WO2007106283A1 - Rfid business process-decoupling of design and deployment time activities - Google Patents
Rfid business process-decoupling of design and deployment time activities Download PDFInfo
- Publication number
- WO2007106283A1 WO2007106283A1 PCT/US2007/004005 US2007004005W WO2007106283A1 WO 2007106283 A1 WO2007106283 A1 WO 2007106283A1 US 2007004005 W US2007004005 W US 2007004005W WO 2007106283 A1 WO2007106283 A1 WO 2007106283A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- binding
- rfid
- component
- devices
- event
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/20—Point-of-sale [POS] network systems
- G06Q20/208—Input by product or record sensing, e.g. weighing or scanner processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
- G06F9/453—Help systems
Definitions
- RFID Radio Frequency Identification
- RFID is a technique of remotely storing and retrieving data utilizing RFID tags. Since RFID systems are based upon radio frequency and associated signals, numerous benefits and/or advantages precede traditional techniques in monitoring products. RFID technology does not require a line of sight in order to monitor products and/or receive signals from RFED tags. Thus, no manual scan is necessary wherein the scanner is required to be in close proximity of the target (e.g., product). Yet, range is limited in RFID based upon radio frequency, RFID tag size, and associated power source.
- RFID systems allow multiple reads within seconds providing quick scans and identification, hi other words, an RFID system allows a plurality of tags to be read and/or identified when the tags are within a range of an RFID reader. The capability of multiple reads in an RFID system is complimented with the ability of providing informational tags that contain a unique identification code to each individual product.
- RFID systems and/or methodologies provide real-time data associated to a tagged item. Real-time data streams allow a retailer, distributor, and/or manufacturer the ability to monitor inventory and/or products with precision. Utilizing RFID can further facilitate supplying products on a front-end distribution (e.g., retailer to consumer) and a back-end distribution (e.g., distributor/manufacturer to retailer).
- An RFID system consists of at least an RFID tag and an RFID transceiver.
- the RFID tag can contain an antenna that provides reception and/or transmission to radio frequency queries from the RFID transceiver.
- the RFID tag can be a small object, such as, for example, an adhesive sticker, a flexible label and integrated chip, etc.
- an RFID system can include multiple components: tags, tag readers (e.g., tag transceivers), tag writers, tag-programming stations, circulation readers, sorting equipment, tag inventory wands, RFID printers, etc.
- Establishing an RFID system within a distribution and/or manufacturing environment can be an overwhelming and meticulous task.
- configuring various processes, applications, and/or instructions for such systems at a conceptual level can be complicated by the immense amount of devices, components, repetitive settings and/or properties respective to such devices and components, and/or any other particularities associated with a potential client's environment.
- the subject innovation relates to systems and/or methods that facilitate binding at least one RFID process to a device and/or one or more devices.
- a binding engine can bind an RFID process to a device(s) to allow data collected by the device(s) to be utilized by the RFED process.
- the binding engine allows the decoupling of design time activities and deployment time activities associated with the RFID process and the device.
- the design time activity can be the process of conceptualizing an RFID business process by specifying logical device elements, specifying logical sources as containers for logical device elements, and/or creating a pipeline of components (e.g., event handlers).
- the deployment time activity can be the act of making an RFID business active (e.g., receive tags), by mapping logical entities to physical entities and configuring components (e.g., event handlers) to work correctly in the deployed environment.
- the RFID process can be created, generated, and/or executed within a physical device architecture without the RFID process being aware of the physical device configuration within such architecture.
- an RFID process can be designed independent of the physical device architecture. Therefore, the RFID process can be a generic process that can be marketed and/or deployed to various enterprises (e.g., where there can be a plurality of enterprises, each enterprise having a distinct and/or unique device configuration, layout, and/or physical architecture). '
- the binding engine can include a device mapping component.
- the device mapping component can provide a device binding between the RFED process and the device and/or one or more devices. It is to be appreciated that the binding can be a technique of mapping external devices to internal logical devices, and assigning values to initialization parameters of components.
- the device mapping component can employ device binding which can be the action of linking a logical entity (e.g., logical device) with a physical entity.
- the binding engine can further include a component configuration module that can provide any suitable mapping from an event handler to the RFED process.
- the component configuration module can employ component binding which can be referred to as the specification of values for initialization parameters of components such as, but not limited to, internal logical elements.
- the binding engine can further utilize a binding component that can create a binding object that facilitates binding the RFED process to the device and/or more device.
- the binding component can provide seamless binding between the RFDD process and the device(s) (e.g., device binding) and/or an event handler and the RFID process (e.g., component binding).
- the binding engine can further utilize a process update component that can allow dynamic updates to the RFID process in relation to binding changes without any interruption of the RFID process.
- the process of binding can allow Authors (e.g., Independent Software Vendors (ISV)) to supply a process definition and a set of associated component files to customers.
- ISV Independent Software Vendors
- This can creates a market for RFID business processes and respective vendors.
- an RFID business process can in theory be "sealed", thereby preventing customers from willfully changing the implementation. This can allows ISVs to be guaranteed that their implementation runs as specified in the customer premises. Customers are free to ask the ISVs for changes to the algorithms implemented by the components published by the ISVs'.
- the RFID business process can be packaged. Due to the binding architecture, one can package an entire RFID business process and enable shipment of such a process from software vendor to customer. This package can contain the process definition, the bindings and the actual binaries that implement the components. This "deployment" package would significantly cut down the complexity and the time it requires to deploy a RFID business process.
- methods are provided that facilitate binding at least one RFED process to at least one device.
- Fig. 1 illustrates a block diagram of an exemplary system that facilitates binding a process to a device and/or one or more devices while providing a decoupling of design time activities and deployment time activities.
- FIG. 2 illustrates a block diagram of an exemplary system that facilitates employing at least one of binding a process to a device and/or one or more devices and dynamically updating a binding.
- FIG. 3 illustrates a block diagram of an exemplary system that facilitates ensuring the integrity of a binding between a process and at least one device that can wirelessly communicate with a tag.
- FIG. 4 illustrates a block diagram of a logical source in accordance with the subject innovation.
- FIG. 5 illustrates a block diagram of an exemplary system that facilitates binding a process to one or more devices while providing a decoupling of design time activities and deployment time activities
- FIG. 6 illustrates a block diagram of an exemplary user interface in accordance with the claimed subject matter.
- FIG. 7 illustrates a block diagram of an exemplary user interface in accordance with the claimed subject matter.
- FIG. 8 illustrates a block diagram of an exemplary user interface in accordance with the claimed subject matter.
- Fig. 9 illustrates a block diagram of an exemplary system that facilitates binding one or more RFID devices within a physical RFID network to a process.
- Fig. 10 illustrates an exemplary methodology that facilitates employing a binding between a process and one or more devices.
- Fig. 11 illustrates an exemplary methodology for binding a process and at least one device such that dynamic updates can be invoked.
- Fig. 12 illustrates an exemplary methodology that facilitates associating at least one process to at least one device employing a user interface.
- FIG. 13 illustrates an exemplary networking environment, wherein the novel aspects of the claimed subject matter can be employed.
- Fig. 14 illustrates an exemplary operating environment that can be employed in accordance with the claimed subject matter.
- a component can be a process running on a processor, a processor, an object, an executable, a program, and/or a computer.
- an application running on a server N and the server can be a component.
- One or more components can reside within a process and a component can be localized on one computer and/or distributed between two or more computers.
- the claimed subject matter may be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer to implement the disclosed subject matter.
- article of manufacture as used herein is intended to encompass a computer program accessible from any computer-readable device, carrier, or media.
- computer readable media can include but are not limited to magnetic storage devices (e.g., hard disk, floppy disk, magnetic stripsituated » optical disks (e.g., compact disk (CD), digital versatile disk (DVD)...), smart cards, and flash memory devices (e.g., card, stick, key drive).
- a carrier wave can be employed to carry computer-readable electronic data such as those used in transmitting and receiving electronic mail or in accessing a network such as the Internet or a local area network (LAN).
- LAN local area network
- the system 100 can include a binding engine 102 that can bind an RFID process 104 (also referred to as an RFID business process 104) to a device 102. It is to be appreciated that there can be any number of devices that bind to the RFID process 104.
- the binding provided by the binding engine 102 can invoke a separation of the RFID process 104 into a pure process definition and a pure binding definition.
- the binding engine 102 allows the decoupling of design time activities and deployment time activities.
- the design time activity can be the process of conceptualizing an RFID process 104 by specifying logical device elements, specifying logical sources as containers for logical device elements, and/or creating a pipeline of components (e.g., event handlers).
- the deployment time activity can be the act of making an RFID process 104 active (e.g., receive tags), by mapping logical entities to physical entities and configuring components (e.g., event handlers) to work correctly in the deployed environment.
- Such decoupling can allow the RFID process 104 to be designed independently of the physical device architecture.
- the RPID process 104 can be a generic process that can be marketed and/or deployed to various enterprises (e.g., where there can be a plurality of enterprises, each enterprise having a distinct and/or unique device configuration, layout, and/or physical architecture). Process of binding takes a process definition and associates devices and/or components to the actual topology and systems configuration that is in an enterprise (e.g., an environment to which the RFID process 104 is to be initiated).
- the device 108 can receive a signal from, for instance, at least one tag 110 and/or a plurality of tags.
- the tag 110 can contain an antenna that provides reception and/or transmission to radio frequency queries from the device 108.
- the device 108 can be, but is not limited to being, an RFID reader, an RFID writer, an RFID printer, a printer, a reader, a writer, an RFED transmitter, an antenna, a sensor, a real-time device, an RFID receiver, a real-time sensor, a device extensible to a web service, and a real-time event generation system.
- a single device 108 and tag 110 are depicted, it is to be appreciated that a plurality of devices 108 and tags 110 can be utilized with the system 100.
- the binding engine 102 can include a device mapping component 112 that can provide any suitable mapping from a physical device (e.g., device 108) to the RFID process 104.
- the device mapping component 112 can provide a device binding between the RFID process 104 and the device 108.
- a binding can be referred to as a process of mapping external devices to internal logical devices, and assigning values to initialization parameters of components.
- the device mapping component 112 can employ device binding which can be the action of linking a logical entity (e.g., logical device) with a physical entity.
- a logical device is bound to a device or a device group, wherein the device group can be a collection of devices that have substantially similar characteristics or perform similar functions and are grouped to deal with devices efficiently.
- the binding engine can further include a component configuration module
- the component configuration module 114 can employ component binding which can be referred to as the specification of values for initialization parameters of components such as, but not limited to, internal logical elements.
- the component binding can be to a component that can be defined such as, but not limited to, an event handler.
- An event handler can be managed code running in the context of the RFID process 104 that processes a tag event.
- the RFID process 104 can utilize any suitable number of devices 108.
- An RFID process 104 can be related to a particular RFID subsystem (e.g., an RFID server, RFID network, etc.) that is an uber or high-level object that forms together various entities to create a meaningful unit of execution.
- the RFID process 104 can be and/or can include an outbound process (e.g., pick, pack, shipping scenario, etc.), a manufacturing process, a shipping process, a receiving process, tracking, data representation, data manipulation, data application, security, ....
- the RFID process 104 can include and/or respond to a device service, a tag read, an event, a tag write, a device configuration, a geographic tracking, a number count, etc.
- the RFID process 104 can have raw data collected via at least one device, wherein such raw data can be manipulated based at least in part upon a rule and/or a business rule engine (not shown).
- the RFID process 104 can take a tag read event from the device 108 and make the tag read event available for at least one high level application.
- the RFID process 104 can be a shipping process that represents multiple devices at various dock doors working together to perform tag reads, filtering, read enrichment, alert evaluation, and data storage in a sink for a host application to retrieve/process.
- the process can execute a manufacturing process, wherein devices are configured to read as well as write dependent upon a location. Moreover, additional functions such as filtering, alerting, enriching, etc. can be implemented at the location.
- the RFID process 104 can write to a tag process, wherein a tag can be written in real-time based at least upon an input. The write process can also check if the write succeeded by reading and passing data back to the host.
- the binding engine 102 can allow the dynamic update of any binding created between the RFID process 104 and the device 108.
- a warehouse can deploy a first process that can be bound to a first collection of devices having a first device, a second device, and a third device.
- the warehouse can deploy a second process that can be bound to a second collection of devices having the first device and the second device.
- the first and/or second process can be dynamically updated in respect to the bindings associated therewith without interrupting the running first and/or second process.
- the second process can be bound to the third device without the interrupting the execution of the second process.
- the above example can be implemented by utilizing a user interface (UI) (discussed in more detail infra).
- UI user interface
- the process of binding can allow Authors ⁇ e.g., Independent
- ISV Software Vendors
- This can creates a market for RFID business processes and respective vendors.
- an RFID business process can in theory be "sealed", thereby preventing customers from willfully changing the implementation. This can allows ISVs to be guaranteed that their implementation runs as specified in the customer premises. Customers are free to ask the ISVs for changes to the algorithms implemented by the components published by the ISVs'.
- the RFID business process can be packaged by the ISV. Due to the binding architecture, one can package an entire RFID business process and enable shipment of such a process from software vendor to customer. This package can contain the process definition, the bindings and the actual binaries that implement the components.
- the system 100 can include any suitable and/or necessary interface component 106 (herein referred to as "interface 106"), which provides various adapters, connectors, channels, communication paths, etc. to integrate the binding engine 102 into virtually any operating and/or database system(s).
- interface 106 can provide various adapters, connectors, channels, communication paths, etc., that provide for interaction with the binding engine 102, the RFID process 104, the device 108, the tag 110, and any other device and/or component associated with the system 100.
- the system 200 can include a binding engine 202 that can bind at least one RFID process 204 to at least one device 208 such that a decoupling of design time activities and deployment time activities can be employed.
- the binding engine 202 can provide a device binding (e.g., linking a logical entity and/or device with a physical entity) and/or a component binding (e.g., specifying values for initialization parameters of components such as internal logical elements).
- the binding engine 202 can separate the RFED process 204 into a pure process definition and a pure binding definition.
- the binding engine 202, the device 208, the tag 210, and the RFID process 204 can be substantially similar to the binding engine 102, the device 108, the tag 110, and the RFID process 104 depicted in figure 1.
- the device 208 and the tag 210 can be associated with a physical RFID network (not shown), wherein the physical RFID network can be implemented by any enterprise, business, facility, and/or any suitable entity that can utilize RFID technology.
- the physical RFID network can be deployed to include any number of devices 208 such as device i to device N , where N is positive integer.
- devices 208 can interact (e.g., wirelessly communicate) with any number of tags 210 such as tag i to tag M , where M is a positive integer.
- the device 208 can be associated with at least an antenna to communicate data.
- the tags 210 can be associated to any suitable object related to the enterprise, business, facility, and/or any suitable entity utilizing such RFHD technology.
- the process can be a shipping process that is related to the devices at the shipping door, wherein the devices can collect data at such location.
- another process can be a receiving process that is related to the devices at the receiving door, wherein the devices can collect data at such location.
- the RPID process 204 can be a business process, wherein the devices 208 can be indirectly utilized in association with the business process.
- the RFID stack can bridge the gap between devices 208 and business applications.
- the business process can be, for instance, a business application to achieve a critical business function.
- the business application can be a back end application, an existing business application, a line of business (LOB) application, an accounting application, a supply chain management application, a resource planning application, and/or a business monitoring (BAM) application.
- the critical business function can be, for example, a demand plan, a forecast, and/or an inventory control with the incorporation of RFID data in real-time.
- an RF 1 ID host can utilize a business rules engine (not shown), wherein such business rules engine can provide a rule-based system in association with any application such that a filter and/or alert can be utilized as a rule(s).
- the business rules engine can execute declarative filters and/or alerts as rules, wherein the rules can include a rule set adhered to an event, condition, and action format utilizing an extensible markup language (XML).
- the rule is at least one of the following: contained within a rule set that adheres to an event, a condition, and an action; and represented utilizing an extensible markup language (XML).
- the condition has at least one of a set of predicates and a logical connective to form a logical expression that evaluates to one of a true and a false.
- the binding engine 202 can bind a process to the device 208 and/or a group of devices ⁇ e.g., readers).
- a user can utilize a notification setting, wherein the security setting can be related to the notification to provide access to the process.
- the process is bound to the device group X, that process can receive events from device group X.
- notification data ⁇ e.g. , credentials
- the system 200 can utilize a logical source that contains at least one or more logical devices and/or one or more components ⁇ e.g., event handlers).
- the logical devices and/or components can form a pipeline, wherein a multitude of pipelines can be put together to form an event processing tree.
- the logical source (LS) can have a LogicalSourceList and a LogicalDeviceList.
- Each LogicalDeviceList (LDList) can be made up of LogicalDevices(LDs) which can be bound to at least one of a DeviceGroupList, a DeviceList, and a RegexCollection ⁇ e.g., regular expression (Regex).
- the LogicalDevice e.g.
- TagReadEvent.ServerTag.DeviceCollectionName can also be referred to TagReadEvent.ServerTag.LogicalDeviceName.
- the LS can directly have a DeviceGroupList, a DeviceList, and a RegexCollection and not have the concept of a LogicalDevice.
- the binding engine 202 can include a binding component 206 that can create a binding object to allow for seamless binding between the RFID. process 204 and one or more devices 208 (e.g., device binding) and/or an event handler and the RFID process 204 (e.g., component binding).
- the binding object allows a deployer (e.g., user, administrator, etc.) to bind the RFID process 204 to an actual, physical device 208.
- a clear separation of a process definition e.g., as shipped by an independent service vendor (ISV)
- the process deployer e.g., who populates the binding object for that process).
- the binding object aligns itself well with application level events (ALE) 3 where an ALE spec (e.g. , which can be unaware of the physical device(s) 208) can be mapped to the RFID process 204. Separating the RFID process 204 from the physical devices 208 can allow the ALE specification to be modified while remaining agnostic to the physical bindings created by the system 200.
- the binding object can provide at least one initialization parameter for an event handler and/or a rule.
- the initialization parameter can be part of the process definition so that the process authors (e.g. , an ISV, user, software manufacturer, etc.) can provide a default value.
- the value of the initialization parameter in the binding object can override values provided in the process definition.
- the components can be referred to utilizing a name in the binding object created. It is to be appreciated that the name can be unique within the process.
- the binding engine 202 can further include a process update component
- the process update component 212 can dynamically update the RFID process 204 in relation to any manipulations, changes, and/or disparities associated with the binding established.
- the process update component 212 can provide a dynamic update to any binding associated with the system 200 such that there is no need stop and/or interrupt the RFED process 204.
- the process update component 212 can update the RFID process 204 dynamically based on a name and/or reference.
- the process update component 212 can bind a disparate device to a particular process without interrupting the execution of the particular process.
- the following pseudo-code can be implemented by the process update component 212 to provide dynamic updates to the bindings and/or the RFID process 204.
- Fig. 3 illustrates a system 300 that facilitates ensuring the integrity of a binding between a process and one or more devices that can wirelessly communicate with a tag.
- the system 300 can include a binding engine 302 that can dynamically initiate a binding between an RFID process 304 and at least one device 308.
- the RPID process 304 can be bound to the device 308 in a manner such that the RFDD process 304 can be separated into a pure process definition an a pure binding definition.
- the RFID process 304 can be created, generated, and/or executed within a physical device architecture without the RFID process 304 being aware of the physical device configuration within such architecture.
- the RFID process 304 can be a generic process that can be marketed and/or deployed to various enterprises (e.g., where there can be a plurality of enterprises, each enterprise having a distinct and/or unique device configuration, layout, and/or physical architecture).
- the binding engine 302 can provide a device binding (e.g., linking a logical entity and/or device with a physical entity) and/or a component binding (e.g., specifying values for initialization parameters of components such as internal logical elements). It is to be appreciated that the binding engine 302, the RFID process 304, the device 308, a tag 310, and the interface 106 can be substantially similar to components, processes, devices, and/or tags described supra.
- the system 300 can utilize a link component 306 that can facilitate manipulating a binding between at least one RFID process 304 and at least one device 308. It is to be appreciated that the system 300 can implement decoupling without the use of a hard link and/or a soft link, yet the following is an exemplary illustration of utilizing the link component 306 to maintain such linkage.
- the link component 306 can maintain the bindings within the system 300 by utilizing two kinds of binding relationships between the RFID process 304 and the device 308: a hard link and a soft link.
- Hard links can be explicit relationships between a process and a device or a process and a device group.
- a hard link is an explicit contract between the device administrator and the process administrator and may not be overridden by just the device administrator.
- a soft link can be an implicit link between a device and a process. The soft link can be established in two techniques: 1) by specifying a regular expression pattern; and 2) by changing the membership of a device group.
- the object model may not complain and/or invoke an error that an interested process is affected (e.g., a user interface can provide a warning to the device administrator about this particular scenario by querying the interested processes collection for the device).
- a user interface can provide a warning to the device administrator about this particular scenario by querying the interested processes collection for the device.
- all transient changes and/or manipulations e.g., changing device properties, rebooting the device, rebooting the provider, etc.
- the process-binding can be changed while the process pipeline is online to minimize downtime and can be extremely beneficial to minimize any downtime associated with the system 300.
- the link component 306 By allowing the link component 306 to employ a hard link and a soft link technique, various scenarios can be managed and/or handled. For instance, a process administrator can indicate an interest in a particular device by binding it explicitly by binding to the parent device group list or by biding to a regular expression that matches to the device name. After this step, deleting the device, changes to the device name or the device group that contains the device can affect whether the process gets events from a particular device or not. Thus, by utilizing the link component 306 and at least one hard link and one soft link, the above scenario can be handled.
- the binding engine 302 can provide dynamic binding updates and/or manipulations without any interruption to the RFID process 304.
- process binding can be changed without stopping the RFID process 304.
- the dynamically updates related to bindings can be employed by instituting the following: 1) there may not be any dangling references to devices; 2) the object model (OM) may have limited authority to do things automatically (e.g., any changes that are made can be explicit); 3) minimize process downtime; 4) tool user should have to distinguish between a hard link and a soft link (e.g., or the distinguishing features should be minimum); and 5) deletion of device should be an easy technique.
- OM object model
- the following is an example of to illustrate the above techniques and/or concepts.
- GetlnterestedProcesses (deviceOrDeviceGroupName).
- the OM can return an array of [ProcessName, hard / soft link]. If more than one process is interested in the device, the GUI can throw up a warning dialog. If the user chooses to continue, the tool can either make the changes to the process binding (e.g., in case of a hard link) or just emits the DeleteDeviceO call (e.g., in case of a soft link). It is to be further appreciated and understood that the renaming of the device 308 can be substantially similar to the above except the instruction "DeleteO" with "RenameO-"
- the link component 306 can further maintain the interested process collection (IPC), wherein the IPC can be the list of currently running processes that either have a hard link or a soft link to a device.
- the IPC can be utilized for posting to a notification queue (not shown) (e.g., the hard links for a device group can be retrieved utilizing an application programmable interface (API)).
- a process can be part of the IPC for a device if, for example, the following condition is met: ((Hard-Link Exists
- the binding engine 302 can utilize a callback component 312 that can implement various callbacks related to the RFID process 304.
- callback component 312 can provide the RFID process 304 with an object called OnProcessEvents which can implement callbacks for at least one of the following: 1) OnProcessStartup()- any initialization work for the process can be done here including holding onto the Containerlnterface; 2) OnProcessShutdown()- any cleanup work can be done here; and 3) OnProcessError()- any exception handling work can be done here.
- the following pseudocode can be implemented by the callback component 312 to provide callbacks for the RFID process 304. It is to be appreciated that the following is an example and the subject innovation is not so limited as a plurality of variations can be invoked. Moreover, it is to be understood that comments are proceeded with "//.” Abstract class HandleProcessEvents
- the binding engine 302 can further utilize a security component 314 that can provide security techniques to protect and/or ensure the integrity of the system 300.
- the security component 314 can implement security to the RFID process 304, the device 308, a binding relationship established between a process and a device, any combination thereof, etc.
- the security component 314 can define security, authorization, and/or privileges in accordance with the bindings associated with at least one RFDD process 304 and at least one device 308, wherein at least a portion of the binding, process, device, and/or any combination thereof can be associated to a specific security level.
- security component 314 can be a stand-alone component, incorporated into the binding engine 302, and/or any combination thereof.
- the security component 314 can further utilize an administrator account and password technique.
- the administrator can set the account and password under which the ProcessEngine will run and the ProcessEngine is run with those credentials in a web hosting infrastructure (e.g., ASP.NET web hosting infrastructure).
- the username and password management can be delegated to an entity (e.g., ASP.NET) within the web hosting infrastructure.
- the binding engine 302 can further utilize a presentation component 316 that provides various types of user interfaces to facilitate interaction between a user and any component coupled to the binding engine 302.
- the presentation component 316 is a separate entity that can be utilized with the binding engine 302.
- the presentation component 316 can provide one or more graphical user interfaces (GUIs), command line interfaces, and the like.
- GUIs graphical user interfaces
- a GUI can be rendered that provides a user with a region or means to load, import, read, etc., data, and can include a region to present the results of such.
- These regions can comprise known text and/or graphic regions comprising dialogue boxes, static controls, drop-down-menus, list boxes, pop-up menus, as edit controls, combo boxes, radio buttons, check boxes, push buttons, and graphic boxes.
- utilities to facilitate the presentation such as vertical and/or horizontal scroll bars for navigation and toolbar buttons to determine whether a region will be viewable can be employed.
- the user can interact with one or more of the components coupled and/or incorporated into the binding engine 302. [0057]
- the user can also interact with the regions to select and provide information via various devices such as a mouse, a roller ball, a keypad, a keyboard, a pen and/or voice activation, for example.
- a mechanism such as a push button or the enter key on the keyboard can be employed subsequent entering the information in order to initiate the search.
- a command line interface can be employed.
- the command line interface can prompt (e.g., via a text message on a display and an audio tone) the user for information via providing a text message.
- the user can than provide suitable information, such as alpha-numeric input corresponding to an option provided in the interface prompt or an answer to a question posed in the prompt.
- the command line interface can be employed in connection with a GUI and/or API.
- a diagram 400 of a logical source 402 is illustrated that can be utilized to create a model that is used to build an RFID application and/or process.
- a logical source 402 is a stream of tag reads and/or writes. The stream of reads can be processed and result in a different stream of reads. It is to be appreciated that the logical source 402 can recursively embed at least one other logical source.
- a group of events and/or tag reads 404 can be sent to a rules engine 406, where optional filters and/or alerts can be executed.
- the group of events and/or tag reads 404 can be N logical sources, where N is greater than or equal to one, and/or M device collections, where M is greater than or equal to one.
- the rules engine 406 the group of events and/or tag reads 404 can be passed to a component 408.
- the component 408 can be an event handler (not shown).
- the event handler can manage an event from a logical source 402.
- the event handler can be utilized for at least one of the following: apply logic in real-time on tag read events and/or enrich the event in a specific manner; consume an event by a higher level application; write back to a tag when a blank tag read event is detected; etc.
- the event handler can specify actions when exceptions occur such as, but not limited to, a read error and a write error. It is to be understood that the exceptions can be from the logical source 402 during execution (e.g., managing a process specific event).
- Fig. 5 illustrates a system 500 that employs intelligence to facilitate binding a process to one or more devices while providing a decoupling of design time activities and deployment time activities.
- the system 600 can include a binding engine 502, an RFID process 504, a device 508, a tag 510, and the interface 106 that can all be substantially similar to respective engines, components, processes, tags, devices, and interfaces described in previous figures.
- the system 500 further includes an intelligent component 506.
- the intelligent component 506 can be utilized by the binding engine 502 to facilitate providing a device binding and/or a component binding in relation to the RFED process 504, the device 508, and an event handler.
- the intelligent component 506 can infer the at least one of the following: security settings associated with a physical device architecture, process bindings, device bindings, component bindings, binding changes, process updates, optimized device groups, optimized device group settings and/or configurations, etc.
- the intelligent component 506 can provide for reasoning about or infer states of the system, environment, and/or user from a set of observations as captured via events and/or data. Inference can be employed to identify a specific context or action, or can generate a probability distribution over states, for example.
- the inference can be probabilistic - that is, the computation of a probability distribution over states of interest based on a consideration of data and events.
- Inference can also refer to techniques employed for composing higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether or not the events are correlated in close temporal proximity, and whether the events and data come from one or several event and data sources.
- Such classification can employ a probabilistic and/or statistical-based analysis (e.g., factoring into the analysis utilities and costs) to prognose or infer an action that a user desires to be automatically performed.
- a support vector machine (SVM) is an example of a classifier that can be employed. The SVM operates by finding a hypersurface in the space of possible inputs, which hypersurface attempts to split the triggering criteria from the non-triggering events.
- Figs. 6- 8 illustrate exemplary user interfaces in accordance with the claimed subject matter. It is to be appreciated that the user interfaces depicted are examples and the subject innovation is not to be so limited. In addition, it is to be appreciated that there are a plurality of nuances and/or subtleties that can be employed in connection with the user interfaces, thus any depiction is utilized to facilitate implementing the claimed subject matter.
- Fig. 6 illustrates a user interface 600 that can provide a wizard application to facilitate providing a device binding and a component binding in connection with an RFED process and a device.
- the user interface 600 can display a list of logical devices in the RFED process. If there are no logical devices defined, the administrator can create one. For each logical device, the binding process can be repeated.
- Fig. 7 illustrates a user interface 700 that depicts the hierarchy of a device group and/or a device. The user interface 700 can differentiate a hard link and a soft link utilizing, for example, an icon.
- Fig. 8 illustrates a user interface 800 that can employ a component binding. The user interface 800 depicts an example of an out of the box SQL sink.
- Fig. 9 illustrates a system 900 that facilitates binding one or more RFID devices within a physical RFID network to a process.
- the system 900 can include binding engine 902 that provides a device binding and/or a component binding in relation to an RFED process 904 and a device 910, a device collection 908 (herein referred to as "first collection 908"), and/or any combination thereof within the physical RFID device network 906 (herein referred to as "RFID network 906").
- the binding engine 902 can provide device binding and/or component binding within the RFID network 906 based at least in part upon a grouping, wherein the grouping of devices within the RFED network 906 can be based on at least one of the following: device physical location, device functionality, device security level, process device association, make and/or model of device, type of device, device frequency, etc. Furthermore, it is to be appreciated that the binding engine 902 and the RFID process 904 can be substantially similar to previously described figures. [0066]
- the RFED network 906 can include a plurality of universes ⁇ e.g., subsystems, RFEO networks), wherein a universe is a server of RFED entities.
- the RFED network 906 illustrates a single universe containing two collections of devices ⁇ e.g., device collections), where a first collection 908is shown.
- the device collections can correspond to device groups, wherein such collections and/or groups can be based on at least one of the following: device physical location, device functionality, device security level, process device association, make and/or model of device, type of device, device frequency, etc.
- an RFED sub-system can be a location wherein the entities involved are related to a substantially similar process.
- a sub-system can be a warehouse containing a plurality of receiving and/or shipping dock doors with associated devices.
- first collection 908 can be a collection of devices within the specified sub-system.
- a device 910 can receive an RFID signal 916 from a pallet of goods 914 containing at least one RFID tag 912. It is to be appreciated the pallets and/or goods can be tagged based at least upon user specifications ⁇ e.g., single pallets tagged, individual goods tagged, pallets and goods tagged, etc.).
- Figs. 10-12 illustrate methodologies in accordance with the claimed subject matter.
- the methodologies are depicted and described as a series of acts. It is to be understood and appreciated that the subject innovation is not limited by the acts illustrated and/or by the order of acts, for example acts can occur in various orders and/or concurrently, and with other acts not presented and described herein. Furthermore, not all illustrated acts may be required to implement the methodologies in accordance with the claimed subject matter.
- those skilled in the art will understand and appreciate that the methodologies could alternatively be represented as a series of interrelated states via a state diagram or events.
- the methodologies disclosed hereinafter and throughout this specification are capable of being stored on an article of manufacture to facilitate transporting and transferring such methodologies to computers.
- the term article of manufacture, as used herein, is intended to encompass a computer program accessible from any computer- readable device, carrier, or media.
- Fig. 10 illustrates a methodology 1000 that facilitates employing a binding between a process and one or more devices.
- an RFID process can be received.
- the RFID process can be received by, for instance, an installation, a creation, and/or any combination thereof.
- the RFED process can be related to a particular RFID sub-system (e.g., an RFID server, RFID network, etc.) that is an uber or high-level object that forms together various entities to create a meaningful unit of execution.
- the RFID process can be and/or can include an outbound process (e.g., pick, pack, shipping scenario, etc.), a manufacturing process, a shipping process, a receiving process, tracking, data representation, data manipulation, data application, security, — Additionally, the RFID process can include and/or respond to a device service, a tag read, an event, a tag write, a device configuration, a geographic tracking, a number count, etc. It is to be appreciated that the RFID process can have raw data collected via at least one device, wherein such raw data can be manipulated based at least in part upon a rule and/or a business rule engine (not shown). The RFDD process can take a tag read event from a device and make the tag read event available for at least one high level application.
- an outbound process e.g., pick, pack, shipping scenario, etc.
- the RFID process can include and/or respond to a device service, a tag read, an event, a tag write, a device configuration, a geographic tracking, a number count
- the RFID process can be a shipping process that represents multiple devices at various dock doors working together to perform tag reads, filtering, read enrichment, alert evaluation, and data storage in a sink for a host application to retrieve/process.
- the process can execute a manufacturing process, wherein devices are configured to read as well as write dependent upon a location. Moreover, additional functions such as filtering, alerting, enriching, etc. can be implemented at the location.
- the RFID process can write to a tag process, wherein a tag can be written in real-time based at least upon an input. The write process can also check if the write succeeded by reading and passing data back to the host.
- the RFID process can be bound to a device by employing at least one of a device binding and a component binding.
- the device can be within the RFED network and can be, but is not limited to being, an RFID reader, an RFID writer, an RFID printer, a printer, a reader, a writer, an RFID transmitter, an antenna, a sensor, a real-time device, an RFED receiver, a real-time sensor, a device extensible to a web service, and a real-time event generation system.
- the binding can provide any suitable mapping from a physical device (e.g., device) to the RFID process.
- the binding can be a process of mapping external devices to internal logical devices, and assigning values to initialization parameters of components.
- the device binding can be the action of linking a logical entity (e.g., logical device) with a physical entity.
- a logical device is bound to a device or a device group, wherein the device group can be a collection of devices that have substantially similar characteristics or perform similar functions and are grouped to deal with devices efficiently.
- the component binding can provide any suitable mapping from an event handler to the RFID process.
- the component binding can be the specification of values for initialization parameters of components such as, but not limited to, internal logical elements such as an event handler, wherein the event handler can be managed code running in the context of the RFID process that processes a tag event.
- Fig. 11 illustrates a methodology 1100 for binding a process and one or more devices such that dynamic updates can be invoked.
- an RFID process can be received.
- the RFID process can be purchased, installed, created, programmed, etc. in relation to a particular environment.
- the RFID process can be related to a particular RFID sub-system (e.g., an RFID server, RFID network, etc.) that is an uber or high-level object that forms together various entities to create a meaningful unit of execution.
- the RFID process can be a business process, wherein devices can be indirectly utilized in association with the business process.
- the RFID stack can bridge the gap between devices and business applications.
- the business process can be, for instance, a business application to achieve a critical business function.
- the business application can be a back end application, an existing business application, a line of business (LOB) application, an accounting application, a supply chain management application, a resource planning application, and/or a business monitoring (BAM) application.
- LOB line of business
- BAM business monitoring
- an RFED host can utilize a business rules engine (not shown), wherein such business rules engine can provide a rule-based system in association with any application such that a filter and/or alert can be utilized as a rule(s).
- the business rules engine can execute declarative filters and/or alerts as rules, wherein the rules can include a rule set adhered to an event, condition, and action format utilizing an extensible markup language (XML).
- the rule is at least one of the following: contained within a rule set that adheres to an event, a condition, and an action; and represented utilizing an extensible markup language (XML).
- the condition has at least one of a set of predicates and a logical connective to form a logical expression that evaluates to one of a true and a false.
- a device binding and a component binding between the RFED process and a physical device can be created and/or initiated.
- the binding can be a process of mapping external devices to internal logical devices, and assigning values to initialization parameters of components.
- the device binding can be the action of linking a logical entity (e.g., logical device) with a physical entity.
- a logical device is bound to a device or a device group, wherein the device group can be a collection of devices that have substantially similar characteristics or perform similar functions and are grouped to deal with devices efficiently.
- the component binding can provide any suitable mapping from an event handler to the RFED process.
- the bindings related to the RFED process can be updated dynamically.
- any changes and/or manipulations associated with the RFED process and the physical device bond e.g., device binding and/or component binding
- such changes and/or manipulations can be updated dynamically without interrupting the RFED process.
- Fig. 12 illustrates a methodology 1200 that facilitates associating at least one process to at least one device employing a user interface.
- an RFED process can be received.
- a user interface can be employed to bind an RFID process to a physical device.
- the user interface can be a wizard application that can provide a step-by-step installation and/or setup for a device binding and/or a component binding of the RFED process and the physical RFID device.
- Such wizard can utilize various screens that can initiate a sequential implementation of the binding between the RFED process and the physical device.
- a user interface can display a list of logical devices in the RFED process.
- the administrator can create one. For each logical device, the binding process can be repeated.
- the user interface can depicts the hierarchy of a device group and/or a device. The user interface can differentiate a hard link and a soft link utilizing, for example, an icon.
- the user interface that can employ a component binding, wherein the properties of the sink are displayed for the user to configure.
- Figs. 13-14 and the following discussion is intended to provide a brief, general description of a suitable computing environment in which the various aspects of the subject innovation may be implemented.
- a binding engine that provides binding between a process and a device, as described in the previous figures, can be implemented in such suitable computing environment.
- the claimed subject matter has been described above in the general context of computer-executable instructions of a computer program that runs on a local computer and/or remote computer, those skilled in the art will recognize that the subject innovation also may be implemented in combination with other program modules.
- program modules include routines, programs, components, data structures, etc., that perform particular tasks and/or implement particular abstract data types.
- Fig. 13 is a schematic block diagram of a sample-computing environment
- the system 1300 includes one or more client(s) 1310.
- the client(s) 1310 can be hardware and/or software ⁇ e.g., threads, processes, computing devices).
- the system 1300 also includes one or more server(s) 1320.
- the server(s) 1320 can be hardware and/or software (e.g., threads, processes, computing devices).
- the servers 1320 can house threads to perform transformations by employing the subject innovation, for example.
- One possible communication between a client 1310 and a server 1320 can be in the form of a data packet adapted to be transmitted between two or more computer processes.
- the system 1300 includes a communication framework 1340 that can be employed to facilitate communications between the client(s) 1310 and the server(s) 1320.
- the client(s) 1310 are operably connected to one or more client data store(s) 1350 that can be employed to store information local to the client(s) 1310.
- the server(s) 1320 are operably connected to one or more server data store(s) 1330 that can be employed to store information local to the servers 1320.
- an exemplary environment 1400 for implementing various aspects of the claimed subject matter includes a computer 1412.
- the computer 1412 includes a processing unit 1414, a system memory 1416, and a system bus 1418.
- the system bus 1418 couples system components including, but not limited to, the system memory 1416 to the processing unit 1414.
- the processing unit 1414 can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as the processing unit 1414.
- the system bus 1418 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Card Bus, Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), Firewire (IEEE 1394), and Small Computer Systems Interface (SCSI).
- ISA Industrial Standard Architecture
- MSA Micro-Channel Architecture
- EISA Extended ISA
- IDE Intelligent Drive Electronics
- VLB VESA Local Bus
- PCI Peripheral Component Interconnect
- Card Bus Universal Serial Bus
- USB Universal Serial Bus
- AGP Advanced Graphics Port
- PCMCIA Personal Computer Memory Card International Association bus
- Firewire IEEE 1394
- SCSI Small Computer Systems Interface
- nonvolatile memory 1422 The basic input/output system (BIOS), containing the basic routines to transfer information between elements within the computer 1412, such as during start-up, is stored in nonvolatile memory 1422.
- nonvolatile memory 1422 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
- Volatile memory 1420 includes random access memory (RAM), which acts as external cache memory.
- RAM is available in many forms such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), Rambus direct RAM (RDRAM), direct Rambus dynamic RAM (DRDRAM), and Rambus dynamic RAM (RDRAM).
- SRAM static RAM
- DRAM dynamic RAM
- SDRAM synchronous DRAM
- DDR SDRAM double data rate SDRAM
- ESDRAM enhanced SDRAM
- SLDRAM Synchlink DRAM
- RDRAM Rambus direct RAM
- DRAM direct Rambus dynamic RAM
- RDRAM Rambus dynamic RAM
- Computer 1412 also includes removable/non-removable, volatile/nonvolatile computer storage media.
- Fig. 14 illustrates, for example a disk storage 1424.
- Disk storage 1424 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memory stick.
- disk storage 1424 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM).
- CD-ROM compact disk ROM device
- CD-R Drive CD recordable drive
- CD-RW Drive CD rewritable drive
- DVD-ROM digital versatile disk ROM drive
- Fig. 14 describes software that acts as an intermediary between users and the basic computer resources described in the suitable operating environment 1400.
- Such software includes an operating system 1428.
- Operating system 1428 which can be stored on disk storage 1424, acts to control and allocate resources of the computer system 1412.
- System applications 1430 take advantage of the management of resources by operating system 1428 through program modules 1432 and program data 1434 stored either in system memory 1416 or on disk storage 1424. It is to be appreciated that the claimed subject matter can be implemented with various operating systems or combinations of operating systems. ⁇
- a user enters commands or information into the computer 1412 through input device(s) 1436.
- Input devices 1436 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 1414 through the system bus 1418 via interface port(s) 1438.
- Interface port(s) 1438 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB).
- Output device(s) 1440 use some of the same type of ports as input device(s) 1436.
- a USB port may be used to provide input to computer 1412, and to output information from computer 1412 to an output device 1440.
- Output adapter 1442 is provided to illustrate that there are some output devices 1440 like monitors, speakers, and printers, among other output devices 1440, which require special adapters.
- the output adapters 1442 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 1440 and the system bus 1418. It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 1444.
- Computer 1412 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 1444.
- the remote computer(s) 1444 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer 1412. For purposes of brevity, only a memory storage device 1446 is illustrated with remote computer(s) 1444.
- Remote computer(s) 1444 is logically connected to computer 1412 through a network interface 1448 and then physically connected via communication connection 1450.
- Network interface 1448 encompasses wire and/or wireless communication networks such as local-area networks (LAN) and wide-area networks (WAN).
- LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet, Token Ring and the like.
- WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).
- ISDN Integrated Services Digital Networks
- DSL Digital Subscriber Lines
- Communication connection(s) 1450 refers to the hardware/software employed to connect the network interface 1448 to the bus 1418. While communication connection 1450 is shown for illustrative clarity inside computer 1412, it can also be external to computer 1412.
- the hardware/software necessary for connection to the network interface 1448 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards.
- the terms (including a reference to a "means") used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., a functional equivalent), even though not structurally equivalent to the disclosed structure, which performs the function in the herein illustrated exemplary aspects of the claimed subject matter.
- the innovation includes a system as well as a computer-readable medium having computer-executable instructions for performing the acts and/or events of the various methods of the claimed subject matter.
Abstract
Description
Claims
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2007800085313A CN101401123B (en) | 2006-03-10 | 2007-02-15 | Rfid business process-decoupling of design and deployment time activities |
BRPI0708210-0A BRPI0708210A2 (en) | 2006-03-10 | 2007-02-15 | rfid business process decoupling from design and deployment time activities |
EP07750817A EP2002393A1 (en) | 2006-03-10 | 2007-02-15 | Rfid business process-decoupling of design and deployment time activities |
JP2008558278A JP2009529727A (en) | 2006-03-10 | 2007-02-15 | RFID business process separation between design and deployment activities |
AU2007225397A AU2007225397A1 (en) | 2006-03-10 | 2007-02-15 | RFID business process-decoupling of design and deployment time activities |
CA002641930A CA2641930A1 (en) | 2006-03-10 | 2007-02-15 | Rfid business process-decoupling of design and deployment time activities |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/373,348 US7756747B2 (en) | 2006-03-10 | 2006-03-10 | RFID business process-decoupling of design and deployment time activities |
US11/373,348 | 2006-03-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007106283A1 true WO2007106283A1 (en) | 2007-09-20 |
Family
ID=38480053
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2007/004005 WO2007106283A1 (en) | 2006-03-10 | 2007-02-15 | Rfid business process-decoupling of design and deployment time activities |
Country Status (10)
Country | Link |
---|---|
US (1) | US7756747B2 (en) |
EP (1) | EP2002393A1 (en) |
JP (1) | JP2009529727A (en) |
KR (1) | KR20080109745A (en) |
CN (1) | CN101401123B (en) |
AU (1) | AU2007225397A1 (en) |
BR (1) | BRPI0708210A2 (en) |
CA (1) | CA2641930A1 (en) |
RU (1) | RU2008136380A (en) |
WO (1) | WO2007106283A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010250494A (en) * | 2009-04-14 | 2010-11-04 | Nec Corp | Service provision system, terminal equipment, server, scenario server, service provision method and program |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8098158B2 (en) * | 2004-09-01 | 2012-01-17 | Microsoft Corporation | RFID server internals design |
US8217756B2 (en) | 2004-09-01 | 2012-07-10 | Microsoft Corporation | Rule-based filtering and alerting |
US20090146782A1 (en) * | 2007-12-05 | 2009-06-11 | Symbol Technologies, Inc. | Singulation of radiofrequency identification tags |
US20100325550A1 (en) * | 2009-06-17 | 2010-12-23 | Chien Yaw Wong | Rfid systems |
US8723640B2 (en) | 2011-08-16 | 2014-05-13 | Elwha Llc | Distillation of status data relating to regimen compliance responsive to the presence and absence of wireless signals relating to one or more threshold frequencies |
US20170123622A1 (en) * | 2015-10-28 | 2017-05-04 | Microsoft Technology Licensing, Llc | Computing device having user-input accessory |
TWI788975B (en) * | 2021-08-26 | 2023-01-01 | 香港商永道無線射頻標籤(香港)有限公司 | Online design system and method of radio frequency identification (rfid) tag |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060047789A1 (en) * | 2004-09-01 | 2006-03-02 | Microsoft Corporation | Rule-based filtering and alerting |
EP1632893A2 (en) * | 2004-09-01 | 2006-03-08 | Microsoft Corporation | Device service provider interface |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5910776A (en) | 1994-10-24 | 1999-06-08 | Id Technologies, Inc. | Method and apparatus for identifying locating or monitoring equipment or other objects |
US5650768A (en) | 1996-03-04 | 1997-07-22 | Eswaran; Kapali P. | Baggage claiming method and apparatus |
US6175860B1 (en) | 1997-11-26 | 2001-01-16 | International Business Machines Corporation | Method and apparatus for an automatic multi-rate wireless/wired computer network |
US7586398B2 (en) | 1998-07-23 | 2009-09-08 | Universal Electronics, Inc. | System and method for setting up a universal remote control |
US6862735B1 (en) * | 1999-02-11 | 2005-03-01 | Sun Microsystems, Inc. | Mechanism by which platform independent software may bind to and access platform dependent software |
US6677852B1 (en) | 1999-09-22 | 2004-01-13 | Intermec Ip Corp. | System and method for automatically controlling or configuring a device, such as an RFID reader |
US6631363B1 (en) | 1999-10-11 | 2003-10-07 | I2 Technologies Us, Inc. | Rules-based notification system |
US6784802B1 (en) | 1999-11-04 | 2004-08-31 | Nordx/Cdt, Inc. | Real time monitoring of cable patch panel |
US7171459B2 (en) | 2000-06-07 | 2007-01-30 | Microsoft Corporation | Method and apparatus for handling policies in an enterprise |
US20020070865A1 (en) | 2000-09-29 | 2002-06-13 | Lancos Kenneth J. | System and method for creating a group of guests at a coverage area |
US6883710B2 (en) | 2000-10-11 | 2005-04-26 | Amerasia International Technology, Inc. | Article tracking system and method |
US6732923B2 (en) | 2001-04-04 | 2004-05-11 | Ncr Corporation | Radio frequency identification system and method |
US6793127B2 (en) | 2001-04-04 | 2004-09-21 | Koninklijke Philips Electronics N.V. | Internet enabled resource constrained terminal for processing tags |
US6908034B2 (en) | 2001-12-17 | 2005-06-21 | Zih Corp. | XML system |
US6843415B2 (en) | 2002-01-11 | 2005-01-18 | Sap Atkiengesellschaft | Event-based communication in a distributed item tracking system |
US7149753B2 (en) | 2002-01-11 | 2006-12-12 | Sap Aktiengesellschaft | Providing selective access to tracking information |
US7969306B2 (en) | 2002-01-11 | 2011-06-28 | Sap Aktiengesellschaft | Context-aware and real-time item tracking system architecture and scenarios |
US7287053B2 (en) | 2002-01-15 | 2007-10-23 | International Business Machines Corporation | Ad hoc data sharing in virtual team rooms |
EP1330074B1 (en) | 2002-01-21 | 2005-12-28 | Hewlett-Packard Company | Location device of data network appliance |
US7406439B2 (en) | 2002-01-31 | 2008-07-29 | International Business Machines Corporation | Inventory controls with radio frequency identification |
US20030225928A1 (en) | 2002-05-28 | 2003-12-04 | Sun Microsystems, Inc. | Method, system, and program for managing access to a device by device specific components and operating system specific components |
US20040046642A1 (en) | 2002-09-05 | 2004-03-11 | Honeywell International Inc. | Protocol for addressing groups of RFID tags |
US20040111335A1 (en) | 2002-12-04 | 2004-06-10 | Black Charles Ronald | RFID space monitoring and asset inventory system |
US8103753B2 (en) | 2003-04-22 | 2012-01-24 | Microsoft Corporation | Distributing membership information for multi-party application layer sessions |
US20050062603A1 (en) | 2003-08-06 | 2005-03-24 | Oren Fuerst | Secure, networked and wireless access, storage and retrival system and method utilizing tags and modular nodes |
US7155305B2 (en) | 2003-11-04 | 2006-12-26 | Universal Electronics Inc. | System and methods for home appliance identification and control in a networked environment |
US7267275B2 (en) | 2003-11-04 | 2007-09-11 | Captech Ventures, Inc. | System and method for RFID system integration |
JP4438558B2 (en) * | 2003-11-12 | 2010-03-24 | 株式会社日立製作所 | RFID tag manufacturing method |
GB2453477A (en) | 2004-02-06 | 2009-04-08 | Zih Corp | Identifying a plurality of transponders |
JP2005279008A (en) * | 2004-03-30 | 2005-10-13 | Brother Ind Ltd | Embroidery data preparing device, embroidery data preparing method, embroidery data preparation controlling program, and embroidering method |
US7071825B2 (en) | 2004-04-26 | 2006-07-04 | Microsoft Corporation | Self-monitored active rack |
US7204409B2 (en) | 2004-09-01 | 2007-04-17 | Microsoft Corporation | Reader application markup language schema |
-
2006
- 2006-03-10 US US11/373,348 patent/US7756747B2/en not_active Expired - Fee Related
-
2007
- 2007-02-15 WO PCT/US2007/004005 patent/WO2007106283A1/en active Application Filing
- 2007-02-15 CA CA002641930A patent/CA2641930A1/en not_active Abandoned
- 2007-02-15 CN CN2007800085313A patent/CN101401123B/en not_active Expired - Fee Related
- 2007-02-15 JP JP2008558278A patent/JP2009529727A/en not_active Withdrawn
- 2007-02-15 EP EP07750817A patent/EP2002393A1/en not_active Withdrawn
- 2007-02-15 AU AU2007225397A patent/AU2007225397A1/en not_active Abandoned
- 2007-02-15 KR KR1020087021612A patent/KR20080109745A/en not_active Application Discontinuation
- 2007-02-15 RU RU2008136380/09A patent/RU2008136380A/en not_active Application Discontinuation
- 2007-02-15 BR BRPI0708210-0A patent/BRPI0708210A2/en not_active Application Discontinuation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060047789A1 (en) * | 2004-09-01 | 2006-03-02 | Microsoft Corporation | Rule-based filtering and alerting |
EP1632893A2 (en) * | 2004-09-01 | 2006-03-08 | Microsoft Corporation | Device service provider interface |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010250494A (en) * | 2009-04-14 | 2010-11-04 | Nec Corp | Service provision system, terminal equipment, server, scenario server, service provision method and program |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
Also Published As
Publication number | Publication date |
---|---|
JP2009529727A (en) | 2009-08-20 |
AU2007225397A1 (en) | 2007-09-20 |
KR20080109745A (en) | 2008-12-17 |
CN101401123A (en) | 2009-04-01 |
RU2008136380A (en) | 2010-03-20 |
US7756747B2 (en) | 2010-07-13 |
US20070213994A1 (en) | 2007-09-13 |
EP2002393A1 (en) | 2008-12-17 |
BRPI0708210A2 (en) | 2011-05-17 |
CA2641930A1 (en) | 2007-09-20 |
AU2007225397A8 (en) | 2009-01-08 |
CN101401123B (en) | 2013-01-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8452860B2 (en) | RFID device groups | |
US8245219B2 (en) | Standardized mechanism for firmware upgrades of RFID devices | |
US7756747B2 (en) | RFID business process-decoupling of design and deployment time activities | |
US8098158B2 (en) | RFID server internals design | |
RU2402069C2 (en) | Rfid-server internal structure | |
CA2516005C (en) | Rfid enabled information systems utilizing a business application | |
US7868738B2 (en) | Device simulator framework for an RFID infrastructure | |
CA2517861C (en) | Rule-based filtering and alerting | |
US7675418B2 (en) | Synchronous command model for RFID-enabling applications | |
ZA200506539B (en) | Rfid enabled information systems utilizing a business application | |
US7782203B2 (en) | Strong typing of components in RFID business processes | |
US20080174404A1 (en) | Dynamic updates in rfid manager | |
US8207822B2 (en) | Support for batching of events, and shredding of batched events in the RFID infrastructure platform | |
US7898417B2 (en) | Standardized mechanism for printing labels and managing templates within RFID | |
US7956724B2 (en) | Support for reliable end to end messaging of tags in an RFID infrastructure | |
US20080001711A1 (en) | Reliability of execution for device provider implementations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 07750817 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007225397 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2641930 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/a/2008/010486 Country of ref document: MX |
|
WWE | Wipo information: entry into national phase |
Ref document number: 4391/CHENP/2008 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2008558278 Country of ref document: JP Ref document number: 1020087021612 Country of ref document: KR |
|
ENP | Entry into the national phase |
Ref document number: 2008136380 Country of ref document: RU Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200780008531.3 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007750817 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: PI0708210 Country of ref document: BR Kind code of ref document: A2 Effective date: 20080822 |