Nothing Special   »   [go: up one dir, main page]

MXPA00000831A - Inventory system using articles with rfid tags - Google Patents

Inventory system using articles with rfid tags

Info

Publication number
MXPA00000831A
MXPA00000831A MXPA/A/2000/000831A MXPA00000831A MXPA00000831A MX PA00000831 A MXPA00000831 A MX PA00000831A MX PA00000831 A MXPA00000831 A MX PA00000831A MX PA00000831 A MXPA00000831 A MX PA00000831A
Authority
MX
Mexico
Prior art keywords
interrogator
item
items
library
protector
Prior art date
Application number
MXPA/A/2000/000831A
Other languages
Spanish (es)
Inventor
John H Bowers
Thomas J Clare
Original Assignee
Checkpoint Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Checkpoint Systems Inc filed Critical Checkpoint Systems Inc
Publication of MXPA00000831A publication Critical patent/MXPA00000831A/en

Links

Abstract

An article inventory control system for articles (22), such as books, uses RFID tags attached to each article (22). Each tag has a unique identification or serial number for identifying the individual article (22). An inventory database tracks all of the tagged articles (22) and maintains circulation status information for each article (22). Articles are checked out of the library (10) using a patron self-checkout system. Checked out articles (22) are returned to the library by being deposited into an exterior smart book drop (32) which reads the RFID tag and automatically checks the article back in. Article data from the exterior smart book drop are used to generate reshelving reports for efficiently reshelving the articles. Articles which are used in the library (10), but not checked out, are returned to interior smart book drops (34) within the library (10) for reshelving. The interior smart book drops (34) capture data regarding in-house use of articles. The data are used to generate historical usage reports. The uncirculated articles (22) are stored on shelves of the library (10). The shelves are periodically scanned with an RFID scanner for updating inventory status.

Description

INVENTORY SYSTEM USING ARTICLES WITH RADIO FREQUENCY IDENTIFICATION PROTECTORS BACKGROUND OF THE INVENTION The present invention relates, in general, to inventory systems and circulation control in libraries, and, in particular, to systems that use radio frequency identification protectors in books and the like. The library faces an enormous task of maintaining and controlling large inventories of books, newspapers, audiovisual products, and the like. To facilitate verification of income / verification of expenditures, inventorying, and control of theft of items in the library collection, most libraries place bar codes and / or sensitizable magnetic strips on the articles. Bar codes allow items to be quickly identified using a scanner. The magnetic strip is used in conjunction with a magnetic detection device at the exit of the library for the control of theft. The magnetic strip is normally sensitized. When a person who attends the library borrows an article, the magnetic strip is desensitized. When the person returns the article to the library, the magnetic strip is sensitized again. The magnetic detection device initiates an alarm if a person who attends the library attempts to pass through a controlled exit carrying an article with a sensitized magnetic tape. The arrangements that are based on magnetic strips have numerous disadvantages. They must use special equipment to desensitize and re-sensitize the magnetic strips. Typically, the library staff must operate the equipment to ensure that entry verification and exit verification are done accurately. An example of such a system is described in the patent of the United States of America No. 4,141,078 (in favor of Bridges, Jr. and others). Another library entry / check verification system that is based on protected articles and that is designed to be commanded only by a person attending the library is described in United States of America Patent No. 5,288,980 a Please Patel and others. Another inventory control arrangement of general purpose articles suitable for use in a library is disclosed in United States Patent No. 4,881,061 in favor of Chambers. The existing procedures in libraries to manipulate articles are time consuming and lead to many errors. The replacement of items on shelves is a particularly error-prone, time-consuming task. Many items are returned to the wrong location in the library and are subsequently supposed to be run until they are discovered during complete inventory checks. Also, taking inventory of a collection in libraries is currently a task of such high cost and time-consuming that most libraries do not perform a full inventory check as often as they should if they really do. Often libraries review exit verification data to determine which items are of most interest to those attending the library. This information can be used to make decisions about new purchases or to allocate better existing resources. However, libraries are not able to capture a large amount of information regarding the use of their collections by those who attend the library but do not borrow the articles but use the articles while they remain in the library. In general, the so-called "internal circulation" makes up two-thirds to three-quarters of the total circulation of many libraries. In this way, the exit verification data can not accurately measure which items are of interest to certain people who attend the library. The biggest expense in the operation of a library are personnel costs. Libraries are constantly looking for ways to perform the necessary functions for less cost. ThereforeThere is still a need for systems that allow library employees to further reduce the time and effort devoted to the handling of articles, and to provide library administrators with better information regarding how their collections are being used. The present invention satisfies these needs.
DESCRIPTION OF THE INVENTION The present invention provides an inventory control system for use in conjunction with items that will be maintained in a storage area. Each of the items has a radio-frequency identification shield attached to it. Each protector includes an antenna for use in detecting the presence of the article by receiving an interrogation signal and returning a response signal. The shield also includes an integrated circuit connected to the antenna for storing identification information of the article and for issuing the item identification information with the response signal when the guard interrogation is performed. The system comprises at least one item return area to receive items that were removed from the storage area and that are to be returned to the storage area, the returned item passing through an area when the item is returned, an interrogator to monitor the area to determine alterations in the form of a response signal caused by the presence of a protector within the zone, the interrogator emitting an interrogator output signal when a protector is detected in the zone, including each output signal of the interrogator the identification information stored in the integrated circuit of a interrogated protector; and a database to receive the interrogator output signals, including the database, inventory data for items monitored by the system including output verification status data, the received interrogator output signals being used to update the output verification status data. In another embodiment, the present invention comprises an inventory control method for use in conjunction with items that have been maintained in a storage area. Each of the articles has a radiofrequency protector attached thereto, each protector including an antenna for use in detecting the presence of the article by receiving an interrogation signal and returning a response signal. Each shield also has an integrated circuit connected to the antenna for storing identification information of the article and for issuing the item identification information with the response signal when the shield interrogation occurs. The method comprises the steps of: a) scanning a portion of the storage area with a mobile interrogator, the mobile interrogator detecting alterations in the shape of the response signals caused by the presence of protectors within the predefined zone disposed from the interrogator and emitting an interrogator output signal when a protector is detected in the zone, each interrogator output signal including the identification information stored in the integrated circuit of a interrogated protector; b) repeating step a) for an adjacent portion of the storage area and for all remaining portions of the storage area; Y ? Sfr í m á i ^ c) receive the interrogator output signals in a database, including the database, inventory data for the items that are kept in the storage area, with the interrogator output signals being received used to update the inventory data. The present invention further comprises an inventory control system in libraries for use in conjunction with items that are maintained in a storage area. Each of the items has a radio frequency protector attached to it. Each protector includes an antenna for use in detecting the presence of the article by receiving an interrogation signal and returning a response signal and an integrated circuit connected to the antenna to store identification information of the article and to output identification information. of the item with the response signal when the guard interrogation occurs. The system comprises an inventory database and a mobile interrogator. The database includes a list of articles in the library and the circulation status of each of the articles. The mobile interrogator scans the storage area in discrete portions, detecting alterations in the form of a response signal caused by the presence of protectors within the predefined zone disposed from the interrogator. The interrogator also emits an interrogator output signal when a protector is detected in the zone. Each output signal of the interrogator includes identification information stored in the integrated circuit of a interrogated shield. the basis of M? U? The inventory data receives the identification information and uses the identification information to update the circulation status of the items stored in a library. In yet another embodiment, the present invention is a self-service exit check system for a library that has items available to be brought as a loan to the library concurrently. Each of the articles has a radiofrequency protector attached thereto and each protector includes an antenna for use in detecting the presence of the article by receiving an interrogation signal and returning a response signal and an integrated circuit connected to the antenna for storing identification information of the article and to issue the identification information of the article with the response signal when the interrogation of the protector by an interrogator occurs. The system also a plurality of identification cards concurrent to the library, each of which includes a radio frequency shield. The system comprises an interrogator, an inventory database, and a processor. The interrogator is located in an exit verification area in the library to interrogate at least one item that the concurrent to the library wishes to carry and substantially simultaneously interrogate a concurrent identification card that identifies the concurrent to the system. The interrogator receives a response signal containing the identification information of the item stored for each of the articles to be taken as a loan and information of Identification of the concurrent to the library from the identification card. The interrogator receives the response signals regardless of the orientation of the articles or the identification card of the concurrent to the library. The inventory database includes a list of items in the library and the circulation status of each of the items. The database receives the identification information of the concurrent and the identification information of the article for each of the articles to be rendered. The processor is in communication with the database and updates the circulation status of the items to be provided. In another embodiment, the present invention is a self-service checkout system for a library. The library has items that are available to be borrowed as concurrent loans. Each of the articles has a radiofrequency protector attached thereto, and each protector includes an antenna for use in detecting the presence of the article by receiving an interrogation signal and returning a response signal and an integrated circuit connected to the antenna for storing identification information of the article and to issue an identification information of the article with the response signal when the interrogation of the protector by an interrogator occurs. The system comprises a tray for containing a plurality of articles, an interrogator for substantially simultaneously interrogating the plurality of articles placed on the trays that the participant wishes to borrow, with the interrogator receiving a response signal containing the identification information of the article stored for each of the plurality of articles to be taken as a loan, in which the interrogator receives the response signals regardless of the orientation of the articles; an inventory database that includes the articles that are in the library and the circulation status of each of the articles, the database receiving the identification information of articles for the article to be taken as loan; and a processor in communication with the database to update the circulation status of the items to be taken as a loan. In another embodiment, the present invention is an inventory control arrangement in libraries for use in conjunction with items that are maintained in a storage area. Each of these articles has a radiofrequency protector attached thereto that includes an antenna for use in detecting the presence of the article by receiving an interrogation signal and returning a response signal and an integrated circuit connected to the antenna to store information of identification of the article and to output the identification information of the article with the response signal when the interrogation of the protector by an interrogator occurs. The system comprises an inventory database that includes a list of items in the library and the circulation status for each such item; a concurrent identification device to the library to identify a concurrent to the system; an item checkout system located in an exit verification area - «¡¡¡¡¡¡¡¡¡¡¡¡^ ^ ^^^ i ^ ^ fiiii- ^ r of articles, including the verification system of exit a first interrogator to interrogate an article that the concurrent to the library wants to extract from the storage area, receiving the first interrogator a response signal containing the identification information of the item stored for the article to be extracted; a processor in communication with the first interrogator and the database, the processor receiving the identification information of the concurrent and the identification of the article for the article to be extracted from the first interrogator, and updating the inventory database with the status of circulation of the item to be extracted; an item entry verification system that includes at least one item return area to receive items that were removed from the storage area and that are to be returned to the storage area, with each item returned through an area of proper income verification the item is returned; a second interrogator in communication with the processor, the second interrogator monitoring the income verification zone to determine alterations in the form of a response signal caused by the presence of a protector within the zone, and emitting an exit signal the interrogator when a protector is detected in the area, each output signal from the controller including the identification information stored in the integrated circuit of a shield interrogated for the article being returned, in which the inventory database receives the signals from exit of the interrogator and update the exit verification status data of the article that is being returned with the same. Another embodiment of the present invention is a library inventory control system for use in conjunction with items that are maintained in the library. Each of the articles has a radiofrequency protector attached thereto, each protector including an antenna for use in detecting the presence of the article by receiving an interrogation signal and returning a response signal and an integrated circuit connected to the antenna for storing information identifying the article and for issuing the item identification information with the response signal when an interrogation of the protector is received by an interrogator. The system comprises: an inventory database that includes a list of items in the library and the circulation status of each such item; a concurrent identification device of the library to identify a concurrent for the system; an item check verification system located in an exit checking area of library items, including the exit verification system a first interrogator to interrogate an item that the competitor wishes to take from the library, the first interrogator receiving a response signal that contains the information of the identification of the article stored for the article to be taken; a processor in communication with the first interrogator and the database, the processor receiving the identification information of the concurrent and the identification information of the article for the item to be taken from the first interrogator, and updating the inventory database with the state of circulation of the item to be taken; a video camera for capturing output verification area images and outputting video signals of the captured images; a video recorder for storing the video signal in a video storage medium; an item verification system that includes at least one item return area to receive items that were taken from the library, with each item returned through an entry verification zone when the item is returned; a second interrogator in communication with the inventory database, the second interrogator monitoring the entry verification area to determine alterations in the form of a response signal caused by the presence of a protector within the area, and emit a signal Interrogator output when a protector is detected in the zone, each interrogator output signal including the identification information stored in the integrated circuit of a interrogated protector for the item being returned, in which the inventory database receives the interrogator output signals and updates the exit verification status of the item being returned using the interrogator output signals; a mobile interrogator for scanning discrete portions of the library and detecting alterations in the form of response signals caused by the presence of protectors within a predefined zone disposed from the mobile interrogator and for emitting an interrogator output signal when a protector is detected in the zone, including each interrogator output signal, the identification information stored in the integrated circuit of an interrogated protector, in which the database receives the identification information and updates the circulation status of the items stored therein with information; an exit interrogator to monitor an exit from the library, interrogating the exit interrogator an item that passes through the exit and is thus being carried from the library, the exit interrogator receiving a response signal from the associated protector with the article, the response signal containing the identification information of the article stored for the item that passes through the output; an output processor coupled to the output interrogator, the output processor receiving a signal output from the output interrogator including the identification information of the response signal, in which the output processor compares the received identification information with the information stored in the database to determine if the item is registered in the database as a loan, in which the exit interrogator triggers an alarm if the .ji? iSsi? fek? áiaíí - ^. i.- g ^ jé article that passes through the exit is not registered in the database as taken as loan; and a zone interrogator located at the exit from the predefined area of the library, the zone interrogator being arranged to detect the removal of protected items from the predefined area, in which the interrogator of the zone activates an alarm in response to the detection of the extraction of an article from the predefined area.
BRIEF DESCRIPTION OF THE DRAWINGS The preceding summary, as well as the following detailed description of the preferred embodiments of the invention will be better understood when considered in conjunction with the accompanying drawings. To illustrate the invention, embodiments that are currently preferred are shown in the drawings. However, it should be understood that the invention is not limited to the precise arrangements and instrumentation shown. In the drawings: Figure 1 is a schematic layout diagram of a library to illustrate the general characteristics of the present invention. Figure 2 is a schematic block diagram of a radio frequency identification shield suitable for use in articles that are circulated through the library of Figure 1. Figure 3 is a schematic detailed functional block diagram of an interrogator for use in the reading of the protector of Figure 2. Figure 4 is a sample of database records for protected items used by the library of Figure 1. Figure 5 is a schematic block diagram of a self-test system of output from concurrent for use in the library of Figure 1. Figure 6 is a schematic block diagram of a smart mailbox for books for use in the library of Figure 1. Figure 7 is a sample of shelving replacement uniform generated in base to data collected by the intelligent viewer for books of figure 6. Figure 8 is a sample of historical use uniform generated from data collected by the intelligent internal mailbox for books of Fig. 7. Fig. 9 is a schematic block diagram of a shelving scan inventory system. Figure 10 is a top view of a row of shelves and shows an interrogation zone for inventorying articles using the system of Figure 9. Figure 11 is a front elevational view of a multi-row shelving and illustrates a method for inventorying articles using the system of Figure 9; and Figure 12 shows an alternative entry procedure for the concurrent exit self-verification system of Figure 5.
DETAILED DESCRIPTION OF THE INVENTION In the present specification certain terminology is used for reasons of convenience only and should not be considered as limiting the present invention. In the drawings, the same reference numbers are used to designate the same elements in all figures. Figure 1 is a schematic diagram of a storage area in the form of a library 10 for use in explaining the novel features of the present invention. While the present invention explains the environment of a library, the scope of the invention includes other environments in which items are maintained in a storage area and are periodically (permanently) removed or borrowed for limited periods of time because they are concurrent. or clients like being in video business, rental business or the like. The storage area may also be associated with a commercial / industrial environment, and may be, for example, a tool magazine, a maintenance warehouse, or the like. An interrogator, as defined herein, is a device that is used to couple power to a radio frequency identification shield to power the shield and to receive data from the shield. The present invention uses different forms of interrogators, including scanners, "smart" and "non-intelligent" pedestals and the like. With reference to Figure 1, the library 10 is divided into an area of public space 16 for use by persons attending the library, and an area of space 18 for employees. The public space area 16 includes a storage area in the form of a plurality of shelves or stacks 20 for containing items such as books, newspapers, audio tapes, compact discs, videotapes, music sheets and the like 22, a newspaper room 23 having additional shelves or stacks 24, and a plurality of online computerized catalogs 26 and library membership elements. A circulation table 28 separates a portion of the space area 26 for the public and a portion of the space area 18 for employees. Employee space area 18 includes an area of support service operations. In the circulation table 28 and in the support service operations area 30, additional catalogs are located on computerized lines 26. In these locations other miscellaneous computer equipment can be placed, such as a bar code vector 46 or a computer 48. A database associated with the computer 48 stores inventory data of all items 22 of the library collection, as well as data relating to items 22 that were borrowed by the library concurrently.
ASate ^ -. ^? **** * *! : - Online catalogs 26 are connected to computer 48 and its database. All the features and elements described above are conventional. Libraries typically also include areas devoted to information from other resources, such as videos, CD-ROMs, cassettes or the like. For reasons of brevity, these alternative resources are not shown in Figure 1. Throughout the specification, the word articles and books are used interchangeably. However, it should be understood that the scope of the word "article" includes other types of items that are typically found in a library, such as videos, CD-ROMs, cassettes, newspapers or the like. The library 10 further includes elements that are associated with novel methods and systems for inventory control and article usage tracking. First, the library includes a plurality of "smart" areas for returning articles or mailboxes for books. Bookcases according to the prior art generally functioned to provide a temporary storage location for books that were returned by the library user for check in and reposition on shelves. The "smart" bookcases of the present invention interrogate articles 32 as they pass into the bookcase and read, they register and process information regarding their identity. Figure 1 shows a smart outdoor area for return of articles or mailbox for books 32 and three areas of return of articles smart interiors or book boxes 34. The exterior book mailbox 32 allows people to return items when the library 10 is closed or when the person does not wish to physically enter the library 10. Library policy may also be required that all the loaned items 22 are returned to the outer mailbox 32 for books. The book boxes 32 or 34 can thus function as an entry identification terminal for items 22 that are returned. The interior bookcases 34 can be placed in an area 16 to the public and / or in the space area 18 for employees. When the people return items 22 to the circulation table 28, an employee placed the article 22 in the interior letter box 34 located in the space area 18 for employees. People who come to the library can also place borrowed items 22 in any of the interior book boxes 34 located in the public area. In both cases, the items loaned may be items that are returned after they have been borrowed for use outside the library or items that were used by the person while in the library but were not verified for departure. Each of the articles 22 has a radio frequency identification shield, which is sometimes referred to as an "intelligent" shield attached thereto. The radio-frequency identification shield thus becomes an intelligent security protector in the disclosed embodiment of the invention. The radio frequency identification protectors are described below with reference to figure 2. When the radio frequency identification protectors are correctly interrogated, they return unique information that can be used to determine the identity of article 22 and its correct location in the library. Second, the library 10 includes one or more pairs of "intelligent" pedestals 36. A pair of "intelligent pedestals" as described above are pedestal-shaped devices that contain interrogators capable of communicating with radio frequency identification shields. A pair of smart pedestals 36 reads radio frequency identification shields when protected articles 22 are within a predetermined area between the pedestals. In Figure 1, a pair of smart pedestals 36 monitors an area by which a competitor to the library must pass to enter or leave library 10. Another pair of smart pedestals 36 monitors an area in which employees enter and exit. from the library 10. Each of the zones is optionally monitored by a surveillance camera 38 or a biometric measuring device. The output of each pair of smart pedestals 36 is connected to the database of the computer 48 to verify whether the articles 22 detected within the area between the pedestals 36 have been correctly checked for their output. The library 10 may also include a pair of sensors, referred to herein as "non-intelligent pedestals" for detecting the presence of items that carry security guards according to the prior art, such as magnetic security protectors or non-intelligent resonant security protectors. The non-intelligent pedestals 40 can be used to ensure that the newspapers are between a designated portion of the library 10 (e.g., a newspaper room 23). Alternatively, the non-intelligent pedestals 40 may be similar to the smart pedestals 36 that are not connected to the database of the computer 48. Since items 24 are not allowed to be taken out of the newspaper room 23, the detection of any article 24 between the non-intelligent pedestals 40. Since articles 23 are not allowed from the newspaper room 23, the detection of any item 24 between non-intelligent pedestals 40 initiates an alarm. Third, the library 10 includes portable radiofrequency identification shielding scanners or so-called "radio frequency identification scanners". These scanners can read identification information associated with a radiofrequency identification shield, as described in more detail below. A radiofrequency identification scanner 42 is shown in the circulation mass 28, and a portable scanner 42 is shown adjacent to a set of book shelves 20. Two additional scanners 42 are associated with a novel output check station, which outlined below. When portability is not required, a fixed interrogator 43 may be used in the circulation table 28 and the novel exit verification post in place of, or in conjunction with, the portable scanner 42.
Fourth, the library includes a 50 self-check outpost for the library, to allow those attending the library to check out articles 22 to get them out of the library. The exit check post 50 includes a fixed interrogator 43, and optionally, one or more optional portable radio frequency identification scanners 42, which are used to identify items 22 that are presented at the exit check post 50. The exit check post 50 also includes at least one computer terminal 52 for receiving data from the fixed interrogator 43 and the scanner 42. Computer terminal 52 is also connected to a concurrent identification device 68 to the library. The circulation table 28 also includes a fixed interrogator 43, an optional scanner 42, a computer terminal 52 and a concurrent identification device 68 to the library that can be used by the concurrent the library or by employees to check out items. The 50 self-check outpost of people attending the library is described in more detail below with reference to Figure 5. All novel systems of the present invention use a radio-frequency identification shield to be linked to each Article 22. While such protectors are well known in the prior art, a particular type of radio frequency identification shield that is particularly suitable for use with the present invention is a passive radio frequency shield having an antenna, and in the embodiment preferred, a radio frequency identification shield comprising an antenna or inductor coil connected to an integrated circuit. Figure 2 shows general details of a sample radio frequency identification shield 54, suitable for use with the present invention. The shield 54 includes a passive resonant radio frequency circuit 56 for use in detection when the shield 54 is within an area monitored by a vector or interrogator, as is well known in the art. A well-known type of circuit 56 has a coil antenna 58 and a capacitor 60 which together form a resonant circuit with a predetermined resonant frequency, i.e., the selected radio frequency. The power for the protector 54 is obtained from the antenna 58 in a convenient manner. Also, the protector 54 includes an integrated circuit 62 to provide "intelligence" to the protector 54. The integrated circuit 62 is connected to the circuit 56. The integrated circuit 62 includes a programmable memory 64, such as a 64-bit memory, for storing bits of identification data. Of course, other protective designs could also be used with the present invention, and the invention is not limited to the particular protector 54 shown. For example, the capacitor 60 may be located in the integrated circuit 62, only one inductor coil being outside the integrated circuit 62. The integrated circuit 62 outputs a data stream composed of the 64 bits of stored data when sufficient integrated circuit is applied to the integrated circuit. power. In an embodiment of the invention, the data flow creates a series of data pulses by connecting an additional capacitor (not shown) through the coil antenna 58 during the duration of the data pulses. This changes the resonant frequency of the radiofrequency circuit 56, detuning it from the operational frequency. In this way, instead of the radio frequency circuit 56 returning a simple response signal, it returns a signal containing a preprogrammed information packet. The information packet (data pulses) is received and processed by the interrogator receiver circuit and decoded (if necessary) to provide identification information relating to the item 22. Other methods of using the data in the integrated circuit memory 64 for issuing shield identification data 54 are within the scope of the invention. The integrated circuit 52 is preferably also a passive device and is powered in the same way as the radio frequency circuit 56 (i.e., using energy received in the antenna 58 that comes from the transmitter signal of the interrogator). In this way, protector 54 is what is called a "radio frequency identification shield". Other types of radiofrequency identification shields can be used with the present invention. Examples of other radio frequency identification shields that are suitable for use as protector 54 are shown in U.S. Patent Nos. 5,446,447 (in favor of Carney et al.), 5,430,441 (in favor of Bickley et al.), and 5,347,263 (in favor of Carroll and others). Typically, radio frequency identification protectors are not physically disabled That is, they are not permanently short-circuited in a way that prevents their reuse, and they are not made inactive by magnetizing or demagnetizing a magnet in it. Figure 3 is a schematic block diagram of a reader or interrogator 100 suitable for use with protector 54 depicted in Figure 2. Interrogator 100 and protector 54 communicate by inductive coupling, as is well known in the art. Interrogator 100 includes a transmitter 102, a receiver 104, an antenna assembly 106, and data processing and control circuitry 108, each of which has inputs and outputs. The output of the transmitter 102 is connected to a first input of the receiver 104, and the input of the antenna assembly 106. The output of the antenna assembly 106 is connected to a second receiver input 104. A first output and a second output of the data processing and control circuitry 108 are connected to the input of the transmitter 102 and a third input of the receiver 104, respectively. Also, the output of the receiver 104 is connected to the input of the data processing and control circuitry 108. Interrogators having this general configuration can be constituted using circuitry that is described in U.S. Patent Nos. 3,752,960, 3,816,708, 4,223,830 and 4,580,041, all issued in favor of Walton, and all of which are incorporated by name. reference in its entirety to the present specification. The interrogator 100 is physically implemented as a pair of smart pedestals 36, or as a scanner 42 of The portable radiofrequency identification, as illustrated in FIG. 1. A preferred embodiment of a portable scanner 42 has an antenna of the resonant circuit similar to a dish. disc with a diameter of approximately 150 mm to approximately 200 mm, and is mounted on an arm extension to reach upper shelves and lower shelves and book shelves. Before any of the novel systems of the present invention are implemented, the library 10 protects the articles 22 with protectors and prepares a database within the computer 48 of all the items 22 protected with shields. Ideally, all items 22 in the library are protected with guards. However, the provisions can work, albeit less efficiently, even if not all items are protected with protectors. In an embodiment of the invention, the library 10 receives unscheduled protectors 54, assigns a unique serial number to each of the protectors 54 by means of suitable programming, (if they are no longer preassigned), the protectors 54 are physically linked to each of the articles 52, and creates a database that correlates each protector 54, specifically the unique serial number thereof, with the respective article 22. The programming step is eliminated if the articles 22 arrive pre-protected with protectors to the library 10. In the example illustrated in the present specification, library 10 applies protectors to 100 items. Next, an inventory database is created in the following manner: 1. An article 22 is read by a fixed interrogator 43 or by a portable radio frequency identification interrogator 42 which extracts the programmed unique serial number of the guard 54 2.- A database record is added for the number of 5 series. 3.- Next, the item identification information is obtained for article 22, by any means, such as reading bar codes or existing labels in article 22 or manually entering identification information or reading such information from another 0 database or other storage device. Then the item identification information is added to the database record for the respective guard serial number. Most large libraries already have an automated online catalog that is generated from an existing database of their collections (ie, the 5 articles 22). Thus, library 10 should only add information to an existing data field to identify the specific protector 54 serial number that is linked to article 22, instead of creating a relatively new information database for articles 22 protected with protectors. Alternatively, the library 10 could keep its catalog in an existing line and create a new database to track the status of protected items 22 with protectors. The following description assumes that the library 10 prepares a fully integrated database or that the information of the online catalog is linked to the database of articles protected with protectors so that all available information regarding an article 22 is easily recoverable. The database of articles 22 in the library collection also includes circulation status information (not shown), such as if an article 22 is borrowed, who borrowed it, and when it should be returned (ie , return date of the article). Figure 4 is a sample of a database registration sequence created by the procedure described above. Each record includes a field for shield identification information (for example, shield serial number 22) and a field for item identification information. The identification information is correlated with "item identification information" and therefore it is also referred to as "item identification information". That is, as the guard serial number is unique, it can be used to identify the item. The item identification information can be a classification number according to the Deciam Dewey System, a classification number according to the congress library, an ISBN number, or an arbitrarily assigned number. The last digit of the item identification information can be used to identify the copy number of the item in the library inventory. The information identifying the item can also include any part of the bibliographic data, such as the title, author, publisher and similar. Optionally, the database registration may include additional information, such as a ^^^ jH ^ default location of a large library system, where article 22 is stored. Universities typically have individual departmental libraries, in addition to a main library. Large government library systems have plural branches. The additional location information may be used to correctly identify the items 22 with such respective locations. The database of protected items 22 with protectors (whether constructed as a separate database or appended to the existing line catalog 26) is stored in computer 48 as a database 66, but can also be stored in a computer remote (not shown). Database 66 may also optionally include a field to maintain the loan status of each item 22 in a field to maintain the current location of item 22. For example, a borrowed item is indicated as borrowed in the loan status field and the identification number of the person who borrowed the item is stored in the persons identification field. The person identification field can also mean that the item is presently on the shelf of the library (for example with a zero (000000) stored in the persons identification field) and indicates that the item has been returned and not yet returned. has been put back on the shelf (for example, with a 000001 stored in the people identification field). It should be understood that the loan status and the identification field of persons, as well as other fields, can they can be stored in a separate database or they can be stored as a concatenated list, and that other information can also be stored in the database 66 or concatenated to the database 66. Figures 5, 6 and 9 show systems of according to the present invention that can be implemented after the articles 22 are protected with protectors and the database 66 has been established. More particularly, figure 5 shows a system of self check out of people, figure 6 shows a mailbox for intelligent books, and Figure 9 shows a shelf scanning inventory system. For reasons of clarity, these figures are described in conjunction with figure 1. With reference to figure 5, therein is shown a schematic block diagram of the self-checking system 50 for the departure of people who have lent an article in figure 1. When a person wishes to borrow an article 22 from the collection of the library, the person is identified to the system by means of a device 68 of identification of persons. The person identification device 68 can be a card reader, such as a bar code reader or a magnetic strip reader for reading data from the library card belonging to a person. The person identification device 68 can also be the same fixed interrogator 43 or the radiofrequency identification scanner 42 that is used to interrogate articles. Alternatively, the person identification device 68 can be a biometric (physiological) reading device, such as a fingerprint t * ^. ** ^ ^ ** or an iris scanner. In another alternative embodiment of the invention, the person can be identified directly to the system 50 by entering an identification and / or password to the computer terminal 52. The identification data of the person is received by the terminal of the computer 52 communicating with a computer. database of people stored in computer 48 to verify that the person is authorized to borrow items 22. If the person is not in the person database or if the person is a criminal, the exit verification procedure may be completed or the computer terminal can enter a routine for registering people. After the person is identified and determined to be an authorized user, the exit verification procedure can begin by carrying out the following steps. The person manipulates the article 22 to be borrowed and / or the fixed interrogation 43 or the scanner 42 so that the protector 54 associated with article 22 is interrogated and the data returned by the protector 54 are read. As in article 22 it is preferably protected with the radio frequency identification shield 54, it is necessary that the article 22 be placed in the vicinity of the interrogator 43 or the scanner 42. The data output of the interrogator 43 or the scanner 42 includes serial numbers of the protector 54. The serial number of the protector is sent directly, or through terminal 52 of the computer, to computer 48 which places the appropriate record for article 22 in its database. If an article 22 is correctly entered in the library 10, a person can borrow it. Database 66 is then authorized to show that article 22 has been loaned to a person who is currently using position 50. These exit verification stages are repeated for each item 22 that the person wishes to carry as loan. Figure 12 shows an alternative procedure of entry into the exit self-verification system 50 by the person who has lent an item. The system is the one shown in Figures 1 and 5. All items 22 that the person wishes to borrow may be placed in a tray 150 or a predefined interrogation zone, such as a housing in the vicinity of the fixed interrogator 43 '. that simultaneously interrogates all of the articles 22. Radio frequency identification interrogators do not require that there is a line of sight, and in this way they can simultaneously interrogate multiple protectors that are placed in a defined area regardless of their orientation in the zone. The interrogator 43 'may also be designed to read both a person identification card 152 (which may also include a protector 54), and the protectors 54 linked to the articles 22. In this way, the identification device 68 of figure 5, can be incorporated into the interrogator 43 'of figure 12. To verify the output, the person simply places the identification card 152 and the articles 22 in a defined area, and initiates an exit verification procedure. The data output of the interrogator 43 'is communicated to the database 48 either directly or via the terminal 52 of the computer (Figure 5). The terminal of the computer 52 can be used to urge the person to go through the stages of exit verification and to return information regarding the stages, such as messages verified on the result of the interrogation of each article. The terminal 52 of the computer can also inform a person about the return date of article 22 and can optionally include a printer to generate a record of the exit verification transaction and the return date for the person who borrowed the item. . 0 To ensure that only items 22 whose exit verification has been correctly performed are removed from the library 10, the pair of intelligent pedestals 36 (which incorporate the elements of the interrogator 100 of FIG. 3 therein) interrogate the articles 22 as they pass through an area by which a concurrent person or employee must pass to exit the library 10. The status of each item 22 interrogated is verified in the database 66. If the article 22 is not properly verified for its output, a sensitive and / or audio alarm is initiated to alert the person and the employees of the library about the problem. Alternatively, the alarm may cause a door (not shown) to be locked, thus preventing the person or employees from leaving the library. Alternatively, the information regarding the item whose exit verification has not been made , a database is registered and the alarm is not activated. As ^^^^^^ j ^ riÜÉ gtíb ^ ^ xi? T, ^ nmí ^^ indicated above, the exit zones are optionally monitored by a surveillance camera 38 or a biometric measuring device that is activated by the alarm signal to record a biometric image or data of the person or employee passing through the area. The image would be useful if the person or employee ignores the alarm and leaves the library 10 with the article or items 22 not verified for their departure. In an optional configuration, the exit check occurs automatically when the person leaves the library. In this embodiment, the interrogator associated with the smart pedestals 36 can read both the identification card of the persons (which also includes a radio frequency identification shield) and also the protectors 54 linked to the articles 22. When the person walks and passes in front of the intelligent pedestals 36, the articles 22 are automatically verified for their exit. Alternatively, the person may be required to insert an identification card into a card reader that unlocks an exit door or passage barrier. Intelligent pedestals 36 are placed on the exit door or passage barrier. As the person passes through the exit door or the passage barrier, the interrogator associated with the smart pedestals 36 verifies the departure of the items 22. These optional configurations are particularly suitable for unattended libraries, which are typically in private institutions, corporations or universities.
If the protector of the article @ 4j | l 'has engraving or rewriting capability, one or more bits of the memory of the protector can be used to indicate the exit verification status made of article 22. During the exit verification, the Associated changes are made to one or more bits. In this case, if the interrogator associated with the intelligent pedestals 36 detects that the article has been correctly verified for its exit, it is not necessary to search the database 66 to determine the status of the article 22, and the person passes through it. the zone without sounding any alarm nor that any search is made in a database of articles. With reference to figure 6, there is shown a schematic block diagram of the external intelligent book box 32 of figure 1. When a person wishes to return an article 22 to the library 10, the person simply deposits article 22 within of the mailbox for smart books 32. The outer smart box 32 includes a tray, a panel, a compartment, or the like (in the list with the reference number 138), to initially support an article 22 placed in the book box 32 The outer boundary of the tray 138 is coincident with an interrogation zone 110 defined by the dashed lines in Fig. 6. The book box 32 also includes a collecting container 112 for receiving and containing items accepted by the book mailbox 32. In operation, once a person has access to the tray 138 and places articles 22 on it, an interrogator 100 reads the protectors 54 of the articles. 22 and compare the serial numbers received from the read articles 22 with the serial numbers in their database 66. If the articles 22 belong to the library 10, the book mailbox 32 allows the articles 22 to pass to the collecting container 112 (such as opening a door 114) and signaling to the database 66 a computer 48 that the items 22 were returned. Otherwise, a presentation panel or the like (not shown) informs the person that the articles 22 do not belong to the library 10 and must be removed from the tray 138. If the articles do not have protectors 54, and the Library 10 has all the items in its collection protected with protectors, the library 10 also informs the person that the articles do not belong to the library 10 and that they must be removed from the tray 138. If the articles do not have protectors 54, and the library 10 has not protected all its collection with protectors, the library 10 may wish to accept the articles although they may not belong to the library collection. Any item that does not belong to the library 10 is processed by the employees of the library after the collector container 112 is emptied. In the alternative embodiments of the book box 32, there is no tray 138. In contrast, the articles 22 are simply they drop into the book box 32 through a slot and fall directly into the collecting container 112. The articles 22 are read by the interrogator 100 as they fall into the collecting container 112, or they are all read at the same time before they are emptied the container 112. If the articles 22 are all interrogated at the same time, it is only necessary that the scope of the interrogator 100 be sufficient to reach all areas of the container 112. A problem with the mailboxes for external books is that sometimes the Vandals go from deteriorating items previously inserted into the mailbox or try to spoil the same book box. For example, a vandal could pour liquids or food waste into the mailbox. In the worst case, a vandal could pour flammable liquids or burn objects inside the book box to try to start a fire in it. To minimize access to internal parts of the outer smart book mailbox 32 by vandals, the book mailbox 32 may include a person identification device 68 similar to that described in Figure 5, and an access door 140 to gain access to the library. tray 138. Access door 140 opens only if the person is an authorized user. The book box 32 may also have elements to detect a jam caused by a jammed item 22, and items to report jamming to the computer 48. It can be assumed that there is a jam if the interrogator 100 repeatedly detects the same serial number in interrogation zone 110 for a prolonged period of time. At regular intervals, the employees of the library empty the collecting container 112 and replace the articles 22 in the shelves. To ensure that all items are correctly verified when they are integrated, the library employees will want to interrogate the collection container 112 before the items 22 are put back on the shelves. Optionally, an entry verification reader can be positioned adjacent to the book mailbox or the book return processing workspace in which the employee can cause the items 22 to be interrogated as part of the classification and handling procedure. A terminal associated with the entry verification interrogator can provide instructions to the employee regarding special handling requirements and the like. The data generated by the outer book box 32 is used by the database 66 to create a container content report and a shelf replacement report. The container content report can be used to quickly determine if a particular item of interest is in the collection container 112 without having to physically search the container 112. The contents report of the container can also indicate items 22 that are normally maintained in reserve or that can be removed by another person. The contents report of the container also provides general data concerning the articles 22 in the collection container 112. A type of container content report is a shelf replacement report that can be used for repositioning the article on shelves. Libraries dedicate a large amount of labor resources to the replacement of items on shelves, (for example, books, newspapers and the like) in your collection.
Typically, all of the items 22 are taken to a central location, classified by location, (e.g., floors, bookshelf or shelf, row), are placed in different carts and taken to their respective shelving replacement locations. The shelving replacement report can be used to drastically reduce the time and effort devoted to repositioning items 22 on shelves. Figure 7 is a sample of a shelf repositioning report 116 generated by belt items 22 in a collection container 112. The report 116 provides a list of items 22 ordered according to shelf location. The location in shelves can be the row of shelves that contains the respective article or, any other indicative information to help the employee in the return of articles 22, such as the location of the floor / shelf. The provision of such repositioning report on shelving classified 116 can assist in the shelving replacement process. For example, in a shelving replacement method using report 116, an employee simply brings the collection container 112 to the first location listed in the shelving replacement report 116, located in the collection container 112 the first report article 22 116, and place it on the shelf. This procedure can then be repeated for each article 22 of the reposition report on racks 116. If the collecting container 112 is not displaceable, it may be necessary that the articles must be transferred to a moving carriage and that the above procedure be carried out by moving the displaceable car from location to location. The shelving replacement report 116 is preferably arranged to take advantage of the shortest path path reprogrammed through the library. The generation of a path as short as possible from pre-assigned locations is well known in the prior art. Referring again to Figure 1, the library 10 includes one or more boxes for interior intelligent books 34 in area 16 for the public and / or in the space for employee space. The interior bookcases 34 are similar to the exterior bookcases 32, except that most of the items 32 that are placed in the interior bookcases 34 are items 22 that are used by the attendants to the library while they are in the library but that they do not borrow. In this way, it is not necessary to update the status of returned items 22 to indicate that they were re-entered. However, the database 66 in the computer 48 must be verified and updated, if necessary, because some of the items 22 placed in the mailboxes for inside books 34 may have previously been items 22 that were borrowed that are being returned by concurrent. A content report of the container is also generated in the interior parallel mailboxes 34. (The report does not include articles 22 previously taken as a loan that are being returned by concurrent, since this information is tracked elsewhere). Reports of container contents are accumulated over a period of He? ? uttt? lití í mÉ ^ time and used to generate a historical use report of articles 22 that are used by concurrent within the library, but that are not taken as a loan. This information is extremely valuable because it allows the library 10 to capture data for internal use referring to articles 22 of its collection. Libraries constantly evaluate models of use of articles in their collection to determine trends in the interest of concurrent in order to decide what types of new articles 22 should be acquired, when to remove articles 22 from the floor of the library, how floor space should be more effectively used, and how to assist in other administration tasks. Currently, libraries rely on exit verification data, observations from librarians, and comments and requests from attendees to evaluate these issues. However, the exit verification data does not capture all the concurrent activity associated with a library. Typically, the participants do not borrow all the articles 22 that are of interest to them. A large percentage of articles 22 are reference items that can not be borrowed. Some participants may be ashamed to borrow certain items and read them only in the library. It is not necessary for some items 22 to be loaned because the wiser can quickly obtain the information of interest from articles 22 while in the library. The observations of the librarians and the comments and requests of the participants may not accurately capture the interests of certain participants. The Historical use reports generated on the basis of internal book mailbox data allow the library to better capture the tendencies and interests of the participants. Figure 8 is a sample of a historical use report 136. Of course, the data can be presented and classified in any appropriate field. Also, the historical usage report 136 for the inner book mailboxes 34 may be spliced with a historical use report (not shown) for items 22 carried as a loan in order to obtain a more accurate representation of the items 22 of interest to all those attending the library. To replenish the articles 22 in the most efficient way, all the articles placed in the mailboxes for interior books 34 and exterior 32 can be periodically taken to a single sliding carriage, and the reports of repositioning on shelves from the mailbox for Inside books 34 and the outer book box 32 can be spliced into a single shelving report for the single car. The information that is available about the contents of the mailboxes for books 32 and 34 can also be used to help locate an article 22 that is "of great interest" in particular, that another concurrent to the library has requested. Currently, library staff spend a disproportionate amount of time circulating relatively few articles 22 of great interest. Knowing exactly what mailbox they are stopping books 32, 34 > contains Article 22 of great interest, 4 | It produces the time and effort that is expended by recirculating items 22 of great interest. Fig. 9 shows a shelf scanning inventory system 120 for library 10 of Fig. 1. System 120 is used to perform inventory and to verify that items 22 are placed on the correct shelf. Taking inventory of the entire collection of a library is a labor-intensive and error-prone activity.
Using the system 120, the inventory procedure can be greatly simplified and performed by less qualified employees. Therefore, inventory checks can be carried out more frequently than in current practice. The system 120 is implemented using a portable radio frequency identification scanner 42 connected to its output to a portable computer 122. The portable computer 122 stores the data collected by the radio frequency identification scanner 42 in a memory 130 and transfers the data to the computer. computer 48 for updating the data base 66. In one embodiment of the invention, the portable computer 122 and the computer 48 each include a wireless communication device 132 to allow the portable computer 122 to continuously send the data from the scanner to the computer. computer 48. In another embodiment of the invention, the portable computer 122 is periodically wired or otherwise physically connected to the computer 48 to transfer the data from the memory 130. "** • - - - *. *. *** ^ ~ - ^ - - ~» -fc - ** J- ~ - With reference to the figure -? ^ E? Operation, the radiofrequency identification scanner 42 which leads to the proximity of a shelf 124, and a first portion 126-? of the shelf 124 is interrogated by the scanner 42. The scanner 42 reads the return signals (serial numbers) that come from the articles 22 provided with projectors. The serial numbers are processed and stored in the memory 130 of the laptop 122, and communicated to the database of the computer 48. Next, the scanner 42 is moved to an adjacent portion 1262 of the shelf, or another shelf, and the procedure is repeated To avoid losing any portion of the shelves, the scanner 42 may overlap a small area of a previously scanned shelf portion 126. This procedure causes the titles 22 in the overlay zone 128 to be scanned. twice, howeverIf each item 22 has a unique serial number, the double scan has no effect on the accuracy of the inventory scan because the second reading can be ignored. With reference to figures 9 and 10, the first portion 126! is within a predefined zone 134 that extends from the scanner 42. Preferably, the intensity of the interrogation signal emanating from the scanner 42 is sufficiently high to effectively interrogate all the items 22 in the first portion 126? of shelf 124, but not high enough to reach items 22 in the adjacent rows of shelves. This characteristic is illustrated in figure 10 with the striped line iH-i-f-i-i-i-iafe ^^ m ^ imaginary that demarcates the predefined area 134 that is parallel to the shelves. After all the article containment locations in the library 10 are scanned, the detected serial numbers are compared with the inventory of the library by storing in the base of 5 data 66 items that have not been verified for their output. A report of missing articles of all articles 22 that were not placed during the scanning procedure and that have not been verified for their output is generated. Before an article 22 is assumed to be missing, the shelf should be physically inspected to determine if article 22 was simply overlooked by the scanning procedure or if the protector 54 is missing or defective. The system 120 can also be used to identify items 22 poorly located or located on other shelves. As each zone 134 is interrogated, the laptop 122 and / or the computer 48 check to see if any of the protectors 54 read is associated with items 22 that do not belong to the scanned portion 126. For example, if zone 134 covers books that have classification numbers AD-140-xxxx to AD-190-xxxx, any item 22 that has classification numbers outside of this range are assumed to be misplaced on the shelves. The laptop 122 may need the employee to locate the wrong item 22 on shelves and put them on the correct shelf. It must be recognized that many replacement errors on smaller shelves will not be detected by this method, such as when items 22 with numbers of Adjacent classification are transposed on the shelf (for example, if AD-140-332D is on the right side of AD-140-332E, instead of the left side it belongs to). The interrogators and guard scanners that are used in the present invention can detect a plurality of items 22 that are passed simultaneously with an interrogator, or that are scanned simultaneously. In most cases, each of the items 22 receives and responds to the interrogation signal on a different shelf in time, although the items 22 are physically close together. The returned signal series is processed to classify the individual identifications. However, if the items 22 return an identification signal at exactly the same instant, the interrogator or scanner can not classify the returned signals to retrieve the two different identifications. Alternatively, the interrogator can ignore the received signals simultaneously and use subsequent return signals that are not received simultaneously to classify the individual identifications. Other variants of the present invention, without limitation, are indicated below: 1) Instead of storing and issuing a serial number, protector 54 may store and output data other than the article itself, such as subtitle or classification number. Book editors can link and program the protectors 54 using a coding scheme recognized in the industry at the time the books are printed. 2) As noted above, the protector 54 may have "recording" capabilities, thereby allowing it to also store data relating to the circulation or checkout status of article 22. The recording capabilities may also be used for keep data different data different from the person who borrowed article 22, as well as its return date. 3) The focus of the portion 126 scanned in Figure 9 can be made very small and narrow so that only one or more items 22 are scanned at a time. Thus, the area 134 in Figure 10 would encompass only one or a few items 22. For example, Figure 11 shows a scheme in which the radio frequency identification scanner 42 is moved along a single row 144. of articles 22 within a shelf 124. Each row 144 is scanned separately. (For reasons of clarity, in figure 11 only the upper portion of the scanner 42) is shown. In zone 134, the time taken to carry out the inventory is increased because the scanner 42 must be physically moved more frequently to cover each shelf. However, items 22 placed on the wrong shelves are more easily located by scanning a narrower area. For example, if the articles 22 are scanned one by one, the computers 66 of the system and / or 1122 can verify whether each item has a successively higher (or successively lower) classification number. In this way, j ^^^^^ j ^^ n can detect transposed adjacent articles 22. 4) The self-checking system 50 of the exit of persons of Figure 5 can optionally include a debit card reader 142 connected to the terminal 52 of the computer to allow a person who has borrowed an item and is in default to pay fines. In this way, the person can quickly cure the delinquency and be authorized immediately to borrow subsequent items. 22. 5) Research institutions often allow students to keep items at an assigned kiosk somewhere in the building without verifying their departure of the building. Finally, the students are supposed to bring the items to the circulation table to register the items as temporarily located in the assigned kiosk. However, students often do not do so out of negligence. A shelf scanning inventory system 120 can be used to capture these lost items. Periodically, employees of the library can walk from kiosk and scan all the items in each kiosk. A location code that identifies the kiosk can be attached to each item before or after it is scanned. 6) It is often not feasible to protect certain items with protectors, such as rare books or multimedia products (for example, CD-ROMs). Accordingly, the person's identification card can be used to track the use of the item and / or to control access in and out of a selected area of the library ^. ^ .. t + Xjm ** ... ... V ^^ m ^ where the article will be used. In this scheme, the identification card of the person would preferably be a card with radio frequency identification shield. For example, if the person borrows an item from a multimedia lab, the person's radiofrequency ID card and the item's wrap or holder (which is protected with a shield) would be read and associated with each other. If the article is very expensive (for example, the revision with eight CD-ROM discs of the Oxford English dictionary costs the libraries 895 dollars per copy), the exit to the multimedia laboratory can be prevented if the person tries to leave the laboratory before returning the set of CD-ROMs, as well as the support. 7) Smart pedestals 36 can be designed to detect both conventional deactivatable (non-intelligent) resonant protectors and smart protectors 54. In this way, the same interrogation device can be used to detect the removal of conventionally protected items that have not been correctly deactivated. Also, the non-intelligent pedestals 40 can be designed to detect both smart protectors 54 and conventional deactivatable (non-intelligent) resonant protectors. In this way, an item with radio-frequency identification shield that passes in or out of the newspaper room 23 will be detected. 8) The records of the database shown in Figure 4 they may include a security field for each protected article 22. The security field can identify restrictions in the circulation of article 22. For example, the security field may indicate that article 22 must be inside the newspaper room 23, or the multimedia laboratory described above. The security field may indicate that article 22 can only be borrowed by selected people, such as students, or other predefined groups of people. These restrictions are verified by computer 48 when article 22 is detected in the exit verification counter or on pedestal 36. 9) The term "exit verification" is typically associated with the loan of books or the like of a library. Nevertheless, the "exit" verification of an article is equivalent to the "extraction" of an article in contexts where exit verification does not necessarily involve the loan of an item that comes from a storage area. 10) While the preferred embodiments of the invention use pairs of pedestals at the exits, single pedestal interrogators can also be used where appropriate. 11) The records of the database of selected articles can be changed by authorized personnel of the library without the presence of the article. For example, it may be convenient to set an alarm on an entry to the library to start it if an expired item is detected. It may also be convenient to return an article ttgÉ kmtß? ím O **** M **** -. . ^^^^ g | before its expiration date, so that if the person brings the article to the library correctly verified for its exit, the employee of the library is alerted of its presence. Those skilled in the art will appreciate that changes can be made in the embodiments described above without departing from the broad concept of the invention. It should be understood, therefore, that the present invention is not limited to the particular embodiments disclosed, but is intended to cover modifications within the spirit and scope of the present invention as defined in the appended claims. > -

Claims (28)

  1. NOVELTY OF THE INVENTION CLAIMS 1. - An inventory control system for use in conjunction with items that are kept in a storage area, each item having a radiofrequency protector linking at the same time, including each protector an antenna for use in detecting the presence of the article receiving a question mark and returning a response signal and an integrated circuit connected to the antenna, for storing information identifying the article and for issuing the item identification information with the response signal when the guard interrogation is made , the system comprising: a) at least one item return area to receive items that were taken out of the storage area and that are to be returned to the storage area, the return area includes an interrogation zone and a tray collection to contain the returned items, passing the art Items returned through the area and inside the collection tray when the items are returned, where plural items can be placed simultaneously in the area; b) an interrogator to monitor the area to determine alterations in the form of a response signal caused by the presence of one or more protectors within the zone, the interrogator substantially simultaneously interrogating each item that is in the area, emitting the interrogator an interrogator output signal when a protector is detected in the zone, each interrogator output signal including the identification information stored in the integrated circuit of a interrogated protector; and e) a database to receive the interrogator output signals, including the database, inventory data for items monitored by the system including output verification status data, with the received interrogator output signal being used to update the exit verification status data of each returned item.
  2. 2. The system according to claim 1, wherein the system tracks articles associated with a library that are available to be brought as a loan by persons, and the storage area comprises shelves of a library.
  3. 3. The system according to claim 2, wherein the item return area is a mailbox for the books of a library.
  4. 4. The system according to claim 1, wherein the database includes location data of the storage area for the items that are monitored by the system. 5. - The system according to claim 4, which in addition a computer in communication with the database, the computer including means to generate a report of the locations in the storage area for the articles in the return area of articles, the report facilitating the return of items to their appropriate, respective locations within the storage area. 6. The system according to claim 1, wherein the system tracks the items associated with the library and the at least one item return area is located within the library, the inventory data additionally includes data on the use of the article. 7. An inventory control method for use in conjunction with items that are maintained in a storage area, each item having a radio frequency protector attached to it, each protector including an antenna for use in detecting the presence of the article receiving a question mark and returning a response signal and an integrated circuit connected to the antenna to store item identification information and to issue item identification information with the response signal when the guard interrogation occurs, the method comprising the steps of: a) scanning a portion of the storage area with a mobile interrogator, the mobile interrogator detecting alterations in the shape of the response signals caused by the presence of protectors within a predefined zone disposed from the interrogator and emitting an interrogator output signal when a protector is detected in the zone, each interrogator output signal including identification information stored in the interrogated protector's integrated circuit, where plural items located in the portion of the interrogation area can be scanned. storage; b) - j * "* - - ^ -.« - S ^ - i At.e ^ ^ tf jD repeat step a) for an adjacent portion of the storage area and for all remaining portions of the storage area; ) receive the interrogator output signals in a database, including the database, inventory data for the items that are kept in the storage area, where the inventory data is updated using only the interrogator output signals received from the article protectors; d) using the output signals received from the interrogator and the inventory data to determine whether an item in a particular scanned area is outside the range of items belonging to the scanned portion, and if so, e) issue signals that report that the item is in the wrong place 8.- An inventory control system of a library for use in conjunction with items that are maintained in a storage area, each item having a radiofrequency protector attached thereto, each protector including an antenna for use in detecting the presence of the item by receiving an interrogation signal and returning a response signal and an integrated circuit connected to the antenna, for storing identification information of the article and for issuing the article identification information with the response signal when the guard interrogation is carried out, the system comprising: a) an inventory database that includes a list of articles in the library and the circulation status of each of the articles; and b) a mobile interrogator for scanning the storage area in discrete portions, detecting SÉlffations in the form of a response signal caused by the presence of protectors within a predefined area extending from the interrogator, and emitting an interrogator output signal for each protector detected in the area, where a plurality of items located in the discrete portions can be scanned simultaneously, with each interrogator output signal identifying information stored in the integrated circuit of an integrated guard, the information database receiving the information of identification and updating the circulation status of the articles stored in it using only the information obtained from the items with protector interrogated. 9. A control system according to claim 8, wherein the protectors are physically non-deactivatable protectors. 10. A self-service exit check system for a library that has items available to be borrowed by people, each item having a radio frequency protector attached to it, each protector including an antenna for use in detection of the presence of the article displaying an interrogation signal and returning a response signal and an integrated circuit connected to the antenna to store identification information of the article and to issue the identification information of the article with the response signal when interrogation occurs of the protector by an interrogator, having the system also: a tray to contain a j-j? -toa. plurality of articles; a collection tray to contain the returned items; a door to allow the items contained in the tray to pass to the collection tray when released from the door; an interrogator to substantially simultaneously interrogate the plurality of items placed in the tray that the person borrowed and wishes to return, the interrogator receives a response signal containing the identification information of the item stored for each of the plurality of items returned, where the interrogator receives response signals without taking into account the orientation of the articles, the interrogator releasing the door upon receiving acceptable response signals from each of the articles; an inventory database that includes the items in the library and the circulation status of each of the items, the database receiving the item identification information for each item returned; and a processor in communication with the database to update the circulation status of the returned items. 11. The system according to claim 10, further comprising an identification card (ID) of the person taking the borrowed items comprising a shield with radio frequency identification, the ID card of the persons includes identification information of them stored electronically in the ID, where the ID card is placed in the tray and is interrogated substantially simultaneously on the returned items. 12. The system according to claim 11 wherein the database includes a field to store the ID of the person who takes the items in loan corresponding to any previous loan of articles. 13. The system according to claim 10, further comprising: a video camera for capturing images from the output verification area and emitting video signals of the captured images; and a video recorder for storing the video signals in a video storage medium. 14.- The inventory control system of the library for use together with the articles that maintain a storage area, each of the items has a radio frequency protector attached to it, including each protector an antenna for use in the detection of the presence of the article receiving a question mark and returning a response signal and an integrated circuit connected to the antenna to store identification information of the article and to issue the item identification information with the response signal when interrogation occurs of the protector by an interrogator, the system comprising: an inventory database that includes a list of items in the library and the circulation status of each such item; a person identification device that wants to borrow an item for the system to identify it, an item checkout system located in an item verification area, the exit verification system includes a first questioner to interrogate an item that a person wishes to borrow it from the storage area, the first interrogator receives a response signal containing the identification information of the item stored for each of a plurality of items to be rendered; a processor in communication with the first interrogator and the database, the processor receives the identification information of the person and the identification information of the article that will be borrowed from the first interrogator, and updating the database of the inventory with the state of circulation of the item to be borrowed; an item return verification system that includes at least one article return area to receive items that were taken from the storage area, the item return area includes an interrogation entry verification zone and a collection tray to contain the returned items, each item returned by going through the entry verification zone and into the collection tray when returning the item, where a plurality of items can be placed simultaneously in the area and a second interrogator in communication with the processor , the second interrogator monitoring the entrance area to determine alterations in the form of a response signal caused by the presence of a protector within the zone, and simultaneously emitting an interrogation to each article in the zone and emitting an exit signal of the interrogator when the protector is detected in the area, each interrogator output signal including the identification information stored in the integrated circuit of an interrogating protector for the item being returned, in which the inventory base receives the interrogator output signals and updates the data 15. The system according to claim 14, further comprising: an exit interrogator for monitoring an exit from the storage area, interrogating the exit interrogator for an item that passes through the exit and thus is being removed from the storage area, the exit interrogator receiving a response signal that comes from the protector associated with the item, the response signal containing the item identification information stored for the item. article that passes through the exit 16.- The system according to the claim tion 15, further comprising an output processor coupled to the output interrogator, the processor receiving an output signal that comes from the output interrogator that includes the identification information of the response signal, in which the processor compares the information of ID received with the information stored in the database to determine if the item is registered in it as a loan. 17. The system according to claim 16, wherein the output interrogator activates an alarm if the article that passes through the output is not registered in the database as being taken as a loan. 18. - The system according to claim 14, wherein the library includes a room for newspapers, the system also comprising a zone interrogator located at an exit of the newspaper room to detect the removal of protected items with a guard of the same 19. The system according to claim 18, wherein the zone interrogator activates an alarm in response to the detection of the removal of an article from the newspaper room. 20. The system according to claim 14, further comprising a mobile interrogator for scanning the storage area in discrete portions, detecting alterations in the shape of the response signals caused by the presence of detectors within a predefined zone. that extends from the mobile interrogator, to emit an interrogator output signal when a protector is detected in the zone, each interrogator output signal including the identification information stored in the integrated circuit of a interrogated protector, in which the base of data receives the identification information and updates the circulation status of the articles stored in it with the information. 21. The system according to claim 14, further comprising: a video camera for capturing images from the output verification area and outputting video signals of the captured images; and a video recorder for storing the video signals in a video storage medium. 22. - The system according to claim 14, wherein the protector is a protector that is not physically deactivatable. 23. An inventory control system in a library for use in conjunction with items that are kept in a storage area, each item having a radio frequency protector attached to it, each protector including an antenna for use in the detecting the presence of the article by receiving an interrogation signal and returning a response signal and an integrated circuit connected to the antenna, for storing information identifying the article and for issuing the item identification information with the response signal when it is made the interrogation of the protector, the system comprising: an inventory database that includes a list of items in the library and the circulation status of each item; an identification device for concurrent persons to identify a person concurrent to the system; an item exit verification system located in an item checkout area, including the exit verification system a first interrogator to interrogate an item that the concurrent person wishes to remove from the library, with the first interrogator receiving a signal from response containing the identification information of the article stored for the item to be removed; a processor in communication with the first interrogator and the database, the processor receiving the identification information of the concurrent person and the identification information of the article for the article to be ÜMiiii taken from the first interrogator, and update the inventory database with the circulation status of the item to be removed; a video camera to capture images from the exit verification area and to broadcast video signals of the captured images; and a video recorder for storing the video signals in a video storage medium; an item entry verification system that includes at least one item return area to receive items that were taken out of the library, with each item returned through an entry verification zone when the item is returned; and a second interrogator in communication with the inventory database, the second interrogator monitoring the input identification signal to determine alterations in the form of a response signal caused by the presence of a protector within the zone, and emitting an interrogator output signal when the protector is detected in the zone, each interrogator output signal including the identification information stored in the integrated circuit of a interrogated protector for the item being returned, wherein the Inventory database receives the interrogator output signals and updates the exit verification status data of the item being returned using the interrogator output signals; a mobile interrogator to scan the library in discrete portions, detecting alterations in the shape of the response signals caused by the presence of detectors within a predefined zone that extends from the mobile interrogator, to emit an output signal from the interrogator when a protector is detected in the zone, where a plurality of items located in the discrete portions can be scanned simultaneously, with each interrogator output signal containing the identification information stored in the integrated circuit of a interrogated shield, in which the database receives the identifying information and updating the circulation status of the articles stored therein using only the identification information obtained from the articles with protector interrogated; an exit interrogator to monitor an exit from the library, interrogating the exit interrogator an item that passes through the exit and thus is being extracted from the library area, receiving the exit interrogator a response signal that comes of the protector associated with the article, the response signal containing the item identification information stored for the article passing through the output; an output processor coupled to the output interrogator, the processor receiving an output signal that comes from the output interrogator that includes the identification information of the response signal, in which the output processor compares the received identification information with the information stored in the database to determine if the article is registered in it as a loan; in which the exit interrogator triggers an alarm if the item that passes through the exit is not registered in the database as being taken as a loan; and a zone interrogator located in an exit of a predefined area of the library, detecting the interrogator B-J »of zone the extraction of protected articles with protector of the predefined area, in which the zone interrogator activates an alarm in response to the detection of the extraction of an article from the predefined area. 24.- An inventory control method for use in conjunction with items that have been kept in a storage area, each item has a radio frequency protector attached to it, each protector including an antenna for use in the detection of the presence of the article receiving a interrogation signal and returning a response signal and an integrated circuit connected to the antenna to store identification information of the article and to issue the identification information of the article with the response signal when the interrogation of the item occurs. protector, the method comprises the steps of: a) scanning a portion of the storage area with a mobile interrogator, the mobile interrogator detecting alterations in the shape of the response signals caused by the presence of protectors on the items within the predefined zone arranged from the interrogator and issuing an exit signal of the interrogator when a protector is detected in the zone, each interrogator output signal including the identification information stored in the integrated circuit of a interrogated shield, where a plurality of articles located in the portion of the storage area can be scanned simultaneously; b) repeating step a) for an adjacent portion of the storage area and for all remaining portions of the storage area; and c) receiving the interrogator output signals in a database, including the database, inventory data for the items that are kept in the storage area, the interrogator output signals being from the items with protector received used to update the inventory data. 25. The method according to claim 24, wherein the storage area comprises rows of shelves in a library, step a) comprising scanning each shelf by scanning successive adjacent portions of the shelf. 26.- A self-service exit verification system for a library that has items available to be borrowed by people, each item having a radiofrequency protector attached to it, including each protector an antenna for use in detection of the presence of the article receiving a question mark and returning a response signal and an integrated circuit connected to the antenna to store item identification information and to issue the item identification information with the response signal when the interrogation occurs of the protector by an interrogator, the system also having a plurality of identification cards of persons who will take the items on loan, each one including a radio frequency protector: a) an interrogator located in the exit verification area of the library for interrogation at least one article that a p ersona wishes to take as a loan and substantially simultaneously interrogate an identification of the person who wants the item on loan identifying him with the system, the interrogator receives a response signal containing the identification information of the item stored for each one of the items that will be borrowed and identification information of the ID card of the person who will take them, where the interrogator receives the response signals regardless of the orientation of the items or identification card of the aforementioned person, and where the interrogator can substantially simultaneously receive response signals from a plurality of protected items; b) an inventory database that includes a list of items in the library and the circulation status of each of the items, the database receiving the identification information of the person who will take the item as a loan and the item identification information for each of them that will be provided; and c) a processor in communication with the database to update the circulation status of the items that will be provided. 27. The system according to claim 26, further comprising: d) a video camera for capturing images of the output verification area and emitting video signals of the captured images; and e) a video recorder for storing the video signals in a video storage medium. 28. A system according to claim 26, wherein the protector is a physically non-deactivatable protector. ., r ^ ífñm.,. , ^ t * »^ ** ^ * SUMMARY OF THE INVENTION An inventory control system for articles for articles such as books, which uses radio frequency identification protectors linked to each item; each protector has a unique identification or serial number to identify the individual item; an inventory database tracks all items protected by protectors and maintains circulation status information for each item the exit check of library items is done using an exit self-verification system by people attending the library. libraries that carry borrowed items; the items that are borrowed are returned to the library by depositing them in a smart outer bookcase that reads the radio-frequency identification shield and automatically verifies the entry of the item again; the data from the article from the external intelligent book box are used to generate reports for replenishment on shelves to efficiently replenish items on the shelves; the items that are used in the library, but that are not borrowed abroad, are returned to mailboxes for interior intelligent books within the library for replacement on shelves; mailboxes for interior intelligent books capture data concerning the use of items in the library; the data is used to generate historical use reports; Uncirculated items are stored on shelves in the library; the shelves are ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ of radio frequency identification to update the inventory status. P99 / 1852F AKIN / aom * jtc * eos * sll * ald *
MXPA/A/2000/000831A 1997-07-24 2000-01-24 Inventory system using articles with rfid tags MXPA00000831A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08899438 1997-07-24

Publications (1)

Publication Number Publication Date
MXPA00000831A true MXPA00000831A (en) 2001-11-21

Family

ID=

Similar Documents

Publication Publication Date Title
US5963134A (en) Inventory system using articles with RFID tags
KR100460759B1 (en) A monitoring system
US7348884B2 (en) RFID cabinet
US5745036A (en) Electronic article security system for store which uses intelligent security tags and transaction data
JP5178746B2 (en) RFID storage system
US6704690B2 (en) Monitoring system
WO1993000644A1 (en) Inventory control system for automatic dispensing systems
MXPA00000831A (en) Inventory system using articles with rfid tags
Basu et al. Circulation Desk-less Library Management System Using Radio-Frequency Identification (RFID) Technology and Computer Vision
JP2004342092A (en) Monitoring system
MXPA99002405A (en) Electronic article security system for store which uses intelligent security tags and transaction data
MXPA00012244A (en) A monitoring system