[go: up one dir, main page]

WO2019168783A1 - Système et procédé de transfert sécurisé de propriété d'étiquettes sans fil - Google Patents

Système et procédé de transfert sécurisé de propriété d'étiquettes sans fil Download PDF

Info

Publication number
WO2019168783A1
WO2019168783A1 PCT/US2019/019402 US2019019402W WO2019168783A1 WO 2019168783 A1 WO2019168783 A1 WO 2019168783A1 US 2019019402 W US2019019402 W US 2019019402W WO 2019168783 A1 WO2019168783 A1 WO 2019168783A1
Authority
WO
WIPO (PCT)
Prior art keywords
tag
owner
wireless tag
transfer
wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2019/019402
Other languages
English (en)
Other versions
WO2019168783A9 (fr
Inventor
Zvika Ashkenazi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ensurge Micropower ASA
Original Assignee
Thin Film Electronics ASA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thin Film Electronics ASA filed Critical Thin Film Electronics ASA
Publication of WO2019168783A1 publication Critical patent/WO2019168783A1/fr
Publication of WO2019168783A9 publication Critical patent/WO2019168783A9/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements

Definitions

  • the present invention generally relates to the field(s) of managing transactions of wireless tags. More specifically, embodiments of the present invention pertain to computer-implemented methods for securely transferring ownership of wireless tags between users using mobile computing devices.
  • Wireless near field communication (NFC) and radio frequency (RF) security and/or identification tags are used to digitally track and manage products by their manufacturers and distributors. Such wireless tags are often associated with a product by a manufacturer of the tag, and subsequently shipped to the manufacturer or distributor of the product. Ownership of tags can be assigned to different stakeholders in a commercial context. For example, a tag may be first owned by the maker of the tag, and then later by a merchant who purchases the tag from the tag maker, and so on. In many cases, it is desirable to transfer ownership of tags quickly and without extensive delays, while still doing so securely. The prior art to date does not allow for easy transfers of tag ownership between users in close proximity who would like to exchange ownership securely for an object and associated tag, for instance, between a shipper of a packaged article (with an affixed tag) and a target recipient.
  • NFC near field communication
  • RF radio frequency
  • Embodiments of the present invention include the ability to transfer wireless tags between users using different levels of security, and using basic mobile applications running on small portable electronic devices, such as smartphones.
  • An aspect of the disclosure concerns a computer-implemented method for transferring ownership of wireless tags in a transfer transaction with a portable computing device, comprising associating a first wireless tag with a first owner for such first wireless tag; in response to a tag transfer request initiated by the first owner during a first transfer transaction, reading the first wireless tag with a reader integrated within a first portable computing device to determine at least a first wireless tag identification code; setting the first wireless tag to a first state corresponding to a wait state in the first transfer transaction; identifying a tap event during the first transfer transaction resulting from placing the first portable computing device within a physical distance sufficient to support near field communication with such first wireless tag; confirming an acceptance indicator provided by the second owner for such first wireless tag as part of such first transfer transaction; transferring ownership of the first wireless tag from the first owner to such second owner after the confirming of the acceptance indicator; and recording the first transaction for the first wireless tag.
  • the first wireless tag is part of a group of wireless tags associated with the first owner, and all of such tags in such group are transferred with a single physical tap as part of the first transaction.
  • the tag becomes disconnected from such group.
  • Other restrictions and conditions can be imposed as well. For example, ownership transfer for the first wireless tag can be conditioned on the tag transfer request and the physical tap event occurring in approximately the same physical location.
  • the two portable devices used in the transaction use mobile applications executing on both such devices to coordinate the transfer though a cloud computing service.
  • the wireless tags can be set to the wait state until the transfer is confirmed/accepted.
  • the transaction is preferably recorded at a cloud-based database.
  • Temporal restrictions can be imposed in some instances to detect that both owners have tapped the tag within a certain time/sequence, and require the new owner to claim ownership within a predetermined time/place.
  • Various forms of security can also be implemented.
  • no further action is required by the first owner of the tag beyond simply designating an intent to transfer, and then allowing a second owner to tap and claim ownership of the tag.
  • a push notification can be sent to either/both the first owner/second owner to confirm the transfer.
  • either or both the original owner and new owner can be required to provide further credentials, preferably in the form of additional secure key tags, prior to authorizing the transfer.
  • the wireless tag is a flexible electronic tag printed with an electronic ink, and adapted in a continuous low power mode to respond to a near- field-communications (NFC) interrogation signal.
  • the tag preferably includes a non- alterable non-volatile memory data fields identifying at least a manufacturer ID and a product ID.
  • Another aspect of the invention concerns a computer-implemented method for transferring ownership of wireless tags in a transfer transaction with a portable computing device, comprising creating a first entry in a tag ownership database associating a first wireless tag with a first owner, such entry further including a pointer specifying one or more web resources associated with such tag by the first owner; in response to a tag transfer request initiated by the first owner during a first transfer transaction within a mobile application, reading the first wireless tag with a reader integrated within a first portable computing device to determine at least a first wireless tag identification code in a first physical tap event; processing a user identification code and password provided by the first owner with the mobile application at a cloud computing system to generate a first verification confirming the first owner's rights to transfer rights in the first wireless tag; setting the first wireless tag to a first state in the tag ownership database corresponding to a wait state in the first transfer transaction in response to the first verification; generating and communicating a first push notification confirmation to the first portable computing device to confirm the first transfer transaction from the first owner
  • Still another aspect of the invention covers a computer-implemented method for transferring ownership of wireless tags in a transfer transaction using a first portable computing device and a second portable computing device, the method comprising initiating a tag transfer request by a first owner of a first wireless tag using a graphical user interface (GUI) of the first portable computing device, the first owner being associated with a first user identification code; specifying a tag transfer mode to be used for a tag transfer transaction within the GUI, including at least a non-secure mode, and at least one secure mode; reading the first wireless tag with a reader integrated within the first portable computing device to determine at least a first wireless tag identification code; and communicating the tag transfer request through a network to a server computing system, which tag transfer request includes both the first user identification code and the first wireless tag identification code, where preferably in response to the first owner specifying the non-secure mode, the first wireless tag can be claimed by a new owner to consummate the tag transfer transaction without further confirmation or input by the first owner, and in response to the first owner specifying
  • Yet another aspect of the disclosure is directed to computing systems, computer programs, and portable devices implementing the above functions.
  • FIG. 1 is a diagram of an exemplary cloud-based tag management system enabling a service provider to, among other functions, coordinate tag creation, tag transfers, tag transactions, tag product assignments, tag marketing, etc. for and between manufacturers, merchants and end users in accordance with the teachings of the present disclosure;
  • FIG. 2A is a diagram of an exemplary cloud-based Product
  • Manufacturing/Tag Computing Support system enabling a manufacturer to create and manage tags in connection with product manufacturing operations in accordance with the teachings of the present disclosure
  • FIG. 2B is a diagram of an exemplary cloud-based Tag Manufacturer/Service
  • Provider Computing Support system enabling a tag service provider to manage and coordinate tags for manufacturers, merchants and end users in accordance with the teachings of the present disclosure
  • FIG. 2C is a diagram of an exemplary cloud-based Merchant Product/Tag
  • Computing Support system enabling a merchant to manage tags, products, etc. in connection with product marketing and sales operations in accordance with the teachings of the present disclosure
  • FIGs. 3A - 3F are diagrams and flowcharts depicting the structure and operation of exemplary tags in accordance with one or more embodiments of the present invention.
  • FIG. 4A is a diagram of exemplary hardware and software employed in a mobile computing device implemented as a Tag User Computing Support system enabled with tag management functions in accordance with one or more embodiments of the present invention
  • FIG. 4B depicts an exemplary graphical interface of a mobile computing device enabled with tag management functions in accordance with one or more embodiments of the present invention
  • FIG. 5A is a diagram of an exemplary cloud-based system enabling transfer of tag ownership within a mobile computing device for an end user in accordance with the teachings of the present disclosure.
  • FIG. 6 is a flow chart showing exemplary methods for transferring ownership of tags with a mobile computing device for an end user in accordance with embodiments of the present invention.
  • the term“signal” refers to any known structure, construction, arrangement, technique, method and/or process for physically transferring data or information from one point to another. Unless indicated otherwise from the context of its use herein, the terms “information” and“data” may be used interchangeably, although each term is generally given its art-recognized meaning.
  • the terms“coupled to,”“connected to,” and“in communication with” may be used interchangeably and indicate both direct and indirect couplings, connections and communications, but each term is also generally given its art-recognized meaning.
  • the terms“known,”“fixed,”“given,”“certain” and“predetermined” generally refer to a value, quantity, parameter, constraint, condition, state, process, procedure, method, practice, or combination thereof that is, in theory, variable, but is typically set in advance and not varied thereafter when in use.
  • wireless tag (or simply “tag”) as used herein preferably refers to near-field communication (NFC), radio frequency (RF), high frequency (HF), very high frequency (VHF), or ultra high frequency (UHF) tags.
  • the mobile or portable device may comprise a smart phone configured to communicate wirelessly with the wireless tags.
  • the tags may be associated with a user account using a customized tag application on the mobile device.
  • the tags are of the NFC type manufactured by Thin Film Electronics ASA (TFEA) in printed integrated circuit (PIC) form (preferably made using TFEA's proprietary printed dopant polysilicon (PDPS) technology) under the tradenames SpeedTapTM and OpenSense.TM
  • the wireless tags are manufactured using printed doped polysilicon (PDPS) technology (see, e.g., U.S. Pat. Nos. 7,314,513 [Attorney Docket No. IDR0302], 7,485,691 [Attorney Docket No. IDR0422], 8,846,507 [Attorney Docket No. IDR0884], 9,045,653 [Attorney Docket No. IDR1102], and 9,359,513 [Attorney Docket No. IDR1942], the relevant portions of which are incorporated herein by reference).
  • PDPS printed doped polysilicon
  • FIG. 3A A circuit diagram identifying the main components of a preferred example of a tag 300 used in the present embodiments is shown in FIG. 3A. These tags preferably include the following general characteristics:
  • Tag-Talks-First (TTF) Protocol/Mode meaning the tag preferably transmits its code after it receives enough power from a reader field (FIG. 3E).
  • the tag does not wait for or require and additional commands from a reader before transmitting its code, and for security reasons, preferably does not acknowledge/recognize any commands from the reader
  • these types of tags preferably comply with the NFC Barcode protocol, a common NFC protocol supported by top-tier NFC controllers from NXP, Broadcom, Samsung, Sony, Toshiba, and others.
  • the tags are preferably passive, l28-bit NFC tags operating at l3.56MHz and using a Tag-Talks-First (TTF) protocol.
  • TTF Tag-Talks-First
  • These types of NFC tags operate preferably in a read-only mode to transmit l28-bit codes to NFC- enabled devices, such as phones, tablets, PCs, and set-top boxes.
  • the data in the tags is also primarily stored in permanent, unalterable read-only memory but may in some embodiments include a number of reprogrammable dynamic bits to reflect the status of connected or integrated sensors and other information that could change over time. Because these types of tags do not receive information via RF, all data transmissions are unidirectional, from tag 300 to reader 310.
  • the NFC SpeedTap and NFC OpenSense tags also preferably store data following the NFC Barcode data formats (previously known as the Kovio NFC Barcode data formats). These are standardized representations of data so that operating systems and applications can consistently interpret the l28-bit data stream.
  • An example of a memory map 330 preferably used by such tags is shown in FIG. 3D. As seen in FIG. 3D the tags preferably include dedicated fields for such parameters as a manufacturers ID field 332, a data format specifier field 334, a data payload field 336 and a CRC field 338.
  • the l28-bit code 330 includes an 8-bit (l-byte)
  • Manufacturer ID field 332 consisting of a start bit and a 7-bit ID.
  • TTF Tag-Talks-First
  • a 7-bit manufacturer ID (based on the least significant 7 bits of the manufacturer IDs specified in the ISO/IEC 7816-6 specification) follows the standard logical‘G start bit.
  • An 8-bit (l-byte) data format identifier field 334 then describes how an NFC reader should interpret the contents of the payload field 336.
  • the data format identifier preferably contains two sections: Reserved bits and a Data Type Format.
  • the 3-bit Reserved section is set to‘000’ for a l28-bit NFC Barcode.
  • a 5-bit Data Type Format allows for 32 possible data types.
  • the data payload field 336 is preferably 96 bits, and may include separate components such as a tag ID 336a, an object/item ID 336b and a vendor ID 336c or some other convenient format for the application in question.
  • the payload 336 can be used for any number of data purposes including for identifying a uniform resource locator (URL) having different formats, an electronic product code (EPC) or any other desired identification/metadata information.
  • the CRC field 338 can be coded in accordance with any number of conventional specifications as needed to support a particular application.
  • the tag identification codes are assigned to products in accordance with the teachings of U.S. Pat. Application No. 15/904,178, also assigned to the present applicant, and hereby incorporated by reference. Again, it should be understood that other NFC Barcode data formats can be used in other applications, and as standards for tags evolve, it is expected that other variations will be employed in the future.
  • a “tap” or “tapping event” refers to the transmission of the NFC code by the tag when it is sufficiently close to be read by an NFC controller as may be embodied in a portable computing device (e.g. smartphone).
  • the term “tap” in this instance does not require physical contact or bumping of the tag, but, rather, merely waving or placing the reader in close proximity to the tag.
  • the distance range of detectable taps or tapping events can be adjusted of course, by altering field strength, reader antenna size and other physical/transmission parameters.
  • the tag continues, at a predetermined interval and standardized protocol, to re transmit the entire length as long as the NFC Barcode is powered up in the reader’s field.
  • the transmission intervals are separated by sleep cycles, which timing periods are again predefined according to an operating standard used in the particular application.
  • wireless near field communication (NFC) and radio frequency (RF) security and/or identification tags can be used by manufacturers, distributors and other entities to digitally identify, track and manage products and other objects.
  • owned in connection with a tag means generally that it is associated with a user account by the manufacturer of the tags before receipt by the user (e.g., a product manufacturer, distributor, reseller, packager, end user [consumer], etc.).
  • give away refers to tags that are not pre-associated with a user account, and may be associated with a user account by the user of the mobile device. Give-away tags may be given away at conferences or demonstrations or as samples, or may be sold as a commodity item.
  • group when used herein preferably refers to tags manufactured on a common roll or sheet, and/or which have at least some common manufacturing ID 332 (FIG. 3D) data, payload data 336, etc. It will be understood that in some embodiments, tags which have different physical tag ids 330 may nonetheless be logically associated to create groupings at different logical levels by the support software described herein.
  • FIG. 1 is a diagram of an exemplary cloud-based tag management system 100 enabling a service provider to, among other functions, coordinate tag creation, tag transfers, tag transactions, tag product assignments, tag marketing, etc. for and between manufacturers, merchants and end users in accordance with the teachings of the present disclosure.
  • the tag management system 100 preferably includes a front-end cloud computer system 110 and a back-end cloud computing system 170 connected through a secure connection 114.
  • the system 100 further preferably includes separate computing support systems for the different tag stakeholders, including a Product Manufacturing/Tag Computing Support system 140 (shown in more detail in FIG.2A) a Tag Manufacturer/Service Provider Computing Support systeml50 (shown in more detail in FIG.
  • the tag management system further preferably comprises a tag user computing support system for end-users, including consumers, including one or more mobile devices 120 (or conventional PCs) executing a mobile tag manager application 125 (or web portal 126) and connected through both TCP/IP protocol network l05a (preferably the Internet) and a cellular network l05b.
  • tags can be managed by system 100 include wireless security tags (e.g., continuity sensing tag 135') a wireless identification tag 135, and other known types.
  • the cloud computing systems (110, 170) may provide shared computer processing resources and data to the other devices in the system, and may be implemented using a cloud computing service such as Google Cloud PlatformTM or Amazon Web ServicesTM.
  • the computing systems (110, 170) may be implemented using a service model such as software as a service (SaaS). Some or all of the data may be accessed by authorized users, but is protected from access by unauthorized users.
  • SaaS software as a service
  • the tag manufacturer (service provider) applications may be partially executed using the cloud computer 110.
  • the tag manufacturer applications are accessible from a support system 150, as well as through various client devices (such as the mobile device 120) through either a web browser or a program (e.g., application) interface.
  • client devices such as the mobile device 120
  • program e.g., application
  • the various stakeholders including tag manufacturer, product manufacturers, merchants (distributor, reseller) or end-users do not manage or control the underlying infrastructure in the cloud computer 110 or 170 including any network, servers, operating systems, and/or storage devices.
  • FIG. 1 depicts only those components of system 100 critical to understanding the present teachings. Moreover, other components and software modules may be employed in system 100 consistent with the present teachings.
  • FIG. 2A is a diagram of an exemplary cloud-based tag manufacturing support system enabling a manufacturer to create and manage tags with a back-end cloud computing system for product manufacturing operations in accordance with the teachings of the present disclosure.
  • System 170 is a back end cloud computing system that includes one or more computing servers 172, product database 178, tag database 179 and related software modules that support manufactures integrating tags with any type of product/object, such as apparel, consumables, household items, pharmaceuticals, or any other commercial article 137 on which a tag 135 or 135' (which can be in the form of a roll, sheet, etc.) can be affixed directly or as part of packaging during a manufacturing process.
  • a tag 135 or 135' which can be in the form of a roll, sheet, etc.
  • the product-tag support system further preferably comprises a host computing system 140 (e.g. a PC, smartphone, etc.), typically onsite at the product manufacturer facility, which system further includes a portal application (not shown, but which may take on any number of conventional forms) to permit communications with a cloud system 170, including a manufacturing administrative module 174, a manufacturing interface module 173, and various tag ID management applications in module 177.
  • a manufacturer tag writer/application module 176 controls the application of tags to products/packaging during the manufacture of the articles of interest at a fabrication facility 175.
  • the various software modules of FIG. 2A assist product manufacturers in managing the creation, application and tracking of products including tags.
  • a manufacturing admin module 174 provides visualization and configuration tools, including for enabling users to designate particular tag types/IDs for particular products.
  • the tag IDs are provided by a tag manufacturer through an interface module 173 by a service provider, or, in some instances can be generated directly by a tag ID management module 177.
  • a product manufacturer can maintain separate databases of both tags (M-Tag 178) and products (M-Product 179).
  • the type and form of the data in such databases may be specified in any convenient form most suitable for the manufacturer's particular operations, infrastructure, etc. Since it is conceivable that the same tag or product can be managed and tracked differently by different stakeholders using different data formats and logical identifiers, the nomenclature in FIG.
  • M-Prod db 179 and M-Tag dB 178 denotes such distinction.
  • the application of specific tag ids to specific products is controlled and monitored by a module 176 at the product manufacturing facility 175. In this manner, a product manufacturer can maintain an accurate inventory and record of tag/product pairings.
  • This product/tag pairing data 176’ then be shared with other systems as desired, including through an API call or other known mechanisms known in the art. While shown as part of front-end cloud computing system 170, it will be appreciated by those skilled in the art that some or all portions of such modules, databases, interfaces, etc. in FIG. 2A can be implemented as part of host computing system 140 as well.
  • FIG. 2B is a diagram of an exemplary cloud-based tag service provider support system enabling a tag service provider to create, manage and coordinate tags for manufacturers, merchants and end users in accordance with the teachings of the present disclosure.
  • a front-end cloud-computing system 110 is accessed by a tag manufacturing (and/or tag service provider) host system 150.
  • tags 135 are manufactured in a tag fabrication facility 138 in the form of rolls, sheets, or other conventional forms.
  • the tags are physically coded during manufacture in accordance with any number of tag identification code types and formats (see, e.g., FIG. 3, 336a, 336b, 336c).
  • System 110 includes specified by a tag management module 156, which is a front end cloud computing system that includes one or more computing servers 112, a tag ID (S-tag) database 158, a tag metadata database 159, a user identification code database 157, and related software modules that support tag creation support and management functions.
  • the type and form of the data in such databases may be specified in any convenient form most suitable for the tag provider's particular operations, infrastructure, etc.
  • the tag IDs tracked by system 110 may be the same or have different physical IDs than those tracked by system 170, the tag IDs are designated with a (potentially) different dB index (i.e., S-tag as opposed to M-tag).
  • the tag manufacturer/provider system further preferably comprises a host computing system 150 (e.g. a PC, smartphone, etc.), typically onsite at the tag manufacturer facility, which system further includes a portal application (not shown, but which may take on any number of conventional forms) to permit communications with a cloud system 110, including a service administrative module 154, a manufacturing interface module 152 which communicates over a secure connection to back-end cloud system 170 and to a merchant support system 160 (FIG. 2C) and a tag management module 156 that comprises various tag ID management applications.
  • a tag engagement module 151 interacts with and coordinates transactions with end-user systems such as seen in FIG. 2D, including through receipt and processing of tap events, user identification information, and related context data from user computing devices.
  • Tag engagement module 151 further generates and provides any necessary responses from system 110 as described further below, including tag AR metadata, enhanced tag secure data, tag ownership transaction details and tag identification codes.
  • the various software modules of FIG. 2D assist product manufacturers in managing the creation, application and tracking of products including tags. While shown as part of front-end cloud computing system 110, it will be appreciated by those skilled in the art that some or all portions of such modules, databases, interfaces, etc. in FIG. 2B can be implemented as part of host computing system 150 as well.
  • FIG. 2C is a diagram of an exemplary cloud-based tag merchant support system enabling a merchant to manage tags, products, etc. in connection with product marketing and sales operations in accordance with the teachings of the present disclosure.
  • a front-end cloud-computing system 110 is accessible to a merchant product/tag host system 160.
  • product/tag ID information 176' from one or more manufacturers can be input from a source including a back-end cloud computing system 170 (FIG. 2 A).
  • the product is a consumable item (beer) 137, which has an affixed tag (integrated as part of the label).
  • a merchant/vendor can customize additional content for the product, including multi-media data (video, audio, graphics, etc.) 138 which can be presented when the product tag is read as part of an augmented reality (AR) experience discussed further below.
  • AR augmented reality
  • System 160 includes a combination of hardware and software components that support merchant (retailer/distributor) product-tag marketing, promotions and sales operations, including one or more server computing machines 164, a host computing system
  • System 160 also supports a merchant website 139, which can be configured with product/marketing/sales webpages in any number of styles known in the art and made accessible to web-enabled browsers (including on smartphones) through conventional uniform resource locators (URLs). Resources and control access to system 160 can also be made through secure applications executing on smartphones 16G and similar portable computing devices.
  • the tag manufacturer/provider system further preferably comprises a host computing system 161 (e.g. a PC, smartphone, etc.), typically onsite at the merchant facility, which system further includes a portal application (not shown, but which may take on any number of conventional forms) to permit communications with a cloud system 110.
  • Merchant support system 160 further includes a number of software modules, including a merchant (retailer/distributor or Rtag) management module 165 that enables and supports tag creation, tag-product association, tag-content association, and related management/marketing functions attendant to the marketing, promotion and sales of products including physical tags.
  • tag IDs tracked by system 160 may be the same or have different physical IDs than those tracked by systems 110/170, the tag IDs are designated with a (potentially) different dB index (i.e., R-Tag, as opposed to S-tag and M-tag).
  • System 160 may further include an AR Context Rules module 163 and AR
  • Device Rendering Logic module 166 which are responsible for identifying, selecting and presenting customized content to end-user devices 120 within a customized application 125 (see FIG. 1) or as part of a customized experience within a browser accessing website 139.
  • AR Context Rules module 163 dictates user, time, place, manner controls and filters, so that, for example, certain content may be presented for a designated product tag ID (i.e. wool sweater) only to selected users meeting certain criteria (i.e. new customers) at particular locations (i.e., designated partner store) at particular times (i.e. in fall months). All of such parameters can be extracted from the end-user's device 121, product tag 135 and other merchant customer information in db 167.
  • product tag ID i.e. wool sweater
  • AR Device Rendering Logic module 166 which is responsible for providing appropriate metadata in the right format for the particular desired AR experience on a target device. For example, a merchant may specify that a designated graphics overlay with particular dimensions should be made on a particular portion of a target device (i.e., model A smartphone by brand X). Again, any form of software tools and controls for overlaying, supplementing and augmenting existing media files (e.g., a graphical image captured by a phone) can be used for this module. While shown as a standalone system in FIG. 2C, it will be understood by skilled artisans that part or all of system 160 could be implemented by front end cloud computing system 110 and controlled/managed through portal applications with basic devices 161, 16G and the like.
  • FIG. 4A is a diagram of exemplary hardware and software employed in a mobile computing device 120 enabled with tag management functions in accordance with one or more embodiments of the present invention.
  • the device 120 includes a customized CPU 122 for executing mobile applications, a memory 123 (which may take different forms, including volatile DRAM/SRAM and non-volatile EEPROM), a set of different types of sensors 124 (camera, microphone, touch, gyroscopic to name a few) for capturing different physical stimuli, a Universal Integrated Circuit Card (UICC) or SIM card 126 for communicating over a cellular channel (such as a carrier network 105), Bluetooth/GPS and WiFi communication circuits 127, and various I/O circuits, including display, speakers, etc.
  • a customized CPU 122 for executing mobile applications
  • a memory 123 which may take different forms, including volatile DRAM/SRAM and non-volatile EEPROM
  • sensors 124 camera, microphone, touch, gyroscopic to name a few
  • UICC Universal
  • a mobile computing device includes one or more Near Field Communication (NFC) support circuits, including an NFC communications IC l2la, an associated Secure Element l2lb and an NFC receive/transmit antenna l2lc.
  • Device 120 further includes a number of firmware and software components, including an Operating System (OS) l25a (e.g., Android, IOS), a web/network software interface l25b (e.g., Safari, Chrome, etc.) for establishing communication sessions over an IP network channel l05a (e.g. Internet) and one or more software applications l25c executing on the device and enabling different functions I/O and computational functions.
  • OS Operating System
  • IOS Internet
  • software applications l25c executing on the device and enabling different functions I/O and computational functions.
  • FIG. 4B depicts an exemplary graphical interface of a mobile computing device enabled with tag management functions in accordance with one or more embodiments of the present invention.
  • These applications generally include an augmented reality (AR) tagged Item application l29a, an enhanced tag/app application l29b, a tag transfer application l29c, an assign new tag application l29d, and a provision tag application l29e.
  • AR augmented reality
  • FIG. 4B depicts an exemplary graphical interface of a mobile computing device enabled with tag management functions in accordance with one or more embodiments of the present invention.
  • These applications generally include an augmented reality (AR) tagged Item application l29a, an enhanced tag/app application l29b, a tag transfer application l29c, an assign new tag application l29d, and a provision tag application l29e.
  • AR augmented reality
  • tags can be used by manufacturers, distributors and other entities to digitally identify, track and manage products and other objects.
  • tags may be assigned owners, meaning that it is associated with a user account, which can be assigned by the manufacturer of the tags or another stakeholder. The owners of tags can then assign them to products, ascribe them customized content (including AR content) and so on. Since it may be desirable in some applications to transfer tags between entities, the present disclosure contemplates and describes techniques for performing such transfers quickly, easily and seamlessly. For example, in the case of shipping and receiving a packaged product, the latter may have an associated tag.
  • the shipper may desire to transfer ownership of both the product and the tag to a recipient upon delivery through a simplified, efficient exchange process.
  • the present disclosure permits the owner of a tag to transfer ownership with a few simple taps and touch selections within a mobile application interface.
  • a delivery person for example, can simply tap an application on their mobile device, and within a few seconds a recipient/new owner can confirm receipt on their own mobile device equipped with a counterpart application.
  • the process is simple, intuitive, and expedient.
  • the mobile application can be simpler and with a reduced footprint (storage and computation-wise).
  • FIG. 5A is a diagram of an exemplary cloud-based system 500A enabling mulit-modal transfer of tag ownership within a mobile computing device for an end user in accordance with the teachings of the present disclosure.
  • a first mobile device 520 can transfer ownership of tags 535 on a product 537 to a second mobile device 520' using a mobile application 522.
  • a first user/owner of a tag 535 invokes application 522 and can simply tap on the tag to initiate a transfer.
  • the user has three different possible transfer modes as explained below and shown in FIG.
  • the transfer request 526a including the tag ID(s) and other related context information, including user/device ID, location information, etc. can be sent along with the request to front end cloud computing system 110.
  • the inclusion of multiple tags 536 as part of the transfer can be effectuated using the techniques noted above with respect to tag assignments, i.e., by selecting a range of tags, a beginning and end tag, etc.
  • the second user then activates a similar application 522, and taps/selects the tag(s) 535/536 to take ownership of the same.
  • This acceptance 526b preferably includes a set of tag IDs, a second user ID, and other context information, including location data.
  • the cloud computing system then matches the transfer/acceptance requests for the tag(s) in question, and records the new ownership.
  • the location data can be used as a verifying parameter for the tag transfer as well, i.e., to confirm that both the prior and current owner are in the same location.
  • additional verification layers can be employed.
  • a first secure mode the existing owner can be specifically given a prompt 526c to confirm the transfer. Only after providing a confirmation does the transfer in ownership become registered.
  • a second secure transfer mode both users are required to provide additional identification information, including one or more of a password, or even information from additional unique customized key tags 526d and 526e, that must be tapped as part of the transfer. This is depicted in FIG. 5A by the requirement of both a 3rd and possible a 4th tap on respective transferor and transferee key tags 524 and 524'.
  • tag engagement module 151 and tag management module 156 coordinate and handle the transfer transaction, updating database 158 as needed to reflect the change in ownership of the tag(s).
  • FIG. 6 is a flow chart showing exemplary methods 600 for transferring ownership of tags with a mobile computing device for an end user in accordance with embodiments of the present invention.
  • the present disclosure advantageously provides at least three different modes for transferring ownership of tags which can be used in different applications depending on security requirements.
  • a user may elect to have his/her tag app and/or device registered at cloud system 110.
  • the first user/tag owner indicates that they want to transfer one or more tags, and specifies a particular mode to be used.
  • a user tap on a tag is detected by device 620 in the manner described above in connection with FIGs. 3A-3F.
  • the tag ID (included in some or all of payload 136) is then extracted and read at step 610.
  • Step 612 processes whether the user is transferring a single tag or a group of tags. For example, in a group of tags (a roll or sheet) with unique IDs a transferor may select a beginning tag and ending tag, and so on, so that all tag IDs in between are included in the transfer; alternatively, they may be specified manually as a range of tag IDs. When only a single tag is selected, it is removed from the group at step 614. After the tag ids are determined, they are confirmed/verified at step 621, along with a user id (which may be any one or more of a username, password, or application registration ID) by checking a database at step 630, to determine for example if the user is indeed the current owner of the tag. Location data can also be derived from the application and device sensors (i.e. GPS and similar techniques). The tag and UID databases (FIG. 2B, databases 157/158) are consulted as part of step 630.
  • the tag and UID databases (FIG. 2B, databases 157
  • the tags are set to a conditional, ready to transfer state at step 670.
  • the target recipient is prompted to confirm transfer of the tag(s) in question. In some instance an acceptance confirmation from a new prospective tag owner can be accepted in parallel (after receiving the second tap event noted above) and then matched up against the pending transfer request based on a tag ID.
  • a non-secure mode is identified at step 674, the process proceeds to then formally record and transfer ownership of the tag(s) in question to the new owner at step 690. This information is then used to update the tag ID/UID databases discussed for step 630.
  • a secure mode is identified at step 674, a further determination is then made based on the mode selected.
  • the transferor/current owner is prompted for a confirmation at step 676, as a condition for consummating the transaction.
  • the process picks up with step 690 in the same manner as discussed above.
  • additional parameters are considered for the transaction.
  • the owner/recipient locations are preferably confirmed at step 680, to ensure that the two entities are in the same (approximate) location (subject to known allowances in positions attendant to the technique employed).
  • their respective key tags are also examined and confirmed at step 682, based on a tap event at step 603, which is used to record a user key tag ID.
  • step 684 the process goes on to record details of the transaction, including a sequence, location, etc. at step 684. After that point, the process proceeds as noted earlier, picking up with step 690 in which the ownership records for the tag are updated.
  • modules of the present invention can be implemented using any one of many known programming languages suitable for creating applications that can run on large scale computing systems, including servers connected to a network (such as the Internet) as part of a cloud computing system.
  • a network such as the Internet
  • the details of the specific implementation of the present invention will vary depending on the programming language(s) used to embody the above principles, and are not material to an understanding of the present invention.
  • a portion of the hardware and software will be contained locally to a user's computing system, which can include a portable machine or a computing machine at the user's premises, such as a personal computer, a PDA, digital video recorder, receiver, etc.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Quality & Reliability (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Selon l'invention, la gestion de propriété d'étiquettes sans fil peut être effectuée par l'intermédiaire d'une application mobile se coordonnant avec un système de gestion de transaction fondé sur un service en nuage. La propriété d'étiquette peut être transférée et enregistrée entre deux utilisateurs à l'aide de dispositifs mobiles ayant différents niveaux de sécurité et de restrictions de contexte pour s'adapter à différentes applications.
PCT/US2019/019402 2018-02-27 2019-02-25 Système et procédé de transfert sécurisé de propriété d'étiquettes sans fil Ceased WO2019168783A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862635709P 2018-02-27 2018-02-27
US62/635,709 2018-02-27

Publications (2)

Publication Number Publication Date
WO2019168783A1 true WO2019168783A1 (fr) 2019-09-06
WO2019168783A9 WO2019168783A9 (fr) 2019-10-03

Family

ID=67805106

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2019/019402 Ceased WO2019168783A1 (fr) 2018-02-27 2019-02-25 Système et procédé de transfert sécurisé de propriété d'étiquettes sans fil

Country Status (1)

Country Link
WO (1) WO2019168783A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112737780A (zh) * 2021-01-12 2021-04-30 西安电子科技大学 一种电子标签所有权转移方法
WO2023274959A1 (fr) * 2021-06-29 2023-01-05 Assa Abloy Limited Transfert de la responsabilité d'une clé physique d'un dispositif de transfert à un destinataire de transfert
WO2025108147A1 (fr) * 2023-11-25 2025-05-30 华为技术有限公司 Procédé et appareil de communication

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075572A1 (en) * 2012-08-30 2014-03-13 Intelleflex Corporation Rfid system with segmented rfid data ownership
US20140361872A1 (en) * 2013-06-07 2014-12-11 Research In Motion Limited Mobile wireless communications device providing near field communication (nfc) unlock and tag data change features and related methods
US20150134552A1 (en) * 2013-11-08 2015-05-14 Vattaca, LLC Authenticating and Managing Item Ownership and Authenticity
CN106330451A (zh) * 2016-08-11 2017-01-11 广东工业大学 一种rfid标签所有权转移方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075572A1 (en) * 2012-08-30 2014-03-13 Intelleflex Corporation Rfid system with segmented rfid data ownership
US20140361872A1 (en) * 2013-06-07 2014-12-11 Research In Motion Limited Mobile wireless communications device providing near field communication (nfc) unlock and tag data change features and related methods
US20150134552A1 (en) * 2013-11-08 2015-05-14 Vattaca, LLC Authenticating and Managing Item Ownership and Authenticity
CN106330451A (zh) * 2016-08-11 2017-01-11 广东工业大学 一种rfid标签所有权转移方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112737780A (zh) * 2021-01-12 2021-04-30 西安电子科技大学 一种电子标签所有权转移方法
WO2023274959A1 (fr) * 2021-06-29 2023-01-05 Assa Abloy Limited Transfert de la responsabilité d'une clé physique d'un dispositif de transfert à un destinataire de transfert
WO2025108147A1 (fr) * 2023-11-25 2025-05-30 华为技术有限公司 Procédé et appareil de communication

Also Published As

Publication number Publication date
WO2019168783A9 (fr) 2019-10-03

Similar Documents

Publication Publication Date Title
US10380849B2 (en) Payment processing with automatic no-touch mode selection
US10546290B2 (en) Methods, systems, and computer readable media for provisioning and utilizing an aggregated soft card on a mobile device
JP2025165974A (ja) 車載デバイスにバリューをロードするためのシステム
KR101409754B1 (ko) 오프라인 거래 결제 시스템, 이를 위한 방법 및 장치
EP3522490B1 (fr) Configuration d'application de support sécurisé par nfc
WO2019168780A9 (fr) Système et procédé permettant de fournir une expérience de réalité augmentée à des objets à l'aide d'étiquettes sans fil
US10944448B2 (en) Managing NFC devices based on downloaded data
US20160171486A1 (en) Devices, Systems and Methods for Data Processing
US20160034877A1 (en) System and method for providing contactless payment with a near field communications attachment
KR20190126453A (ko) 무접촉 프로토콜을 제공하기 위한 시스템들, 방법들, 및 컴퓨터 프로그램 제품들
CN114175083A (zh) Nfc加强型增强现实信息叠加
US20140258046A1 (en) Method for managing a transaction
JP2017538211A (ja) 複数のセキュアエレメントに対する適応ルーティングのためのシステム及び方法
CN114096981A (zh) 利用支付卡认证语音交易
US9635127B2 (en) Personalization of devices while packaged
WO2019168783A9 (fr) Système et procédé de transfert sécurisé de propriété d'étiquettes sans fil
WO2019168782A1 (fr) Système et procédé de gestion de la fonctionnalité d'étiquettes sans fil
KR20160098706A (ko) 사물 인식 기반 리타게팅 광고 상품 추천 단말과 서버, 그를 포함하는 광고 상품 추천 시스템, 그의 제어 방법 및 컴퓨터 프로그램이 기록된 기록매체
WO2019168785A1 (fr) Système et procédé de codage automatique d'étiquettes sans fil
KR101499503B1 (ko) 스마트 폰을 이용한 전자 주문 방법
KR20180122153A (ko) 마일리지 안내를 제공하는 쇼핑몰 서비스 제공 장치, 이를 포함하는 쇼핑몰 서비스 제공 시스템 및 마일리지 안내 서비스 제공 방법, 그리고 컴퓨터 프로그램이 기록된 기록매체
US20220092582A1 (en) Systems and methods for rendering card art representation
KR20130128736A (ko) 뮤직 서비스 방법
HK40063241A (en) Nfc enhanced augmented reality information overlays
HK40093613A (zh) 用於控制经由url的安全数据传输的系统和方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19761530

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 12.01.2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19761530

Country of ref document: EP

Kind code of ref document: A1