly simplifiesthe logistics of secure key distribution.

The power level at which the transmitter transmits may be a measurementof power immediately at the output of the transmitter, while thetransmitter is actively transmitting. A transmitter may be designed tohave a configurable power level, such that in response to certain inputsit may transmit a signal at one of two or more different power levels.

Data content may include a unique identifier associated with thewireless tag, a status of the wireless tag, a location of the wirelesstag, a power level of the wireless tag, pricing information, ownershipinformation, styling information, data relating to the trigger thatinitiated the transmission, or any information conveyed by the signal.

For example, when the processor makes a change to the list of authorizedentities, the processor may also instruct the tag to change the signalthat it transmits. Referring to FIG. 20, when processor 20004 modifiesthe list of authorized entities in data structure 20006, processor 20004may also send a signal (not shown) to identification tag 1100 whichchanges the signal 12200 transmitted by the identification tag 1100. Theidentification tag may change at least a repetition period of the signaltransmitted by the tag, a time interval between two consecutive signalstransmitted by the tag, a data encryption mechanism, an encryption key,a signal transmission power, a packet format, or data content of atransmission from the tag. The change may involve encryption. Forexample, if an entity is removed from the list of authorized entitiesassociated with a tag, then the way the tag encrypts information maychange so that the non-unauthorized entity is unable to read informationfrom the tag.

Disclosed embodiments may include storing tag IDs of a plurality of tagsand a pairing between each tag ID and at least one owner ID. Asdiscussed earlier, paring between tag IDs and an owner ID may include arelationship between the two. Storing, as previously discussed, mayinvolve writing into a data structure or memory a link or any otherconnection between the two pieces of data. The relationship may be aone-to-one relationship between a particular tag ID and an owner ID. Insome embodiments, a single owner ID may be paired with a tag ID. Inother embodiments a single owner ID may be paired with multiple tag IDs.For example, an owner ID associated with a retailer may be paired withmultiple tag IDs associated with goods such as articles of clothing. Forexample, as depicted in FIG. 20, processor 20004 may store the pairingof a tag ID associated with an identification tag 1100 between an ownerID. The processor 20004 may store the pairing information in datastructure 20006.

Disclosed embodiments may include receiving, for each owner ID, apairing between the owner ID and at least one authorized entity enabledto receive data of the one or more tags associated with the owner ID. Asdiscussed earlier, causing a linkage to be formed between the owner IDand at least one authorized entity may enable the owner to permit morethan one device or person to access tag-related data.

Disclosed embodiments may further include receiving, from a requester, aquery for information pertaining to a particular tag of the plurality oftags. A requester may include any person, device, program, orapplication seeking to retrieve information from a data structure. Therequest may come via an interface or through pre-programed processes.The requester may be required to provide some form of credentials suchas, log-in, certificate, or identification, in order to determinewhether the requester is an authorized entity with permission to accessthe information stored in the data structure. Such permission may begeneral permission and allow access to the entire data structure,classification permissions to access data associated with a particularclass or group of objects, or specific permissions to access dataassociated with a particular tag. Some of the data associated with theparticular lag might be restricted only to entities with higher levelpermissions, while entities with lower level permissions may be able toaccess the other data. The system may grant/require specific permissionfor each and every piece of stored information. If the request involvesa human interacting with an interface, the requestor may generate aquery for information pertaining to the particular tag by scanning itwith a computing device. For example, when the scan occurs, an IDassociated with the requestor may be transmitted to a server (e.g.,either via network infrastructure or via a receiver/transmitter in adevice controlled by the user). The server can then perform a look up ofinformation and transmit it to the requestor.

For example, in FIG. 20 a user may create a query via a device 20008 byscanning tag 1100. The query may then be sent to the processor 20004 vianetwork 20002. Processor 20004 may then perform a look up and locate theinformation pertaining to a particular tag 1100 in the data structure20006. The information pertaining to a particular tag 1100 may bedisplayed to the user via network 20002 using a graphical user interface20100 on a computing device 20008.

Disclosed embodiments may include looking up the at least one owner IDassociated with the particular tag. Looking up the at least one owner IDassociated with the particular tag may include accessing the storedpairing information between tag IDs and owner IDs. The system maycompare the tag ID associated with the particular tag with stored tagIDs. When the particular tag information is located, the pairinginformation may include an owner ID associated with the particular tag.For example, in FIG. 20, processor 20004 may receive a tag ID from anidentification tag 1100 via reader 11300 a and network 20002 (or fromcomputing device 20008, as mentioned previously). Processor 20004 maythen access data structure 20006 via network 20002 and search for theparticular tag ID and the pairing information indicating an owner IDpaired with the tag ID.

Disclosed embodiments may include receiving, from a requester, a queryto identify at least one of the product ID, the information associatedwith the at least one particular tag ID, the information associated withthe product ID, or the at least one authorized entity, the queryincluding an encrypted tag ID of the particular tag. For example, thequery generated by a requestor may include a request to receive theproduct ID, information associated with the particular tag ID,information associated with the product ID, or the identity of theauthorized entity or authorized entities paired with the tag ID. Therequest or query may include an encrypted tag ID of the particular tag.

In some embodiments the at least one processor may be configured toaccess at least one encryption key of each tag ID. For example, theencryption key of each tag ID may be stored on the tag itself or may beretrieved from a data structure after the device transmits identifyinginformation to a processor that performs a lookup in the data structure.Referring to FIG. 20, an encryption key associated with eachidentification tag 1100 may be stored on the individual identificationtags 1120 and in data structure 20006. Processor 20004 may access theencryption key stored in data structure 20006 via network 20002.

In some embodiments the at least one processor may be further configuredto access the at least one encryption key associated with the particulartag. For example, the encryption key of a particular tag may be storedon the particular tag itself and/or may be retrieved from a datastructure after the device transmits identifying information to aprocessor that performs a lookup in the data structure. Referring toFIG. 20, an encryption key associated with a particular identificationtag 1100 may be stored on the particular identification tag 1120 or indata structure 20006. Processor 20004 may access the encryption keystored in data structure 20006 via network 20002.

In some embodiments the particular tag may be configured to transmit thetag ID thereof when the tag ID is encrypted according to at least oneencryption key, and wherein the at least one processor is configured toreceive the at least one encryption key and decrypt the tag IDtransmitted by the particular tag with the at least one encryption key.For example, when a tag ID is encrypted according to an encryption key,the tag may transmit the encrypted tag ID to a processor. The processormay be able to decrypt the encrypted tag ID with the encryption key.Referring to FIG. 20, an encryption key associated with a particularidentification tag 1100 may be stored on the particular identificationtag 1120 and/or in data structure 20006. Processor 20004 may access theencryption key stored in data structure 20006 via network 20002 and usethe encryption key to decrypt the encrypted tag ID.

Disclosed embodiments may also include decrypting the encrypted tag ID,to thereby look up the decrypted tag ID of the particular tag.Decryption may include a process of decoding a message or informationthat has been encrypted. A decryption processes may include the use ofan encryption key, which may be a piece of data that is shared betweenthe transmitter of the message and the intended recipient at a point intime prior to the transmission of the encrypted message. The use of anencryption key may enable multiple parties to use common encryptionprocesses, while still maintaining the secrecy of the messages as longas the keys are unique arm kept secret. A message would be considereddecipherable or readable by a receiving party if it is transmitted inaccordance with a protocol that is agreed upon by both the sending andthe receiving party. In the case of an encrypted message, the messagemay be decipherable or readable if the receiving party also possessesthe details of the type of encryption used, including the encryptionkey. For example, a processor may receive a query which includes anencrypted tag ID. The processor may decrypt the encrypted tag ID inorder to access the stored tag IDs and locate the particular tag ID inthe memory or a data structure associated with the system.

In some embodiments the at least one processor may be further configuredto decrypt, using an encryption algorithm and the at least oneencryption key, an encrypted tag ID received with the query from therequester. An algorithm may be any process or set of rules that may beapplied for decryption purposes. The algorithm may be accessed by aprocessor. For example, in FIG. 20, an encryption key associated with aparticular identification tag 1100 may be stored on the particularidentification tag 1120 or in data structure 20006. Processor 20004 mayaccess the encryption key stored in data structure 20006 via network20002 and use the encryption key to decrypt the encrypted tag ID. Theprocessor 20004 may then look up via network 20002 the decrypted tag IDand associated information that may be stored in the data structure20006.

In some embodiments, the encrypted tag ID received from the requestermay be encrypted with at least one encryption key associated with theparticular tag, and wherein the at least one processor is configured toretrieve at least one encryption algorithm and the at least oneencryption key, and to decrypt the encrypted tag ID using the at leastone encryption algorithm and the at least one encryption key. Forexample, the processor may receive a query from a requestor. The querymay include a tag ID that has been encrypted with an encryption key thatis associated with the particular tag. The processor may furtherretrieve an encryption algorithm stored on the tag, within an internalmemory associated with the processor, or in the memory or data structureassociated with the system. The processor may use the encryption keyretrieved from the system and the retrieved encryption algorithm todecrypt the encrypted fag ID.

Referring to FIG. 20, processor 20004 may receive a query from a device20008 via network 20002. The query may include a tag ID associated withan identification tag 1100 that has been encrypted with an encryptionkey particular to the identification tag 1100. Processor 20004 mayretrieve an encryption algorithm and encryption key from data structure20006 and use the encryption algorithm and the encryption key to decryptthe fag ID associated with the identification tag 1100.

Disclosed embodiments may further include receiving at least one changein an owner ID of the particular tag from first owner ID to a second IDand/or receiving an updated owner ID associated with the particular tag.A change in owner ID or an updated owner ID may include any informationindicating that a new owner is associated with a tag, or that there isnew information about an existing owner previously associated with atag. Such a change may be received via a network interface. For example,when a purchase is made at a point of sale or through an electronicshopping cart, an identification of the new owner may be associated withthe tag, and the new owner's ID may be stored in a data structure. Forexample, the processor associated with the system may receive a changein ownership of a tag. The request may include the current owner ID andthe new owner ID with an instruction to associate the new owner ID withthe indicated tag.

Disclosed embodiments may further include, in response to the at leastone change in the owner ID, correspondingly changing the encryption keyof the particular tag to an updated encryption key that is associatedwith the second owner ID. Once a new owner is assigned to a tag, a priorowner's rights to access the tag may be restricted or removed. One wayto prevent a prior owner from accessing information related to the tagis to change the encryption method or key used by the tag and not sharethe new encryption with the prior owner. For example, when the processorassociated with the system receives a change in the owner ID of a tag,then the processor may change the encryption key associated with theidentified tag to an encryption key that is associated with the newowner ID. The processor may further encrypt the tag ID using theencryption key associated with the new owner ID, and further instructthe tag to use the new encryption key for any subsequent transmissions.

Disclosed embodiments may further include removing the first owner ID(or a previous owner ID) from a list of authorized entities associatedwith the at least one particular tag ID. When ownership changes, so toomay permissions for accessing tag data. This may occur via a processorthat receives information associated with an ownership change, andremoves the prior owner ID (as well as any entities associated with theprior owner ID) from a list of authorized entities associated with anidentified tag ID. The removal may occur when a specific request is madefor removal, or it may occur automatically via a process implemented inthe system.

Referring to FIG. 20, processor 20004 may update ownership informationof an identification tag 1100 when processor 20004 receives informationproviding an indication that the ownership of tire tag changed. Theindication may be provided through device 20008 via network 20002. Theprocessor 20002 may then update the encryption key associated with theidentification tag 1100 to the encryption key associated with the newowner ID indicated by the device 20008. Additionally, the processor20002 may remove the first owner ID (as well as any entities associatedwith the prior owner ID) from a list of authorized entities stored indata structure 20006 associated with the particular identification tag1100.

Disclosed embodiments may include determining if the requester is the atleast one authorized entity associated with the decrypted tag ID of theparticular tag or the at least one owner ID associated with theparticular tag. When a request for access to tag information is made andbefore the information is provided, a processor might compare an ID ofthe requester against a list including IDs of authorized entities. Onlyif the comparison determines that the requestor is authorized may theprocessor enable the request to proceed. For example, when a processorassociated with a system receives a query by a requestor to access ormodify information associated with a tag ID, the processor may determineif the requestor is an authorized entity associated with the particulartag and therefore allowed to access or modify the requested information.The processor may look up the decrypted tag ID to find the list ofauthorized entities associated with the identified tag.

Referring to FIG. 20, when processor 20004 receives a query from adevice 20008, processor 20004 may access data structure 20006 vianetwork 20002 and located the pairings between the particular tag ID andone or more authorized entities in order to determine if the requestoris an authorized entity associated with the particular identificationtag 1100.

Disclosed embodiments may include fulfilling the query, if the requesteris the at least one authorized entity, and/or permitting the requesterto access the requested information pertaining to the particular tag.For example, if the processor associated with the system determines thatthe requestor is an authorized entity associated with the tag, theprocessor may enable the query to proceed by, for example, providingrequested data or permitting data to be changed. For example, fulfillingthe query may include retrieving the requested information from tirestored information and responding to the requestor with the retrievedinformation. In some embodiments fulfilling the query may includeretrieving requested information from at least one data structure, therequested information including at least one of the stored informationassociated with the at least one particular tag ID or the storedinformation associated with the product ID. In some embodimentsfulfilling the query may include outputting the requested information tothe requestor.

Disclosed embodiments may include denying the query if the requester isnot the at least one authorized entity. For example, if the processorassociated with the system determines that the requestor is not anauthorized entity associated with the tag, then the processor may denythe query. Denying the query may include taking no action such as notproviding requested information or not providing a stored data to bemodified or updated. In some embodiments, denying the query may includeoutputting a notification that the requester is not authorized to accessinformation designated by the query.

Referring to FIG. 20, when processor 20004 receives a query from adevice 20008, then processor 20004 will determine if the device 20008 isan authorized entity associated with the particular identification tag1100. If the device 20008 is not an authorized entity, processor 20004may deny tire query and inform the requestor, by displaying a message ona graphical user interface 20100 on the device 20008 that the requestoris not authorized to receive the requested information or to perform therequested modification of information associated the particularidentification tag 1100.

As discussed previously, the plurality of tags may be configured towirelessly receive and store ambient energy, and to power transmissionof signals using the stored ambient energy.

Embodiments of the present disclosure may relate to methods, systems,devices, and computer readable media for a wireless identification tagwith varying identity. According to some embodiments, the identity ofthe wireless tag may vary. For example, the wireless tag may transmittwo or more identifiers, or may transmit the same identificationinformation in two or more different forms. A tag ID may includeinformation identifying the wireless tag. The tag ID may includenumbers, letters, characters, codes, strings, or other forms of datawhich may identify the wireless tag to other devices or devicecomponents that receive the tag ID. The tag ID may be unique to aspecific tag, and that specific tag may have only one tag ID.Alternatively, the same tag may have multiple IDs. In some embodiments,multiple tags may share the same tag ID or groups of IDs, Examples of atag ID may include a serial number, part number, UUID, EPC, and/or otherdata.

As discussed above, the wireless tag may include at least one circuit.By way of example, as illustrated in FIG. 9, top level controller 9020,either alone or in combination with other components, may be an exampleof the at least one circuit. Alternatively, depending on particulardesign functionality, other components either alone or in combination myconstitute at least one circuit.

In various embodiments, the at least on circuit may be configured toreceive a first trigger at a first time. A trigger may be inputs,stimuli, and other signals for inducing a reaction. In the context ofelectrical and electronic circuits, examples of a trigger may include,but are not limited to, an external signal or an internal signalreceived. In some embodiments, an external signal received may cause atrigger to be sent to the at least one circuit. Whether internally orexternally induced, a trigger may include, for example, a voltage level,a voltage level change, a current level, a current level change, afrequency, amplitude or phase change of a received signal, a digitalinput, a digital pulse, a control word, and/or any other signals invarious forms of energy.

In various embodiments, the at least one circuit may, in response to thefirst trigger, generate in a quasi-random manner a first decipherable IDuniquely identifying the tag. The decipherable ID may be a coded,scrambled, or encrypted piece of data that can be decoded, unscrambledor decrypted. The decipherable ID may be singularly associated with anentity (e.g., the tag or its tag ID), such that no two entities areassociated with the same decipherable ID. And the decipherable ID mayrepresent the tag ID after the tag ID has been coded, scrambled, orencrypted.

A decipherable ID may be generated in a quasi-random manner. Forexample, the at least one circuit may generate decipherable ID with adeterministic process using a combination of fixed inputs and randominputs. The decipherable ID may be considered quasi-random (as the termis used herein) if it conforms to at least some statistical measure ofrandomness. This may include, for example, fixed numbers or knownoutcomes randomness, pseudo randomness, non-fully reducible randomness,Martingale randomness, or real randomness. Randomness may exhibit, forexample, in random noise, such as auto-correlation conditions, normaldistributions, frequency content, and other similar noisecharacteristics. The quasi-random characteristics of the decipherable IDmay allow a party with knowledge of the quasi-random generation processto access the underlying inputs, (i.e., deciphering the ID), whilepreventing others from differentiating the decipherable ID from a stringof random numbers or characters.

In various embodiments, the at least one circuit may cause the at leastone transmitter to transmit the first decipherable ID. By way ofexample, as illustrated in FIG. 9, top level controller 9020 may beprogrammed to generate the first decipherable ID in a quasi-randommanner. In some embodiments, top level controller 9020 may be programmedby computer readable instructions stored in memory 9022. Transmissiondata provided from top level controller 9020 to beacon controller 9030may contain the first decipherable ID. Transmitter 2104 may transmit thefirst decipherable ID as instructed by beacon controller 9030.

In various embodiments, the at least one circuit may receive a secondtrigger at a second time after the first time, and in response to thesecond trigger, may generate in a quasi-random manner a seconddecipherable ID different from the first decipherable ID and uniquelyidentifying the tag, and may cause the at least one transmitter totransmit the second decipherable ID. The at least one circuit mayreceive more than one trigger. For example, the at least one circuit mayreceive the first trigger, and thereafter receive a second trigger. Insome embodiments, the second trigger may be identical to the firsttrigger. Alternatively, the second trigger may differ from the firsttrigger in one or more aspects, such as magnitude, phase, time duration,frequency, and/or information contained within. In some embodiments, thetag ID may be transmitted as part of the first decipherable ID, thesecond decipherable ID, or both.

As previously described, quasi-random numbers or strings may begenerated by a deterministic process with fixed inputs and randominputs. In some embodiments, the second decipherable ID may be generatedby using a different process or a different set of inputs from the onesused to generate the first decipherable ID. By way of exampleillustrated in FIG. 9, memory 9022 may contain multiple algorithms forgenerating quasi-random strings, and top level controller 9020 may beprogrammed to generate the second decipherable ID differently than thefirst decipherable ID by using different algorithms. Alternatively oradditionally, top level controller 9020 may be configured to use thesame set of fixed inputs to generate both the first decipherable ID andthe second decipherable ID, but may use a first set of random inputswhen generating the first decipherable ID, and a second set of randominputs, different from the first set, when generating the seconddecipherable ID. In some embodiments, top level controller 9020 may beconfigured to generate decipherable IDs to be different frompreviously-generated decipherable IDs.

Generating a new decipherable ID each time the tag ID transmits enhancesprivacy. Even if third parties are unable to decipher the decipherableID, they may still ‘map’ an undeciphered ID to a particular wireless tagif the decipherable ID remains unchanged. For example, one may still beable to track the wireless tag using an unreadable code if the wirelesstag consistently transmits the same unreadable code.

According to some embodiments, at least one of the first decipherable IDor the second decipherable ID may be encrypted. Encryption may be aprocess of encoding a message or information in such a way that itenables authorized parties to access the encoded message or informationwhile denying access to those who are not authorized. For example, evenif the encoded message or information were obtained by some unauthorizedparty, encryption may block that unauthorized party from reading theencoded message or information without knowledge of the decryptionprocess. In some embodiments, encryption processes or algorithms mayinclude the use of an encryption key, which may be a piece of data thatis shared between a sender of the message or information and theintended recipient, usually at a time prior to transmission. So long asthe encryption key remains secret and unique, multiple parties may use acommon encryption process while still maintaining the secrecy of theencrypted message or information.

A message or information may be considered “decipherable” or “readable”if it is transmitted in a protocol that is agreed upon by both thesending and the receiving party. For an encrypted message orinformation, it may be considered decipherable if the receiving partyhas details regarding the encryption process or algorithm, including theencryption key. The first decipherable ID or the second decipherable IDmay be encrypted by symmetric or asymmetric algorithms. Symmetricalgorithms use the same key for both encryption and decryption, whileasymmetric algorithms have one key used for encryption and a differentkey used for decryption. Examples of symmetric encryption algorithms mayinclude AES, 3DES, Blowfish, and X-TEA. Examples of asymmetricalgorithms may include RSA and ECC.

According to some embodiments, the at least one circuit may beconfigured receive a unique ID of the tag. The unique ID of the tag mayinclude serial number, part number, UUID, EPC, database entries, and/orany other form of data which is singularly associated with the tag. Thetag ID may be unique to the tag, or, in some embodiments, may be sharedby multiple tags.

The at least one circuit may be configured to receive a key configuredfor use with at least one encryption algorithm and may encrypt theunique ID of the tag using the key and the encryption algorithm togenerate at least one of the first decipherable ID or the seconddecipherable ID with the unique ID of the tag and the key. In someembodiments, the encryption algorithm may be the quasi-random processthrough which the first decipherable ID or the second decipherable IDare generated. For example, the first decipherable ID or the seconddecipherable ID may be an encrypted message containing the unique ID ofthe tag.

In some embodiments, the tag may include memory for storing at least oneof the unique ID of the tag or the key. By of way example, asillustrated in FIG. 10, tag ID ROM 10010 and key ROM 10012 may beexamples of memories for storing the unique ID of tire tag and tire key,respectively. Top level controller 9020 (e.g., at least one circuit) mayretrieve the unique ID of the tag and the key from tag ID ROM 10010 andkey ROM 10012.

In some embodiments, the at least one circuit may be configured togenerate at least one of a random number or a pseudo-random number. Arandom number may be a number generated by a process with an apparentlack of pattern or predictability, lacks order, or that does not followan intelligible pattern or combination. A pseudorandom number may be anumber generated by a process with predictable outcomes that aredifficult to acquire without knowledge of the underlying process. Asequence of pseudorandom numbers exhibit statistical randomness, but arenot truly random. In some embodiments, top level controller 9020 may beprogrammed to generate random numbers or pseudo-random numbers. In someother embodiments, top level controller 9020 may be programmed toreceive random numbers and/or pseudo-random numbers from another circuitof the wireless identification tag.

In some embodiments, the at least one circuit may be configured togenerate at least one of the first decipherable ID or the seconddecipherable ID using the generated number, the unique ID of the tag,and the key. For example, the key may define a scrambling process of toencrypt the unique ID of the tag using the generated number, such thatin the first or second decipherable ID, the unique ID of the tag ismasked as a series of quasi-random numbers/strings with the generatednumber.

In some embodiments, at least one of the first trigger or the secondtrigger may be a request, received from a requester, to identify thetag. A requester may an individual, device, or system desiring aresponse from the tag to transmit the tag ID. In some embodiments, therequester may be at least one of a computing device or an applicationexecuted on a computing device. A computing device may include apersonal PC, tabled device, smart phone, PDA, digital camera, homeappliance, computer server, cloud platform, processor, and othermachines and electronics capable of processing inputs and producingoutputs.

In some embodiments, the at least one circuit may be configured totransmit, to the requester, the quasi-randomly generated decipherable IDcorresponding to at least one of the first trigger or the secondtrigger. FIG. 11 illustrates one exemplary embodiment of a wirelessidentification tag operating in an environment such as a clothing retailestablishment. For example, environmental exciters such as exciters11400, mobile devices such as handheld device 11200, and FAS gate 1112may all emit wireless signals that may be received by tag 1100 as one ofthe first or second trigger for transmitting the quasi-randomlygenerated decipherable ID.

As illustrated in FIG. 12, exciter 11400 d may be one example of arequester. Signal 12100, which originates from exciter 11400 d, may betin example of a request containing one of the first or second triggers.In response to signal 12100, tag 1100 may transmit, to tag receivers11300 e and 11300 f, signal 12200, which may contain one of the first orsecond decipherable IDs. Exciter 11400 d and tag receivers 11300 e and11300 f may be part of a larger infrastructure at the retailestablishment.

By way of another example, as illustrated in FIG. 13, a handheld userdevice 11200 may also be a requester. Signal 13100, which originatesfrom handheld user device 11200, may be another example of a requestcontaining one of the first or second triggers. In response to signal13100, tag 1100 may transmit signal 12200 containing one of the first orsecond decipherable IDs. Handheld user device 11200 may be a cellularphone, PDA, wearable devices, or other mobile computing device havingcomputer programs (examples of applications) for controlling thedevice's operations.

By way of yet another example, as illustrated in FIG. 14, EAS gates1112, 1114 may also be a requester. Signal 14100, which originates fromEAS gates 1112, /1114, may be a different example of a requestcontaining one of the first or second triggers. In response to signal14100, tag 1100 may transmit signal 12200 containing one of the first orsecond decipherable IDs. EAS gates 1112, 1114 may be part of a largerinfrastructure at the retail establishment.

In some embodiments, the request to identify the tag may occur outsideof a retail establishment setting. The wireless tag may be embedded in aproduct for an extended period of time after purchase, and may beconfigured to allow user interaction by the purchaser during that time.Whereas in a store setting, the wireless tag may allow large numbers ofcomputing devices to access the tag ID, such access may only be allowedfor one or a few authorized devices after purchase. In some embodiments,after purchase, the wireless tag's transmissions may be encrypted suchthat they appear unreadable by nearby receiving devices. In order todecrypt the transmission and access the tag ID, the receiving device mayfirst require authorization.

In some embodiments, the receiving device may be authorized to accessthe tag ID by sending a request to a cloud platform through a network,such as the internet. The cloud platform may include one or moredatabases storing IDs of wireless tags, registered owners of each tag,and encryption information for each tag such as keys corresponding toencryption algorithms. In some embodiments, access to tire tag ID may berestricted such that every decryption of a tag's transmission passesthrough the cloud platform.

By way of example, as illustrated in FIG. 26, a purchaser 1104 ofproduct 4000, using handheld device 11200, may transmit signal 13100(example of the request) to request the tag ID of tag 1100. Tag 1100transmits in response, signal 12200, which may contain thequasi-randomly generated decipherable ID. Handheld device 11200, unableto decrypt signal 12200, may send query 26012 to cloud platform 26004for decryption. Query 26012 may include a copy of the quasi-randomlygenerated decipherable ID. Access to cloud platform 26004 may requireidentity verification such as a password, biometric authentication,multi-factor sign-in, or other authentication processes. Cloud platform26004 may either grant or deny access based on whether the identifyverification is successful. If access is granted, cloud platform 26004may decrypt the quasi-randomly generated decipherable ID using the keystored within the cloud platform 26004, and provide the decryptionresult 26014 to handheld device 11200. By restricting the access to thekey, the tag ID of tag 1100 may be kept secret, and privacy of thepurchaser 1104 may be protected.

In some embodiments, the at least one circuit may be configured to causethe at least one transmitter to transmit the first decipherable ID to afirst receiver and to transmit the second decipherable ID to a secondreceiver different from the first receiver. By way of example, asillustrated in FIG. 13, tag receivers 11300 e or 11300 f may serve astire first receiver. By wav of another example, as illustrated in FIG.14, handheld device 11200 may serve as the second receiver.

In some embodiments, the wireless tag may include at least one receiverconfigured to receive triggers transmitted at a frequency within atleast one of a predetermined first frequency band or a predeterminedsecond frequency band. As discussed above, the first frequency band maybe a band around 900 MHz and the second frequency band may be a bandaround 2.4 GHz.

By way of example, as illustrated in FIG. 9, multi-source harvester 2102and gate detection circuit 2106 may serve as the at least one receiver.Multi-source harvester 2102 may include 2.4 GHz harvester 9014, whichmay be coupled to 2.4 GHz antenna 2114 through switch 9034; 900 MHzharvester 9012, which may be coupled to 900 MHz antenna 2112; and powermanager 9010. It should be noted that each of the forgoing componentsmay be made up of multiple circuits, and therefore reference to acircuit may relate to a single component or portion thereof. In someembodiments, the at least one circuit may be configured to determinewhether the at least one receiver receives a trigger at a frequencywithin the first frequency band or within the second frequency hand.

In some embodiments, one or more different components may be configuredto receive signals of different frequency bands, and at least onecircuit may detect whether a signal carrying the trigger is at frequencywithin the first or the second frequency hand based on which componentreceived the signal. In a non-limiting example illustrated in FIG. 9,power manager 9010 may receive inputs from 2.4 GHz harvester 9014, 900MHz harvester 9012, or both, and provide one of 900 MHz detection and2.4 GHz detection to top level controller 9020. Top level controller9022 may determine whether the trigger is at a frequency within thefirst frequency band or the second frequency band based on one of 900MHz detection and 2.4 GHz detection.

In some embodiments, the at least one circuit may be configured to causethe at least one transmitter to transmit a first tag ID signal when thetrigger is received at a frequency within the first frequency band, andto transmit a second tag ID signal when the trigger is received at afrequency within the second frequency band. The first tag ID signal andthe second tag ID signal may be signals transmitted by the wireless tag.The trigger for generation of the first tag ID signal may include afirst incoming predicate signal of a first frequency, while the triggerfor generation of the second tag ID may include a second predicateincoming signal of a second frequency. The first and second predicatesignals may emanate from the same transmitter or from differingtransmitters. Regardless, based on the differing frequency inputs, theat least one circuit may cause the transmission of the first tag IDsignal and the second tag ID signal. Both the first tag ID signal andthe second tag ID may contain one of the first decipherable ID and thesecond decipherable ID.

In some embodiments, the first tag ID signal differs from the second tagID signal in at least one of repetition period, a time interval betweentwo consecutive responses, a data encryption mechanism, a transmissionpower, or data content of the transmission. A repetition period may be atime between two actions or responses. For repeated occurrence of a sameevent, whether such events are inputs or outputs, an average timeinterval, or periodicity of the events may be considered the repetitionperiod. A time interval between consecutive response may be a timebetween two consecutive first tag ID signals, or a time between twoconsecutive second tag ID signals. In some embodiments, the first tag IDsignal may have a different length of repetition period or a timeinterval between consecutive response than the second tag ID signal. Forexample, if a trigger is at a frequency within the 900 MHz frequencyband, the wireless tag may operate in a “infrastructure-excitable mode.”In the infrastructure-excitable mode, the wireless tag may transmit tagID signals to enable computer systems of the retail establishment totrack the wireless tag's location within the establishment, and toupdate inventory of the establishment. These types of operation may notbe time sensitive, permitting longer periods between transmissions oftag ID signals in order to minimize energy usage by the tag. On theother hand, if a trigger is within the 2.4 GHz frequency band, thewireless tag may be operating in a “user-excitable mode.” In theuser-excitable mode, a user may transmit a trigger via a user device,and expect a response within a short time. Thus, in the user-excitablemode, a shorter time period between transmissions of tag ID signals maybe desirable.

Transmission power may be the power emitted by the at least onetransmitter, or a power contained in a transmission of the tag IDsignals. The power contained in the transmission may be characterized byenergy density, magnitude, or amplitude of the transmission. In someembodiments, the first tag ID signal may have a different transmissionpower than the second tag ID signal. In general, a range of a wirelesstransmission is related to its power, hence transmissions with higherpower can reach a longer range. Tag ID signals may be programmed to havea certain transmission power to ensure a minimum transmission range.However, in certain cases, a tag ID signal having a shorter range isstill acceptable and may be advantageous in some cases. For example,when the wireless tag passes an EAS gate, the EAS gate transmits atrigger to the wireless tag requesting a response. This may be referredto as “gate mode.” In some instances, when the wireless tag hassufficient power, it may transmit the first tag ID signal in the gatemode at a first transmission power. However, if the wireless tag isunderpowered, it may instead transmit the second tag ID signal, whichmay have a lower transmission power. This may ensure that the wirelesstag is always tracked as it leaves the premises of the establishment,even in a low power state.

A data encryption mechanism may include one of an encryption key or anencryption algorithm. In some embodiments, the first tag ID signal maybe encrypted using a different data encryption mechanism than the secondtag ID signal. For example, multiple receiving devices may be in rangeof the wireless tag when it transmits a tag ID signal, and it may not bedesirable for all these devices to be able to read this transmission.When the wireless tag is in the infrastructure-excitable mode or thegate mode, for example, a nearby user device may not need to read thetransmission from the wireless tag. Hence, while in theinfrastructure-excitable inode or the gate mode, the wireless tag maytransmit the first tag ID signal encrypted using a first data encryptionmechanism unrecognizable to the nearby user devices, preventing thesedevices from reading first tag ID signal. During the user-excitablemode, the wireless tag may transmit the second tag ID signal encryptedusing a different data encryption mechanism recognizable by a nearbyuser device.

In some alternative embodiments, it may be advantageous for one IDsignal to be encrypted while a second ID signal is not encrypted. Forexample, when the decryption is performed on a remote server or a cloudplatform, the round-trip-time from sending the encrypted ID signal toreceiving the decrypted data may be longer than some design constraints,which may require that some signals not be encrypted. By way of example,when the tag transmits in the infrastructure-excitable mode, the IDsignal may be encrypted, since the time-lag between receiving thetransmission to the use of the data may be long. On the other hand, asin the example when the tag is operating in the gate mode, it may bedesirable for the data to be available as soon as possible, as even adelay of a fraction of a second may impact system performance. In someinstances, the ID signals transmitted during the gate mode may beunencrypted.

Data content of the transmission may refer to the data contained in thefirst and second tag ID signals. In some embodiments, when the wirelesstag responds to a trigger, it may include other data in addition to thetag ID in the transmission, depending on the purpose of the individualor device sending the trigger. The first tag ID signal and the secondtag ID signal may have different data content in response to triggersreceived from different devices, or when operating in different modes,or transmitting different types of information regarding the tag status.

By way of an example, as illustrated in FIG. 12, signal 12100, whichoriginates from exciter 11400 d, may be an example of a trigger withinthe first frequency band. In response to signal 12100, tag 1100 maytransmit signal 12200, which may be an example of the first tag IDsignal or the second tag ID signal.

By way of another example, as illustrated in FIG. 13, signal 13100,which originate from handheld user device 11200, may be an example of atrigger within the second frequency band. In response to signal 13100,tag 1100 may transmit signal 12200, which may be an example of the firsttag ID signal or tire second tag ID signal.

In some embodiments, the wireless tag may include at least one energystorage component, electrically connected to tire at least onetransmitter, for collecting and storing ambient energy received by theat least one receiver and for powering transmission of the at least onetransmitter. The wireless tag may collect and store ambient energy.Collecting ambient energy may include wirelessly gathering, harvesting,and/or acquiring energy from an external source or environment of thetag. Storing ambient energy may include accumulating, saving, oraggregating the collected ambient energy for use at a future time.

FIG. 11 illustrates a non-limiting embodiment of a wirelessidentification tag operating in an environment such as a clothing retailestablishment. For example, environmental exciters such as exciters11400, user devices such as handheld device 11200, and EAS gate 1112 mayall emit wireless signals carrying energy in electric and magneticfields, which may contribute to the ambient energy in the environment.Tag 1100 may be configured to collect and store the ambient energy fromsome or all of these wireless signals present in the establishment.

In some embodiments, the energy storage component may include at leastone capacitor. By way of example, as shown in FIG. 10, energy storagecircuit 2108 may contain a storage capacitor 10300 (example of an energystorage component). The storage capacitor 10300 may be electricallyconnected through the circuitry illustrated in FIG. 10 to 900 MHzharvester 9012 and 2.4 GHz harvester 9014 (examples of the at least onereceiver) in order to store ambient energy received by those harvesters.While illustrated as a single capacitor, there may be multiple storagecapacitors for storing ambient energy.

In some embodiments, the wireless tag may include a timing circuitconfigured to generate at least one of the first trigger or the secondtrigger according to a predetermined timing sequence. Depending on apredetermined sequence, the ID transmitted by the tag may change. Thepredetermined sequence may be coded into the tag to generate differingIDs based on any programmed protocol. The protocols could be infinite.For example, the ID may change after a predetermined elapsed period,after a predetermined sequence of events, after certain signals areprocessed internally, after certain information is received, based onexternal signal characteristics, or after an ID has been used apredetermined number of times, to name just a few examples. The timingcircuit may be coupled to the at least one circuit to provide the firsttrigger or the second trigger.

A timing sequence may be a sequence or a signal used for the purpose oftime keeping. For example, a sequence of near identical events in whicheach event repeats at a fixed interval may be a timing sequence. Incontext of electrical or electronics circuits, a timing sequence mayinvolve any electrical signals with cyclical oscillation, for which theperiod of oscillation is fixed. In digital electronics, a clock signalmay be used in providing a timing sequence. Alternatively oradditionally, a timing sequence may be a sequence of events generatedfrom a clock signal by counting a number of clock cycles for each eventin the sequence. The number of clock cycles counted for each event inthe sequence may be fixed for the entire sequence, or variable betweenevents following some pre-determined rule, or it may be a random numberor pseudo-random number. At least one of the first trigger or the secondtrigger may be generated at fixed times, or at intervals of fixed time,which may be based on the timing sequence. For example, the wireless tagmay be programmed to transmit its tag ID at fixed times during the day(such as at a time of store opening or closing). In another example, thewireless tag may be programmed to change its tag ID at a fixed timeinterval (e.g., every 5 minutes) while it is located in the retailestablishment.

By way of example, as illustrated in FIG. 10, crystal oscillator 10022(an example of timing circuit) may provide a reference clock (an exampleof the first trigger or the second trigger) to top level controller 9020(e.g., the at least one circuit). Additionally or alternatively, realtime dock 10024 (another example of the timing circuit) may provide aslow clock (another example of the first trigger or the second trigger)to top level controller 9020. Top level controller 9020 may generate thefirst and the second decipherable ID based on one of the reference clockor the slow clock. In some embodiments, only the slow clock may be oneof the first or the second trigger.

In some embodiments, the timing circuit may be configured to generatethe first trigger according to a first timing sequence and to generatethe second trigger according to a second timing sequence that differsfrom the first timing sequence in at least one of a repetition period ora time interval between two consecutive generated triggers. In somecases, it may be desirable to randomize the timing of transmission bytire wireless tag. The circuit may include one more random numbergenerators to create sets of randomized timing sequences from a cyclicaltiming sequence such as a clock signal. After randomization, the firsttiming sequence will differ from the second time sequence in at leastone of a repetition period or a time interval between two consecutivegenerated triggers due to randomness.

By way of example, when the wireless tag is operating in the retailestablishment as illustrated in FIG. 11, tag 1100 may transmit its tagID based on its internal timing sequences, without receiving triggersfrom external sources. In the establishment setting, if too many tagstransmit at once, the infrastructure (receivers and computer systems forprocessing tag ID signals) may be overwhelmed. With sufficientrandomness in the timing of the transmissions, the load of theinfrastructure may be lessened even when multiple tags are present at asingle location. As illustrated in FIG. 10, real time clock 10024 maygenerate slow clock (example of first or second trigger) based on arandomized timing sequence. Alternatively or additionally, top levelcontroller 9020 may generate the randomized timing sequence using thefixed timing sequence of the slow clock coming from real time clock10024 and internally generated random or pseudo-random numbers.

Embodiments of the present disclosure may relate to methods, systems,devices, and computer readable media for protecting against distributionof counterfeit products. For ease of discussion, in some instancesrelated embodiments are described below in connection with a system ormethod with the understanding that the disclosed aspects of the systemand method apply equally to each other as well as devices, and computerreadable media. Some aspects of a related method may occurelectronically over a network that is either wired, wireless, or both.Other aspects of such a method may occur using non-electronic means. Inthe broadest sense, the systems, methods and computer readable mediadisclosed herein are not limited to particular physical and/orelectronic instrumentalities, but rather may be accomplished using manydiffering instrumentalities.

Some disclosed embodiments may include a system for protecting againstdistribution of counterfeit products. Distribution of counterfeitproducts may be prevalent at multiple levels throughout a supply chainincluding at the levels of producers, wholesalers-distributors, retailsellers, internet resellers, returned goods, consignment stores, rentingor leasing operations, and second-hand sellers. Counterfeiters andfraudsters generally pass off stolen goods, counterfeits, knock-offsthrough myriad channels with minimal deterrence and this problem is morepronounced in environments such as the Internet, consignment stores,used luxury items stores, consumer-to-consumer online shopping sites, aswell as through other establishments and channels.

Disclosed embodiments may involve a system for protection againstdistribution of counterfeit products. Such systems may include wirelessidentification systems and may be installed in, or may be a part of anestablishment such as a consignment store, for example. An exemplarysystem to deter and minimize distribution of counterfeit products mayinvolve the use of one or more processors, data structures, devices,signal receivers, wireless identification tags, and a network throughwhich one or more components of the system may be connected. In someembodiments, portions of the wireless identification system includingportions of the network may be located outside the establishment. Thewireless identification system may further involve other elements,circuitry, circuit components, and systems that may be beneficial toperform one or more functions related to protecting against distributionof counterfeit products.

By way of an example to provide a high level overview, manufacturers mayembed in or otherwise affix to their products tags that electronicallyretain a unique code or tag ID. A record may be stored on a cloudserver, linking the unique code of each product with its original sourceof origin. An electronic scan of the tag might reveal that the productis an original and not a counterfeit. For example, a scan of the tagmight cause a lookup to occur in the record, and return via anelectronic display on a handheld device confirmation of the product'ssource of origin, and perhaps its chain of title. For example, when themanufacturer sells the product to a distributor, the record may beupdated to note the ownership transfer. Thus, a downstream retailer whobuys the product from the distributor may be able to check the chain oftitle to confirm not only the authenticity of the goods, but also thatthe goods were lawfully obtained by the distributor (e.g., if the recordof the product does not include the distributor in the chain of title,there may be a likelihood of fraud). Similarly, when a retailer takespossession of a product, the ownership record may also be updated,enabling a downstream customer to confirm both the authenticity of theproduct and the legality of the transaction.

Such a system might work well for large volume as well as small volumeproducts. For example, a customer who purchases a tagged luxury watchmight be able to confirm the entire chain of title with a single scan,to ensure that the watch is authentic and not stolen. Upon theft of atagged item, the owner of record might be provided with a mechanism tomark the product's record with a theft indication. Then, anyone in thefuture who scans the product may receive an indication that the productwas reported stolen. To this end, owners might retain electronic vaultscontaining the IDs of ail of their tagged products, so that in the eventa product goes missing, a secure mechanism exists to report the productas missing or stolen.

From a manufacturers or retailer's perspective, tagged goods have theability to greatly reduce shrinkage, as stolen goods may no longerremain anonymous. For at any time, the goods can be scanned to confirmtheir source of origin and their ownership history.

In some embodiments, the system may include at least one processor. Theprocessor, among other functions, may be configured to receive, store,and process information related to wireless identification tags, receiveand execute queries and searches, communicate with databases and/ornetworks, relay information to users, provide notifications, and/orprovide alerts, etc. By way of example, as illustrated in FIG. 20, awireless identification system 20000 in an establishment may includenetwork 20002, which may enable the exchange of data and/or informationbetween elements of the system such as processors) 20004, datastructure(s) 20006, device(s) 20008, receiver(s) 11300 a-g. The systemmay further include wireless identification tags 1110, each tag beingassociated with a separate item in a store such that the identificationtag includes information associated with the item. In some disclosedembodiments, the processor may be configured to store tag IDs of aplurality of electronic tags, wherein at least one specific electronictag is associated with a specific product. The wireless identificationtags may be electronic tags configured for wireless communication withone or more elements of the wireless identification system and anexternal device such as a handheld device used by a customer.

Consistent with disclosed embodiments, each of the plurality ofelectronic tags may have an assigned unique tag ID. Because the tag IDof each electronic tag may be a unique tag ID, each tag may beindividually addressable, enabling better tracking and monitoringcapabilities to minimize distribution of counterfeit products. Theindividual addressability of the electronic tags may be beneficial, inscenarios where items are expensive, valuable, antique, or confidential,for example, and are thus more prone to counterfeiting. For example,luxury watches may have a tag with a unique tag ID incorporated in theircases; designer handbags may have a tag with a unique tag ID sown intotheir lining or otherwise affixed; sports shoes or any clothing item mayhave a tag with a unique tag ID incorporated into their linings; andpharmaceuticals, nutraceuticals, cosmetics, and food products mayincorporate a tag with a unique tag ID into (heir packaging. These arejust a few non-limiting examples. Any product for which there is acounterfeiting concern may incorporate a tag with a unique tag ID.

In some embodiments, the tag IDs may be assigned by the originalmanufacturer of the item at the location of origin of the item, orassigned by the store where the item is being sold, for example. Aunique tag identifier may be a number, string, or other form of datawhich is singularly associated with a tag, such that no identificationtag is associated with the same unique identifier as any other tag, andany tag of the plurality of tags can only have a single uniqueidentifier associated with it. Some non-limiting examples of uniqueidentifiers are serial numbers, unique EPC codes, database entries, orany other unique identifier associated with an electronic tag. Theprocessor may store the unique tag IDs of each identification tag andthe information associated with the tag ID in a database, or in a datastructure in communication with the processor, either directly orindirectly through a network. The stored tag IDs and the associatedinformation may be accessible through a user query, initiated by aprocessor or a system user, for example.

For additional security and tracking purposes, each tag ID of theplurality of electronic tags may be encrypted using an encryptionprocess, thereby resulting in an encrypted tag ID associated with thespecific product. The encryption mechanism may be configured to encode amessage or information in such a way that it enables authorized partiesto access the encoded message or information while denying access tothose who are not authorized. For example, even if the encoded messageor information were obtained by some unauthorized party, encryption mayblock that unauthorized party from reading the encoded message orinformation without knowledge of the decryption process. In someembodiments, encryption processes or algorithms may include the use ofan encryption key, which may be a piece of data that is shared between asender of the message or information and the intended recipient, usuallyat a time prior to transmission. So long as the encryption key remainssecret and unique, multiple parties may use a common encryption processwhile still maintaining the secrecy of the encrypted message orinformation.

Consistent with some disclosed embodiments, the processor may be furtherconfigured to store at least one identity of a first entity. Forexample, the processor, upon receiving a request from an entity forinformation regarding ownership of a product, may generate instructionsto request identifying information of the entity. The processor may beconfigured to receive the identifying information from the entity, fromthe product, or from another source that can supply reliable identifyinginformation of the entity, and store the received information in adatabase or a data structure. The identifying information may include,but is not limited to, login ID, username, password, passcode, name,gender, age, address, tax ID, organization name, contact information,answers to security questions, biometric data, and other personal orprofessional identification details depending on the entity type orsystem specifications. The entity may be associated with at least one ofa seller of the specific product, a manufacturer of the specificproduct, a current owner of the specific product, or a prior owner ofthe specific product. As disclosed herein, an entity may be a person ora party with rights to sell a product. As an example, an entity mayinclude a current owner of the product, a seller contracted by thecurrent owner of the product, a manufacturer of the specific product, aprevious owner of the product, or any other party that has obtainedrights and/or representation on behalf of the seller. Whether the entityis an owner, a seller, and/or an authorized party, collecting andstoring the identifying information of the entity may not be limited toan attempt to sell the product. For example, the entity may beinterested in donating, leasing, lending, renting, shipping,transferring, displaying, or providing the product through any othermechanism.

In some aspects of the disclosure, the processor may be configured toreceive, on behalf of a prospective subsequent custodian of the specificproduct, an encrypted tag ID associated with the specific product. Inthe context of this disclosure, a prospective subsequent custodianrefers to an entity that wishes to purchase, rent, borrow, lease, use,or otherwise obtain and/or use the product. In some disclosedembodiments, the prospective subsequent custodian may be associated witha prospective purchaser of the specific product. In an exemplaryembodiment, the processor may receive the encrypted tag ID associatedwith the specific product the prospective purchaser is interested in.The processor may initiate and execute a search query designed to fetchthe encrypted tag ID from the database stored in one or more datastructures. In some embodiments, in addition to receiving the encryptedtag ID of the specific product, the processor may be further configuredto receive, on behalf of the prospective subsequent custodian, a queryassociated with the at least one identity. A query may be any form ofrequest for information. In one sense, an application running on ahandheld device may include a GUI entitled “authenticity lookup.” A scanof a product using that GUI may be considered a query. In otherinstances, a query may require a user to enter more information. Forexample, a GUI might prompt the user to enter identifying information ofa person holding themselves out as a legitimate owner. In anotherexample, a query may have the legitimate owner enter informationauthorizing revelation to a prospective purchaser to reveal privateinformation about the legitimate owner so that the subsequent purchasercan confirm the legality of a prospective transaction. These are hut afew examples of a query. Any time a user interrogates a data structurefor information about a tagged product, such an interrogation may beconsidered a query.

The at least one identity may include identifying information associatedwith the first entity, for example, a name of the seller of the product,or a tax ID of the entity authorized to represent the seller. In thiscontext, a query may involve searching for a single stored piece ofinformation, searching in the data structure for specific informationassociated with a known piece of information, searching for multiplepieces of information having at least one common characteristic, etc. Adata structure designed to allow queries and retrieval of informationmay define a standard interface, including both a medium, tunnel orprotocol through which to receive queries and return responses, as wellas a language, format, application or other definition for the structureand content of the queries as well as the structure and content of theresponses. Such an interface (usually called an API) enables the userwith access to the interface, and knowledge of the format of queries andresponses, to retrieve information from the data structure.

In some disclosed embodiments, the processor may be further configuredto decrypt the encrypted tag ID to identify the specific productassociated with the specific electronic tag. As disclosed herein,decryption is the process of transforming data that has been renderedunreadable through encryption back to its unencrypted form. Indecryption, the system extracts and converts the garbled data andtransforms it to text, codes, and/or images that are easilyunderstandable by one or more of the reader and the system. Decryptionmay be accomplished using a predefined set of keys or passwords. Basedon the encryption algorithm, whether it is a symmetric or an asymmetricencryption algorithm, the processor may use an encryption key (as eithera “symmetric key” or a “private key”) to decrypt the encrypted tag ID.The information associated with the encrypted tag ID may includeinformation related to the specific product or the electronic tag thatstores the information related to the specific product. For example, thespecific product information may include, but is not limited to, date ofmanufacture, ownership history, identities of component parts, pricinginformation, dates and locations of each ownership transaction, productinformation such as model, brand, serial number, etc., popularity,number of purchase inquiries, type of ownership being granted (e.g.,sale, or rental, or lease), and other relevant information about theproduct that may be useful for the prospective subsequent purchaser. Theprocessor may grant limited access or unrestricted access to specificproduct information based on the level of authorization. In someembodiments, complete and unrestricted access to all the informationstored in the specific electronic tag may require additionalverification and authentication.

Upon decryption and obtaining access, the processor may use informationassociated with the specific electronic tag to access an ownershiphistory for the specific product. As used herein, ownership refers tothe possession of rights in the product. It may connote title, as wellas permission to possess the product. Therefore, a title holder may beconsidered an owner, as too may be a person provided with use permissionfrom the title holder. The ownership history may include, for example, alist of previous owners of the specific product, identificationinformation associated with each of the previous owners of the specificproduct, duration for which each of the previous owners owned thespecific product, a reason for resale of the specific product asprovided by each of the previous owners, ownership transfer agreements,etc. The listing of past owners in the ownership history may be arrangedchronologically, alphabetically, or in any format that is compatible andaccessible using a lookup based query for the processor to execute.

In some disclosed embodiments, based on the accessible ownershiphistory, the processor may be configured to check if the at least oneidentity identified in the query corresponds to tin entity in theownership history. The checking may involve a lookup of an entity in theownership history within the results from the query. The processor mayfurther verify that the identity identified by the query matches theentity in the ownership history. Based on at least the check andverification of the identity, the processor may determine whether thespecific product is a counterfeit or an authentic product. For example,when a tagged Gucci handbag is scanned, the associated tag ID may bereceived at a processor that causes a lookup to occur in a datastructure. At or around the time of manufacture of the handbag, Guccimay have scanned the same tag, or otherwise entered the tag's ID into adata structure. This may have occurred remotely using a scanner inGucci's factory, to upload via the Internet the tag ID, informationidentifying the handbag, including, for example, the model number, themodel name, a serial number, a product photo, and/or any otheridentifying information. Later, when the same bag is scanned for acustomer in a store, a lookup may occur through the Internet to the datastructure, to retrieve some or all of the identifying information and toconfirm for the customer that the handbag is authentic. At or around thesame time, the current owner of the handbag (i.e., the store) may useits unique credentials to update the record to identify the customer asthe subsequent owner. If the customer ever chooses to sell the handbag,a subsequent purchaser may be able to not only confirm the authenticityof the handbag through a scan of the tag, but may be able to confirmthat the seller is in fact a legitimate owner of the handbag.

As part of processes like these, the processor may cause a transmissionof an authenticity indication to a prospective subsequent custodian ifthe identity identified in the query corresponds to an entity in theownership history. An authenticity indication, as used herein, may referto an indicator of a source of origin, an indicator of genuineness ororiginality of the product, and/or a validation that the product beingsold by tire seller or displayed at the store for selling is genuine, asopposed to a counterfeit or a stolen product. As used herein, acounterfeit product may be a product, item or object made to resemble orimitate some other authentic or original product, item or object, inorder to deceive or defraud persons other than the maker of thecounterfeit, and cause them to confuse the counterfeit and the original.Further, the processor may cause transmission of the authenticityindication to the prospective purchaser if the identity identified bythe query is the current owner of the specific product in the ownershiphistory. A current owner in this context, refers to the last personstored in the ownership record in the data structure as having a rightto possess the specific product. It may be the last person to havepurchased the product, or it may be someone who is authorized by thelast person who purchased the product. The processor may contain atleast one component or a circuit configured for causing transmission ofa notification to the prospective purchaser through an indication on adevice (e.g., smartphone, handheld device, computer, a kiosk, or a GUIterminal) that the specific product is authentic. In some embodiments,the processor may cause transmission of a non-authenticity indication tothe prospective subsequent custodian if the at least one identityidentified in the query does not correspond to an entity in theownership history. In some embodiments, if the identity identified inthe query does not correspond to any entity in the ownership history,the product may be determined as a counterfeit, or stolen, ornon-authentic. For example, if authentic goods sold to one store werestolen from the delivery truck and illegally passed off to a secondstore, a customer in the second store who scans the tag and poses aquery, may receive a notification that either the goods are notauthorized to be sold by the second store, or simply a notification thatthe goods belong to another store. If the store that truly owns thegoods happened to enter into the data structure an indication that thegoods were stolen, the customer in the second store may receive anotification that the product may potentially be stolen goods. Moreover,law enforcement authorities may be able to quickly identify stolen goodswith handheld scanners. Before consignment shops accept any taggedgoods, they might scan the goods to confirm that they are not receivingstolen merchandise.

Consistent with some disclosed embodiments, the processor may beconfigured to prevent the prospective subsequent custodian fromaccessing data about the specific product, the data including at leastone of a product location, a transaction history, an owner name, amanufacturer name, the decrypted tag ID of the specific electronic tag,or an encryption key associated with the specific electronic tag. Forexample, the processor may regulate access to information stored in thedatabase by restricting access to authorized personnel and may require apassword, a passcode, or a digital key to access the database containinginformation related to the specific product. In some disclosedembodiments, the prospective purchaser may not be granted access to theinformation related to the specific product. The information related tothe specific product may include, but is not limited to, data includingproduct location, a transaction history, ownership history, decryptedtag ID, encryption key associated with the specific electronic tag,manufacturer details, owner credentials such as name, address, tax ID,and/or contact information.

In some disclosed embodiments, the processor may be configured tomaintain privacy of the first entity (e.g., seller, or a seller agent).Maintaining the privacy may involve preserving the secrecy of all orsome information from unauthorized entities. For example, the processormay determine whether a query from the prospective subsequent custodian(e.g., prospective purchaser) is seeking private information about theseller or whether the prospective purchaser has any privileges to accessthe database containing information related with the specific product,specific electronic tag, or the seller of the specific product. Asubsequent purchaser, for example, might receive an indication that thechain of title for tagged product is unbroken, without identifying thevarious ownership links in the chain. Or, the subsequent purchaser mightbe able to learn that a product was purchased at a particular chain(e.g., Macy's), without being able to see the identities of subsequentowners. As another example, the subsequent purchaser may only receiveinformation verifying the original maker and/or seller of the product(e.g. Gucci, in the handbag example above), and an indication that theperson holding the product has the rights to sell it (regardless ofwhether that person is a current owner, someone authorized by thecurrent owner, an agent of the current owner, a distributor, or anotherentity with rights to sell a product).

Some disclosed embodiments relate to a system wherein the processor isconfigured to store an ownership history for each of the plurality ofproducts in at least one data structure. In some disclosed embodiments,a data structure may include a database configured to store dataincluding, but not limited to, information related with an electronictag, an encrypted tag ID, corresponding product information, productlocation, ownership history, a transaction history, an owner name, amanufacturer name, the decrypted tag ID of the specific electronic tag,an encryption key associated with the specific electronic tag, aninventory of the plurality of electronic tags, the tag IDs of theplurality of electronic tags, or a product ID associated with each tagID. The information stored in the database may be accessible to one ormore processors directly or indirectly connected with the database. Insome embodiments, the system may include one or more databases. Forexample, a local database may store local information related with aparticular facility or the store, a regional database, or a globaldatabase.

In some aspects of the present disclosure, the processor may beconfigured to record a transaction transferring ownership of the tag IDassociated with the specific product from the first entity to theprospective subsequent custodian. When the authenticity of the specificproduct is verified, and the prospective purchaser decides to proceedwith the transaction, the processor may record tire transaction of atransfer of ownership rights from the first entity (e.g., seller) to theprospective purchaser (who becomes the new current owner). Uponsuccessfully recording the transaction, the processor may update theownership history of the product in the at least one data structure. Forexample, after the transaction, the prospective purchaser may be listedas the current or the most recent owner in the database and theprocessor may further request relevant personal information and updatethe database upon receiving it.

In some embodiments, updating the ownership history of the productincludes storing an association between at least one identity of theprospective subsequent custodian and the tag ID associated with theproduct. In addition to updating the information associated with currentownership details, updating the ownership history may also involvestoring the information related to an association between the identityof the prospective purchaser and the tag ID containing informationassociated with the specific product. For example, if Dili Pan purchasestagged Prada shoes, she may use a vault accessible through her ceilphone to electronically take ownership of the shoes through anelectronic transaction with a terminal in the store from which shepurchased the shoes. In this instance, Lili's cell phone may then act asconduit for updating the ownership record stored in a remote datastructure, Alternatively, the terminal in the store may receive a securecommunication from Lili's cell phone, providing Lilt's unique ID whichmay be then uploaded to the ownership record via the store's point ofsale system. In another example. Lili might enter her password or othercredentials into a terminal in the store to cause the store's point ofsale system to update a central data structure with Lili's ownershipinformation.

Consistent with some disclosed embodiments, the processor may be furtherconfigured to store, in the at least one data structure, at least twoencryption keys associated with the tag ID of the specific product. Aspreviously alluded to, the process of encryption involves encoding amessage or information in such a way that only authorized entities mayaccess it and unauthorized entities may be restricted from access. Insome embodiments, the processor may store two or more encryption keysassociated with the tag ID of the specific product. The encryption keymay allow the possessor of the encryption key to decrypt the encryptedtag ID and/or decrypt the encrypted information associated with theencrypted tag ID. In some embodiments, the at least two encryption keysinclude a first encryption key associated with the at least one identityand a second encryption key associated with the prospective subsequentcustodian. Because a transaction such as selling, renting, leasing,borrowing, etc. necessarily involves at least two entities, eachencrypted tag ID may be associated with at least two encryption keys.

In some embodiments, the number of encryption keys associated with anencrypted tag ID of a specific product may be equal to the number ofentities directly involved in the transaction. For example, for aproduct held in a consignment store, there may be three encryption keysassociated with an encrypted tag ID of the product, including the storemanager or the store owner, the seller, and the prospective purchaser.In some embodiments, all commercial entities involved in a transactionmay share one encryption key, and all private entities involved in thetransaction may share one encryption key, such that the manufacturer,distributor, and consignment store owner may all have the tag IDdecrypted using a first encryption key, while any subsequent privateowner of the item (such as a purchaser, a person receiving the item as agift, or a future second-hand purchaser of the item) may have the tag IDdecrypted using a second encryption key that is different from the firstencryption key.

After the processor receives the query, the processor may be furtherconfigured to determine whether the prospective subsequent custodian isauthorized to make the query. A prospective subsequent custodian may beauthorized to make the query if, for example, the custodian initiates aquery via an authorized terminal. For example, a consignment store mayhave a terminal from which queries may be made. Anyone using thatterminal for goods recorded as being “owned” by the store, may beauthorized to make a query. Alternatively, a prospective subsequentcustodian may use his/her own cell phone to make the query, if thecurrent owner provides credentials permitting the query. In an evenbroader sense, an authorization may be electronically provided to anydevice to which a prospective subsequent custodian may have access,rendering the prospective subsequent custodian authorized. In the caseof verification of ownership authenticity, the current owner of theproduct may not want prospective purchasers to query the ownership ofthe product, unless allowed by the owner themselves.

In some embodiments, the processor may be configured to receive anassociation between the first entity and at least one entity authorizedto make the query. For example, a current owner may providepreauthorization to a particular individual to obtain ownershipinformation. This may occur when the current owner sends anauthorization to a central server. The providing of preauthorization insuch an instance may establish an association between the first entity(e.g., a current owner) and an entity (e.g., prospective purchaser), whois authorized to make the query. Alternatively, an authorization recordin a database may contain a list of “pre-authorized” entities who may beauthorized to make a query related to ownership information of theproduct. For example, a store might preauthorize a number of terminalsand scanners to access ownership data. Or an auction house maypreauthorize a list of registered bidders to check ownership informationof all products up for bid. Or a brand may preauthorize any devicerunning the brand's own application to access ownership information. Theprocessor may also receive an association between the current owner andthe preauthorized prospective purchaser. For example, in the priorexample, the bidders might be considered “pre-authorized prospectivepurchasers.” Or a store's preferred customers list might be included ona list of “pre-authorized” prospective purchasers. The processor may befurther configured to determine if the prospective subsequent custodianis the at least one authorized entity. In some disclosed embodiments,the processor may verify the association between the current owner andthe authorized prospective purchaser, based on the information receivedby the processor.

As another example, manufacturers of high-value products may want tolimit authenticity checks to be performed via preferred select shoppingoutlets. By way of example, a prospective purchaser may verifyauthenticity of a pair of Nike shoes through the Nike smartphone app, orverify authenticity of a Prada purse at a certified Prada store. In boththe cases, ownership authenticity and identity authenticity, anon-authorization indication may not be a sign of lack of authenticity,but rather a sign that the query is not allowed in the channel/outletthat it was requested.

In some disclosed embodiments, the processor may be configured torequest from the first entity an authorization for the prospectivesubsequent custodian to make the query. The processor may initiate arequest for the current owner/seller to authorize a response to theprospective purchaser's query about the authenticity or chain of titleof the product. This may occur by sending an authorization request to aregistered mobile device of the current owner, or through an automatedphone call to the current owner. In some embodiments, if the prospectivesubsequent custodian is authorized to make the query, the processor maybe configured to proceed with decrypting the encrypted tag ID to accessthe ownership history, and if the prospective subsequent custodian isnot authorized to make the query, cause transmission of anon-authorization indication for the prospective subsequent custodian.Based on the authorization to make the query by the prospectivepurchaser, the processor may either decrypt the encrypted tag ID,allowing the prospective purchaser to access the ownership history, orthe processor may be configured to cause transmission of an indicationnotifying that the prospective purchaser is not authorized to access theinformation stored in the encrypted tag ID. In some embodiments, theprocessor may allow more than one attempt to the prospective purchaserto provide the necessary authorization, before denying access.

In some aspects of the present disclosure, if the at least one identityidentified in the query does not correspond to an entity in theownership history, the at least one processor may be configured toreceive, from at least one entity in the ownership history, verificationthat the at least one identity identified in the query is a secondentity in the ownership history. Recognizing that chains of title maynot always be accurate, before a query results in a negative response(or a final negative response), a recorded current owner may be given anopportunity to correct the ownership record. For example, the processormay be configured to receive verification from a third entity (e.g., theoriginal seller, or the last verified owner of the product) that thefirst entity (e.g., the current owner) is an entity in the ownershiphistory, and validation that the first entity is the legal current ownerof the product. This situation may arise, for example, when the salefrom the original seller to the current seller was improperly registeredor improperly recorded without establishing transfer of ownershiprights. The verification that the first entity is a current owner of theproduct may be validated by a third entity (the original seller, or thelast confirmed seller, or any confirmed seller of the product) listed inthe ownership history. Upon receiving the verification from the thirdentity, the processor may be configured to update the ownership historyto include the at least one identity identified in the query. Forexample, the information associated with the ownership history may beupdated in the database and stored for future access.

In some embodiments, the at least one processor may be furtherconfigured to cause transmission of an authenticity indication for theprospective subsequent custodian based on the updated ownership history.Once the ownership history is updated based on the verification from athird entity in response to a query, the processor may determine thatthe identity identified in the query exists as a valid current owner,and may cause transmission of an authenticity indication to theprospective purchaser.

In some disclosed embodiments, the specific electronic tag may beassociated with a unique tag ID and may be configured to encrypt theunique tag ID for transmission to at least one of the at least oneprocessor or a processing device of the prospective subsequentcustodian. As alluded to previously, each electronic tag or anidentification tag may be associated with an encrypted uniqueidentifier, also referred to herein as a unique tag ID. The encryptedunique tag ID may be configured for transmission to at least theprocessor of the system, or a device of the prospective purchaser. Theprocessor of the system and/or the device of the prospective purchasermay be any device capable of receiving data and displaying the datathrough a graphical user interface or a screen of the device.

In some embodiments, the processor may be further configured to send anotification to at least one entity in the ownership history when aquery regarding the tag ID associated with the product is received. Asdisclosed herein, when a prospective purchaser makes a query requestinginformation associated with the tag ID representing the product, one ormore entities in the ownership history of the product may be notified ofthe received query. For example, a current owner may receive anotification on a mobile device that an inquiry is being made on theownership of a particular product.

In some embodiments, the processor may be configured to send anotification to at least one entity in the ownership history when anon-authentic indication is sent regarding the tag ID associated withthe product. As alluded to earlier, an indication that a product or atag ID associated with the product is non-authentic may be generated bythe processor if, for example, the identity identified in the query doesnot correspond to any entity in the ownership history of the product. Insome instances, the absence of an entity in the ownership history of aproduct may not necessarily mean that there is or was an attempt of afraudulent activity. In the event that a non-authentic indication issent to a prospective purchaser, the processor may also notify one ormore entities in the ownership history associated with the product thata non-authentic indication is sent to a prospective subsequentcustodian.

Embodiments of the present disclosure may relate to methods, systems,devices, and computer readable media associated with a wirelessidentification tag with varying ID transmission timing. For ease ofdiscussion, aspects of methods, systems devices and computer readablemedia are discussed interchangeably herein such that reference to oneform is equally applicable to another form and is therefore notnecessarily repeated. In addition, some aspects of some embodiments mayoccur electronically over a network that is either wired, wireless, orboth. Other aspects may occur using non-electronic means. In thebroadest sense, the disclosed embodiments are not limited to particularphysical and/or electronic instrumentalities, but rather may beaccomplished using many differing instrumentalities.

Disclosed embodiments may include a wireless identification tag, asdescribed above. According to some embodiments, the ID transmissiontiming of the a wireless tag may vary. As described herein, a wirelesstag may periodically transmit its ID for reception by a receiver,typically in response to a trigger signal. The tag ID, may includenumbers, letters, characters, codes, strings, or other forms of datawhich may identify the wireless tag to other devices or devicecomponents that receive the tag ID. The tag ID may be unique to aspecific tag, and that specific tag may have only one tag ID.Alternatively, the same tag may have multiple IDs or IDs that changeover time. In some embodiments, multiple tags may share the same tag IDor groups of IDs. Examples of a tag ID may include a serial number, partnumber, UUID, EPC, and/or other data. When a tag receives a triggersignal, it may respond by sending its ID within a certain time period.According to some embodiments of this disclosure, the transmission timeperiod or time period that elapses before the tag reacts with aresponsive signal may vary. There may be multiple alternative reasonsfor fee variance, as described herein.

Varied transmission timing may refer to situations when one transmissionhas at least one different timing attribute from another transmission. Atiming attribute may include specific times when transmissions occur,time intervals between transmissions, or time durations oftransmissions. In some instances, if multiple signals are transmitted inthe vicinity of each other and potential receivers, varying thetransmission timing of the signals may avoid certain undesirableeffects.

For example, FIG. 27 depicts a situation in which consumer 1104 leaves astore with a variety of products, such as shopping cart 27100 filledwith products including products 27200 a and 27200 b. Wirelessidentification tags, such as tag 1100 a and 1100 b may be affixed,embedded in or otherwise attached to the products. As consumer 1104leaves the retail establishment, EAS gates 1110, 1112 may transit signal1118 triggering the wireless tags to transmit identification signals.This operation mode of the wireless identification tags may be referredto as a “gate mode.” In the example depicted in FIG. 27, if all of thewireless tags transmit their identification signals simultaneously, thesignals have risks of collision, or potentially overwhelming receiver11300. Signal collision may refer to situations in which the presence oftwo or more signals negatively affects the propagation, reception, orprocessing of one or more of the signals. In some instances, a receivingdevice may be unable to receive the particular signal intendedreception, or unable to distinguish the intended signal from among manyother signals received. By transmitting the signals with non-uniformintervals between consecutive transmissions, the risk of collision oroverwhelming the receiver may be diminished.

For ease of discussion, exemplary transmission timelines are illustratedin FIGS. 28A and 28B. For example, each bracket in FIGS. 28A and 28B mayrepresent a time interval. The vertical axis represent differentwireless identification tags (tag 1, tag 2, . . . , tag N−1, and tag N)in range of each other, and the horizontal axis represents time.Brackets that are filled, for example 28002, 28004, and 28008, representsignal transmissions (e.g., ID transmissions), while brackets that areempty, such as 28014, represent time intervals when no transmissionoccurs.

In the example illustrated in FIG. 28A, tag N may transmit a signalduring 28002, 28004, and 28006, and tag 2 may transmit a signal duringtime intervals 28008, 28010, and 28012, which may occur at the sametimes as time intervals 28002, 28004, and 28006, respectively. In thisexample, there may be a high risk of signal collision, as multiple tagstransmit signals simultaneously. This simultaneous transmission ofsignals may be the result of uniform durations between transmissions,where the times between 28002, 28004, and 28006 are substantiallysimilar to each other, and to the times between intervals 28008, 28010,28012. With this uniformity in time intervals between consecutivetransmissions, many tags may transmit signals at the same time if theyare simultaneously triggered.

On the other hand, FIG. 28B depicts a situation with reduced risk ofsignal collision, as the tags illustrated do not all transmit signalssimultaneously. The time between interval 28102 raid 28104 is differentfrom the time between 28104 and 28106. Similarly, the time between 28108and 28110 is different from the time between 28110 and 28112, and fromother times between consecutive transmissions. These may be examples ofvarying ID transmission times. As illustrated in FIG. 28B, even if tagsrue triggered at the same time, the non-uniformity between transmissionsspread out responsive signal transmission so that signals do not collideand the receiver is not overwhelmed.

In various embodiments, the wireless tag may include at least onetransmitter, such as transmitter 2104. The wireless tag may also includeat least one energy storage component, electrically connected to the atleast one transmitter. The at least one energy storage component may beconfigured to collect and store ambient energy and to power transmissionof the at least one transmitter, as discussed above.

FIG. 11 illustrates a non-limiting embodiment of a wirelessidentification tag operating in an environment such as a clothing retailestablishment. For example, environmental exciters such as exciters11400, user devices such as handheld device 11200, and EAS gate 1112 mayall emit wireless signals carrying energy in electric and magneticfields, which may contribute to the ambient energy in the environment.Tag 1100 may be configured to collect and store the ambient energy fromsome or all of these wireless signals present in the establishment. Insome embodiments, the at least one energy storage component includes atleast one capacitor configured to power the wireless identification tagwithout a battery. By way of example, as shown in FIG. 10, energystorage circuit 2108 may contain a storage capacitor 10300 (example ofan energy storage component). The storage capacitor 10300 may beelectrically connected through the circuitry illustrated in FIG. 10 to900 MHz harvester 9012 and 2.4 GHz harvester 9014 in order to storeambient energy received by those harvesters. While illustrated as asingle capacitor, there may be multiple storage capacitors for storingambient energy.

In various embodiments, the wireless tag may include at least onecircuit. By way of example, as illustrated in FIG. 10, beacon controller9030, either alone or in combination with other components (such as toplevel controller 9020), may be an example of the at least one circuit.Alternatively, depending on particular design functionality, othercomponents either alone or in combination my constitute at least onecircuit. In various embodiments, the at least one circuit may beconfigured to cause the at least one transmitter to transmit a sequenceof identification signals in non-uniform intervals such that timesbetween identification signal transmission of three consecutivetransmissions vary.

Non-uniformity may refer to a characteristic describing a lack ofsimilarity or consistency in of a series or sequence of events oroccurrences. Intervals may refer to a time or a delay between two ormore events in a sequence. Non-uniform intervals may be intervalsbetween consecutive events such that any two or more consecutiveintervals may be different by a significant portion of each interval.The difference between consecutive intervals may be significant if thedifference value is above a threshold proportion of any of intervals inthe sequence, or above a threshold of an average value of the intervalsin the sequence. By way of example, the interval may be a time betweentwo or more transmissions of identification signals.

Some levels of non-uniformity of intervals may be inherent in the natureof signal transmission, caused by factors such as noise, interference,or some inherent deviations of components or systems. In someembodiments, non-uniformity may be introduced deliberately for variousdesign goals.

The non-uniformity of intervals between transmissions may result fromcharacteristics of circuit design. For example, tags cannot transmit asignal unless they have a minimum level of energy stored in the energystorage component (e.g., storage capacitor 10300). The minimum level ofenergy may be predetermined and may be based on the amount of energyrequired by the transmitter to transmit a signal of a certain strength.For this reason, tags may be forced by design to wait for a timeduration until the next signal transmission, the duration beingdependent on a minimum stored energy level and a rate of ambient energycollection. The rate of ambient energy collection may depend both on theambient energy level of the environment and the performance of theenergy harvester, of which there may be manufacturing deviations.Additionally, the minimum energy level may also depend on the accuracyof energy level measurements, which also may be subject to manufacturingdeviations. Thus, even when multiple tags are present in vicinity of oneanother, they may start counting time to the next transmission atdifferent points in time based on when the respective tag may havedetected a minimum energy level for transmission.

Non-uniformity of intervals may be satisfied when a threshold number ofintervals between some numbers of consecutive transmissions are made tobe non-uniform. For example, it may be sufficient to ensure that thetime between identification signal transmission of three consecutivetransmissions vary. By way of example, in the timeline of tag IDtransmissions illustrated in FIG. 28B, three consecutive tag IDtransmissions 28102, 28104, and 28106 are illustrated for tag N, suchthat the times between the three ID signal transmissions vary. Asillustrated, two units of delay are interposed between transmissions28102 and 28104, while three units of delay are interposed betweentransmissions 28104, and 28106. Thus, in this example, times betweenidentification signal transmissions of three consecutive transmissionsvary. The non-uniformity continues for tag N, where there isnon-uniformity between four lag ID transmissions, as the delay fromtransmission 28106 to 28107 is only one unit. These are only examples.Patterns of delay may repeat or delays may be random. Alternatively, theextent of non-uniformity if at all, may be a matter of design choice.

By way of example, as illustrated in FIGS. 9 and 10, beacon controller9030 may be an example of the at least one circuit. In some embodiments,beacon controller 9030 may be structured and designed to cause thetransmitter to transmit signals having non-uniform intervals.Additionally, or alternatively, beacon controller 9030 may be programmedby computer readable instructions (e.g., instructions stored in memory9022 or in another memory unit of the tag). Transmission data providedfrom beacon controller 9030 to beacon transmitter 9032 may contain asequence of identification signals, including instructions regarding thetiming of the transmission of the sequence of identification signals. Insome embodiments, such as the example illustrated in FIG. 10, the toplevel controller 9020 may be configured to transmit a transmissioncontrol signal to beacon controller 9030, specifying the timingparameters for the transmission of the sequence of identificationsignals.

In some embodiments, the at least one circuit may be further configuredto select the respective durations of the non-uniform intervals based ona predetermined rule. The predetermined rule may be an algorithm,process, method, logic, or instructions for generating or controllingthe timing of the identification signals, determined in advance of thetransmission of signals. The rule may be based on an internal state,such as an amount of measured reserve energy, internal operationsunderway, a state of an internal clock, a random number generator,historical data such as a duration since a prior transmission, etc. Thepredetermined rule may be manifest in the form of a computer readablecode for programming the at least one circuit. Additionally oralternatively, the predetermined rule may be inherent in the design andarrangement of components in a circuit of the at least one circuit.

In some embodiments, the at least one circuit may be further configuredto randomly select the respective durations of the non-uniformintervals. Randomness may refer to numbers, sequences or processes thatexhibit characteristics of random, pseudo-random, or quasi-randomdistribution. A random process may be a process with an apparent lack ofpattern or predictability, tacks order, or that does not follow anintelligible pattern or combination. A pseudo-random or quasi-randomprocess may be a process with predictable outcomes that are difficult toacquire without knowledge of the underlying process, which may exhibitsome statistical distribution of randomness, but are not truly random.By selecting durations of the non-uniform intervals randomly, thechances that different tags will simultaneously transmit signals may befurther reduced. The at least one circuit, or circuits connected to it,may include one or more random number generators to create sets ofrandom or pseudo-random numbers or sequences, to cause the at least onecircuit to behave in a random or pseudo-random manner. Afterrandomization, a duration of first interval may differ from a durationof a second or third interval due to randomness.

In some embodiments, the at least one circuit may be further configuredto cause the at least one transmitter to transmit the sequence ofidentification signals in varying frequency channels such thattransmission frequencies of the three consecutive transmissions vary. Atransmission channel may be a medium through which signals tiretransmitted. Transmission channels may be thought of as completelywireless, but may also include wired portions. A transmission channelmay include a selected frequency, or a band of frequencies in whichtransmissions may occur. The wireless identification tag may transmitthe sequence of identification signals in within a single frequency bandcorresponding to a single channel, or across multiple frequency bands,corresponding to multiple frequency channels. In some instances, thewireless identification tag may be designed to transmit in only a singlechannel. In other instances the tag may transmit in at least threechannels (or more), each having a different frequency from the otherchannels, such that the no consecutive transmissions are transmittedwithin the same channel, or that in a series of transmissions at leastone transmission varies in frequency from at least one othertransmission. By varying the transmission channel, multiple signaltransmissions may be distinguished by one or more receiving devicesbased on the difference in the frequency of the channel. This may helpto reduce the chances of signal collision in the situation wheremultiple tags simultaneously transmit their identification signals. Andit may also help to reduce a risk of overwhelming a receiver.

FIG. 30 illustrates a timeline of multi-channel transmissions bywireless identification tags within range of each other. Each tag (tag1, tag 2, . . . , tag N−1, tag N) may contain 3 rows of brackets, eachrow representing a channel. For example, in tag 2, 30002 and 30004 arewithin the same channel, with 30002 occurring at an earlier point intime than 30004. Each of the tags may include circuitry illustrated inFIG. 29, which may correspond to a simplified representation ofcircuitry illustrated in FIG. 10. For example, tag N−1 may include tagID memory 10010, beacon controller 9030, top level controller 9020, andpower manager 9010 (the combination of which may be an example of at onecircuit). Tag N−1 may also include beacon transmitter 9032 and antenna2114 (individually or in combination, may be an example of at least onetransmitter). At a time of transmission, tag N−1 may transmit its tagIDs in channels 30010, 30008, and 30006, in staggered repetition, thestaggering of which differs from channel to channel. In someembodiments, the transmission duration of each successive repetition maybe the same or may vary, depending on system specifications. Thus, insome embodiments both the transmission duration of each repetition andthe time between successive repetitions may vary. Beacon controller 9030may control beacon transmitter 9032 to modulate signal transmissionsacross frequency channels. The beacon controller 9030 may control eachchannel independently or may select one or more of transmission durationor transmission spacing based on the duration or spacing of signaltransmissions in at least one other channel.

In some embodiments, the at least one circuit may be further configuredto randomly select one channel of the varying frequency channels fortransmission of each identification signal by the at least onetransmitter. By of way example, referring to FIG. 30, beacon controller9030 may select one of 30010, 30008, or 30006 in a random orpseudo-random manner.

In some embodiments, the at least one transmitter may be configured totransmit the identification signals in at least three transmissionchannels within a predetermined frequency band. The predeterminedfrequency band may be a frequency band around 2.4 GHz. For example,“Bluetooth Low-Energy”, or BLE, is defined to have a total of 40channels (labeled 0 to 39) with center frequencies of these channelsranging from 2.402 GHz to 2.480 GHz, spaced 2 MHz apart. Three of thesechannel are referred to as “special” advertisement channels, labeled byconvention as channel 37 with a frequency at 2.402 GHz, channel 38 at2.426 GHz, and channel 39 at 2.480 GHz. While all other BLE channels(labeled from 0 to 36) are reserved for transmission within paired BLEnetworks (pairing between two devices), these three advertisementchannels may be used by any BLE device at any time. In some embodiments,BLE may be a communications protocol used for transmission of theidentification signals, with the 2.4 GHz WW ISM band used as thepredetermined frequency band and channels 37-39 of BLE used as the atleast three transmission channels.

In some embodiments, at least one circuit may be configured to receive atrigger and cause at least one transmitter to transmit identificationsignals in response to the trigger. A trigger may be inputs, stimuli,and other signals for inducing a reaction. In context electrical andelectronic circuits, examples of a trigger may include, but are notlimited to, an external signal or an internal signal received. In someembodiments, an external signal received may cause a trigger to be sentto the at least one circuit. Whether internally or externally induced, atrigger may include, for example, a voltage level, a voltage levelchange, a current level, a current level change, a frequency, amplitudeor phase change of a received signal, a digital input, a digital pulse,a control word, and/or any other signals in various forms of energy.

In some embodiments the trigger may be a signal received by the wirelessidentification tag from an external device. By way of example, asillustrated in FIGS. 9 and 10, power manager 9010 may receive inputsfrom 2.4 GHz harvester 9014, 900 MHz harvester 9012, or both, andprovide one of 900 MHz detection and 2.4 GHz detection to top levelcontroller 9020, which may transmit a transmission control signal tobeacon controller 9030 based on the received inputs. Thus, beaconcontroller 9030 (e.g., at least one circuit), based upon control signalsfrom top level controller 9020 (which may also constitute at least onecircuit in some embodiments) may cause beacon transmitter 9032 (e.g., atleast one transmitter) to transmit one or more signals as the result ofdetection of an incoming 900 MHz signal or a 2.4 GHz signal (examples ofthe trigger).

In some embodiments, the wireless tag may include at least one antennaconfigured to receive the trigger transmitted as energy having afrequency within at least one of a first frequency band around 900 MHzor a second frequency band around 2.4 GHz, and wherein the at least oneenergy storage component is configured to store the energy received bythe at least one antenna.

FIG. 9 illustrates non-limiting embodiments of a wireless identificationtag including a receiver for receiving ambient energy. The receiver mayinclude multi-source harvester 2102 and switch 9034 (or a portion of theforegoing), which may also be coupled to top level controller 9020.Multi-source harvester 2102 may include 2.4 GHz harvester 9014, whichmay be coupled to 2.4 GHz antenna 2114 through switch 9034; 900 MHzharvester 9012, which may be coupled to 900 MHz antenna 2112; and powermanager 9010, which may be coupled to top level controller 9020. Itshould be noted that each of the forgoing components may be made up ofmultiple circuits, and therefore reference to a circuit may relate to asingle component or portion thereof.

In some embodiments, the at least one circuit may be further configuredto cause the at least one transmitter to operate in a first transmissionmode when the at least one antenna receives energy transmitted in thefirst frequency band; and operate in a second transmission mode when theat least one antenna receives energy transmitted in the second frequencyband transmitted in the second frequency-band, wherein the firsttransmission mode may differ from the second transmission mode in atleast one of a repetition period of a transmitted signal, a transmissionpower level, or data content of the transmission.

A repetition period may be a time between two actions. For repeatedoccurrence of a same event, whether such events are inputs or outputs,an average time interval, or periodicity of the events may be consideredthe repetition period. In some embodiments, if an energy at a frequencywithin the 900 MHz frequency band is received, the wireless tag mayoperate in a “infrastructure-excitable mode.” In theinfrastructure-excitable mode, the wireless tag may transmit signals toenable computer systems of the retail establishment to track thewireless tag's location within the establishment, and to updateinventory of the establishment. These types of operations may berepetitive. For example, the tag may transmit signals continuously, withsome intervals between the transmissions. In the retail establishmentsetting, with many tags repeatedly transmitting signals from a generallycommon location, the repetition period may require special considerationto avoid signal collision and/or overwhelming a receiver. For example,the repetition period may be designed so that for each tag, therepetition period is non-uniform. On the other hand, in a“user-excitable mode” where a user triggers a tag for an immediateresponse as may occur, for example, using a 2.4 GHz handheld device, ashorter response time may be warranted. A tag's response to a trigger inthe user-excitable mode may therefore have different characteristicsfrom the tag's response to a trigger in other modes.

Transmission power may be the power emitted by the at least onetransmitter, or an amount of power contained in a signal transmission.The power contained in the transmission may be characterized by energydensity, magnitude, or amplitude of the transmission. In general, arange of a wireless transmission is related to its power, hencetransmissions with higher power can reach a longer range. Signaltransmitters may be programmed to have a certain transmission power toensure a minimum transmission range. For example, when the wireless tagoperates in the infrastructure-excitable mode, signals transmitted bythe tag should be able to reach a tag receiver located at some distanceaway from the tag, thus a higher transmission power may be desirable.However, in the user excitable mode, where the user device is expectedto be close to the tag, lower power may be acceptable.

Data content of a transmission may refer to the data contained in thesignal transmission. In some embodiments, when the tag responds to arequest to transmit, it may include other data in addition to the tag IDin the transmission, depending on the purpose of the individual ordevice sending the trigger.

In some embodiments, one or more different components may be configuredto receive signals in different frequency bands, and the at leastcircuit may detect whether a signal carrying the trigger is at afrequency within the first or the second frequency band based on whichcomponent receives the signal. In a non-limiting example illustrated inFIGS. 9 and 10, power manager 9010 may receive inputs from 2.4 GHzharvester 9014, 900 MHz harvester 9012, or both, and provide one or bothof 900 MHz detection and 2.4 GHz detection to top level controller 9020.Top level controller 9020 may determine whether the energy received isat a frequency within the first frequency band or the second frequencyband based on one of 900 MHz detection and 2.4 GHz detection.

In some embodiments, the wireless identification tag may include atleast one second circuit configured to generate the trigger according toa predetermined timing sequence. A timing sequence may be a sequence ora signal used for the purpose of time keeping. For example, in asequence of events, a timing sequence may constitute the length of timebetween consecutive events. A predetermined timing sequence may be asequence of events for which the lengths of time between consecutiveevents are predetermined. In some embodiments, a predetermined timingsequence may be coded into the tag to generate the triggers based on anyprogrammed protocol. The protocols could be infinite. In the context ofelectrical or electronics circuits, a timing sequence may involve anyelectrical signals with cyclical oscillation, such as a clock signal.Events in the timing sequence may be examples the trigger. In someembodiments, the at least one second circuit may be configured togenerate a first trigger according to a first timing sequence and togenerate a second trigger according to a second timing sequence thatdiffers from the first timing sequence in at least one of a repetitionperiod or a time interval between two consecutive generated triggers. Inthe case where a number of expected transmissions are unknown, the exacttiming of each transmission may not be programmed in advance. Instead,the timing of the transmission may be determined based on a trigger,which may be generated based a timing sequence, such as a clock signal.Non-uniformity of time intervals between consecutive transmissions maybe achieved by randomizing the timing sequence, thus ensuring that thefirst and second time sequences may have a different repetition periodor time interval between consecutive triggers.

In some embodiments, top level controller 9020 may constitute an exampleof a second circuit. As illustrated in FIG. 10, top level controller9020 may send a transmission control signal to beacon controller 9030,which may specify the parameters of the identification signal to betransmitted by the transmitter. These parameters may include a durationbetween two consecutively transmitted signals, a duration of eachtransmission, data transmitted with each transmission, and/or a powerlevel of the transmitted signals. In some embodiments, and as discussedabove, top level controller 9020 may specify different timing sequencesbased upon an operation mode of the wireless identification tag. Forexample, when the tag is in the infrastructure-excitable mode (i.e.,store mode), top level controller 9020 may instruct the beaconcontroller 9030 to cause transmission of identification signals with afirst timing sequence with relatively longer periods of time betweensignals. However, when the tag is in a user-excitable mode (e.g., IoTmode), top level controller 9020 may instruct the beacon controller 9030to cause transmission of identification signals with a second timingsequence with shorter periods of time between signals. Thus, top levelcontroller 9020 may determine when transmission of an identificationsignal is needed and may generate one or more triggers (i.e.,transmission control signals) as a result. These triggers may specify atiming sequence of the identification signals to be transmitted by thetag (that is, a desired length of time between two consecutivetransmissions of the identification signal). Top level controller 9020may send the triggers to the beacon controller 9030, which may causetransmission of the identification signals according to the parametersprovided by top level controller 9020.

In some embodiments, the wireless identification tag may include a realtime clock 10024, which may provide a slow clock signal to top levelcontroller 9020 and/or to beacon controller 9030. In some embodiments,the slow clock signal may enable top level controller 9020 to track theamount of time between consecutive transmissions of the tag'sidentification signal, and to accordingly instruct the beacon controller9030 to cause transmission of the identification signals at the desiredfrequency (e.g., transmit an identification signal approximately every10 seconds). That is, top level controller 9020 may use the slow clocksignal to determine how much time has elapsed since the prior signal wastransmitted and may instruct beacon controller 9030 to causetransmission of an identification signal after the desired length oftime has passed since the last transmission.

In some embodiments, the time interval between consecutive transmissionsof the tag's identification signal may be modified using a randomizedvariation of the slow clock signal. As stated above, top levelcontroller 9020 may use the slow clock signal to determine whenindividual transmissions of the identification signal should occur. Insome embodiments, the configuration of the real time dock 10024 may varybetween individual tags, such that even if two tags start counting atthe same point in time, the variation in their respective slow clocksignals would be enough to cause their respective transmissions to occurat different points in time. Additionally, or alternatively, the tag mayinclude a random or pseudo-random number generator configured to causethe slow clock signal to vary by some amount, with respect to the slowclock signals of other tags.

In some embodiments, this variation between slow clock signals indifferent tags may cause randomization of transmission times with aresolution mound 0.5 seconds (or between 0.1 and 0.9 seconds). Thisrandom variation of the slow clock signal may prevent signaltransmission by multiple tags in close proximity from occurring at thesame time, thus reducing the likelihood that the tags' signals willcollide. In some embodiments, each wireless identification tag may bedesigned to have a different slow clock signal. For example, one tag mayhave a slow clock signal that generates a trigger every five seconds,and a different tag have a slow clock signal that generates a triggerevery nine seconds, and so on. This may further reduce the likelihoodthat multiple tags may have overlapping of signal transmissions.

In some embodiments, the wireless identification tag may also include acrystal oscillator 10022. The crystal oscillator 10022 may be configuredto provide a reference clock signal to the beacon transmitter 9032. Insome embodiments, the time interval between consecutive transmissions ofthe identification signal may be further modified by using the referenceclock signal. The crystal oscillator 10022 may measure time inincrements on the order of tens of milliseconds. A time intervalmeasured by the crystal oscillator 10022 may be added to or subtractedfrom the time intervals generated based on the slow clock signal tocreate additional variations in the time interval between signaltransmissions. Since the reference clock signal may have an incrementthat, is substantially smaller than the increments of either the slowclock signal or the randomized variations of the slow clock signal, theresultant time interval may be varied by smaller time increments. Forexample, when the top level controller 9020 determines that theidentification signal is to be transmitted every 7 seconds, variationfrom the slow clock signal may result in a duration of, e.g., between6.3 and 7.7 seconds between consecutive transmissions. With theincorporation of the variation from the reference clock signal, thisvariation may increase to a duration of, e.g., between 6.21 to 7.79seconds between consecutive transmissions. Thus, by using the referenceclock signal in addition to the slow clock signal, an extra layer ofnon-uniformity may be added to the time intervals between signaltransmissions. Moreover, because the crystal oscillator 10022 measurestime in small increments (tens of milliseconds), even more resolution isavailable for the time windows for signal transmissions, furtherreducing the risk of signal collision.

In some embodiments, the time interval between consecutive transmissionsmay be further modified by using a randomized variation of the referenceclock signal. For example, the tag may include a random or pseudo-randomnumber generator configured to cause the reference clock signal to varyby some amount, such as on the order of tens of microseconds. Similar tothe previous examples, the additional variation may be added to orsubtracted from time intervals between transmissions. If, for example, asignal transmission occurs 6.21 to 7.79 seconds after a previous signaltransmission, the randomized variation of the reference clock signal maycause a new interval of between 6.209 to 7.799 seconds.

By way of example, as illustrated in FIG. 10, real time clock 10024 maygenerate a slow clock signal that keeps time on the order of tens ofseconds. Real time clock 10024 may generate randomized variations usingrandom or pseudo-random numbers generated by a random number generator.The randomized variation of the slow clock signal may be on the order ofaround 0.5 seconds, as discussed above. Crystal oscillator 10022 mayprovide a reference clock signal that keeps track of times on the ordersof tens of milliseconds. Crystal oscillator 10022 may generaterandomized variations of the reference clock signal using random orpseudo-random numbers generated by a random number generator. Therandomized variations of the reference clock signal may be on the orderof tens of microseconds. In some embodiments, crystal oscillator 10022and/or real time dock 10024 may be circuits configured to generate theirrespective signals based upon their design and structure. Additionally,or alternatively, crystal oscillator 10022 and/or real time clock 10024may be controlled (e.g., by top level controller 9020 or by anothercontroller) to provide signals having desired characteristics.

In some embodiments, a sequence of identification signals may vary basedon a characteristic of a product associated with the tag. For example,heavy products, such as appliances, are less likely to move whencompared to a garment or an over the counter pharmaceutical product.This is but one example to illustrate that for some classes of products,historical information about the product's location may be relied uponsuch that at any given time, detecting a presence of the product'sassociated tag may be less consequential. In contrast, for products thatare more likely to be moved, a more robust sequence of transmissions maybe desirable for inventory management purposes. Such determinations maybe made based on characteristic of a product identifiable via a tag,such as tag ID, serial number, reference number, category or code type,or other similar information. In some embodiments, a system may bedesigned to trigger only certain classes of tags at certain intervals.Borrowing from the above example, the tags of immovable items may betriggered by the system less frequently than the tags of movable items.

In some embodiments, while in the infrastructure excitable mode, thesequence of identification signals may further vary based on thecharacteristics of the product to reduce the risk of signal collision.For example, different classes or categories of product may be associatewith tags programmed with different sequences of identification signal.While in the store setting, when the tags transmit signals to the tagreceivers in the store, and different sequences of identificationsignals may cause the different tags to transmit at different times,frequencies, or power levels. In some instances, one class of productmay have tags that transmit with one repetition period, and anotherclass of product may have tags that transmit with a different repetitionperiod, thus further reducing the chances of simultaneous transmission.

In some embodiments, a characteristic of a product may include a uniqueID of the product. An unique ID of a product may be number, string, orother form of data which is singularly associated with an identifiedproduct, and not others. Examples of unique ID may include serialnumbers, unique EPC codes, barcodes, or unique database entries. In someembodiments, the unique ID of the product may be associated with a stockkeeping unit (SKIT) indicative of at least one of a material, size,color, or style associated with the product. A stock keeping unit (SKU)may be a data representation of a distinct product or service for sale.An SKU may be associated with an identifier, such as the unique ID ofthe product. It may represent an entry in a database, such as onebelonging to an inventory management system and may contain anyinformation relevant to the product. The information may include aproduct's inventory number, price, category, classification, location,history, specification, and/or other information that may be relevantfor business purpose. In some embodiments, a products may be categorizedby its size, color, style material and other such characteristics. Eachof these characteristics may be associated with a different SKU andunique ID, and product items sharing the same characteristics may sharethe same SKU and unique ID.

By way of example, in the context of a clothing retail store asillustrated in FIG. 11, T-shirts of a specific size, color, material mayshare a first SKU. T-shirts with the same size, material, but differentcolor may share a second SKU, and so on.

Embodiments of the present disclosure may relate to methods, systems,devices, and computer readable media associated with mechanisms foravoiding spoofing of wireless tags, for fraud avoidance. As discussedherein, a wireless tag may transmit a unique tag ID for various reasons,including for enabling a system to detect the tag ID for inventorypurposes and/or for enabling a system to track removal of the taggeditem from a controlled area. By way of example only, in a retailestablishment, it may be particularly valuable to track tagged itemsremoved from the establishment. This may occur when, for example, a tagreceives an EAS gate signal at an egress of the establishment, whichtriggers the tag to transmit its unique ID to a receiver in the vicinityof the egress. In order to prevent tags from passing undetected throughthe egress, the tags may require sufficient energy to transmit theirunique IDs. Knowing this, a fraudster might be inclined to trigger a tagto repeatedly send its ID, thereby depleting reserve energy in the tagto a point that when the tagged item is removed from the establishment,reserve energy in the tag is insufficient to send an identificationsignal.

Such a nefarious individual may attempt to deplete stored energy in atag using a handheld transmitter that sends a spoof signal, in thefrequency band of an EAS gate transmitter, to a tag located out of rangeof receivers in the vicinity of the EAS gate. For example, the fraudstermight bring a tagged article of clothing into a dressing room, and usinga handheld EAS signal transmitter, attempt to deplete the reserve energyin the item's tag.

To combat this spoofing, the infrastructure in the establishment may beconfigured to detect the telltale signs of spoofing. For example, an EASgate frequency transmission is only expected by the system to occur inan immediate vicinity of an EAS gate. Therefore, if the EAS frequency isdetected in another part of the establishment, such as a dressing room,an alert may notify administration or security personnel of a suspectedspoofing attempt. Additionally, or alternatively, in response to an EASsignal, a tag may be designed to emit a responsive signal indicatingthat the tag is responding to an EAS signal. For example, a signalpattern transmitted in response to an EAS gate trigger might differ froma signal pattern transmitted in response to any other trigger signal. Ifsuch a gate mode response signal is received by the system from alocation other than a vicinity of an EAS gate, a similar alert may betransmitted. Since spoof alerts may be received by receivers in known,fixed locations, the alert, in some embodiments, may identify a spoofinglocation, enabling security personnel to locate the fraudster. Forexample, if the spoofed BIAS signal is detected by a receiver coveringan area of a dressing room, that location may be transmitted as part ofan alert. If more than one receiver receives the fraudulently causedsignals, triangulation or other location techniques may be employed toidentify location coordinates or other location-related data associatedwith the spoofed tag or the spoofing transmitter. In this way, securitypersonnel may receive as part of an alert, location-related information.Moreover, since the transmitted response of a spoofed tag likely incudesa unique ID that identifies the product with which the spoofed tag isassociated, an alert might also notify personnel of product-identifyinginformation (e.g., an alert may indicate a possible attempt to steal abrown leather Armani jacket by a person in dressing room #6). Such analert might also include an image of the product at issue, retrievedfrom a data structure associated with the system. If tied to theestablishment's CCTV cameras, the system might automatically perform alook up of video of one or more individuals who were recently in an areawhere the spoofed signal occurred, and transmit such images as part ofan alert. Similarly, as soon as a spoofed signal is detected, one ormore CCTV cameras streaming from the area of the spoof may betransmitted live as part of an alert. Moreover, multiple cameras mightbe used to track the suspect as the suspect moves through theestablishment. Using one or more of these techniques, fraud andshrinkage may be reduced.

Disclosed embodiments may involve a wireless identification system. Anexemplary wireless identification system may involve the use of, one ormore transmitters configured to transmit electromagnetic energy, such asEAS transmitters, one or more EAS gates, one or more receiversconfigured to receive transmissions from the plurality of identificationtags, and one or more processors configured to store and processinformation related with, for example, identification tags, alertmechanisms, inventory, or product details. The wireless identificationsystem may further involve other elements, circuitry, circuitcomponents, and systems that may be beneficial to track and/orauthenticate objects, people, and/or animals. A wireless identificationsystem may include one or more of the foregoing elements.

In some embodiments, the wireless identification system may include afirst receiver. The first receiver may be a handheld device or a fixeddevice. A handheld device may include a handheld scanner provided to anemployee or customer by the establishment for use during workingroutines or in a shopping session; a mobile communications device ofsuch an individual (e.g., cellphone, tablet, dedicated hardware, etc.);or any other handheld device capable of performing the functions of areceiver. A fixed scanner may be a device affixed or otherwise attachedto any wall, ceiling, or any other structural or non-structural elementcapable of supporting the receiver, that is capable of performing thefunctions of a receiver. By way of example, in FIG. 11, receivers 11300a-h may be scanners attached to certain structures (e.g., walls,ceilings, racks, displays, or other fixtures or components) in theestablishment. A customer or employee may, for example, use handhelddevice 11200 as a handheld scanner, which may be a device dedicated toscanning or any other mobile device capable of performing the functionsof a receiver.

The wireless identification system may further include at least oneprocessor. The processor may be configured to store and processinformation related to, for example, identification tags, alertmechanisms, inventory status, or product details. The at least oneprocessor may be configured to identify the identification tags, updateinventory, provide notifications, and/or provide alerts, among otherfunctions depending on the particular design parameters of the wirelessidentification system.

The wireless identification system may be used in connection with atleast one transmitter configured to transmit a first signal in a firstfrequency band to a plurality of identification tags. By way of example,the at least one transmitter may be incorporated in or otherwiseassociated with an EAS gate or an EAS system. Such systems typicallytransmit in frequency ranges of 58-60 kHz or 7-13 MHz. One or morewireless identification tags receiving such a first signal may be causedto transmit a second signal in a second frequency band. Depending on tagdesign, the second signal may be in 2.4 GHz WW ISM frequency range.Characteristics of the second signal may identify it as having beentriggered by the first signal—in this example by a transmission from anEAS gate or EAS system. Such signal characteristics may include one ormore of a power level, repetition rate, data content, or any otherinformation that may be used to identify the triggering source. This mayoccur because the tag may be programmed to generate the second signalwith the particular characteristics in response to having received thefirst signal. If a plurality of tagged items receive the first signal atthe same time, they may each transmit second signals, unique to eachtag, simultaneously or within a short time interval. While the at leastone transmitter is described by way of example as being associated withan EAS gate or system, the at least one transmitter need not beEAS-related, and the first signal need not be in an EAS frequency range.Similarly, the second signal need not be in the 2.4 GHz range.

Regardless of the frequency ranges, transmission of the second signalmay serve as an indication that the first signal was received in thefirst frequency band. In other words, it may be said that the firstsignal received by the tag is in some way involved in triggeringtransmission of the second signal by the tag.

The second signal may be received by a first receiver configured forlocation proximate the at least one transmitter. The first receiver maybe “configured” as the result of its placement near the at least onetransmitter, or as the result of an overall system design recognizingthat the receiver is expected to receive the second signal as the resultof receipt of the first signal by the tag.

As alluded to earlier, the first frequency band may include, forexample, at least one of a first EAS frequency band of about 7-13 MHz ora second EAS frequency band of about 58-60 kHz. In one example, thesecond signal transmitted by a tag may include an identification signal,which may be unique to the tag. For example, the identification signalmay include a unique identification code or a sequence permitting thetag to be identified by a processor accessing a data structure.

In some embodiments, the second signal may indicate whether the firstsignal was received in the first frequency band. Consistent withdisclosed embodiments, the second signal in a second frequency band maybe generated and transmitted in response to receiving the first signalin a first frequency band. In some embodiments, transmitting theidentification signal in a second frequency band may involve receivingthe first signal in the first frequency and verifying the frequency ofthe received first signal. Upon verification, the identification tag maygenerate and transmit the second signal or the identification signal tobe detected by a first receiver, a second receiver, or a plurality ofreceivers. Because the second signal may be generated upon verificationof the receipt of the first signal in the first frequency band, thepresence of the second signal may indicate whether the first signal wasreceived in the first frequency band.

In some disclosed embodiments, the at least one transmitter of thewireless identification system may be located in proximity to a firstreceiver, discussed later in greater detail. The proximity of thecomponents may be such that when the at least one transmitter emits afirst signal to thereby trigger transmission of a second signal to thefirst receiver, the at least one transmitter is close enough to thefirst receiver so that the second signal is capable of being detected orreceived by the first receiver. For example, the at least onetransmitter may be located near an egress (e.g., entrance/exit) of afacility equipped with an EAS system. The transmitter (e.g., an EAStransmitter) may be an external system or device located inside an EASpedestal such that it may be concealed within a frame or a supportstructure of the EAS pedestal, or mounted on a frame or a supportstructure of an EAS pedestal. Additionally, or alternatively, tiretransmitter may be located on or above the ceiling, on or under thefloor, on or behind the walls, or any other stationary or mobilestructure adjacent the entrance/exit of a facility. Wherever located afirst receiver may be close enough to the at least one transmitter sothat when the at least one transmitter triggers tags with the firstsignal, the tags are able to transmit their responsive signal to thefirst receiver.

In some embodiments, one or more transmitters may be located at one ormore locations within a facility. For example, one transmitter may belocated at the main entrance/exit of a bank, another transmitter locatedat the entrance of the safety vault, another transmitter located at theautomated teller machine (ATM) area, or other sections of a securedfacility.

By way of another example, the first receiver may be configured forlocation proximate the at least one transmitter in that the firstreceiver's reception range, when in a location proximate the at leastone transmitter, enables the first receiver to receive signals from tagsin a transmission range of the at least one transmitter. Thus, when theat least one transmitter sends signals to the tags, prompting the tagsto transmit identification signals, the first receiver is within areception range to be able to receive the identification signals. Thefirst receiver may be located, for example, within a transmission rangeof an identification tag receiving the first signal transmitted by thetransmitter of the EAS system. As used herein, a transmission range anda reception range may refer to the maximum distances between atransmitter and a receiver, both operating using the same communicationprotocol and over the same communication medium, such that transmissionand reception is respectively enabled between transmitter and receiver.In some embodiments, if a signal transmitted from the transmitter to thereceiver can be accurately received and interpreted by the receiver,correctly identifying the transmitted data (or, in the case of energytransmission, the maximum distance over which the receiver can convertthe received energy to a usable from on the receiver's end), thetransmitter and the receiver may be “within range” of each other. Thisdistance may be determined, for example, by the power level of thetransmitter output, the attenuation of the communication medium whichmay be fixed, or a formula of the distance, or a statistical formula ofboth the distance and some parameters of the communication medium, amongothers, and the receiver sensitivity. Any receiver which is located at adistance from a given transmitter which is shorter than the transmissionrange is said to be “within range” of the transmitter, or “in thevicinity” of the transmitter, or “proximate” the transmitter. Forexample, the transmission range of a Wi-Fi access point can range from afew meters when the access point is transmitting data at its maximumdata rate, but may extend to dozens of meters (sometimes even 100 metersor more) when transmitting at its lowest data rate. The differencebetween those two conditions is the receiver sensitivity, which is at amuch lower power level for the low data rate compared with the high datarate. In the same manner, walls, people, furniture and other obstaclesor reflectors may reduce or extend the transmission range by changingthe attenuation of the communication medium, without any change of thetransmitted power level or the receiver sensitivity. In some disclosedembodiments, receiver sensitivity may refer to the minimum power levelat the input to the receiver at which the receiver can accuratelyreceive, interpret and act upon the received data.

For the first receiver to receive the transmissions from the pluralityof identification tags near a transmitter such as an EAS transmitter,the first receiver should be positioned within transmission range of anidentification tag which is itself within transmission range of the EAStransmitter. In other words, the first receiver may be located withinthe transmission range of the identification tag receiving the firstsignal transmitted by the EAS transmitter. The maximum distance betweenthe first receiver and the EAS transmitter may be equal to or less thanthe difference between the transmission range of the identification tagto the first receiver and the transmission range of the transmitter tothe identification tag.

In some disclosed embodiments, a second receiver may be configured toreceive a third signal from a tag outside a transmission range of the atleast one transmitter. The second receiver may be so configured, forexample, due to its placement relative to the at least one transmitter.For example, if the second receiver may be located far enough from thefirst receiver such that a second signal triggered by the at least onetransmitter's first signal, may not be detected by the second receiver.However, a third signal emanating from a tag within range of the secondreceiver may be received by the second receiver.

In some embodiments, the wireless identification system may include morethan one second receivers, each of which is far enough from the at leastone transmitter so as not to be impacted by any second signals triggeredby the at least one transmitter. The transmissions from one or more ofthe plurality of identification tags may include the second signalhaving a frequency band in the range of 2.4 GHz WW ISM. The secondreceiver may be configured to receive electromagnetic signals having afrequency in the range of 2.4 GHz transmitted from a transmitter of thewireless identification tag.

A wireless fraud detection system consistent with this disclosure may beconfigured to expect different signals at different receivers. Forexample, a receiver in a particular department in a store may expect toreceive identification signals from tags prompted by signals sent to thetags by infrastructure that is part of an inventory management system.However, a receiver in the same particular department may not expect toreceive signals from tags prompted by an EAS gate. This is because anEAS gate is located at an egress and not within a particular department.Thus, if a receiver far from an EAS gate receives a tag response to anEAS gate signal, such a signal may be unexpected and be indicative offraud. Such a signal may differ from a typical signal received byinfrastructure receivers in that one or more characteristic of thesignal may characterize an EAS gate response. Such characteristics mayinvolve the power of the signal, the repetition rate of the signal,information contained in the signal, or any other signal characteristicemployed in the system to characterize an EAS gate response.

In some embodiments, a minimum distance between the transmitter and thesecond receiver may be greater than the sum of the transmission range ofthe transmitter to the identification tag and the transmission range ofthe identification tag to the second receiver. For example, the distanced4 between the identification tag and the second receiver (e.g.,receiver 11300 c) may be larger than the distance d1 between thetransmitter and the first receiver (e.g., receiver 11300 a), or thedistance d2 between the identification tag and the first receiver.

By way of example, in FIG. 31, wireless identification system 31100 inan establishment may include a transmitter 1116 configured to transmit atransmission signal 1118 (e.g., EAS transmission signal) in a frequencyband of 7-13 MHz or 58-60 kHz. A wireless identification tag 1100 may beconfigured to receive transmission signal 1118 from transmitter 1116 andtransmit an identification signal 1102 in a frequency band of 2.4 GHzupon receiving transmission signal 1118. A first receiver 11300 a may beconfigured to receive the transmitted signal 1102. A second receiver11300 c may not receive signal 1102 because the second receiver 11300 cis outside the transmission range of identification tag 1100 (i.e.,distance d4 is greater than one or more of the transmission range ofidentification tag 1100 or the reception range of receiver 11300C). Byway of example, transmitter 1116 may be disposed in, mounted on, orattached to structure 31120 at the entrance/exit of the establishment.The EAS transmission signal 1118 and the identification signal 1102 aredenoted as waves with solid lines and broken lines, respectively, forillustrative and visual aid purposes only.

As illustrated in FIG. 31, the distance between transmitter 1116 andreceiver 11300 a may be denoted as d1, the distance betweenidentification tag 1100 and receiver 11300 a may be denoted as d2, thedistance between transmitter 1116 and identification tag 1100 may bedenoted as d3, the distance between identification tag 1100 and receiver11300 c may be denoted as d4, and the distance between receiver 11300 cand transmitter 1116 may be denoted as d5. In some disclosedembodiments, the distance d1 may be equal to or less than the differencebetween the transmission range of the identification tag to the firstreceiver and the transmission range of the transmitter to theidentification tag. In some embodiments, d2 may be equal to or less thanthe transmission range of the identification tag 1100, d3 may be equalto or less than the transmission range of the EAS transmitter 1116, andd4 may be larger than the transmission range or outside the transmissionrange of the identification tag 1100 if, for example, distance d5 isgreater than the sum of tire transmission range of EAS transmitter 1116and tire transmission range of identification tag 1100.

In some disclosed embodiments, the at least one processor may beconfigured to generate a potential fraud alert when the second receiverreceives the third signal. A potential fraud alert or an alert signal,may refer to an indication received by a system, that an event requiringa response has occurred. In the context of anti-theft security systems,such as a wireless identification system, alert signals may indicateeither an attempt to steal an item (e.g. remove it from the storewithout paying for it), an attempt to tamper with a specific item suchthat it won't trigger the anti-theft alarm (e.g. by triggering the tagto deplete stored energy, leaving the tag with insufficient energy totrigger a notification when the tag passes through an EAS gate), or anattempt to block the entire system from operating (e.g. by transmittingstrong radio signals, overwhelming the capability of the system'sdetectors to operate). Such alert signals may be in the form of a visualalert, an audible alert, a text alert or any other transmission thatconveys the desired information. The alerts may be caused to occur viafixed infrastructure (alarms, lights, displays), or via other mechanismsincluding notifications on a store employee's mobile device, update of adatabase of attempted thefts, instant messages, and/or automatedtransmissions to local security.

In some disclosed embodiments, the third signal may emanate from a tagin response to a spoof of the tag. A spoof may occur when anunauthorized signal is sent to the tag to cause abnormal operation ofthe tag. For example, if a fraudster with a signal generator generates aspoof of an EAS gate signal and sends it to a tag, the tag may operatein an abnormal manner in that it sends an EAS gate response in an areaother than an EAS gate area, even though the tag was not triggered by anEAS gate.

In some disclosed embodiments, each of the plurality of identificationtags may include an energy storage component configured to store energytransmitted in a frequency outside of the first frequency band.Consistent with disclosed embodiments, the energy storage component mayinclude any element or circuit enabled to store energy. By way ofexample, an energy storage component may include one or more ofcomponents depicted in FIGS. 2, 9, and 10, such as energy storagecircuit 2108, which may include storage capacitor 10300. Any one or moreof the components, for example, may be configured to receive energy fromantennae 2112 or 2114, store the received energy, and make the energyavailable to other components in tag 1100. In some embodiments, energyreceived in one form, may be stored in a second form, and may be provided to components in a third form. Further, in some embodiments, theenergy storage component may not be configured to store electromagneticenergy in a frequency range of 7-13 MHz or 58-60 kHz. For example,electromagnetic energy having a frequency of 2.4 GHz WW ISM may bestored in the energy storage component, but energy in an EAS gate rangemay not be stored. As discussed above, the energy storage component maybe configured to power a transmitter of the at least one identificationtag with the stored energy.

In some disclosed embodiments, the plurality of identification tags maybe further configured to receive a fourth signal outside of the firstfrequency band. For example, the fourth signal may be from anothertriggering source, such as a handheld device (e.g., scanner, cellphone,etc.) or from fixed transmitting infrastructure in the establishment.The latter may be a frequency range of 900 MHz WW ISM or 2.4 GHz WW ISM,and the former may be in the range of 2.4 GHz WW ISM, for example. Insome embodiments, one or more antennae may be tuned to receive energytransmitted in multiple frequency bands of around 900 MHz, multiplefrequency bands of around 2.4 GHz, or both, as discussed herein. Inresponse to the received fourth signal, the plurality of identificationtags may be configured to transmit a fifth signal. The fifth signal maybe intended for receipt by a nearby receiver such as an inventoryinfrastructure receiver or a receiver in the handheld device.

In some disclosed embodiments, the fourth signal may be in the secondfrequency band or in a third frequency band of 900 MHz WW ISM. Theplurality of wireless identification tags may be configured to transmitthe fifth signal in the second frequency band of 2.4 GHz, different fromthe first frequency hand, in response to receiving the third signed inthe second frequency band (e.g., 2.4 GHz) or the third frequency band(e.g., 900 MHz). In some embodiments, the identification tag may includea circuit configured to detect the electromagnetic energy having afrequency in both the second frequency band (e.g., 2.4 GHz) or the thirdfrequency band (e.g., 900 MHz).

FIG. 32 illustrates a block diagram of an exemplary wirelessidentification system 32000 including a transmitter 1116, an externalsource of electromagnetic energy 32200, an identification tag 1100, anda receiver 11300 c. As previously discussed, transmitter 1116 or anotherEAS transmitter may be configured to generate a first signal 1118 in afirst frequency band of 58-60 kHz or 7-13 MHz. The identification tag1100 may be configured to receive the first signal and transmit a secondsignal 1102 in response to receiving the first signal. One or morereceivers 11300 a and/or 11300 c may be configured to receive secondsignal 1102. The wireless identification system 32000 may furtherinclude an external source (ambient and intentional) of electromagneticenergy 32200, such as wireless mobile communication devices, configuredto transmit a third signal 32003 in a frequency range of 2.4 GHz or 900MHz, for example. The identification tag 1100 may be configured toreceive third signal 32003 and transmit a fourth signal 32004 inresponse to receiving third signal 32003. Second receiver 11300 c may beconfigured to receive fourth signal 32004.

In some embodiments, at least one processor may be configured such thatwhen the fifth signal is received by the second receiver, the at leastone processor is configured to identify a specific identification tagthat transmitted the fifth signal and to look up an ID of the identifiedtag in an inventory stored in at least one data structure. For example,when there is an interest in checking information on a product such as aprice, size, model number, etc., a handheld device may cause anassociated tag to send a signal requesting responsive information. Thesignal from the tag may initially be received by the handheld device,which may then make the lookup request to a data structure, such asmemory or a server.

In some disclosed embodiments, a data structure may include a databaseconfigured to store data including, but not limited to, informationrelated with an identification tag, an ID of the identification tag,corresponding product information, inventory status of the correspondingproduct, location of the product within the establishment, storeinventory, among other product relevant information. The informationstored in the database may be accessible to one or more processorsdirectly or indirectly connected with the database. In some embodiments,the system may include one or more databases. For example, a localdatabase may store local information related with a particular facilityor the store, a regional database, or a global database. The one or moredatabases may be connected with each other through a network such as acloud network, for example. In some embodiments, the database may beconfigured to be updated in real-time, or periodically updated at apredetermined regular interval, or updated in response to a query.Real-time updating may involve updating the database immediately afteroccurrence of a change in relevant information. As used herein,“immediately” may be referred to as without added intentional delays, oras within a specific amount of time, for example, within 3 seconds orless, or within 2 seconds or less, or within 1 second or less, or within0.5 seconds or less.

In some disclosed embodiments, the processor may be configured toidentify the identification tag that transmitted the fifth signalreceived by the second receiver. The processor may identify theidentification tag by, for example, accessing the incoming fifth signaltransmitted by the identification tag and received at one or more secondreceivers. The identified position may be a precise, measurable locationwithin the establishment, or it may be a generalized position, such as aroom, appliance, department, region, area, rack, shelf, or any otherposition, depending on system design and the granularity a particularsystem affords.

In some disclosed embodiments, based on the fifth signal received by thesecond receiver, the at least one processor may be configured togenerate the alert when the ID of the identified tag is included in theinventory. Upon determining and verifying that the identification tag ispresent in the inventory, the processor may generate an alert,indicating that the item was not properly checked out or was not paidfor. In some disclosed embodiments, the at least one processor may beconfigured to forego generating the alert when the second signal isreceived by the first receiver at the first location. The identificationtag may be activated upon receiving the first signal from thetransmitter of the EAS system. Upon activation, the identification tagmay generate or transmit a second signal in a second frequency band ofaround 2.4 GHz which may be received by the first receiver at the firstlocation if the first receiver is located within the transmission rangeof the identification tag. The processor of the wireless identificationsystem may determine that because the identification signal transmittedby the identification tag was received by the first receiver locatedproximate the EAS transmitter, the customer may be near theentrance/exit of the establishment. The processor, based on verificationthat the second signal received was received by the first receiver, maydetermine that it is not a spoof-attempt, and therefore, may notgenerate the alert signal for a system spoof-attempt.

In some disclosed embodiments, the second signal may differ from thefifth signal in at least one of a repetition period, a power level, asignal encryption mechanism, or data content of the transmitted signal.As previously described, the second signal may refer to the signaltransmitted from the identification tag in gate mode and the fifthsignal may refer to the signal transmitted from the identification tagoperating in user-excitable mode or infrastructure-excitable mode. Thesecond and the fifth signals, may differ in a plurality ofcharacteristics including, but not limited to, communication medium,communication protocols, types of encryption, scrambling, and/ordisguising, data content, timing of transmission, and/or any otherdistinguishable characteristic that may be associated with theidentification signal to be transmitted.

In some disclosed embodiments, the identification tags may be furtherconfigured to transmit first identification data with the second signaland to transmit second identification data, different from the firstidentification data, with the fifth signal. As disclosed herein, datacontent may include the first identification data and the secondidentification data. The first identification data may be transmittedwith the second signal in the gate mode, and may include data relatedwith, but not limited to, payment details, inventory details, amongother information relevant to a fair purchase or release of the product.The second identification data may be transmitted with the fifth signalin the user-excitable mode or infrastructure-excitable mode, and mayinclude data related with, hot not limited to, a unique identifierassociated with the identification tag, a status of the identificationtag, a location of the identification tag, a power level of theidentification tag, pricing information, ownership information, stylinginformation, data relating to the trigger that initiated thetransmission, or any information conveyed by the identification signal.

In some embodiments, the at least one transmitter, the first receiver,and the second receiver may be located within a common establishment, asdefined above.

In some disclosed embodiments, when the second signal is received bytire first receiver, the at least one processor may be configured toidentify the identification tag that transmitted the second signal andto look up an ID of the identified tag in an inventory stored in atleast one data structure. As previously described, a data structure mayinclude a database configured to store data including, but not limitedto, information related with an identification tag, tin ID of theidentification tag, corresponding product information, inventory statusof the corresponding product, location of the product within theestablishment, store inventory, among other product relevantinformation. The information stored in the database may be accessible toone or more processors directly or indirectly connected with thedatabase. The processor, when the second signal is received by the firstreceiver at the first location, may be further configured to identifythe identification tag by, for example, looking up the ID of theidentification tag that transmitted the second signal. The processor maygenerate a query about the identity of the identification tag that maycause a look up of the identification tag associated with an item. Inresponse to the query, a search may be initiated within the datastructure to determine if the identification tag that transmitted thesecond signal is present in the inventory, based on, for example, the IDof the identification tag.

In some disclosed embodiments, based on the second signal received bythe first receiver, the at least one processor may be configured togenerate the alert when the ID of the identified tag is included in theinventory. Upon determining and verifying that the identification tag ispresent in the inventory, the processor may generate an alert,indicating that the item has not been properly checked out, or has notbeen fairly paid for.

In some disclosed embodiments, when the second signal is received by thefirst receiver at the first location, the at least one processor may beconfigured to update an inventory database. For example, a gate signal(identification signal generated in response to receiving the firstsignal) may be transmitted by an identification tag when a customerbrings an item containing the identification tag to a predeterminedlocation associated with sales of items. When the first receiverreceives the gate signal, the at least one processor in the system maybe configured to determine that a sale has occurred, and update theinventory database accordingly.

In some disclosed embodiments, the at least, one transmitter may includean EAS antenna configured to transmit and receive signals within thefirst frequency band. For example, as discussed earlier, an EAS gate mayinclude an antenna that transmits and/or receives in a frequency band of7-13 MHz or 58-60 kHz. In disclosed embodiments, although a tag may betriggered by an EAS gate signal, the tag may respond in a frequency suchas 2.4 GHz, which may not be recognized by the EAS gate.

In some disclosed embodiments, at least one of the first receiver or thesecond receiver may include an antenna tuned to receive signalstransmitted in the second frequency band. Thus, in the example providedabove, a signal sent by a tag in response to an EAS gate trigger signalmay be received and understood by the first receiver or the secondreceiver (e.g., in a frequency range of around 2.4 GHz). In somedisclosed embodiments, the processor may be configured to cause an alarmmechanism located in proximity to the second location to produce atleast one of a visual notification or an audible notification when thesecond signal is received by the second receiver. One of severalfunctions of the processor of the wireless identification system mayinclude generating alerts and notification signals in the event that, atheft-attempt or a system spoof-attempt is made. In some disclosedembodiments, under normal operation in a theft-deterrent system, thesecond signal transmitted by the identification tag may be received bythe first receiver located proximate to the transmitter of the wirelessidentification system and within the transmission range of theidentification tag. In such a configuration, if the customer inpossession of one or more items with an identification tag that has notbeen deactivated by an authorized personnel of a store, tries to exitthe store, the processor may be configured to trigger an alarmindicating an attempt of theft. One of several ways to circumvent thealarm triggering at the exit gate may involve overwhelming the systemand “wearing down” or “depleting” the energy of an identification tag toavoid detection of the tag when exiting the store. This couldpotentially happen if a fraudster uses a mobile EAS transmitterconfigured to transmit electromagnetic signals in the frequency band of7-13 MHz or 58-60 kHz to activate the tag. The electromagnetic signalsgenerated from a mobile EAS transmitter (unauthorized by the store) maybe referred to as a fraudulent EAS signal.

As an example, the fraudster may use tire mobile EAS transmitter in afitting room to wear down the energy stored in an identification tag byrepeatedly activating the tag. However, the second signal generated bythe identification tag upon receiving the fraudulent EAS signal, may bereceived by one or more second receivers located at one or more secondlocations such as in the proximity of the fitting room. The processormay be configured to determine the second location of the secondreceiver receiving the fraudulent EAS signal, and generate an alertsignal or a notification signal at or close to the determined secondlocation, indicating an attempt to drain the reserve energy of a tag.

In some disclosed embodiments, an alert signal or a notification signalmay refer to a signal generated by a component of one system, used toalert another component of the system, or a different system, or aperson, or any combination thereof. The notification signal may be anaudible signal, a visual signal, or another sensory signal such as ahaptic signal, or a digital signal. In some disclosed embodiments, theprocessor may be configured to transmit the alert to a remote device.Some non-limiting examples of a remote device include, a mobile device,an app on a mobile device, a remote database, a handheld device, atablet, a computer, or other devices capable of receiving notificationswirelessly over BLUETOOTH™, BLUETOOTH LE™ (BLE), Wi-Fi, near fieldcommunications (NFC), WLAN, or other suitable communication methods.

In some disclosed embodiments, when the second signal is received by thefirst receiver at the first location, the processor may be configured toidentify the identification tag that transmitted the second signal,access data associated with the identified tag in a database, anddetermine whether to generate an alert based upon the accessed data. Aspreviously described, the processor, when the second signal is receivedby the first receiver at the first location, may be further configuredto identify the identification tag by, for example, looking up the ID ofthe identification tag that transmitted the second signal. The processormay generate a query about the identity of the identification lag thatmay cause a look up of the identification tag associated with an item.In response to the query, a search may be initiated within the datastructure to determine whether an alert is required. If removal of thetagged item would violate an inventory rule, an alert might betriggered. A rule might be violated if, for example, an attempt toremove a tagged item from the establishment occurs withoutauthorization. Authorization may occur if the system includes a recordthat the item was already paid for, or if an administrator has clearedthe item for removal.

Alternatively, if the identified tag is absent in the inventory or thedatabase, indicating that the item is “sold” or successfully paid for(or that the item is not related to the specific establishment), theprocessor may not generate an alarm or an alert signal, allowing thecustomer to exit the store without interruption.

In other embodiments, a fraud reduction system for use with wirelesslytagged inventory may include at least one processor configured to detecta signal associated with a transmission in an EAS gate frequency. Adetected signal associated with a transmission in an EAS gate frequencymay be either a signal in a frequency of an EAS gate (e.g., in frequencyband of about 7-13 MHz or about 58-60 kHz), or it may be a signalemanating from a tag triggered by an EAS gate frequency. The signaltransmitted by the tag may be in a frequency other than an EAS gatefrequency (e.g., 2.4 GHz). The at least one processor may identify thesignal as emanating from a location that does not correspond to an EASgate location. For example, EAS gate locations may be known tocorrespond specially with specific receivers. Some receivers in anestablishment may be located in proximity to an EAS gale and capable ofreceiving signals from tags passing through the EAS gate. Otherreceivers may be located sufficiently far from an EAS gate that signalsfrom tags passing through the EAS gate are incapable of being receivedby those more distant receivers. The at least one processor may beprogrammed or may have access to data to determine that the signal doesnot originate from one of the receivers in proximity to the EAS gate.

Alternatively or additionally, the processor may receive, along with thesignal associated with a transmission in the EAS gate frequency, anidentification of the receiver that physically received the signal. Thisidentification may include the location of the receiver, or theprocessor may have access to a database holding location indications ofvarious receivers, enabling the processor to definitively determinewhether the signal was received in proximity to an EAS gate or whetherit was received far enough from an EAS gate so as not to be associatedwith the transmission of the EAS gate itself.

Based on the identified emanation location of the signal, the at leastone processor may determine that a suspected fraudulent event is inprogress. The identified emanation location may be a specific location(e.g., dressing room #2) or it may be a negative identification (e.g.,not an EAS gate location). When the at least one processor determinesthat an EAS gate signal is received in a location that is not supposedto receive EAS gate signals, the processor may conclude, based onrelated programmed logic, that the signal is likely to correspond tofraudulent activity.

When such suspected fraudulent activity is detected, the at least oneprocessor may generate an alert. An alert may indicate a possibleattempt to steal a particular product identified in the signal. Such analert might also include an image of the product at issue, retrieved bythe at least one processor from a data structure. If tied to tireestablishment's CCTV cameras, the at least one processor mightautomatically perform a look up of a video of one or more individualswho were recently in an area where the signal occurred, and transmitsuch images as part of an alert. Similarly, as soon as a spoofed signalis detected, one or more CCTV cameras streaming from the area of theattempted spoof may be transmitted live as part of an alert. Moreover,multiple cameras might be used to track the suspect as the suspect movesthrough the establishment. One or more of the foregoing may beconsidered an alert. The generated alert may be sent to any entity suchas security personnel (either via wired or wireless infrastructure), bytriggering an audible or a visual alarm in the vicinity of the detectedsignal or in any other location, or by sending text or computer readablemessages to an individual or a system component.

Embodiments of the present disclosure may relate to methods, systems,dev ices, and computer readable media for simultaneously triggering andsequentially reading a plurality of tags. Consistent with some disclosedembodiments, non-transitory computer readable storage media may storeprogram instructions executable by at least one processing device andwhich perform any of the steps and/or methods described herein. As usedherein, a non-transitory computer readable storage medium may refer toany type of physical memory on which information or data readable by atleast one processor can be stored. Examples may include random accessmemory (RAM), read-only memory (ROM), volatile memory, non-volatilememory, hard drives, CD ROMs, DVDs, flash drives, disks, and any otherknown physical storage medium whether some or all portions thereof arephysically located in or near an establishment or are located remotelyand are accessible via a network. Singular terms, such as “memory” and“computer readable storage medium,” may additionally refer to multiplestructures, such as a plurality of memories or computer readable storagemediums. As referred to herein, a “memory” may include any type ofcomputer readable storage medium unless otherwise specified. A computerreadable storage medium may store instructions for execution by at leastone processor, including instructions for causing the processor toperform steps or stages consistent with an embodiment herein.Additionally, one or more computer readable storage media may beutilized in implementing a computer-implemented method. The term“computer readable storage medium” should be understood to includetangible items and exclude carrier waves and transient signals.

Some disclosed embodiments may include a non-transitory computerreadable medium containing instructions that, when executed by aprocessor, cause the processor to execute simultaneous triggering andsequential reading of an identification tag in a wireless identificationsystem. Simultaneous triggering may occur when a processor instructs atransmitter to broadcast a triggering signal to an area that containsmore than one tag, each of which is capable of receiving the triggeringsignal. Upon receipt, the tags might initiate a process to respond tothe trigger by either immediately or with some period of delaytransmitting a responsive signal. For example, upon receipt of a 900 MHztrigger signal from infrastructure in an establishment, a plurality oftags might be triggered to respond by broadcasting their own individualIDs in a 2.4 GHz frequency range. A processor causing a transmitter tobroadcast a trigger signal over an area which contains more than one tagmay be referred to as simultaneous triggering, regardless of whether thetags receiving the signal respond simultaneously.

One potential challenge of simultaneous triggering is that it may causetags to simultaneously send responsive signals in an overallunproductive manner. For example, when a high volume of tagssimultaneously respond, the responses can collide and/or the reader(receiver) may be overwhelmed with responses. As discussed in otherparagraphs of this disclosure, strategies for dealing with thesechallenges may include a tag design that either interjects a delayed tagresponse and/or that causes tags to repeatedly send duplicativeresponses of varying transmission duration or with non-uniform intervalsof delay or pause between successive transmissions. These approacheswhich stagger transmission signals may increase the chances that a tagID reaches the receiver without collision, and that the receiver has thecapacity at any given instant to read the responses.

Another facet of this strategy for dealing with the challenge of theeffects of simultaneous triggering involves the receiver beingconfigured to sequentially read responsive signals, and to correctlyassociate such sequentially read signals with the simultaneous trigger.For example, rather than attempting to read all responsive signals atonce, a system might effectively ignore some returning signalsinitially, and later (e.g., milliseconds, seconds, minutes or hourslater depending oil system specifications), sequentially read theinitially ignored tags.

The issue of signal collision and overwhelming a receiver may becomemore pronounced when many tags are triggered by a handheld device.Depending on system design, the permanent infrastructure in anestablishment may be sufficiently robust to handle simultaneoustransmissions. However, a mobile 2.4 GHz device such as a ceil phone,tablet, or handheld scanner may not. Therefore, sequential reading ofresponsive signals may be particularly helpful in such situations.

Because each tag may have its own unique ID, each tag may beindividually traced by the system. From historical data, the system maylearn the expected tag IDs associated with a particular area, and maydetermine when a particular tag previously located in the particulararea is no longer triggered by the system. For example, as illustratedin FIG. 11, a department filled with clothing in a retail store mayhouse thousands of tags, such as tags associated with the shirts on rack11250. Receiver 1114 b is in close proximity to rack 11250, and mayperiodically receive tag IDs transmitted from the shirts on rack 11250.Thus, one or more processors 20004 in FIG. 20, may learn expected tagresponses by accessing historical data stored in data structure(s)20006, including data regarding tags that were previously triggered inthe region surrounding rack 11250. Also stored in data structure(s)20006 is sales data, enabling the processor(s) 20004 to know when aparticular shirt is sold. As the result, in response to a broadcasttrigger in the area of rack 11250, processor(s) 20004 may determine whenreceiver 1114 b fails to receive an expected response from a tag thathas historically been in that region and may, in some embodiments, querysales data in data structure(s) 20006 to determine if the missing tag isrecorded as having been sold. If the tag is not recorded as having beensold, a lack of response might mean that the tag's energy reserve isdepleted, that the tag malfunctioned, or that the product associatedwith the tag was stolen. The associated tag ID may then be recorded on amissing item list in data structure(s) 20006. If, in the future, themissing tag responds to a trigger signal, the missing item may beremoved from the missing items list. Otherwise, the system may note themissing item on a shrinkage list. In this way, an establishment maymanage its shrinkage in real time. Whenever tags fail to respond for aperiod of time and they are not recorded in the inventory system assold, the system may note the items as either missing, lost, or stolen.Depending on how often a system is configured to take inventory, tiretime of the loss may be isolated and correlated to times other itemswere lost and/or to video surveillance footage. In this way, lack of tagresponse may be used for shrinkage monitoring and for security.

Such a system may even be able to detect suspected theft before itoccurs. For example, in establishments where the protocol is toself-scan products before placing them in a shopping basket, if anunscanned product is detected in motion (away from is historicallocation) but has not been scanned into a basket, the detected movementcould be an early warning of possible loss. A heightened risk may besignaled when movement of multiple products is detected all of which arenot scanned into a basket.

According to some embodiments, computer readable medium may containinstructions for causing a 2.4 GHz device to simultaneously trigger andsequentially read a plurality of identification tags. A 2.4 GHz device,as used herein, refers to any device capable of transmitting and/orreceiving an electromagnetic signal having a frequency in the range of2.4 GHz WW ISM. A frequency range of 2.4 GHz may refer to any one ormore portions of the UHF (Ultra High Frequency) band reserved forradiocommunications between fixed points, radiocommunications betweenmobile and/or land stations, radiolocation services, amateur radioservices, and other particular radiocommunication services. Examples ofdevices that may operate within a frequency band of around 2.4 GHzinclude, but are not limited to, cell phones, handheld scanners,desktops, laptops, video game consoles, smartphones, tablets, smart TVs,and other devices capable of wireless communication. Services and usersof a frequency band of around 2.4 GHz may use certain radiocommunicationtechnologies, such as Wi-Fi, Bluetooth Low-Energy (BLE), and ClassicBluetooth, for wireless local area networking and personal areanetworking.

A 2.4 GHz device, or a 2.4 GHz transmitter may be an exciter deviceconfigured to transmit RF energy in the 2.4 GHz band. The exciter maytransmit energy constantly, periodically, or intermittently, based onthe design or configuration. The signal generated and transmitted by theexciter may be in the form of a radio signal, a magnetic signal, anelectric signal, an electromagnetic signal, an audible or an ultrasoundsignal, a light signal, or any other form of energy capable of excitingan identification tag. In an establishment such as a retail store, forexample, one or more exciters may be located throughout theestablishment. An exemplary 2.4 GHz handheld exciter 11200 isillustrated in FIG. 11. Examples of 2.4 GHz handheld devices may includehandheld tag scanners, Bluetooth-enabled cellphones, tablets,transmitters, and other devices capable of generating signals in the 2.4GHz frequency band.

In some embodiments, the 2.4 GHz device may be configured tosimultaneously trigger a plurality of identification tags. Theidentification tags may include wireless identification tags configuredto receive energy wirelessly and in response to receiving the energy ina range appropriate for the tag, transmit a signal such as anidentification signal. The identification tag is “triggered” or“activated” when it receives an electromagnetic energy or anelectromagnetic signal capable of invoking a response signal. In aretail store environment, merchandise may be tagged with identificationtags for security, tracking, inventory management, or enhancing shoppingexperience for customers. A device may be configured to simultaneouslytrigger a plurality of tags when it is programmed to emit a triggeringsignal with characteristics (e.g., sufficient power) to read not just asingle proximate tag, but a group of tags in a vicinity of the device.The probe or trigger signal may be broadcast to perform an inventoryupdate, an inventory query, a product information query, or otherfunctions requiring retrieval of product-related information.

In some disclosed embodiments, instructions for causing a device tosimultaneously trigger and sequentially read a plurality ofidentification tags may include displaying an activatable element on agraphical user interface, the element being configured to activate a 2.4GHz transmitter. A graphical user interface (GUI) is an interfacethrough which a user interacts with electronic devices such ascomputers, hand-held devices, smartphones, tablets, touchscreen devices,and other appliances. The graphical user interface uses icons, menusand/or other visual indicator (graphics) representations to displayinformation and related user controls. Graphical user interfacerepresentations may be manipulated by a pointing device such as a mouse,trackball, stylus, or a finger on a touch screen. In some embodiments,the graphical user interface may be associated with the device or aprocessor performing the disclosed methods. In other embodiments, thegraphical user interface may be associated with an external computingdevice, such as a mobile phone, a tablet, a laptop, a desktop computer,a computer terminal, a wearable device (including smart watches, smartglasses, smart jewelry, head-mounted displays, etc.), or any otherelectronic device capable of receiving a user input and displayinginformation.

An activatable element of the graphical user interface may be a portion,an icon, a link, a field, a button, or any other feature, which whenselected by a user input such as a touch on a touchscreen, a click on apointing device, a keystroke on a keyboard or a gesture in front of acamera, for example, is configured to respond to the user input. Theactive or the activatable element of the graphical user interface may bedisplayed such that the element is clearly visible on a screen of thegraphical user interface as a textual representation, a pictorialinstruction, or an audible sound file. Alternatively or additionally,the active or activatable element may be displayed such that the elementis not clearly visible on a screen, but rather is hidden (such as, e.g.,a “hot area” that responds to touch gestures without being explicitlyvisible) or hidden part of the time and visible part of the time (suchas, e.g., an element that is hidden unless “hovered” over by a pointingdevice).

In some embodiments, the instructions may cause an activatable elementto be displayed on a graphical user interface of an electronic deviceoperated by a store personnel, prompting him/her to provide a userinput. Upon receiving an input, the element may be activated to performa preassigned function. The activatable element may be configured toactivate a 2.4 GHz transmitter such that one or more signals of 2.4 GHzmay be transmitted.

FIGS. 33A, 33B, and 33C illustrate a few non-limiting examples ofgraphical user interfaces displayed on handheld device 33000, which may,for example, be a cell phone. As a generic example, FIG. 33A is providedfor discussion purposes and illustrates handheld device 33000 displayinga graphical user interface (GUI) 33100 for conducting an inventorysearch by enabling a user to enter data into the GUI 33100, andactivating an element, such as a search button 33006. A search query maybe initiated in many ways, such as by typing search text into a field,by scanning a related product with a scanner in handheld device 33000,or through the use of a drop down menu 33200. The drop down menu mayprovide the user with selection options in order for the user to definea search. Once the search is defined, search button 33006 may be touchedon the touch screen of handheld device 33000 in order to initiate thesearch through a wireless transmission to a receiver, as will bedescribed later in greater detail.

FIG. 33B illustrates handheld device 33000 displaying a product searchGUI 33100. A user searching for a particular product or class ofproducts may be provided with dropdown menu 33200. The drop down menu33200 may provide the user with various ways to search for a product, byeither entering a brand, SKU, inventory number, or model number.Sub-menus might appear following an initial selection. For example, ifthe brand drop down is selected, successive sub-menus might includecategory, product, size, color, or any other product distinguishingcharacteristic. Product images might appear in the GUI, enabling theuser to select the product of interest. After the product is identified,search button 33006 may be activated by touch.

FIG. 33C provides yet another example of a GUI with an activatablebutton for searching. This example addresses the common scenario where acustomer physically locates a product of interest, such as a clothingitem, however the item is not in the customer's size. Instead ofsearching endlessly for the product in the correct size, the GUI 33100may prompt the user to enter information about the product of interest.In this example, the customer (or employee of the establishment) may beprompted to take a picture of the barcode or QR code on the productidentified by the customer. The user may next be prompted via dropdownmenu 33200 to input a desired size, color or other variation of theproduct. After the search is defined, search button 33006 may be touchedto initiate the search.

Following a look up, handheld device 33000 may return alternativesources of information, depending on the nature of the query, systemdesign and/or user permissions. For example, the GUI may be caused todisplay that the requested product is either out of stock or in stock,if the product is out of stock, the GUI might identify a location wherethe product is in stock, or may provide an ability to order the productfor shipment to the customer. If the product is in stock, the GUI mightindicate the name of another department where the product is located. Itmay provide a map of the establishment, indicating a general location ofthe product. The GUI may provide walking directions directing the userto the area of the product. In some instances, as the user approachesthe product's location, the tag of the product may transmit a signaleither directly to handheld device 33000 or via an infrastructuretransmitter in the establishment, to enable the user to hone-in on theproduct's location.

Depending on the nature of a query and the system design, the protocolfor retrieving information may vary in response to activation of the GUIelement. In one arrangement, handheld device 33000 may broadcast asignal to tags in the vicinity, and the tags may transmit theirresponses to handheld device 33000. In other embodiments, handhelddevice 33000 may initially transmit the query to an inventory managementsystem for initial look up. The inventory management system might returnthe IDs of products matching the query. Or, if the item is out of stock,the inventory management system might pro vide that information fordisplay through the GUI. If the product is in stock and a list ofmatching tag IDs is sent to hand device 33000, a transmitter such as a2.4 GHz transmitter in device 33000 might send a trigger signal to causetags in the vicinity to send back their unique tag IDs. A comparisonmight occur on the handheld device or on a remote system, to identify amatch and alert the user. Alternatively, the inventory management systemmay already have a record of where each product is located, and ratherthan having the handheld device 33000 trigger responses from tags, mightinstead alert the handheld device 33000 of the prior known location. Ifthat first step is unsuccessful in locating the physical product, thehandheld device 33000 may only then probe tags in a vicinity.

The foregoing are just a few examples of search protocols and ofgraphical user interfaces with activatable buttons that may be employedwith disclosed embodiments, GUI designs and functionality are endlesswithin the scope of this disclosure.

When an element is activated, a transmitter may cause a query to betransmitted wirelessly via a transmitter. The meaning of the termtransmitter, as used herein, is provided elsewhere in the presentapplication. In some embodiments, upon activation of the element, theexecutable instructions may include activating the 2.4 GHz transmitterto cause each of a plurality of tags in a vicinity of the transmitter tosend a unique tag ID to a receiver associated with the transmitter. The2.4 GHz transmitter may be a stand-alone transmitter configured to emita signal having a frequency around 2.4 GHz, may be part of a device or acircuit, or may be part of a system having multiple devices andcircuits. In some embodiments, a transmitter may be capable of emittinga range of frequencies such as 900 MHz, 58-60 kHz, and/or 2.4 GHz. Inthis context, activating the transmitter may involve selecting thefrequency range as a desired frequency to cause one or moreidentification tags to generate an identification signal, andconfiguring the transmitter to transmit a desired frequency.

The identification tags, in some embodiments, may include an antennaconfigured to receive the signal transmitted by the 2.4 GHz transmitter.An antenna may be configured to receive a particular frequency rangewhen the antenna is appropriately tuned for that function. Consistentwith disclosed embodiments, a 2.4 GHz transmitter, such as an exciter,may only “excite” or activate identification tags located within thetransmission range of tire exciter. Alternatively, an identification tagmay be excited or activated depending on whether the transmitted signalis in the reception range of the tag. Any tag which is located at adistance from a given transmitter which is shorter than the transmissionrange is said to be “within range” of the transmitter, or “in thevicinity” of the transmitter, or “proximate” the transmitter. Forexample, the transmission range of a Wi-Fi access point can range from afew meters when the access point is transmitting data at its maximumdata rate, but may extend to dozens of meters (sometimes even 100 metersor more) when transmitting at its lowest data rate. One of thedifferences between those two conditions is the receiver sensitivity,which may be at a much lower power level for the low data rate comparedwith the high data rate. In the same manner, walls, people, furnitureand other obstacles or reflectors may reduce or extend the transmissionrange by changing the attenuation of the communication medium, withoutany change of the transmitted power level or the receiver sensitivity.

The identification tag may further include a transmitter configured totransmit an identification signal in response to receiving a signal fromanother transmitter such as the 2.4 GHz transmitter in handheld device11200 illustrated in FIG. 13). The signal transmitted by a tag mayinclude an identification signal, which may be unique to the tag. Forexample, the identification signal may include a unique identificationcode or a sequence permitting the tag to be identified by a processoraccessing a data structure.

Consistent with some disclosed embodiments, the signals transmitted byone or more tags may be received by a receiver associated with thetransmitter that caused the identification tag to transmit anidentification signal in response to the excitation signal. As usedherein, an association between two components or devices may refer tobeing in direct or indirect wired or wireless electronic communicationor logical connection with each other, constantly or intermittently, orin response to an activity that may require both the components tocooperate. For example, if a processor causes a transmitter in a systemto transmit a signal so that a receiver in the same system receives aresponse caused by that signal, the transmitter and the receiver may besaid to be “associated with” each other. In some embodiments, a receivermay be associated with more than one transmitter, or more than onereceiver may be associated with a single transmitter, or multiplereceivers may be associated with each of the multiple transmitters. Inthe case of a handheld transmitter, such as handheld device 11200 inFIG. 11, the transmitter and receiver may be considered associatedbecause they may be contained within the same housing and/or may beconnected to the same processor or to other circuits. They may furtherbe considered associated because the transmitter of the device may senda triggering signal to tags in order to cause the tags to respond withsignals for receipt by the receiver contained within the same device.

One or more receivers may be associated with the 2.4 GHz transmitter,consistent with some disclosed embodiments. In some embodiments of thisdisclosure, the 2.4 GHz transmitter and the associated receiver may bothbe a part of the same device, such as a device that is part of fixedinfrastructure or a handheld device, as was described earlier. Otherexamples of handheld devices include a handheld scanner provided to anemployee or a customer by the establishment for use during workingroutines or in a shopping session; a mobile communications device ofsuch an individual (e.g., cellphone, tablet, dedicated hardware, etc.);or any other handheld device capable of performing the functions of areceiver. A customer or employee may, for example, use handheld device11200 as a handheld scanner, which may be a device dedicated to scanningor any other mobile device capable of performing the functions of atransmitter and the associated receiver. Such a configuration may be inplay, for example, when a customer uses a handheld scanner to scan theidentification tag to receive product information such as pricing,expiry, inventory, etc. In some embodiments, the handheld scanner mayinclude one or more transceivers, each of which is configured to deliverenergy 12100 to the wireless communication tags (similar to exciters11400 a-e) and to receive broadcasts of ID signals 12200 from thewireless identification tags (similar to receivers 11300 a-h); that is,each transceiver may act both as an exciter and a receiver. In somealternative embodiments, such as the embodiment illustrated in FIG. 11,exciters 11400 and receivers 11300 may be configured as separatedevices.

In some disclosed embodiments, the executable instructions may furtherinclude reading a first group of the plurality of unique tag IDs duringa first time interval, wherein the first group excludes a second groupof the plurality of unique tag IDs. As alluded to earlier, one ofseveral issues encountered in inventory management using wirelessidentification systems includes “signal collision” which may limit areceiver's ability to accurately detect, receive, and/or interpret morethan one signal at a time. Signal collision may occur when, more thanone signal arrives at a receiver while the receiver is actively readinga signal. In some cases, signal collision may cause an irreversible lossof information associated with one or more signals at the receiver.

Some aspects of this disclosure relate to sequentially reading theidentification signals generated by a plurality of identification tagsin response to an excitation signal (also referred to in this disclosureas a probe or probing signal or as trigger or triggering signal)transmitted by an exciter, such as a 2.4 GHz transmitter. As usedherein, sequential reception refers to a phenomenon where at any giventime, a limited number of discrete signals (e.g., one signal) may bereceived and/or interpreted. This may enable, at the output of thereceiver, the received signals to be listed in an ordered,non-overlapping, sequential list. In some alternative embodiments,signals may arrive at the receiver in a random or a pseudo-randommanner, which means that there is no guarantee that any particularsignal will be accurately received and interpreted. Although the riskmay be infinitesimal, there is a statistical possibility that multiplesignals will arrive simultaneously at a receiver, causing a collisionand blocking the reception of both signals. The chance of such anoccurrence may depend on traffic volume, the rate of signals over thechannel and the length of time of each signal. However, after removingall collision signals (which, assuming the signals are short enough andsparse enough, may constitute a very small portion of all signals), allremaining signals would be accurately received and interpreted by asequential receiver, thereby resulting in a sequential list of receivedsignals.

Thus, In some embodiments, a receiver might read less than ail signalsarriving at the receiver. The signals that are read may constitute afirst group. The signals that are not read at the same time mayconstitute a second group.

The instructions may further include recording information associatedwith the first group of unique tag IDs. The recorded first informationmay include the tag IDs of the first group, excluding the tag IDs of thesecond group. Recording data, as used herein, may refer to saving,writing, tabulating or otherwise applying to a medium identifying, fromamong the at least some of the unique tag IDs of the first group and theunique tag IDs of the second group, unique tag IDs that were read withthe first group, information that may be accessed at a later point intime. The recorded data may include both the available data itself, aswell as other relevant pieces of information associated with the datasuch as time-stamp, signal strength, the entity performing therecording, or any other information regarding the circumstances of therecording of the data which may be useful at a later time. Theinformation may be recorded in a database, a data structure, a server, acomputer, a memory, a network, or other system capable of storinginformation. The information may be recorded in a format such that itmay be accessed at a later point in time by using a query executedusing, for example, a processor or the transmitter device. Theinformation associated with the first group of unique tag IDs mayinclude information related to, but is not limited to, pricing, style,size, quantity, cleaning instructions, or storage instructions of apiece of clothing, for example. The first group of unique tag IDs mayrepresent identification tags associated with a particular product, or acategory of the product, or products located in a particularzone/section of the establishment. For example, first group mayrepresent items of the furniture section of the store, or the stationerysection, or the pharmacy section of the store. Alternatively oradditionally, first group may represent a random collection of tags fromamong the plurality of tags that responded to the transmitted trigger.

As used herein, a time interval may refer to a period of time that maybe measured between the occurrence of two events in the system. The twoevents may be, for example, an input, stimulus or trigger into a circuitand the output or action performed by the circuit, or two occurrences ofan input, stimulus or trigger, or two occurrences of an output or actionof the same circuit, or of different circuits. When measuring timeintervals between repeating occurrences of the same event (whether suchevents are inputs or outputs), one may refer to an average time intervalas the periodicity of the events and to the deviation from the averagetime interval as the variance in the periodicity. In such cases wherethis kind of periodicity occurs, one may calculate the frequency of theevents as the inverse of the average time interval between events, andthe duty cycle of the events as the ratio between the average timelength of each event (from the start of the event to its finish time)and the average time interval between events (as measured from the startof one event to the start of the succeeding event).

A time interval when the first group of unique ID tags is received maybe on the order of milliseconds, for ex ample. It may be defined as aperiod of time in which some signals arriving at a receiver aredecipherable by the receiver, while other signals are not, due, forexample, to signal collision or receiver overload.

In some embodiments, time intervals may be predetermined. For example,consistent with some disclosed embodiments, sequential reception mayinvolve reading a group of unique tag IDs for a predetermined length oftime. That is, a first time interval may end at a preprogrammed time,which could be a fixed number or might be set by algorithm depending ona variety of factors. For example, interval times may be based on thetransmission range of the identification tag, power level of thetransmission signal, frequency, total detected traffic volume, and/orother factors that may attenuate or enhance signal reception. Forexample, the interval may be 5 milliseconds (ms) or less, 4 ms or less,3 ms or less, 2 ms or less, 1 ms or less, or 0.5 ms or less. Followingthe interval, the receiver may be deactivated for a time interval, ormay immediately begin reading in a second interval. For example, in someembodiments, after reading the first group, the 2.4 GHz device maymaintain activation of the transmitter during a second time interval, tocause transmission of at least some of the unique tag IDs of the firstgroup along with the unique tag IDs of the second group to the receiver.This may occur as a precautionary measure, as the receiver may not knowthat it missed some responsive signals. Thus, the transmitter may remainactive to cause the tags in the vicinity to respond a second time duringa second time interval following the first time interval. The secondtime interval may have the same or similar characteristics to the firsttime interval, as discussed above. During the second time interval, atleast some of the first group of tag IDs will be received again, alongwith unique tag IDs of the initially excluded second group. However, allof the tags IDs of the first group may not be read in the secondinterval. The excitation signal during the second time interval will notonly activate the second group of identification tags but will alsoactivate at least some of the identification tags of the first group aswell. As a result, signals from tags in the first and second groups willbe received during the second time interval.

The 2.4 GHz device may be repeatedly activated or maintained in itsactivated state through even more than two time intervals until eachunique tag intended to be scanned has been read. While described inconnection with a 2.4 GHz device, in a broader sense, any frequencydevice may be employed, including, for example devices that operate in a900 MHz frequency range or other ranges in which a tag is able toreceive energy and be triggered.

In one use case example, a store manager may activate one or moreexciters of the establishment or use a handheld device to generate aninventory status report at the end of the work day. Because of thesignal collision arising from multiple transmission signals arriving atthe receiver simultaneously, there is a potential risk of irreversibleloss of information, misreads (data mixing from other tags), missedreads (the tag not being read at all), signal crosstalk, or otherdefects that may affect the data reliability and accuracy. To minimizethe risk that some data might not be received, the transmitter mightrepeatedly probe tags in a series of time intervals until a confidencelevel is reached that ail tags are accounted for. Thus, the device maybe configured to continue transmitting the excitation signal to activatethe identification tags repeatedly until the unique tag ID of each tagof the plurality of tags is individually read and recorded.

The second information associated with the second group may be recordedafter reading the at least some of the unique tag IDs of the first groupalong with the unique tag IDs of the second group. Although the firstgroup of signals may have been already recorded in response toinformation read during the first time interval, they may be received inthe second time interval as well, along with the second group that werenot recorded initially. After both are read, the second group may thenbe recorded.

For example, as a 2.4 GHz transmitter continues to transmit theexcitation signals during a second interval, each tag within thetransmission range of the transmitter may be excited, regardless ofwhether the tag was excited during a first time interval. Therefore, thegroup of unique tag IDs received during the second time interval, mayinclude the second group not initially received in addition to one ormore of the first group of unique tag IDs received during the first timeinterval. Since the first group was already recorded, the secondinformation that is recorded may exclude the first group, and onlyinclude the second group. Alternatively, the second information mayinclude information relating to at least some of the first group. Forexample, time stamps associated with the first group might be updated toreflect the last time they were read.

Consistent with some disclosed embodiments, recording the secondinformation may involve identifying the unique tag IDs that were readwith the first group, and excluding the information associated with theidentified unique tag IDs of the first group. As discussed above, sincethe first group was already recorded, there may not be a need to recordthat information again, and therefore it might be excluded fromrecordation the second time mound.

Exclusion may involve comparing tag IDs read during the first and secondtime intervals, and omitting from recording those from the second timeinterval that were already recorded in the first time interval. Toaccomplish this, both tag IDs and timestamps may be accessed. Forexample, each unique tag ID received by a receiver may be time-stampedand those time stamps may be used as a way of avoiding repeat recordingof the same tag. In some embodiments, the non-transitory computerreadable medium may contain instructions that when executed cause adevice to display at least one of the first information or tire secondinformation on the graphical user interface. After receiving the firstand the second information associated with the first group and thesecond group of unique tag IDs, respectively, the device may beconfigured to display one or both of the first and the secondinformation on a screen of the graphical user interface, or to displaypart of the first information, part of the second information, or partof each. In some disclosed embodiments, the first and/or the secondinformation may be displayed on the graphical user interface afterreceiving and recording the information in a database or a datastructure. In some other embodiments, the graphical user interface mayinclude an interactive display configured to receive user input.Alternatively or additionally, derivative data may be provided. Forexample, in connection with the end of the day inventory check discussedabove, if tag IDs are not received from tags associated with unsoldproducts in the inventory management system, the display might indicatethose products as lost or stolen.

In some aspects of the present disclosure, each tag of the plurality oftags is associated with a unique tag ID and is configured to encrypt theunique tag ID thereof and send tire encrypted tag ID to the receiver. Atag may be configured to encrypt its associated unique tag ID andtransmit the encrypted tag ID to a receiver, in response to anexcitation signal generated by ail exciter or a 2.4 GHz device. In someembodiments, the encrypted tag ID may be a part of the identificationsignal sent to one or more receivers associated with the exciter. Insome alternative embodiments, the encrypted tag ID may be sent to tirereceiver as a separate signal.

In some aspects of the present disclosure, the instructions stored inthe non-transitory computer readable medium may include continuouslyactivating a transmitter to cause each of the tags to continuously sendto the transmitter the unique tag IDs. As previously alluded to, adevice may probe tags in two or more intervals. The probing may becontinuous until a confidence level is reached that ail responses arereceived and read. Thus may occur through continuous activation of the atransmitter (such as a 2.4 GHz transmitter) and a an associated receivermight similarly continuously receive and eliminate duplicates until nonew tag IDs are received.

In some disclosed embodiments, the instructions may further includesequentially reading each unique tag ID which may be a part of theidentification signal transmitted by a tag in response to an excitationsignal. Sequentially reading each unique tag ID may involve receivingone unique tag ID at a time or receiving one unique tag ID during a timeinterval. As a result, each incoming unique tag ID may be received andinterpreted accurately to process the associated information. Theprocessed information may be listed in an output signal formatcomprising an ordered, non-overlapping, and sequential list of receivedsignals. In some disclosed embodiments, the instructions may furtherinclude aggregating data associated with each unique tag ID to constructan inventory of products simultaneously activated and sequentially read.Upon sequentially receiving each unique tag ID, the data associated witheach unique tag ID may be compiled, ordered, and stored in the databaseto form an inventory of products or tags representing the products whosetag IDs were sequentially read.

In some aspects of the present disclosure, the non-transitory computerreadable medium may contain instructions to display on the graphicaluser interface an inventory of information associated with the pluralityof tags in the vicinity of the transmitter. Inventory informationderived as the result of the processes described herein may be used todisplay information on the GUI of a device seeking the inventoryinformation, as discussed earlier. For example, consistent with someembodiments, inventory of information may include a list or a collectionof information associated with at least one of a tag ID, an ownershiphistory list, an encryption key, an SKU, or a location associated witheach of the plurality of tags. The inventory of information may includea wide range of information directly or indirectly associated with thetag or tags or the item or items to which the tags are attached. Forexample, a directly associated information may include location of thetag within the store, which may correspond to the location of theproduct in the store. As used herein, an encryption key may refer to apassword or a passcode, or any piece of data that enables a user to gaincontrolled access to confidential or non-public information. Theinventory of information may further include information associated withan SKU (Stock Keeping Unit) of an item. A SKU may be a number, code orother form of data which is uniquely associated with a type of product,item, object, material etc. as part of a stock management system,inventory keeping system, or other such data management platform.Examples of SKU's are EPC codes, barcodes, ISBN codes, product numbers,part numbers, catalog numbers, etc.

In some disclosed embodiments, the non-transitory computer readablemedium may store instructions to enable a user to identity a missingproduct, and displaying on the graphical user interface an indicationthat the missing product is in the vicinity of the transmitter. Theinstructions may include analyzing data within the inventory ofinformation to identify missing products. The analysis may includeexecuting a query to compare an inventory data of “available items” tothe inventory of items physically located in the store. In someembodiments, if the inventory of available items in the database is notupdated, the instructions may additionally include comparing a databaseof “sold items.” If the item does not exist in the sold items databaseand the physical location database, but exists in the inventory data ofthe available items, the item may be identified as “missing.” Uponidentification, the instructions may include displaying the indicationon the graphical user interface that the product is missing. Additionalinformation relating to location of missing items is described inconnection with FIGS. 33A, 33B, and 33C.

In some disclosed embodiments, the instructions may further includedisplaying a location of the missing product on the graphical userinterface. For example, the graphical user interface may not onlydisplay the information that the product is missing, but also displaytire information associated with its original location from which it ismissing. This information may be displayed on the graphical userinterface to which the user has access. Some mechanism for identifyinglocations of missing items are described herein in connection with FIGS.33A, 33B, and 33C.

Some aspects of the present disclosure relate to a device forsimultaneously triggering and sequentially reading a plurality of tags.The device may include a 2.4 GHz transmitter, a receiver, and at leastone processor. The at least one processor may be configured to, forexample, activate the 2.4 GHz transmitter, activate the receiver tosequentially receive the transmitted signals from the plurality of tags,record the information received by the receiver, among other functionsdepending on the mode of operation.

In some disclosed embodiments, the processor may be configured toperiodically activate the 2.4 GHz transmitter to cause each of aplurality of tags in a vicinity of the transmitter to send a unique tagID to the receiver. The processor may activate the transmitter by, forexample, modulating the current supplied to the transmitter or a part ofthe circuit of the transmitter to cause the transmitter to emitelectromagnetic waves having a frequency in tire range of 2.4 GHz. Theemission of the electromagnetic signals may activate one or moreidentification tags located within the transmission range or in thevicinity of the transmitter. Upon activation, each of the identificationtags may send a unique tag ID to the receiver associated with thetransmitter. In some embodiments, the unique tag ID may be a part of theidentification signal transmitted from the tag.

Consistent with some disclosed embodiments, the 2.4 GHz transmitter maybe periodically activated. Periodically activating the 2.4 GHztransmitter may involve activating the 2.4 GHz transmitter at apredetermined time interval. This means that the transmitter may be inan activated state, actively generating excitation signals for a timeinterval. The time interval may be followed immediately by a second timeinterval of activation, or there may be a period of inactivity betweentwo active state intervals. In the latter instance, the periodicity ofthe activated state and the deactivated state may be predetermined, oradjusted based on the information desired. For example, the transmittermay be activated every 30 seconds followed by a deactivation for 30seconds, resulting in a duty cycle of 50%, or the transmitter may beactivated every 10 seconds followed by a deactivation for 30 seconds,resulting in a duty cycle of 25%, Alternatively, the processor mayrandomly select a time interval between two consecutive activations ofthe 2.4 GHz transmitter. In some embodiments, the processor may randomlyselect a time interval between two consecutive deactivations as well.

The processor may further be configured to read a first group of theplurality of unique tag IDs during a first time interval, wherein thefirst group excludes a second group of the plurality of unique tag IDs.The signals transmitted from each of tire tags may be received by one ormore receivers (e.g., a receiver in a handheld device such as in 11200or receivers 11400 a-h) for a length of time, defined herein as thefirst time interval. The signal may include a plurality of unique tagIDs associated with the plurality of identification tags responding tothe excitation signal received from the 2.4 GHz transmitter. Uponreceipt, the processor may record the information associated with thegroup of unique tag IDs received during the first time interval.

After reading the first group, the processor may be configured tomaintain activation of the 2.4 GHz transmitter during a second timeinterval, to cause transmission of at least some of the unique tag IDsof the first group along with the unique tag IDs of the second group tothe receiver. In some embodiments, tire processor may re-activate the2.4 GHz transmitter, based on the duty cycle, for a second time intervalto excite the plurality of identification tags such that each of theidentification tag in the transmission range of the transmitter mayrespond to the excitation signal by transmitting a unique tag ID to thereceiver associated with the transmitter. In a periodic activation cycleof the transmitter, the second time interval may be substantiallysimilar to the first time interval. The second group of unique tag IDsmay include, in addition to the new group of unique tag IDs, some of theunique tag IDs already-sent to the receiver as well.

After reading the at least some of the unique tag IDs of the first groupalong with the unique tag IDs of the second group in the second timeinterval, the processor may be configured to record second informationassociated with the second group. Because the excitation signalactivates all the plurality of identification tags in its transmissionrange, the as-received second group of unique tag IDs may includeduplicate unique tag IDs from the first group already sent to thereceiver. Tins may cause the same tag to be read multiple times.

Based on the received first and second group of unique tag IDs, theprocessor may be configured to identify, from among the at least some ofthe unique tag IDs of the first group and the unique tag IDs of thesecond group, unique tag IDs that were read with the first group. Theprocessor may identify from the second group, unique tag IDs that wereread with the first group and may label the identified unique tag IDs inthe second group that were read with the first group as “duplicate,” forexample. The processor may use any labeling or tagging technique todifferentiate the unique tag IDs that were already read with the firstgroup from the unique tag IDs read in the second time interval. Theprocessor may then record the second information while excludinginformation associated with the identified tag IDs that were read withthe first group. Information may be excluded from being recorded asecond time because of its duplicate nature. In some disclosedembodiments, the processor may be configured to update a data structurewith at least one of the first information or the second information.For example, when there are new items or replaced items shelved in astore, not existing prior to the last inventory update scan, theprocessor may determine the new additional items and update a datastructure, such as a memory, a server, a cloud based network, or anyform of storing data.

Embodiments of the present disclosure may relate to methods, systems,devices, and computer readable media for a wireless identification tagconfigured to collect and store ambient energy for use in delayedtransmission. For ease of discussion, aspects of methods, systemsdevices and computer readable media are discussed interchangeably hereinsuch that reference to one form is equally applicable to another formand is therefore not necessarily repeated. In addition, some aspects ofsome embodiments may occur electronically over a network that is eitherwired, wireless, or both. Other aspects may occur using non-electronicmeans. In the broadest sense, the disclosed embodiments are not limitedto particular physical and/or electronic instrumentalities, but rathermay be accomplished using many differing instrumentalities.

According to some embodiments, the wireless identification tag maycollect and store ambient energy. Collecting ambient energy may includewirelessly gathering, harvesting, and/or acquiring energy from anexternal source or environment of the tag. Storing ambient energy mayinclude accumulating, saving, or aggregating the collected ambientenergy for use at a future time.

FIG. 11 illustrates a non-limiting embodiment of a plurality of wirelessidentification tags (e.g., tag 1100 a and/or tag 1100 b) operating in anenvironment such as a clothing retail establishment. For example,environmental exciters such as exciters 11400 and mobile devices such asdevice 11200 may emit wireless signals carrying energy inelectromagnetic fields, which may contribute to the ambient energy inthe environment. The tags may be configured to collect and store theambient energy from some or all of these wireless signals present in theestablishment.

In some embodiments, the exemplary wireless identification tag may beconfigured to use stored ambient energy for delayed transmissions. Incontext of electrical or electronic circuits, the act of transmittingmay involve transforming a signal or energy from a conducted input to aradiated output, often by a transmitter through an antenna. A delayedtransmission may be an action of transmitting a signal or energy after aprior event (such as a trigger or investigating event), with a timedelay occurring between the prior event and the transmission. Here, atime delay may be a time interval between two events; the time delay mayhave a predetermined duration, a duration selected randomly orpseudo-randomly, or a duration otherwise selected by user input and/orby a controller of the wireless identification tag. In some embodiments,the prior event occurring before the time delay may include, but is notlimited to, receiving and/or storing energy (e.g., ambient energy),receiving a request or a command to transmit a signal or energy, aninitiation or completion of a task, or meeting or failing to meet acriteria.

According to some embodiments, a prior event occurring before the timedelay may be the reception of ambient energy by the wirelessidentification tag and the storage of the ambient energy for later useby the wireless identification tag. For example, instead of immediatelyexpending the received ambient energy in a transmission, the wirelessidentification tag may store the received ambient energy for atransmission at a later dine. The transmission at the later dine may bean example of the delayed transmission. Additionally or alternatively, aprior event may be a determination that the amount of ambient energystored in the wireless identification tag is equal to or greater than afirst threshold value, and the wireless identification tag may delaytransmission of a signal until the level of stored ambient energy isequal to or greater than a second threshold value, higher than the firstthreshold value.

In various embodiments, the wireless identification tag may include areceiver for receiving ambient energy. A receiver may be any component,group of components, or circuitry capable of receiving a signal over acommunication medium. The communication may take the forms of Wi-Fi,Bluetooth, cellular communication, Ethernet communication or any otherstandards-based or proprietary protocol. In some embodiments, a receivermay include an antenna and one or more of an oscillator, demodulator,filter, amplifier, frequency tuner and/or other circuit elements.

In some embodiments, the receiver may be tuned to ambient energytransmitted at specific frequencies. For example, a receiver may beconfigured such that its antenna and associated components are tuned toelectric and/or magnetic fields of a specific frequency, or a specificset of frequencies. In some embodiments, the wireless identification tagmay include multiple receivers, each tuned to receive ambient energytransmitted at a different frequency.

For example, the wireless identification tag may include a firstreceiver for receiving ambient energy transmitted at a first frequencywithin a frequency band around 2.4 GHz. Additionally or alternatively,the wireless identification tag may include a second receiver forreceiving ambient energy transmitted at a second frequency within afrequency band around 900 MHz. Or, a single receiver may be capable ofreceiving both a first frequency within a frequency band (e.g., around2.4 GHz), and a second frequency in a frequency band (e.g., around 900MHz.)

FIG. 9 illustrates non-limiting embodiments of a wireless identificationtag including a receiver for receiving ambient energy. The receiver mayinclude multi-source harvester 2102, gate detection circuit 2106, andmemory 9022 (or a portion of the foregoing), which may also be coupledto top level controller 9020. Multi-source harvester 2102 may include2.4 GHz harvester 9014, which may be coupled to 2.4 GHz antenna 2114through switch 9034; 900 MHz harvester 9012, which may be coupled to 900MHz antenna 2112; and power manager 9010, which may be coupled to toplevel controller 9020. By way of example, 2.4 GHz harvester 9014 and 2.4GHz antenna 2114 may constitute the first receiver, and 900 MHzharvester 9012 and 900 MHz antenna 2112 may constitute the secondreceiver. It should be noted that each of the forgoing components may bemade up of multiple circuits, and therefore reference to a circuit mayrelate to a single component or portion thereof.

In various embodiments, the wireless identification tag may include afirst capacitor for storing the ambient energy. A capacitor may includeany capacitive structure used to store an electrical charge through theuse of charged plates separated by insulation. Examples of capacitorsmay include ceramic capacitors, film capacitors, power film capacitors,electrolytic capacitors, supercapacitors, class X and class Ycapacitors, MOM capacitors (Metal-Oxide-Metal capacitors) implementedinside a semiconductor device, MIM capacitors (Metal-Insulator-Metalcapacitors) implemented inside a semiconductor device, MOS capacitors(Metal-Oxide-Semiconductor capacitors) implemented inside asemiconductor device, other miscellaneous or variable capacitor. Asshown in FIG. 10 and FIG. 34, energy storage circuit 2108 may contain afirst capacitor, illustrated by way of example only as storage capacitor10300. The storage capacitor 10300 may be electrically connected throughthe circuitry illustrated in FIG. 10 and FIG. 34 to 900 MHz harvester9012 and 2.4 GHz harvester 9014 in order to store ambient energyreceived by those harvesters. While illustrated as a single capacitor,there may be multiple storage capacitors for storing ambient energy.

In various embodiments, the wireless identification tag may include asecond capacitor for collecting and storing the ambient energy, thesecond capacitor having lower capacitance than the first capacitor.Additionally or alternatively, the wireless identification tag mayinclude a plurality of second capacitors for collecting and storingambient energy, and each of the plurality of second capacitors may eachhave lower capacitance than the first capacitor. A capacitance of acapacitor describes the ability of a capacitor to store electricalcharges at a given electric potential (i.e., voltage). Capacitance maybe measure in units of farad (F), milli-farad (mF), micro-farad (μF),nano-farad (nF), or pico-farad (pF). By way of example, as illustratedin FIG. 35, a second capacitor may include transfer capacitor 35300disposed between energy harvester 35100 and storage capacitor 10300. Insome embodiments, energy-harvester 35100 may correspond to one of 2.4GHz harvester 9014 and 900 MHz harvester 9012. In yet another embodimentillustrated in FIG. 34, a second capacitor may include one of transfercapacitors 34100 and 34102 disposed between storage capacitor 10300 and900 MHz harvester 9012. A second capacitor may also include, by way ofexample, one of capacitors 34104 and 34106 disposed between storagecapacitor and 2.4 GHz harvester 9014.

In some embodiments, the capacitance of the second capacitor may be lessthan 1 nF. Alternatively, the capacitance of the second capacitor may beless than 100 pF. In other embodiments, the capacitance of the firstcapacitor may be at least 10 nF or at least 100 nF.

In various embodiments, the wireless identification tag may include aninductor interconnecting the first capacitor and the second capacitor.An inductor may include any electronic component that stores energy inthe form of a magnetic field. For example, it may include a reactivestructure used to store energy in a surrounding magnetic field throughthe use of conducting pieces, which may be wounded around a core.Examples of inductor structures may include air core inductors, RFinductors, litz wire, ferromagnetic inductors, film inductors,multi-layered inductors, variable inductors, choke, and othermiscellaneous inductors. By way of example, as illustrated in FIG. 35,inductor 34140 may be disposed in between storage capacitor 10300 andtransfer capacitor 35300. In another example illustrated in FIG. 34,inductor 34140 may be disposed in between storage capacitor 10300 andtransfer capacitors 34100, 34102, 34104, and 34106.

In various embodiments, the wireless identification tag may includecircuitry interconnecting the receiver, the first capacitor, and thesecond capacitor. A circuit or a circuitry, as used in the presentdisclosure, may refer to a component, or a combination of components,elements, and/or devices, which may be electronically coupled by wiredor wireless connections. In some embodiments, a circuit may beimplemented as part of a silicon chip, as part of a printed-circuitboard, as part of a connectorized system or as a combination of any ofthe above, connected in a manner enabling the performance of a desiredfunction or reaction as a response to some inputs, stimuli and/ortriggers, generated either internally or externally. A desired functionor reaction includes, but not limited to, control of other circuits,generating visual, audible, or otherwise communicable alerts or signals,causing a transmission, and/or performing any other operation. Forexample, the components, elements, and/or devices may include, but arenot limited to, resistors, capacitors, inductors, conductors,transistors, diodes, transmission lines, inverters, buffers, logicgates, latches, flip-flops, amplifiers, comparators, voltage sources,current sources, switches, and/or other electrical devices. Inputs,stimuli and/or triggers may include, but are not limited to, a voltagelevel, a voltage level change, a current level, a current level change,a frequency, amplitude or phase change of a received signal, a digitalinput, a digital pulse, a control word, and/or other signals in variousform of energy. As used herein the term “circuit” or “circuitry” mayinclude two or more electrically connected components, which may beconsidered a single circuit or multiple circuits.

By way of example, as illustrated in FIG. 35, circuitry may include someor all of switches 35200 and 35202, configured to connect/disconnectenergy harvester 35100 (one example of a receiver) to transfer capacitor35300 (one example of a second capacitor); switches 35204 and 35206,configured to connect/disconnect transfer capacitor 35300 and inductor34140; and switch 34134, configured to connect/disconnect inductor 34140and storage capacitor 10300 (one example of a first capacitor).

In various embodiments, the circuitry may interconnect the receiver, thefirst capacitor, and the second capacitor in a manner such that ambientenergy received by the receiver may be initially stored in the secondcapacitor, and is subsequently transferred to and stored in the firstcapacitor. As previously discussed, the second capacitor may be atransfer capacitor for temporarily storing ambient energy collected inform of electrical energy, and the first capacitor may be the storagecapacitor functioning as the main store of the collected ambient energyin a form of electrical energy.

In a given circuit, electrical charges may flow from one portion toanother, redistributing themselves in order to equalize the electricpotential across the entire circuit. This may detrimentally affect theamount of energy stored in the storage capacitor since the amount ofstored energy is not proportional to the amount of charge, and energy islost when charges are redistributed between capacitors. The additionalissue of leakage from the storage capacitor may be mitigated byemploying one or more additional circuit elements in between the storagecapacitor and the rest of the circuit, such that the additional circuitelements prevent unwanted discharge of energy stored in the storagecapacitor. The additional circuit elements may include active andpassive elements, such as switches, resistors, capacitors, inductors,and other circuit components.

In some embodiments, the receiver may receive ambient energy, andconvert that energy into a usable or storable form. In the context ofelectric and electronic circuits, the ambient energy may be receivedfrom electric and/or magnetic fields, and then converted into electricalenergy. The converted energy is first collected in the second capacitor,and then transferred to the first capacitor. The first capacitor, secondcapacitor, and inductor may be interconnected by a series of switchesconfigured to connect/disconnect these components to and from eachother. The use of the second capacitor, connected by switches, as anintermediary between the receiver and the first capacitor, may mitigatethe issue of unwanted energy discharge by helping to isolate the firstcapacitor. In some embodiments, the transfer of energy may be performedthrough the inductor disposed in between the first and second capacitor,which may improve the energy transfer efficiency between the first andsecond capacitor. For example, if there is no inductor between the firstand second capacitor, the energy from one capacitor will flow to anothercapacitor until the voltages of the capacitors equalize. This situationresults in inefficient energy storage, since the voltage of the firstcapacitor would be limited by the voltage of the second capacitor, whichin turn would limit the amount of energy the first capacitor may store(since, if the voltage of the first capacitor is higher than the secondcapacitor, energy will flow away from the first capacitor and into thesecond capacitor to equalize the voltages).

When an inductor is provided, a different energy transferring mechanismmay occur. An inductor connected to a capacitor may form a harmonicoscillator, and the energy may flow between the inductor and thecapacitor as an oscillation. Taking advantage of the oscillation,switches may be timed to disconnect the inductor and the capacitor at atime when the energy is predominately residing in one element and not inthe other, trapping most of the energy in only one element. With thisconfiguration, energy may be continuously transferred from the secondcapacitor to the first capacitor, even if the first capacitor may have ahigher voltage level than the second capacitor.

In a non-limiting embodiment illustrated in FIG. 35, energy harvester35100 may receive ambient energy transmitted at one of 900 MHz frequencyband and 2.4 GHz frequency band, and transform the received ambientenergy into electrical energy for storage. During a time period when theambient energy is being collected, switches 35200 and 35202 may connectenergy harvester 35100 to transfer capacitor 35300. When the ambientenergy collection period ends, swatches 35200 and 35202 may disconnectenergy harvester 35100 from transfer capacitor 35300. In some instances,the ambient energy collection period may end when transfer capacitor35300 has collected a sufficient level of energy (i.e., the capacitor isfull). Alternatively or additionally, the collection period may end whenthe wireless identification tag determines that energy harvester 35100is not currently collecting energy; when such a determination is made,the wireless identification tag may transfer the energy stored in thetransfer capacitor 35300 to the storage capacitor 10300, even iftransfer capacitor 35300 is not full.

Switches 35204 and 35206 may connect transfer capacitor 35300 andinductor 34140 during a time period when the ambient energy collected intransfer capacitor 35300 is being transferred for storage. In someinstances, the transfer period may occur at the end of the collectionperiod, such as when transfer capacitor 35300 has collected a sufficientlevel of energy. At the end of the transfer period, switches 35204 and35206 may disconnect transfer capacitor 35300 from inductor 34140 toprevent energy from flowing back from the transfer capacitor 35300. Theend of the transfer period may be based on an LC characteristic oftransfer capacitor 35300 and inductor 34140, timed such that most of theenergy from transfer capacitor 35300 has flowed to inductor 34140.

Switch 34134 may connect inductor 34140 to storage capacitor 10300 toallow energy from the inductor 34140 to transfer to storage capacitor10300. Switch 34134 may then be disconnected at a time when most of theenergy has flowed from the inductor 34140 to storage capacitor 10300.

According to some embodiments, the wireless identification tag mayinclude at least one circuit 35150 configured to generate controlsignals 35402, 35406, and 35408 to command the switching operations ofswitches 35200/35202, 35204/35206, and 34134 respectively. Circuit 35150may be designed to generate the control signals with specific timing sothat ambient energy can be transferred from energy harvester 35100 totransfer capacitor 35300, then to inductor 34140, and then to storagecapacitor 10300.

In some embodiments, circuitry may interconnect the first receiver, thesecond receiver, and the first capacitor in a manner such that theambient energy received by the first and second receivers at the firstand second frequencies is transferred to and stored in the firstcapacitor. Such circuitry may include any component or group ofcomponents between receivers and at least one capacitor that enablesreceived energy to be stored. The circuitry described previously may bemodified to incorporate multiple receivers configured to collectdifferent sources of ambient energy. By way of a non-limiting example,FIG. 34 illustrates 900 MHz harvester 9012 and 2.4 GHz harvester 9014coupled to storage capacitor 10300 to collect ambient energy received inthe 900 MHz frequency band and the 2.4 GHz frequency band.

In some embodiments, the wireless identification tag may include a thirdcapacitor for collecting and storing ambient energy, the third capacitorhaving lower capacitance than the first capacitor, and wherein theinductor may interconnect the first capacitor and the third capacitor.Additionally or alternatively, the circuitry may interconnect the firstcapacitor, the third capacitor, and the inductor in a manner such thatthe ambient energy initially stored in the third capacitor issubsequently transferred to and stored in the first capacitor. There maybe more than one transfer capacitor disposed between the receiver andthe first capacitor. Multiple transfer capacitors may be provided toincrease an efficiency of ambient energy collection. In some embodimentsthe capacitance of each of the second capacitor and third capacitor isless than 1 nF.

In some embodiments, the circuitry may interconnect the receiver, firstcapacitor, the second capacitor, and the third capacitor in a mannersuch that ambient energy received by the receiver is initially stored inat least one of the second capacitor or the third capacitor, and issubsequently transferred to and stored in the first capacitor.

In some embodiments, first receiver may be interconnected with thesecond capacitor to enable the second capacitor to receive the ambientenergy at the first frequency from the first receiver; and the secondreceiver may be interconnected with a third capacitor to enable thethird capacitor to receive the ambient energy at the second frequencyfrom the second receiver. For example, one set of transfer capacitorsmay be configured to collect a first form of ambient energy, and adifferent set of transfer capacitors may be configured to collectanother form of ambient energy. The different sets of transfercapacitors may be coupled to different receivers corresponding todifferent forms of ambient energy. In some embodiments, the firstcapacitor may be configured to receive and store energy from the secondcapacitor and from the third capacitor.

By way of example, as illustrated in FIG. 34, circuitry may include someor ail of switches 34124 and 34126 configured to connect 2.4 GHzharvester 9014 (one example of a first receiver) to one of transfercapacitor 34104 and 34106 (e.g., a second capacitor); switches 34120 and34122 configured to connect 900 MHz harvester 9012 (one example of asecond receiver) to one of transfer capacitor 34100 and 34102 (exampleof a third capacitor); switches 34130 and 34132 configured to connectinductor 34140 to one of transfer capacitor 34100, 34102, 34104, and34106; and switch 34134 configured to connect/disconnect inductor 34140to storage capacitor 10300 (one example of a first capacitor). While theharvester 9014 is an example of a receiver, the antenna to which it isconnected, 2114, may also separately be referred to as a receiver.

In some embodiments, ambient energy of 900 MHz may be initiallycollected in one or both of the transfer capacitor 34100 and 34102. Forexample, transfer capacitor 34100 may collect ambient energy until it isfull, and then transfer capacitor 34102 begins to collect ambientenergy. Alternatively, transfer capacitor 34100 and 34102 may take turnsto collect ambient energy. Operations of transfer capacitors 34104 and34106 may be substantially similar to that of transfer capacitor 34100and 34102, and may also take turns to collect ambient energy.

Inductor 34130 may be connected to storage capacitor 10300 via switch34134. When switches 34130 and 34132 connect inductor 34140 to any oneof transfer capacitors 34100-34106, energy stored in these capacitorsmay be transferred to inductor 34140 via an oscillation as describedpreviously through careful timing of the switches. Similarly, inductor34140 may subsequently transfer its energy to storage capacitor 10300via an oscillation.

In various embodiments, the wireless identification tag may include atleast one transmitter electrically connected to first capacitor, toenable the energy stored in the first capacitor to power the at leastone transmitter. In some embodiments, the transmitter may beelectrically connected to the first capacitor, to thereby power the atleast one transmitter from energy transferred from the second and thirdcapacitors to the first capacitor.

In some embodiments, the first capacitor may be arranged to storeambient energy received at the first frequency and the second frequencyfor powering the at least one transmitter.

In a non-limiting example illustrated in FIG. 9, the transmitter mayinclude beacon 2104, which may include beacon controller 9030 and beacontransmitter 9032. Beacon 2104 may be commanded by top level controller9020, which may output to transmission control interface parameters suchas power, timing, frequency and/or transmission data, which may bereceived by beacon controller 9030. Based on the transmission controlparameters, beacon controller 9030 may instruct beacon transmitter 9032to transmit as commanded. In some embodiments, there may be furtherprovided switch 9034 controlled by beacon controller 9030. Throughswitch control generated by beacon controller 9030, switch 9034 mayalternate between a transmission mode, during which 2.4 GHz antenna 2114is coupled to beacon transmitter 9032, and a receiving mode, duringwhich 2.4 GHz antenna 2114 is coupled to 2.4 GHz harvester 9014.

In yet another non-limiting example illustrated in FIG. 10, beacontransmitter 9032 may include a PLL 10110, which may be coupled tocrystal oscillator 10022 having crystal 10020, and beacon controller9030; VCO 10112 coupled to PLL 10110; and VGA 10114 coupled to receiveinputs from VCO 10112 and beacon controller 9030, and to provide outputto 2.4 GHz antenna 2114 through switch 9034. In some embodiments, VCO10112 may provide modulation of signals to variable gain amplifier (VGA)10114 based on the output of phase-locked loop (PLL) 10110. In someembodiments, PLL 10110 may provide phase-locking for reference clockfrom oscillator 10022 to the rest of beacon transmitter 9032 (asillustrated in FIG. 9). In some embodiments, beacon controller 9030receives a reference clock input from oscillator 10020, and slow clockfrom real time clock 10024. In turn, beacon controller 9030 may providea reference clock control to oscillator 1002. In some embodiments,beacon controller 9030 provides frequency control and transmission datato PLL 10110, and provides power control to VGA 10114.

As described above, the transmitter may be configured to operate in afirst transmission mode when the energy stored in the first capacitor isabove a predetermined energy level, and to operate in a secondtransmission mode when the energy stored in the first capacitor is equalto or less than the predetermined energy level.

In some embodiments, the wireless identification tag may include atleast one circuit configured to control transfer of energy from thesecond capacitor to the first capacitor. Such a circuit includes anycomponent or group of components that regulate the transfer of energyfrom the second capacitor to the first capacitor. As discussedpreviously, for example, transferring energy from the second capacitorto the first capacitor may require active control and regulated timing,which may consume energy. It may be advantageous for a control circuitto have an independent energy supply, apart from the first capacitor orthe second capacitor. For example, since the ambient energy collectionmay require active control of the switches, when the wirelessidentification tag is low on energy, it may not be able to collectambient energy due to an inability to power the control circuit. Thus,in some embodiments, for example, the wireless identification tag mayinclude at least one additional capacitor having lower capacitance thanthe first capacitor, the at least one additional capacitor beingconfigured to power the at least one circuit. The additional capacitormay serve as an energy source for the control circuit, such that even ifthe energy in the first or the second capacitors are depleted, theadditional capacitor may still power the control circuit to enablecontinued ambient energy collection. The additional capacitor may beelectrically connected to the receiver, so that the additional capacitormay collect ambient energy to supply to the control circuit.

In some embodiments, the least one circuit may be configured to controltransfer of energy from at least one of the second capacitor or thethird capacitor to the first capacitor. Such circuitry may include anycomponent or group of components that regulate the transfer of energyfrom the second or third capacitor to the first capacitor. By way of anon-limiting example, as illustrated in FIG. 36, the at least onecircuit may include circuit 36150 connected to control circuit capacitor36302, which may serve as an additional capacitor. Circuit 36150 mayserve as a control for regulating energy transfer from one or more ofthe transfer capacitor 36300 (e.g., second capacitor) or a thirdcapacitor (not illustrated in FIG. 36) to storage capacitor 10300 (e.g.,first capacitor). Control circuit capacitor 36302 may be connected toenergy harvester 36100 via switches 36200 and 36202. Energy harvester36100 may be one of 900 MHz harvester 9012, 2.4 GHz harvester 9014, ordifferent energy harvesting circuit altogether. Ambient energy may becollected and stored in control circuit capacitor 36302, which may besupplied to circuit 36150. In some instances, if control capacitor 36302exclusively powers circuit 36150, no energy may be required from storagecapacitor 10300. Alternatively, storage capacitor 10300 may be used topower circuit 36150 if control circuit capacitor 36302 becomes depleted.In some embodiments, control circuit capacitor 36302 may be omittedentirely, with circuit 36150 being configured for powering by othercapacitors, such as storage capacitor 10300.

Circuit 36150 may be programmed to command and control any one ofswitches 36200, 36202, 36204, 36206, and 34134 in order to collect andstore ambient energy for storage in storage capacitor 10300. The mannerthrough which this occurs is described previously with reference to FIG.34 and FIG. 35.

Disclosed embodiments may include any one of the followingbullet-pointed features alone or in combination with one or more otherbullet-pointed features, whether implemented as a system and/or method,by at least one processor, and/or stored as executable instructions onnon-transitory computer readable media:

-   -   at least one antenna tuned to receive energy transmitted at a        first frequency within a frequency band around 900 MHz and at a        second frequency within a frequency band around 2.4 GHz    -   at least one transmitter, configured to send at least one        identification signal    -   at least one circuit    -   detecting whether energy is received in said first frequency or        said second frequency    -   causing said at least one transmitter to operate in a first mode        to send a first form of identification signal when said first        frequency is detected, and to operate in a second mode to cause        said at least one transmitter to send a second form of        identification signal when said second frequency is detected    -   at least one energy storage component electrically connected to        said at least one antenna, said at least one energy storage        component configured to store said energy received by said at        least one antenna    -   wherein said at least one energy storage component is configured        to store energy received in said first frequency and said second        frequency    -   wherein said at least one energy storage component is configured        to utilize said energy received by said at least one antenna to        power said wireless identification tag    -   wherein said at least one energy storage component includes at        least one capacitor    -   wherein said at least one circuit is configured to power said        transmitter using energy from said at least one capacitor in        order to send said at least one identification signal    -   wherein said at least one circuit is configured to cause said at        least one transmitter to transmit in said second mode using        energy received in at least one of said first frequency or said        second frequency    -   a first antenna tuned to receive energy transmitted at a        frequency within a first frequency range of 900 MHz WW ISM    -   a second antenna tuned to receive energy transmitted at a        frequency within a second frequency range of 2.4 GHz WW ISM    -   wherein said at least one antenna is further tuned to receive        energy transmitted in a third frequency range    -   detecting whether energy is received in said third frequency        range    -   causing said at least one transmitter to operate in a third mode        to send a third form of identification signal when said third        frequency range is detected    -   wherein said third frequency range is lower than said first        frequency range and said second frequency range    -   wherein said at least one transmitter is configured to send said        first form of identification signal and said second form of        identification signal at a same transmission frequency    -   wherein said transmission frequency of said first and second        form of identification signals is said second frequency    -   wherein said at least one transmitter is configured to send said        first form of identification signal and said second form of        identification signal at different power levels    -   wherein said at least one transmitter is configured to send said        second form of identification signal less than ten seconds after        said second frequency is detected    -   wherein, in said first mode, said at least one transmitter is        configured to send said first form of identification signal with        a first repetition period    -   wherein, in said second mode, said at least one transmitter is        configured to send said second form of identification signal        with a second repetition period, shorter than said first        repetition period    -   wherein said first form of identification signal differs from        said second form of identification signal in at least one of a        repetition period, a frequency channel, a transmission power, or        transmitted data associated with said identification signal sent    -   wherein at least one of said first form of identification signal        or said second form of identification signal includes a unique        identifier of said wireless identification tag    -   wherein said at least one antenna, said at least one        transmitter, and said at least one circuit are provided on a        flexible substrate    -   a material layer that at least partially encapsulates said        wireless tag, said material layer configured for affixation by        sewing    -   wherein said material layer comprises fabric    -   a wireless identification tag with a response time that varies        as a function of incoming signal frequency    -   detecting whether energy is received in said first frequency or        said second frequency    -   causing said at least one transmitter to transmit an immediate        response when said second frequency is detected, and to transmit        a delayed response, having a longer delay compared to said        immediate response, when said first frequency is detected    -   wherein said immediate response is set to occur less than 10        seconds after said second frequency is detected    -   wherein said delayed response is set to occur within a range of        about one minute to about one week after said first frequency is        detected    -   wherein said at least one antenna includes a first antenna tuned        to receive energy transmitted at a frequency within a first        frequency range of 900 MHz WW ISM, and a second antenna tuned to        receive energy transmitted at a frequency within a second        frequency range of 2.4 GHz WW ISM    -   wherein said at least one circuit is configured to implement a        transmission rule that commands said at least one circuit for        causing said transmitter to delay sending at least one of said        immediate response or said delayed response, even when        sufficient energy for transmission of said at least one response        is aggregated and stored in an energy storage component    -   wherein said at least one circuit is configured to implement        said transmission rule to cause said transmitter to send at        least one of said immediate response or said delayed response in        a predetermined time interval    -   wherein said transmission rule defines a time interval between        at least one of two consecutive immediate responses, or two        consecutive delayed responses    -   wherein said transmission rule is configured to randomly select        a time interval between two consecutive responses    -   wherein said at least one antenna is further tuned to receive        energy transmitted at a third frequency    -   detecting whether energy is received in said third frequency    -   causing said at least one transmitter to transmit a third        response, different from said immediate response and said        delayed response, when said third frequency is detected    -   wherein a signal associated with said third response differs        from signals associated with said immediate response and delayed        response in at least one of repetition period and a time        interval between two consecutive responses    -   wherein said third frequency is lower than said first frequency        and said second frequency    -   at least one energy storage component electrically connected to        said at least one antenna, said at least one energy storage        component being configured to store said energy received by said        at least one antenna    -   wherein said at least one energy storage component is configured        to utilize said energy received by said at least one antenna to        power said wireless identification tag    -   wherein said at least one energy storage component includes at        least one capacitor configured to power said wireless        identification tag independently of received power    -   wherein said at least one circuit is configured to monitor        energy stored in said energy storage component, and prevent said        at least one transmitter from transmitting said delayed response        when said energy stored in said energy storage component is        determined to be insufficient to transmit said immediate        response when said second frequency is detected    -   wherein said at least one circuit is configured to monitor        energy stored in said energy storage component, and cause, in        response to detection of said second frequency, said at least        one transmitter to transmit a signal requiring less energy to        transmit than an amount of energy required for said immediate        response, when said energy stored in said energy storage        component is determined to be insufficient to transmit a normal        immediate response    -   monitoring energy stored in said energy storage component, and        preventing said at least one transmitter from transmitting said        immediate response when said energy stored in said energy        storage component is determined to be below a predetermined        energy level    -   wherein a signal associated with said delayed response differs        from a signal associated with said immediate response in at        least one of a repetition period, a frequency channel, a        transmission power, or transmitted data associated with said        response sent    -   wherein at least one of said delayed response or said immediate        response includes unique identifier data of said wireless        identification tag    -   wherein said at least one antenna, said at least one        transmitter, and said at least one circuit are provided on a        flexible substrate    -   an adhesive layer for affixation to a product    -   at least one fabric layer that at least partially encapsulates        said wireless tag, said at least one fabric layer being        configured for affixation by sewing    -   at least one antenna tuned to receive energy transmitted in at        least one of a first EAS gate frequency range of about 7-13 MHz        or a second EAS gate frequency range of about 58-60 kHz, and        configured to be non-detectable by said EAS gate    -   at least one transmitter configured to send at least one        identification signal    -   at least one energy storage component, electrically connected to        said at least one transmitter, for powering said at least one        transmitter    -   at least one circuit connected to said at least one antenna and        configured to detect energy transmitted from said EAS gate in at        least one of said first EAS gate frequency range or said second        EAS gate frequency range, and in response to detecting said        energy transmitted from said EAS gate, cause said at least one        transmitter to transmit to a receiver other than said EAS gate,        said at least one identification signal transmitted in a        frequency outside said first EAS gate frequency range and said        second EAS gate frequency range    -   wherein said frequency outside said first and second EAS gate        frequency ranges is within a frequency range of 2.4 GHz WAV ISM    -   wherein said at least one circuit is configured to cause said at        least one transmitter to transmit said at least one        identification signal less than ten seconds after said energy        transmitted from said EAS gate is detected    -   wherein said at least one energy storage component is configured        to store radio frequency energy received by said at least one        antenna, said received radio frequency energy being        characterized by a frequency outside of said first EAS gate        frequency range and outside said second EAS gate frequency range    -   a first antenna tuned to receive energy transmitted within a        frequency range of 900 MHz WW ISM    -   a second antenna tuned to receive energy transmitted within a        frequency range of 2.4 GHz WW ISM    -   at least one EAS antenna configured to receive said energy        transmitted in said at least one EAS gate frequency range    -   wherein said at least one energy storage component is configured        to store said energy received by said first antenna and said        second antenna, and power said at least one transmitter with        said stored energy    -   wherein said at least one transmitter is configured to send said        identification signal via at least one of a Bluetooth protocol,        Bluetooth Low Energy, Wi-Fi, ZigBee, Z-wave, or radio-frequency        identification (RFID) protocol    -   wherein said at least one transmitter is configured to        sequentially send a plurality of repetitions of said        identification signal in response to detecting said energy        transmitted from said EAS gate    -   wherein said at least one transmitter is configured to        dynamically delay each of said plurality of repetitions of said        identification signal, to thereby avoid signal collision    -   wherein said at least one transmitter is configured to randomly        delay at least one of said repetitions of said identification        signal, to thereby avoid signal collision    -   wherein said at least one transmitter is further configured to        transmit at least one alert signal for causing at least one of        an audible alert, a visual alert, or a digital message    -   wherein said at least one alert signal is a component of said at        least one identification signal    -   wherein said at least one alert signal is separate from said at        least one identification signal    -   association with a specific product to thereby transmit a unique        identification signal that differs from identification signals        from tags associated with other instances of a same product    -   wherein said at least one circuit is configured to implement an        identification transmission rule for regulating said at least        one circuit in a manner causing said at least one transmitter to        delay sending said identification signal, even when sufficient        transmission power for transmitting said identification signal        is aggregated and stored in said energy storage component    -   wherein said at least one circuit is configured to implement        said identification transmission rule to cause said transmitter        to send said identification signal in a predetermined time        interval    -   wherein said at least one circuit is configured to implement        said identification transmission rule to define a time interval        between transmission of two consecutive identification signals    -   wherein said at least one circuit is configured to implement        said identification transmission rule to randomly select a time        interval between two consecutive identification signals    -   wherein said non-detectability of said at least one antenna        enables said tag to avoid triggering said EAS gate    -   wherein said at least one circuit is configured to conserve        energy by activating for a first predetermined length of time        and deactivating for a second predetermined length of time, in a        repeating manner    -   a wireless identification tag configured to harvest ambient        energy and transmit an identification signal intermittently    -   at least one antenna configured to receive ambient energy    -   at least one energy storage component, electrically connected to        said at least one antenna, configured to aggregate and store        said received ambient energy    -   at least one transmitter electrically connected to said at least        one energy storage component, configured to transmit said        identification signal    -   at least one circuit connected to said at least one transmitter        and configured to implement an identification transmission rule,        to cause said transmitter to delay sending said identification        signal even when sufficient energy for transmission of said        identification signal is aggregated and stored in said energy        storage component    -   wherein said at least one circuit is configured to implement        said identification transmission rule to cause said transmitter        to send said identification signal in a predetermined time        interval    -   wherein said at least one circuit is configured to implement        said identification transmission rule to define a time interval        between transmission of two consecutive identification signals    -   wherein said at least one circuit is configured to implement        said identification transmission rule to randomly select a time        interval between two consecutive identification signal        transmissions    -   wherein said at least one antenna is configured to receive        energy transmitted at a frequency within at least one of a first        frequency band around 900 MHz or a second frequency band mound        2.4 GHz    -   wherein said at least one circuit is configured to cause said        transmitter to transmit said identification signal in said        second frequency hand using energy received in at least one of        said first frequency band or said second frequency hand    -   wherein said at least one energy storage component is configured        to power said wireless identification tag with said stored        received ambient energy    -   wherein said at least one energy storage component includes at        least one capacitor configured to power said wireless        identification tag without a battery    -   wherein said at least one circuit is configured to implement        said identification transmission rule when said at least one        antenna receives ambient energy of a first predetermined        frequency    -   wherein said first predetermined frequency is a frequency of        about 900 MHz    -   wherein said at least one circuit is further configured to cause        said transmitter to send said identification signal less than        ten seconds after said at least one antenna receives ambient        energy in a second predetermined frequency    -   wherein said second predetermined frequency is about 2.4 GHz    -   wherein said at least one circuit is further configured to        determine that sufficient energy is aggregated and stored when        an amount of energy stored in said energy storage component is        equal to or greater than a sum of a first amount of energy        required for identification signal transmission and a second        predetermined amount of reserve energy    -   wherein said predetermined amount of reserve energy includes        energy for powering at least one portion of said wireless        identification tag, apart from said at least one transmitter,        for a predetermined time period    -   wherein said predetermined amount of reserve energy includes a        minimum amount of energy for said energy storage component to        power said at least one transmitter    -   wherein said predetermined amount of reserve energy includes        energy for powering said at least one transmitter to send a        predetermined number of transmissions of said identification        signal    -   wherein said at least one circuit is configured to monitor        energy stored in said energy storage component, and cause said        at least one transmitter to transmit an additional        identification signal, said additional identification signal        requiring less energy to transmit than said delayed        identification signal, when said ambient energy stored in said        energy storage component is determined to be below a        predetermined threshold level    -   wherein said delayed identification signal includes unique        identifier data of said wireless identification tag    -   a wireless identification tag configured to harvest ambient        energy and transmit an identification signal intermittently    -   at least one transmitter, configured to transmit a first signal        to a first receiver in a first frequency, and to transmit a        second signal to a second receiver in said first frequency    -   at least one energy storage component, electrically connected to        said at least one transmitter, for collecting and storing        ambient energy and for powering transmission of said at least        one transmitter    -   at least one circuit connected to said at least one transmitter        and to said at least one energy storage component, said at least        one circuit being configured to monitor energy stored in said        energy storage component, and to prevent said at least one        transmitter from transmitting said first signal to said first        receiver in said first frequency when said energy stored in said        energy storage component is insufficient to transmit said second        signal to said second receiver in said first frequency    -   wherein said first frequency is within a frequency band of 2.4        GHz WW ISM    -   wherein said at least one energy storage component is configured        to store energy received in said first frequency and energy        received in a second frequency that is lower than said first        frequency, and to power said at least one transmitter using said        stored energy    -   wherein said second frequency is within a frequency band of 900        MHz WW ISM    -   wherein said circuit is configured to determine whether to cause        said at least one transmitter to operate in a first mode for        transmitting said first signal to said first receiver or to        operate in a second mode for transmitting said second signal to        said second receiver based on said frequency of a signal        received by said wireless identification tag    -   wherein said circuit is further configured to cause said at        least one transmitter to operate in said first mode when said        wireless identification tag receives a signal in at least one of        a first frequency band of 900 MHz WW ISM or a second frequency        band of 2.4 GHz WW ISM    -   wherein said circuit is further configured to cause said at        least one transmitter to operate in said second mode when said        wireless identification tag receives a signal in at least one of        a first frequency band of about 7-13 MHz or a second frequency        band of about 58-60 kHz    -   wherein said at least one transmitter is configured to transmit        to said first receiver in a first location different from a        location of said second receiver, and wherein said at least one        transmitter is further configured to transmit said second signal        after a shorter delay than a delay before transmitting said        first signal    -   wherein said at least one circuit is configured to determine        that insufficient energy is stored in said energy storage        component when an amount of energy stored in said energy storage        component is less than a sum of a first amount of energy        required for transmission of said first signal to said first        receiver and a second amount of energy required for transmission        of said second signal to said second receiver after said        transmission of said first signal to said first receiver    -   wherein said at least one circuit is configured to determine        that insufficient energy is stored in said energy storage        component when an amount of energy stored in said energy storage        component is less than a sum of a first amount of energy        required for transmission of said second signal to said second        receiver and a second predetermined amount of reserve energy    -   a first minimum amount of energy for powering at least one        component of said wireless identification tag, apart from said        at least one transmitter, for a predetermined time period    -   a second minimum amount of energy for powering said at least one        transmitter to send a predetermined number of transmissions of        said first signal    -   a third minimum amount of energy for said energy storage        component to power said at least one transmitter after said        transmitter sends said predetermined number of transmissions of        said first signal    -   wherein said at least one circuit is further configured to        detect whether energy is received in a frequency other than said        first frequency, and to cause said at least one transmitter to        send said second signal to said second receiver less than ten        seconds after said energy received in said other frequency is        detected    -   wherein said first signal differs from said second signal in at        least one of repetition period, a time interval between two        consecutive responses, a data encryption mechanism, a        transmission power, or data content of said transmission    -   wherein said first signal includes first identification data and        said second signal includes second identification data, and at        least one of said first identification data or said second        identification data includes a unique identifier of said        wireless identification tag    -   wherein, when said energy stored in said energy storage        component is determined to be below a predetermined threshold        level, said at least one circuit is configured to cause said at        least one transmitter to transmit an alternative signal to said        first receiver with less energy than is required to transmit        said first signal to said first receiver    -   wherein said at least one circuit is configured to implement an        identification transmission rule for regulating said at least        one circuit in a manner causing said at least one transmitter to        delay sending said first signal to said first receiver, even        when sufficient energy is stored in said energy storage        component for transmitting said second signal to said second        receiver    -   wherein said at least one circuit is further configured to        implement said identification transmission rule to cause said        transmitter to send said first signal to said first receiver in        a predetermined time interval    -   wherein said at least one circuit is further configured to        implement said identification transmission rule to randomly        select a time interval between two consecutive transmissions of        said first signal to said first receiver    -   wherein said at least one circuit is configured to conserve        energy by activating for a first predetermined length of time        and deactivating for a second predetermined length of time, in a        repeating manner    -   wherein said at least one transmitter, said at least one energy        storage component, and said at least one circuit are located on        a flexible substrate    -   at least one transmitter configured to transmit a first signal        in a first frequency band to a plurality of identification tags,        and to thereby cause said plurality of identification tags to        transmit second signal in a second frequency band, said second        signal indicating whether said first signal was received in said        first frequency band    -   a first receiver configured for location proximate to said at        least one transmitter to receive transmissions of said second        signal from said plurality of identification tags    -   a second receiver configured to receive a third signal from a        tag outside a transmission range of said at least one        transmitter, wherein said second receiver is located further        from said at least one transmitter than said first receiver    -   at least one processor configured to generate a potential fraud        alert when said second receiver receives said third signal    -   wherein said first frequency band includes at least one of a        first EAS frequency band of about 7-13 MHz or a second EAS        frequency band of about 58-60 kHz    -   wherein said second frequency band is a frequency band of 2.4        GHz WW ISM    -   wherein said plurality of identification tags each include an        energy storage component configured to store energy transmitted        in a frequency outside of said first frequency band and to power        a transmitter of said at least one identification tag with said        stored energy    -   wherein said plurality of identification tags are further        configured to receive a fourth signal outside of said first        frequency band and to transmit a fifth signal in said second        frequency band in response to receiving said fourth signal    -   wherein said fourth signal is in said second frequency band or        in a third frequency band of 900 MHz WW ISM    -   wherein at least one processor is configured such that when said        fifth signal is received by said second receiver, said at least        one processor is configured to identify a specific        identification tag that transmitted said fifth signal and to        look up an ID of said identified tag in an inventory stored in        at least one data structure    -   wherein said at least one processor is configured to generate        said alert when said ID of said identified tag is included in        said inventory    -   wherein said second signal differs from said fourth signal in at        least one of a repetition period, a power level, a signal        encryption mechanism, or data content of said transmitted signal    -   wherein said identification tags are further configured to        transmit first identification data with said second signal and        to transmit second identification data, different from said        first identification data, with said fourth signal    -   wherein said at least one transmitter, said first receiver, and        said second receiver are configured for location within a common        establishment    -   wherein said at least one processor is configured to forego        generating said alert when said second signal is received by        said first receiver at said first location    -   wherein said at least one processor is configured to identify        said identification tag that transmitted said second signal and        looks up an ID of said identified tag in an inventory stored in        at least one data structure when said second signal is received        by said first receiver    -   wherein said at least one processor is configured to generate        said alert when said ID of said identified tag is included in        said inventory    -   wherein said at least one processor is configured to update an        inventory database when said second signal is received by said        first receiver    -   wherein said at least one transmitter includes an EAS antenna        configured to transmit and detect signals within said first        frequency band, and at least one of said first receiver or said        second receiver includes an antenna tuned to receive signals        transmitted in said second frequency band    -   wherein said at least one processor is configured to cause an        alarm mechanism located in proximity to said second location to        produce at least one of a visual notification or an audible        notification when said second signal is received by said second        receiver    -   wherein said at least one processor is configured to transmit        said alert to a remote device when said second signal is        received by said second receiver    -   wherein said at least one processor is configured to identify        said identification tag that transmitted said second signal,        access data associated with said identified tag in a database,        and determine whether to generate an alert based upon said        accessed data, when said second signal is received by said first        receiver    -   a fraud avoidance system for use with wirelessly tagged        inventory    -   detecting a signal associated with a transmission in an EAS gate        frequency    -   identifying said signal as emanating from a location that does        not correspond to an EAS gate location    -   based on said identified emanation location of said signal,        determining that a suspected fraudulent event is in progress    -   generating an alert of said suspected fraudulent event    -   wherein said detected signal is in an EAS gate transmission        range    -   wherein said detected signal emanates from a wireless tag        triggered by a signal in an EAS gate transmission range    -   a wireless identification tag with varying ID transmission        timing    -   at least one energy storage component, electrically connected to        said at least one transmitter, said at least one energy storage        component being configured to collect and store ambient energy        and to power transmission of said at least one transmitter    -   at least one circuit configured to cause said at least one        transmitter to transmit a sequence of identification signals in        non-uniform intervals such that times between identification        signal transmissions of three consecutive transmissions vary    -   wherein said at least one circuit is further configured to        select said respective durations of said non-uniform intervals        based on a predetermined rule    -   wherein said at least one circuit is further configured to        randomly select said respective durations of said non-uniform        intervals    -   wherein said at least one circuit is further configured to cause        said at least one transmitter to transmit said sequence of        identification signals in varying frequency channels such that        transmission frequencies of said three consecutive transmissions        vary    -   wherein said at least one circuit is further configured to        randomly select one channel of said varying frequency channels        for transmission of each identification signal by said at least        one transmitter    -   wherein said at least one transmitter is configured to transmit        said identification signals in at least three transmission        channels within a predetermined frequency band    -   wherein said predetermined frequency band is a frequency band        around 2.4 GHz    -   wherein said at least one circuit is further configured to        receive a trigger and cause said at least one transmitter to        transmit identification signals in response to said trigger    -   at least one antenna configured to receive said trigger        transmitted as energy having a frequency within at least one of        a first frequency band around 900 MHz or a second frequency band        around 2.4 GHz, and wherein said at least one energy storage        component is configured to store said energy received by said at        least one antenna    -   operating in a first transmission mode when said at least one        antenna receives energy transmitted in said first frequency band    -   operating in a second transmission mode when said at least one        antenna receives energy transmitted in said second frequency        band,    -   wherein said first transmission mode differs from said second        transmission mode in at least one of a repetition period of a        transmitted signal, a transmission power level, or data content        of said transmission    -   at least one second circuit configured to generate said trigger        according to a predetermined timing sequence    -   wherein said at least one second circuit is configured to        generate a first trigger according to a first timing sequence        and to generate a second trigger according to a second timing        sequence that differs from said first timing sequence in at        least one of a repetition period or a time interval between two        consecutive generated triggers    -   wherein said sequence of identification signals varies based on        a characteristic of a product associated with said tag    -   wherein said characteristic of said product includes a unique ID        of said product    -   wherein said unique ID of said product is associated with a        stock keeping unit (SKU) indicative of at least one of a        material, size, color, or style associated with said product    -   wherein said at least one energy storage component includes at        least one capacitor configured to power said wireless        identification tag without a battery    -   a wireless identification tag with varying identity    -   at least one transmitter configured to transmit a tag ID    -   receiving a first trigger at a first time, and in response to        said first trigger, generate in a quasi-random manner a first        decipherable ID uniquely identifying said tag, and cause said at        least one transmitter to transmit said first decipherable ID    -   receiving a second trigger at a second time after said first        time and in response to said second trigger, generate in a        quasi-random manner a second decipherable ID different from said        first decipherable ID and uniquely identifying said tag, and        cause said at least one transmitter to transmit said second        decipherable ID    -   wherein at least one of said first decipherable ID or said        second decipherable ID is encrypted    -   wherein at least one of said first trigger or said second        trigger is a request, received from a requester, to identify        said tag    -   wherein said requester is at least one of a computing device or        an application executed on a computing device    -   wherein said at least one circuit is configured to transmit, to        said requester, said quasi-randomly generated decipherable ID        corresponding to said at least one of said first trigger or said        second trigger    -   receiving a unique ID of said tag    -   receiving a key configured for use with at least one encryption        algorithm    -   encrypting said unique ID of said tag using said key and said        encryption algorithm to generate at least one of said first        decipherable ID or said second decipherable ID with said unique        ID of said tag and said key    -   generating at least one of a random number or a pseudo-random        number    -   generating at least one of said first decipherable ID or said        second decipherable ID using said generated number, said unique        ID of said tag, and said key    -   wherein said tag includes memory for storing at least one of        said unique ID of said tag or said key    -   wherein said at least one circuit is configured to receive said        key    -   wherein said at least one circuit is configured to cause said at        least one transmitter to transmit said first decipherable ID to        a first receiver arm to transmit said second decipherable ID to        a second receiver different from said first receiver    -   at least one receiver configured to receive triggers transmitted        at a frequency within at least one of a predetermined first        frequency band or a predetermined second frequency band    -   wherein said first frequency band is a band around 900 MHz and        said second frequency band is a band around 2.4 GHz    -   determining whether said at least one receiver receives a        trigger at a frequency within said first frequency band or        within said second frequency band    -   causing said at least one transmitter to transmit a first tag ID        signal when said trigger is received at a frequency within said        first frequency band, and to transmit a second tag ID signal        when said trigger is received at a frequency within said second        frequency band,    -   wherein said first tag ID signal differs from said second tag ID        signal in at least one of repetition period, a time interval        between two consecutive responses, a data encryption mechanism,        a transmission power, or data content of said transmission    -   at least one energy storage component, electrically connected to        said at least one transmitter, for collecting and storing        ambient energy received by said at least one receiver and for        powering transmission of said at least one transmitter    -   a timing circuit configured to generate at least one of said        first trigger or said second trigger according to a        predetermined timing sequence    -   wherein said timing circuit is configured to generate said first        trigger according to a first timing sequence and to generate        said second trigger according to a second timing sequence that        differs from said first timing sequence in at least one of a        repetition period or a time interval between two consecutive        generated triggers    -   a system for providing privacy to downstream owners of        electronically tagged goods    -   storing IDs for a plurality of tags including at least a first        owner ID and a second owner ID for a particular tag    -   at a time when said first, owner of said particular tag is        recorded as owning said tag, associating first information of        said particular tag with said first owner ID    -   recording a transaction transferring ownership of said        particular tag from said first owner to a second owner    -   after said transfer of ownership, associating second information        of said particular tag with said second owner ID, and prevent        said first owner from accessing said second information    -   wherein at least one of said first information or said second        information includes at least one of a location, a transaction        history, owner name, manufacturer name, a unique identifier of        said tag, or an encryption key associated with said tag    -   wherein said particular tag is attached to a particular item and        wherein recording said transferring ownership of said particular        tag enables tracking of a change in ownership of said particular        item    -   wherein said at least one processor is configured to store a        unique tag ID of each tag and to associate said tag ID of said        particular tag with said owner ID of said recorded owner of said        particular tag    -   wherein said at least one processor is further configured to        receive an association between said tag ID of said particular        tag and at least one authorized entity associated with said        recorded owner of said particular tag    -   wherein said at least one authorized entity is at least one of a        computing device or an application executed on a computing        device    -   wherein said at least one processor is configured to receive a        request to modify a list of said authorized entities associated        with said particular tag, to confirm that said request to modify        is received from an authorized entity of said particular tag,        and to modify said list following confirmation that said request        was received from said authorized entity of said particular tag    -   wherein when a transfer of ownership of said particular tag is        recorded, said at least one processor is configured to control        said particular tag to change at least one parameter of a signal        transmitted by said particular tag    -   wherein said at least one parameter includes at least one of a        repetition period of said signal transmitted by said particular        tag, a time interval between t wo consecutive signals        transmitted by said particular tag, a data encryption mechanism,        tin encryption key, a signal transmission power, a packet        format, or data content of a transmission from said particular        tag    -   controlling said particular tag to transmit a first signal using        a first encryption key associated with said first owner ID        before said transfer of ownership is recorded    -   controlling said particular tag to transmit a second signal        using a second encryption key associated with said second owner        ID after said transfer of ownership is recorded    -   receiving, from a device associated with said first owner ID, an        ownership transfer notification identifying at least said second        owner ID and a tag ID of said particular tag    -   recording, in at least one data structure, at least one of an        updated association between said tag ID and said first owner ID,        an updated association between said tag ID and said second owner        ID, inventory information associated with said first owner ID,        or inventory information associated with said second owner ID    -   receiving from at least one reader an identification signal        transmitted by said particular tag    -   based on said received identification signal, accessing a tag ID        associated with said particular tag    -   receiving an association between said second owner ID and said        tag ID associated with said particular tag    -   recording, in at least one data structure, at least one of an        updated association between said tag ID and said first owner ID,        an updated association between said tag ID and said second owner        ID, inventory information associated with said first owner ID,        or inventory information associated with said second owner ID    -   wherein said at least one processor is configured to permit said        first owner to access said first information after said        ownership transfer    -   wherein said at least one processor is configured to prevent        said first owner from accessing said first information prior to        said time when said first owner is recorded as owning said        particular tag    -   receiving an association between a particular owner ID and at        least one authorized entity associated with said particular        owner ID    -   permitting said authorized entity to access information        pertaining to at least one of said particular owner ID, a tag        associated with said particular owner ID, or an item associated        with said particular owner ID    -   wherein said at least one authorized entity is at least one of a        computing device or an application executed on a computing        device    -   recording a transaction transferring ownership of said        particular tag from said second owner to a third owner    -   after said transfer of ownership to said third owner,        associating third information of said particular tag with an        owner ID of said third owner, and prevent said second owner from        accessing said third information    -   wherein said third owner is said first owner, and wherein said        at least one processor is further configured to associate said        third information of said particular tag with said first owner        ID    -   wherein said third owner is different from said first owner, and        wherein said at least one processor is further configured to        prevent said first owner from accessing said third information    -   wherein after said transfer of ownership to said third owner,        said at least one processor is configured to permit said first        owner to access said first information and to permit said second        owner to access said second information    -   causing simultaneous triggering and sequential reading of a        plurality of tags    -   displaying an activatable element on a graphical user interface,        said element being configured to activate a 2.4 GHz transmitter    -   upon activation of said element, activating said 2.4 GHz        transmitter to cause each of a plurality of lags in a vicinity        of said transmitter to send a unique tag ID to a receiver        associated with said transmitter    -   reading a first group of said plurality of unique tag IDs during        a first time interval, wherein said first group excludes a        second group of said plurality of unique tag IDs    -   recording first information associated with said first group    -   after reading said first group, maintaining activation of said        2.4 GHz transmitter during a second time interval, to cause        transmission of at least some of said unique tag IDs of said        first group along with said unique tag IDs of said second group        to said receiver    -   after reading said at least some of said unique tag IDs of said        first group along with said unique tag IDs of said second group,        recording second information associated with said second group    -   wherein said instructions further comprise displaying at least        one of said first information or said second information on said        graphical user interface    -   wherein said instructions further comprise maintaining        activation of said 2.4 GHz transmitter until said unique tag ID        of each tag of said plurality of tags is read    -   wherein each tag of said plurality of tags is associated with a        unique tag ID and is configured to encrypt said unique tag ID        thereof and send said encrypted tag ID to said receiver    -   continuously activating said 2.4 GHz transmitter to cause each        of said tags to continuously send to said transmitter said        unique tag IDs    -   sequentially reading each unique tag ID    -   aggregating data associated with each unique tag ID to construct        an inventory of products simultaneously activated and        sequentially read    -   identifying, from among said at least some of said unique tag        IDs of said first group and said unique tag IDs of said second        group, unique tag IDs that were read with said first group    -   recording said second information while excluding information        associated with said identified tag IDs that were read with said        first group    -   wherein said instructions further comprise displaying on stud        graphical user interface an inventory of information associated        with said plurality of tags in said vicinity of said transmitter    -   wherein said inventory of information includes at least one of a        tag ID, an ownership history list, an encryption key, an SKU, or        a location associated with each of said plurality of tags    -   wherein said instructions further comprise enabling a user to        identify a missing product, and displaying on said graphical        user interface an indication that said missing product is in        said vicinity of said transmitter    -   wherein displaying said indication further includes displaying a        location of said missing product on said graphical user        interface    -   a device for simultaneously triggering and sequentially reading        a plurality of tags    -   a 2.4 GHz transmitter    -   a receiver    -   periodically activating said 2.4 GHz transmitter to cause each        of a plurality of tags in a vicinity of said transmitter to send        a unique tag ID to said receiver    -   reading a first group of said plurality of unique tag IDs during        a first time interval, wherein said first group excludes a        second group of said plurality of unique tag IDs    -   recording first information associated with said first group    -   after reading said first group, maintaining activation of said        2.4 GHz transmitter during a second time interval, to cause        transmission of at least some of said unique tag IDs of said        first group along with said unique tag IDs of said second group        to said receiver    -   after reading said at least some of said unique tag IDs of said        first group along with said unique tag IDs of said second group        in said second time interval, recording second information        associated with said second group    -   wherein said at least one processor is further configured to        activate said 2.4 GHz transmitter at a predetermined time        interval    -   wherein said at least one processor is further configured to        randomly select a time interval between two consecutive        activations of said 2.4 GHz transmitter    -   wherein said at least one processor is configured to cause at        least one of said first information or said second information        to be displayed on a graphical user interface    -   wherein said at least one processor is configured to update a        data structure with at least one of said first information or        said second information    -   wherein said at least one processor is configured to maintain        activation of said 2.4 GHz transmitter until said unique tag ID        of each tag of said plurality of tags is read    -   wherein each tag of said plurality of tags is associated with a        unique tag ID and is configured to encrypt said unique tag ID        thereof and send said encrypted tag ID to said receiver    -   continuously activating said 2.4 GHz transmitter to cause each        of said plurality of tags to continuously send to said        transmitter said unique tag IDs    -   sequentially reading each unique tag ID    -   aggregating data associated with each unique tag ID to construct        an inventory of products simultaneously activated and        sequentially read    -   identifying, from among said at least some of said unique tag        IDs of said first group and said unique tag IDs of said second        group, unique tag IDs that were read with said first group    -   recording said second information while excluding information        associated with said identified tag IDs that were read with said        first group    -   wherein said at least one processor is configured to cause an        inventory of information associated with each of said plurality        of tags in said vicinity of said transmitter to be displayed on        a graphical user interface    -   wherein said inventory of information includes at least one of a        tag ID, an ownership history list, an encryption key, an SKU, or        a location associated with each of said plurality of tags    -   wherein said at least one processor is configured to enable a        user to input an identification of a missing product, and cause        an indication that said missing product is nearby to be        displayed on a graphical user interface    -   wherein said at least one processor is further configured to        cause a location of said missing product to be displayed on said        graphical user interface    -   an appliance for holding electronically tagged products and for        recording an association between said tagged products and said        appliance,    -   a housing defining a cavity for retaining said electronically        tagged products    -   an exciter, integrated with said housing, said exciter being        configured to trigger tags of said electronically tagged        products to cause said tag of each product to transmit a unique        tag ID    -   a receiver for receiving transmission of each unique tag ID    -   a communicator for outputting indications of identities of        electronically tagged products retained in said cavity    -   wherein said indications outputted by said communicator reflect        identities of said electronically tagged products derived from        received unique tag IDs    -   wherein said indications outputted by said communicator include        at least one of an inventory report, an inventory change, an        inventory history, or a log of a particular tagged product    -   wherein said exciter is configured to transmit energy at a        frequency within at least one of a first frequency band around        900 MHz or a second frequency band around 2.4 GHz    -   wherein after receiving said energy transmitted from said        exciter, said tags of said electronically tagged products are        each configured to transmit said unique tag ID thereof for        receipt by said receiver in said second frequency band    -   wherein said exciter is configured to transmit energy to said        tags of said electronically tagged products to thereby enable        each tag of said tagged products to harvest said energy from        said exciter and use said harvested energy for powering each tag    -   wherein said exciter is configured to receive a trigger command        and to trigger said tags of said electronically tagged products        in response to receiving said trigger command    -   wherein said exciter is configured to trigger said tags of said        electronically tagged products according to a predetermined        timing sequence    -   wherein said receiver includes an antenna configured to receive        said transmission of each unique tag ID at a frequency within a        frequency band around 2.4 GHz    -   wherein said exciter is configured to simultaneously trigger a        plurality of tags of said electronically tagged products    -   wherein said receiver is configured to sequentially read        transmissions of said unique tag IDs of said        simultaneously-triggered tags    -   receiving, from a requester, a request to identify said        electronically tagged products retained in said cavity at a        specified time    -   outputting to said requester an indication of said identities of        said electronically tagged products retained in said cavity at        said specified time    -   receiving, from a requester, a request to locate a particular        electronically tagged product    -   outputting to said requester an indication of whether said        particular electronically tagged product is retained in said        cavity    -   wherein for a particular tag of an electronically tagged        product, at least one of said unique tag ID of said particular        tag or said indication of said identity of said product        associated with said particular lag are encrypted    -   wherein said communicator is configured to send said encrypted        tag ID to at least one processor for decryption by said at least        one processor    -   wherein said communicator is configured to locally decrypt said        at least one unique tag ID wherein said communicator is        configured to output information associated with said        electronically tagged products, said information including at        least one of a period of time said products were retained in        said cavity, a period of time since said previous time said        products were retained in said cavity, or recommendations        associated with said products    -   at least one processor configured to cause information related        to each unique tag ID to be stored in memory, and wherein said        information includes, for each product associated with each        unique tag ID, an indication of at least one of when each        product was placed in said cavity, when each product was removed        from said cavity, a number of times each product was removed        from said cavity, a number of times each product was returned to        said cavity, a total amount of elapsed time when said each        product was outside said cavity, an amount of elapsed time since        each product was within said cavity, an indication of when said        each product associated with each tag ID was last in said        cavity, or a list of products other than a particular product        that were in said cavity at said same time as said particular        product    -   at least one processor configured to distinguish multiple        instances of a same product based on associated unique tag IDs    -   at least one processor configured to recognize products expected        to be in said cavity and to cause said communicator to output a        notification if an expected product is missing from said cavity    -   at least one processor configured to recognize products in said        cavity that are not expected to be in said cavity, and to cause        said communicator to output a notification if a product not        expected to be in said cavity is within said cavity    -   a wireless identification tag configured to collect and store        ambient energy for use in delayed transmission    -   a receiver for receiving ambient energy    -   a first capacitor for storing said ambient energy    -   a second capacitor for collecting and storing said ambient        energy, said second capacitor having lower capacitance than said        first capacitor    -   an inductor interconnecting said first capacitor and said second        capacitor    -   circuitry interconnecting said receiver, said first capacitor,        and said second capacitor in a manner such that ambient energy        received by said receiver is initially stored in said second        capacitor, and is subsequently transferred to and stored in said        first capacitor    -   at least one transmitter electrically connected to first        capacitor, to enable said energy stored in said first capacitor        to power said at least one transmitter    -   wherein a capacitance of said second capacitor is less than 1 nF    -   wherein said capacitance of said second capacitor is less than        100 pF    -   wherein a capacitance of said first capacitor is at least 10 nF    -   wherein said capacitance of said first capacitor is at least 100        nF    -   a third capacitor for collecting and storing ambient energy,        said third capacitor having lower capacitance than said first,        capacitor, and wherein said inductor interconnects said first        capacitor and said third capacitor    -   wherein said circuitry interconnects said first capacitor, said        third capacitor, and said inductor in a manner such that said        ambient energy initially stored in said third capacitor is        subsequently transferred to and stored in said first capacitor    -   a first receiver for receiving ambient energy transmitted at a        first frequency within a frequency band around 2.4 GHz    -   a second receiver for receiving ambient energy transmitted at a        second frequency within a frequency band around 900 MHz, and    -   wherein said circuitry interconnects said first receiver, said        second receiver, and said first capacitor in a manner such that        said ambient energy received by said first and second receivers        at said first and second frequencies is transferred to and        stored in said first capacitor    -   wherein said first capacitor is arranged to store ambient energy        received at said first frequency and said second frequency for        powering said at least one transmitter    -   wherein said first receiver is interconnected with said second        capacitor to enable said second capacitor to receive said        ambient energy at said first frequency from said first receiver    -   wherein said second receiver is interconnected with a third        capacitor to enable said third capacitor to receive said ambient        energy at said second frequency from said second receiver    -   wherein said first capacitor is configured to receive and store        energy from said second capacitor and from said third capacitor    -   wherein said at least one transmitter is configured to operate        in a first transmission mode when said energy stored in said        first capacitor is above a predetermined energy level, and to        operate in a second transmission mode when said energy stored in        said first capacitor is equal to or less than said predetermined        energy level    -   at least one circuit configured to control transfer of energy        from said second capacitor to said first capacitor    -   at least one additional capacitor having lower capacitance than        said first capacitor, said at least one additional capacitor        configured to power said at least one circuit    -   a wireless identification tag configured to collect and store        ambient energy for use in delayed transmission    -   a receiver for receiving ambient energy    -   a first capacitor for collecting and storing said ambient energy    -   a second capacitor for collecting and storing said ambient        energy, said second capacitor having lower capacitance than said        first capacitor    -   a third capacitor for collecting and storing said ambient        energy, said third capacitor having lower capacitance than said        first capacitor    -   circuitry interconnecting said receiver, said first capacitor,        said second capacitor, and said third capacitor in a manner such        that ambient energy received by said receiver is initially        stored in at least one of said second capacitor or said third        capacitor, and is subsequently transferred to and stored in said        first capacitor    -   a transmitter electrically connected to first capacitor, to        thereby power said at least one transmitter from energy        transferred from said second and third capacitors to said first        capacitor    -   an inductor interconnecting said first capacitor with said        second capacitor and said third capacitor    -   wherein a capacitance of each of said second capacitor and third        capacitor is less than 1 nF    -   wherein a capacitance of said first capacitor is at least 10 nF    -   a first receiver for receiving ambient energy transmitted at a        first frequency within a frequency band around 2.4 GHz    -   a second receiver for receiving ambient energy transmitted at a        second frequency within a frequency band around 900 MHz,    -   wherein said circuitry interconnects said first receiver, said        second receiver, and said first capacitor in a manner enabling        said ambient energy received by said first and second receivers        at said first frequency and second frequency to be transferred        to and stored in said first capacitor    -   wherein said first receiver is interconnected with said second        capacitor to enable said second capacitor to receive said        ambient energy at said first frequency from said first receiver    -   wherein said second receiver is interconnected with said third        capacitor to enable said third capacitor to receive said ambient        energy at said second frequency from said second receiver    -   at least one circuit configured to control transfer of energy        from at least one of said second capacitor or said third        capacitor to said first capacitor    -   at least one additional capacitor having lower capacitance than        said first capacitor, said at least one additional capacitor        configured to power said at least one circuit    -   a system for providing access to information associated with        electronically tagged goods    -   storing tag IDs of a plurality of tags    -   receiving a pairing between at least one particular tag ID and a        product ID    -   storing information associated with said at least one particular        tag ID and said product ID    -   receiving a pairing between said at least one particular tag ID        and at least one authorized entity associated with said at least        one particular tag ID, wherein said at least one authorized        entity is associated with at least one of a current owner of a        product corresponding to said product ID, a seller of said        product, a manufacturer of said product, or a user of said        product    -   receiving, from a requester, a query to identify at least one of        said product ID, said information associated with stud at least        one particular tag ID, said information associated with stud        product ID, or said at least one authorized entity, said query        including an encrypted tag ID of said particular tag    -   decrypting said encrypted tag ID, to thereby look up said        decrypted tag ID of said particular tag    -   determining if said requester is said at least one authorized        entity associated with said decrypted tag ID of said particular        tag    -   fulfilling said query, if said requester is said at least one        authorized entity    -   denying said query if said requester is not said at least one        authorized entity    -   retrieving requested information from at least one data        structure, said requested information including at least one of        said stored information associated with said at least one        particular tag ID or said stored information associated with        said product ID    -   outputting said requested information to said requester    -   wherein denying said query includes outputting a notification        that said requester is not authorized to access information        designated by said query    -   wherein said plurality of tags are configured to wirelessly        receive and store ambient energy, and to power transmission of        signals using said stored ambient energy    -   wherein said encrypted tag ID received from said requester is        encrypted with at least one encryption key associated with said        particular tag, and wherein said at least one processor is        configured to retrieve at least one encryption algorithm and        said at least one encryption key, and to decrypt said encrypted        tag ID using said at least one encryption algorithm and said at        least one encryption key    -   receiving at least one change in an owner ID of said particular        tag from a first owner ID to a second owner ID    -   in response to said at least one change in said owner ID,        correspondingly changing said encryption key of said particular        tag to an updated encryption key that is associated with said        second owner ID    -   removing said first owner ID from a list of authorized entities        associated with said at least one particular tag ID    -   wherein said at least one authorized entity is at least one of a        computing device or an application executed on a computing        device    -   wherein said information associated with each of said plurality        of tags includes a list of authorized entities associated with        each tag ID    -   wherein said at least one processor is configured to receive a        query to modify said list of authorized entities of a particular        tag ID, and if said query is received from an authorized entity        of said particular tag ID, perform said requested modification        of said list    -   wherein when said list of authorized entities of said particular        tag ID is modified, said at least one processor is configured to        control said tag associated with said particular tag ID to        change at least one parameter of a signal transmitted by said        tag    -   wherein said at least one parameter includes at least one of a        repetition period of said signal transmitted by said tag, a time        interval between two consecutive signals transmitted by said        tag, a data encryption mechanism, an encryption key, a signal        transmission power, a packet format, or data content of a        transmission from said tag    -   a system for providing privacy to owners of electronically        tagged goods    -   storing tag IDs of a plurality of tags and a pairing between        each tag ID and at least one owner ID    -   receiving, for each owner ID, a pairing between said owner ID        and at least one authorized entity enabled to receive data of        said one or more tags associated with said owner ID    -   receiving, from a requester, a query for information pertaining        to a particular tag of said plurality of tags    -   looking up said at least one owner ID associated with said        particular tag    -   determining if said requester is said at least one authorized        entity of said at least one owner ID associated with said        particular tag    -   if said requester is not said at least one authorized entity,        denying said query    -   if said requester is said at least one authorized entity,        permitting said requester to access said requested information        pertaining to said particular tag    -   accessing at least one encryption key of each tag ID    -   accessing said at least one encryption key associated with said        particular tag    -   decrypting, using an encryption algorithm and said at least one        encryption key, an encrypted tag ID received with said query        from said requester    -   determining if said requester is said at least one authorized        entity based on said decrypted tag ID    -   receiving an updated owner ID associated with said particular        tag    -   in response to receiving said updated owner ID, correspondingly        changing said at least one encryption key associated with said        particular tag to an updated encryption key that is associated        with said updated owner ID    -   removing said previous owner ID from said at least one        authorized entity enabled to receive said data of said        particular tag    -   wherein said at least one owner ID of each tag ID is associated        with at least one of a current owner of a product associated        with said tag ID, a seller of said product, a manufacturer of        said product, or a user of said product    -   wherein said plurality of tags are configured to wirelessly        receive and store ambient energy, and to power transmission of        signals using said stored ambient energy    -   wherein said particular tag is configured to transmit said tag        ID thereof when said tag ID is encrypted according to at least        one encryption key, and wherein said at least one processor is        configured to receive said at least one encryption key and        decrypt said tag ID transmitted by said particular tag with said        at least one encryption key    -   wherein said at least one authorized entity is at least one of a        computing device or an application executed on a computing        device    -   wherein said at least one processor is configured to store and        access a list of authorized entities associated with each tag    -   wherein said at least one processor is configured to receive a        query to modify said list of authorized entities of said        particular tag, and if said query is received from an authorized        entity of said particular tag, perform said requested        modification of said list    -   wherein said at least one processor is configured to control        said particular tag to change at least one signal transmission        parameter when said list of authorized entities of said        particular tag is modified    -   wherein said at least one signal transmission parameter of said        particular tag includes at least one of a repetition period of a        signal transmitted by said tag, a time interval between two        consecutive signals transmitted by said tag, a data encryption        mechanism, an encryption key, a signal transmission power, a        packet format, or data content of a transmission from said tag    -   a system for protecting against distribution of counterfeit        products    -   storing tag IDs of a plurality of electronic tags, wherein at        least one specific electronic tag is associated with a specific        product    -   storing at least one identity of a first entity, said first        entity being associated with at least one of a seller of said        specific product, a manufacturer of said specific product, a        current owner of said specific product, or a prior owner of said        specific product    -   receiving, on behalf of a prospective subsequent custodian of        said specific product, an encrypted tag ID associated with said        specific product    -   receiving, on behalf of said prospective subsequent custodian, a        query associated with said at least one identity    -   decrypting said encrypted tag ID to identify said specific        product associated with said specific electronic tag    -   using information associated with said specific electronic tag        to access an ownership history for said specific product    -   checking if said at least one identity identified in said query        corresponds to an entity in said ownership history    -   causing a transmission of an authenticity indication to said        prospective subsequent custodian if said at least one identify        identified in said query corresponds to an entity in said        ownership history,    -   causing a transmission of a non-authentic indication to said        prospective subsequent custodian if said at least one identity        identified in said query does not correspond to an entity in        said ownership history    -   wherein said at least one processor is configured to cause        transmission of said authenticity indication if said at least        one identity identified in said query corresponds to a current        owner of said specific product in said ownership history    -   wherein said prospective subsequent custodian is associated with        a prospective purchaser of said specific product    -   wherein said at least one processor is configured to prevent        said prospective subsequent custodian from accessing data about        said specific product, said data including at least one of a        product location, a transaction history, an owner name, a        manufacturer name, said decrypted tag ID of said specific        electronic tag, or an encryption key associated with said        specific electronic tag    -   wherein said at least one processor is configured to store an        ownership history for each of said plurality of products in at        least one data structure    -   recording a transaction transferring ownership of said fag ID        associated with said specific product from said first entity to        said prospective subsequent custodian    -   updating said ownership history of said product in said at least        one data structure    -   wherein updating said ownership history of said product includes        storing an association between at least one identity of said        prospective subsequent custodian, and said tag ID associated        with said product    -   wherein said at least one processor is further configured to        store, in said at least one data structure, at least one of an        inventory of said plurality of electronic tags, said tag IDs of        said plurality of electronic tags, or a product ID associated        with each tag ID    -   wherein said at least one processor is further configured to        store, in said at least one data structure, at least two        encryption keys associated with said tag ID of said specific        product, wherein said at least two encryption keys include a        first encryption key associated with said at least one identity        and a second encryption key associated with said prospective        subsequent custodian    -   determining whether said prospective subsequent custodian is        authorized to make said query    -   if said prospective subsequent custodian is authorized to make        said query, proceeding with decrypting said encrypted tag ID to        access said ownership history    -   if said prospective subsequent custodian is not authorized to        make said query, causing transmission of a non-authorization        indication for said prospective subsequent custodian    -   wherein said at least one processor is further configured to        request from said first entity an authorization for said        prospective subsequent custodian to make said query    -   receiving an association between said first entity and at least        one entity authorized to make said query    -   determining if said prospective subsequent custodian is said at        least one authorized entity    -   receiving, from at least one entity in said ownership history,        verification that said at least one identity identified in said        query is a second entity in said ownership history    -   updating said ownership history to include said at least one        identity identified in said query    -   wherein said at least one processor is further configured to        cause transmission of an authenticity indication for said        prospective subsequent custodian based on said updated ownership        history    -   wherein said specific electronic tag is associated with a unique        tag ID and is configured to encrypt said unique tag ID for        transmission to at least one of said at least one processor or a        processing device of said prospective subsequent custodian    -   wherein said at least one processor is further configured to        send a notification to at least one entity in said ownership        history when a query regarding said tag ID associated with said        product is received    -   wherein said at least one processor is further configured to        send a notification to at least one entity in said ownership        history when a non-authentic indication is sent regarding said        tag ID associated with said product    -   a system for detecting misplaced items in an establishment,    -   receiving from at least one reader in said establishment,        identification signals of identification tags read by said at        least one reader    -   determining current locations of said identification tags based        on said received identification signals    -   recording in at least one data structure said current locations        of said identification tags    -   accessing in said at least one data structure a designated        location in said establishment for each of said identification        tags    -   determining, by comparing said current locations of said        identification tags with said designated locations of said        identification tags, a particular identification tag with a        current location that differs from said designated location of        said particular identification tag    -   generating a notification signal when said current location of        said particular identification tag does not match said        designated location of said particular identification tag    -   wherein said identification tags are configured to receive and        store ambient energy, and to power transmission of said        identification signals using said stored ambient energy    -   wherein said identification tags are configured to transmit said        identification signals according to a predetermined timing        sequence    -   wherein at least one identification tag is configured to operate        in a first transmission mode when said at least one        identification tag receives energy in a first frequency, and to        operate in a second transmission mode when said at least one        identification tag receives energy in a second frequency that is        higher than said first frequency, wherein said first        transmission mode differs from said second transmission mode in        at least one of a repetition period of a transmitted signal, a        transmission power level, or data content of said transmission    -   wherein said at least one reader includes a plurality of readers        configured to receive said identification signals, and wherein        said at least one processor is configured to access position        data of said plurality of readers    -   wherein said at least one processor is configured to identify        said locations of said identification tags based on said        position data of said plurality of readers and power levels of        said identification signals received by said plurality of        readers    -   wherein said at least one reader includes at least one of a        handheld scanner or a fixed scanner configured to automatically        read signals transmitted by said identification tags    -   wherein said at least one processor is further configured to        determine that a specific identification tag is associated with        a specific item being sold, and update said at least one data        structure to remove said specific identification tag from an        inventory associated with said establishment    -   wherein said at least one reader is configured to receive gate        signals from said identification tags when said identification        tags are in at least one predetermined location    -   wherein said at least one processor is configured to determine        that said specific item is being sold when a specified reader        receives said gate signal from said identification tag        associated with said specific item    -   wherein said at least one processor is further configured to        modify said data structure to store a unique tag identifier and        at least one item attribute for each of said identification tags        in said establishment, said at least one item attribute for each        identification tag corresponding to at least one of a size, a        color, or a style of said item associated with said        identification tag    -   wherein generating said notification signal includes sending a        signal to cause a user device to output at least one of an        audible indicator or a visible indicator of said current        location associated with said particular identification tag    -   wherein generating said notification signal includes sending a        signal to cause a user device to display, on a graphical user        interface of said user device, said current location associated        with said particular identification tag, and wherein displaying        said current location includes at least one of displaying ail        indication of said current location on a map, displaying        directions to said current location, or displaying a name        associated with said current location    -   wherein said at least one processor is further configured to        modify said data structure to change said designated location of        said particular identification tag to said current location        associated with said particular identification tag    -   a system for reporting a location of items in an establishment    -   receiving from at least one reader in said establishment,        identification signals of identification tags read by said at        least one reader    -   determining current locations of said identification tags based        on said received identification signals    -   recording in at least one data structure said current locations        of said identification tags    -   receiving a query for a location of a particular item in said        establishment    -   identifying said location of said particular item based on an        association between said particular item and a particular        identification tag and said current location of said particular        identification tag    -   displaying, on a graphical user interface, said location of said        particular item to a user, wherein displaying said location        includes at least one of displaying an indication of said        current location of said particular identification tag on a map,        displaying directions to said current location of said        particular identification tag, or displaying a name associated        with said current location of said particular identification tag    -   wherein said identification tags are configured to receive and        store ambient energy, and to power transmission of said        identification signals using said stored ambient energy    -   wherein at least one identification tag is configured to operate        in a first transmission mode when said at least one        identification tag receives energy in a first frequency, and to        operate in a second transmission mode when said at least one        identification tag receives energy in a second frequency that is        higher than said first frequency, wherein said first        transmission mode differs from said second transmission mode in        at least one of a repetition period of a transmitted signal, a        transmission power level, or data content of said transmission    -   wherein said at least one reader includes a plurality of readers        configured to receive said identification signals, and wherein        said at least one processor is configured to access position        data of said plurality of readers    -   wherein said at least one processor is configured to identify        said locations of said identification tags based on said        position data of said plurality of readers and power levels of        said identification signals received by said plurality of        readers receive a query for an inventory of said plurality of        items in said establishment    -   identifying said plurality of items in said establishment based        on associations between said plurality of items and said        identification tags, and said current locations of said        identification tags stored in said data structure    -   displaying, on a graphical user interface, an inventory        indication of said identified items in said establishment    -   wherein said at least one reader includes at least one of a        handheld scanner or a fixed scanner configured to automatically        read signals transmitted by said identification tags    -   wherein said at least one processor is further configured to        determine that a specific identification tag is associated with        a specific item being sold, and update said at least one data        structure to remove said specific identification tag from an        inventory associated with said establishment    -   wherein said at least one reader is configured to receive gate        signals from said identification tags when said identification        tags are in at least one predetermined location    -   wherein said at least one processor is configured to determine        that said specific item is being sold when a specified reader        receives said gate signal from said identification tag        associated with said specific item

Systems and methods disclosed herein involve unconventional improvementsover conventional approaches. Descriptions of the disclosed embodimentsare not exhaustive and are not limited to the precise forms orembodiments disclosed. Modifications and adaptations of the embodimentswill be apparent from consideration of the specification and practice ofthe disclosed embodiments. Additionally, the disclosed embodiments arenot limited to the examples discussed herein.

The foregoing description has been presented for purposes ofillustration. It is not exhaustive and is not limited to the preciseforms or embodiments disclosed. Modifications and adaptations of tireembodiments will be apparent from consideration of the specification andpractice of the disclosed embodiments. For example, the describedimplementations include hardware and software, but systems and methodsconsistent with the present disclosure may be implemented as hardwarealone.

The features and advantages of the disclosure are apparent from thedetailed specification, and thus, it is intended that the appendedclaims cover all systems and methods falling within the true spirit andscope of the disclosure. As used herein, the indefinite articles “a” and“an” mean “one or more.” Similarly, the use of a plural term does notnecessarily denote a plurality unless it is unambiguous in the givencontext. Words such as “and” or “or” mean “and/or” unless specificallydirected otherwise. Further, since numerous modifications and variationswill readily occur from studying the present disclosure, it is notdesired to limit the disclosure to the exact construction and operationillustrated and described, and, accordingly, all suitable modificationsand equivalents may be resorted to, falling within the scope of thedisclosure.

Computer programs based on the written description and methods of thisspecification are within the skill of a software developer. The variousfunctions, scripts, programs, or modules may be created using a varietyof programming techniques. For example, programs, scripts, functions,program sections or program modules may be designed in or by means oflanguages, including JAVASCRIPT, C, C++, JAVA, PHP, PYTHON, RUBY, PERL,BASH, or other programming or scripting languages. One or more of suchsoftware sections or modules may be integrated into a computer system,non-transitory computer readable media, or existing communicationssoftware. The programs, modules, or code may also be implemented orreplicated as firmware or circuit logic.

Moreover, while illustrative embodiments have been described herein, thescope may include any and all embodiments having equivalent elements,modifications, omissions, combinations (e.g., of aspects across variousembodiments), adaptations or alterations based on the presentdisclosure. The elements in the claims are to be interpreted broadlybased on the language employed in the claims and not limited to examplesdescribed in the present specification or during the prosecution of theapplication, which examples are to be construed as non-exclusive.Further, the steps of the disclosed methods may be modified in anymanner, including by reordering steps or inserting or deleting steps. Itis intended, therefore, that the specification and examples beconsidered as exemplary only, with a true scope and spirit beingindicated by the following claims and their full scope of equivalents.

1.-159. (canceled)
 160. A system for providing privacy to downstreamowners of electronically tagged goods, the system comprising: at leastone processor configured to: store IDs for a plurality of tags includingat least a first owner ID and a second owner ID for a particular tag; ata time when the first owner of the particular tag is recorded as owningthe tag, associate first information of the particular tag with thefirst owner ID; record a transaction transferring ownership of theparticular tag from the first owner to a second owner; and after thetransfer of ownership, associate second information of the particulartag with the second owner ID, and prevent the second owner fromaccessing the first information.
 161. The system of claim 160, whereinat least one of the first information or the second information includesat least one of a location, a transaction history, owner name,manufacturer name, a unique identifier of the tag, or an encryption keyassociated with the tag.
 162. The system of claim 160, wherein theparticular tag is attached to a particular item and wherein recordingthe transferring ownership of the particular tag enables tracking of achange in ownership of the particular item.
 163. The system of claim160, wherein the at least one processor is configured to store a uniquetag ID of each tag and to associate the tag ID of the particular tagwith the owner ID of the recorded owner of the particular tag.
 164. Thesystem of claim 163, wherein the at least one processor is furtherconfigured to receive an association between the tag ID of theparticular tag and at least one authorized entity associated with therecorded owner of the particular tag.
 165. The system of claim 164,wherein the at least one authorized entity is at least one of acomputing device or an application executed on a computing device. 166.The system of claim 164, wherein the at least one processor isconfigured to receive a request to modify a list of the authorizedentities associated with the particular tag, to confirm that the requestto modify is received from an authorized entity of the particular tag,and to modify the list following confirmation that the request wasreceived from the authorized entity of the particular tag.
 167. Thesystem of claim 163, wherein when a transfer of ownership of theparticular tag is recorded, the at least one processor is configured tocontrol the particular tag to change at least one parameter of a signaltransmitted by the particular tag.
 168. The system of claim 167, whereinthe at least one parameter includes at least one of a repetition periodof the signal transmitted by the particular tag, a time interval betweentwo consecutive signals transmitted by the particular tag, a dataencryption mechanism, an encryption key, a signal transmission power, apacket format, or data content of a transmission from the particulartag.
 169. The system of claim 160, wherein the at least one processor isconfigured to: control the particular tag to transmit a first signalusing a first encryption key associated with the first owner ID beforethe transfer of ownership is recorded; and control the particular tag totransmit a second signal using a second encryption key associated withthe second owner ID after the transfer of ownership is recorded. 170.The system of claim 160, wherein recording the transaction transferringownership of the particular tag includes: receiving, from a deviceassociated with the first owner ID, an ownership transfer notificationidentifying at least the second owner ID and a tag ID of the particulartag; and recording, in at least one data structure, at least one of anupdated association between the tag ID and the first owner ID, anupdated association between the tag ID and the second owner ID,inventory information associated with the first owner ID, or inventoryinformation associated with the second owner ID.
 171. The system ofclaim 160, wherein recording the transaction transferring ownership ofthe particular tag includes: receiving from at least one reader anidentification signal transmitted by the particular tag; based on thereceived identification signal, accessing a tag ID associated with theparticular tag; receiving an association between the second owner ID andthe tag ID associated with the particular tag; and recording, in atleast one data structure, at least one of an updated association betweenthe tag ID and the first owner ID, an updated association between thetag ID and the second owner ID, inventory information associated withthe first owner ID, or inventory information associated with the secondowner ID.
 172. The system of claim 160, wherein the at least oneprocessor is configured to permit the first owner to access the firstinformation after the ownership transfer.
 173. The system of claim 160,wherein the at least one processor is configured to prevent the firstowner from accessing the first information prior to the time when thefirst owner is recorded as owning the particular tag.
 174. The system ofclaim 160, wherein the at least one processor is further configured to:receive an association between a particular owner ID and at least oneauthorized entity associated with the particular owner ID; and permitthe authorized entity to access information pertaining to at least oneof the particular owner ID, a tag associated with the particular ownerID, or an item associated with the particular owner ID.
 175. The systemof claim 174, wherein the at least one authorized entity is at least oneof a computing device or an application executed on a computing device.176. The system of claim 160, wherein the at least one processor isfurther configured to: record a transaction transferring ownership ofthe particular tag from the second owner to a third owner; and after thetransfer of ownership to the third owner, associate third information ofthe particular tag with an owner ID of the third owner, and prevent thethird owner from accessing the second information.
 177. The system ofclaim 176, wherein the third owner is the first owner, and wherein theat least one processor is further configured to associate the thirdinformation of the particular tag with the first owner ID.
 178. Thesystem of claim 176, wherein the third owner is different from the firstowner, and wherein the at least one processor is further configured toprevent the third owner from accessing the first information.
 179. Thesystem of claim 176, wherein after the transfer of ownership to thethird owner, the at least one processor is configured to permit thefirst owner to access the first information and to permit the secondowner to access the second information. 180.-304. (canceled)