throbber
USOO7348884B2
`
`(12) United States Patent
`Higham
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,348,884 B2
`Mar. 25, 2008
`
`(54) RFID CABINET
`
`(75) Inventor: John Higham, Menlo Park, CA (US)
`(73) Assignee: Omnicell, Inc., Mountain View, CA
`(US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 174 days.
`
`(21) Appl. No.: 11/187,383
`
`(22) Filed:
`
`Jul. 21, 2005
`
`(65)
`
`Prior Publication Data
`
`US 2006/0022827 A1
`
`Feb. 2, 2006
`O
`O
`Related U.S. Application Data
`(60) gyal application No. 60/592.907, filed on Jul.
`
`(51) Int. Cl
`nt. C.
`(2006.01)
`G08B I3/14
`(52) U.S. Cl. ............................... 340/572.1; 340/572.4:
`340/572.8; 340/568.1; 340/5.92; 340/5.54;
`340/5.73; 700/221; 700/229; 700/237
`(58) Field of Classification Search ............. 340/572.1,
`340/572.4,572.8, 568.1, 5.92, 5.54, 5.73;
`7OOf221, 229, 237
`See application file for complete search history.
`References Cited
`
`(56)
`
`U.S. PATENT DOCUMENTS
`* 10,
`3.6% A ck g'' E. - - - - - - - - - - - - - - - - - - - - - - -
`5.739,765 A
`4, 1998 Stanfield'etal."
`5,751.221 A
`5, 1998 Stanfield et al.
`5,771,003 A
`6/1998 Seymour
`
`f
`
`2.
`
`5,774,059 A * 6/1998 Henry et al. ............... 340,554
`5,936,527 A
`8/1999 Isaacman et al.
`6,127,928. A 10/2000 Issacman et al.
`6,204,764 B1
`3/2001 Maloney
`6,407,665 B2
`6/2002 Maloney
`6,512.459 B2
`1/2003 Benezech et al.
`6,677,857 B2
`1/2004 Bara et al.
`29
`R 3. SNR, al.
`6989,749 B2* 1/2006 Mohr. 340,572.1
`2002.0143320 A1 10, 2002 Levin
`2002/0145520 A1 10/2002 Maloney
`2002/O153411 A1 10, 2002 Wan et al.
`2002fO190871 A1 12/2002 Stanfield et al.
`2003/0030539 A1
`2/2003 McGarry et al.
`2003.0034390 A1
`2/2003 Linton et al.
`2003/0052788 A1
`3/2003 Chung
`2003/01 17281 A1
`6/2003 Sriharto et al.
`2003/0160698 A1
`8/2003 Andreasson et al.
`2003. O164401 A1
`9/2003 Andreasson et al.
`2003/0174099 A1
`9, 2003 Bauer et al.
`2004/0032328 A1
`2/2004 Rubinstein
`2004/004.6020 A1
`3/2004 Andreasson et al.
`
`(Continued)
`Primary Examiner Tai Nguyen
`Orne, Agent, Or Firin—IOWnsend and LOWnsen
`E. c. p's it, or Firm T.
`d and T
`d
`' ' '
`(57)
`
`ABSTRACT
`
`An RFID for cabinet for monitoring items having an RFID
`tag includes a cabinet having at least one locking front door.
`An RFID detector is used for monitoring each item placed
`within the cabinet and is located within the interior of the
`cabinet. A computer is coupled to the RFID cabinet and
`controls opening and closing of the front door and is
`configured to receive an input that identifies the user. In this
`way, the computer is configured to periodically record data
`read from the RFID tags by the RFID detector.
`
`22 Claims, 3 Drawing Sheets
`
`XXXX) XXX.
`XXXXX.
`&
`XXXXX
`aS S& &
`KX
`& x 8 X. X.
`k x x x
`XE XX Saala
`CXXXXX)
`XXXXXX
`
`s
`
`aY
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 1 of 10
`
`Health Care Logistics, Inc.
`Exhibit 10012
`
`

`

`US 7,348.884 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`
`2004/0098166 A1* 5/2004 Spano et al. ................ 7OO 237
`2004/010O383 A1
`5, 2004 Chen et al.
`2004/0103033 A1
`5/2004 Reade et al.
`
`7/2004 Gallegher et al.
`2004/O140884 A1
`2005/0077997 A1* 4/2005 Landram et al. ........... 340,554
`
`* cited by examiner
`
`Page 2 of 10
`
`Health Care Logistics, Inc.
`Exhibit 10012
`
`

`

`U.S. Patent
`
`Mar. 25, 2008
`
`Sheet 1 of 3
`
`US 7,348,884 B2
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`KXXX XX
`XXXXX.
`XXXXXXX X
`XXXXXX.
`XXX
`XXXXXXX
`XXXXXX
`X. XXXXX.
`XXXXXXX
`XXXIX
`{OXXOXOXOXO
`XOKXOXOXOXO.
`XXXXX XXXXX
`XXX XXX
`} XXXXXX-XXXX2
`XXXXXX-XXX2
`XXXXXXEXPs
`XXXXXY
`YY
`
`
`
`
`
`Page 3 of 10
`
`Health Care Logistics, Inc.
`Exhibit 10012
`
`

`

`U.S. Patent
`
`Mar. 25, 2008
`
`Sheet 2 of 3
`
`US 7,348,884 B2
`
`
`
`XXXXXXXXX X
`
`XXX {XXXX
`
`XXXXXXXXX:
`OXOXOXOXXOXOXOXOXO
`XXXXXXXXX)
`KXXXXXXXXX
`
`XXXXXXXXX) XXX
`
`XOXOXOXOXOXOXOXO
`
`FG.2
`
`Page 4 of 10
`
`Health Care Logistics, Inc.
`Exhibit 10012
`
`

`

`U.S. Patent
`
`Mar. 25, 2008
`
`Sheet 3 of 3
`
`US 7,348,884 B2
`
`
`
`Page 5 of 10
`
`Health Care Logistics, Inc.
`Exhibit 10012
`
`

`

`US 7,348,884 B2
`
`1.
`RFID CABINET
`
`2
`contains an RFID detector that generates an RFID field to
`scan the RFID tags of any product within the interior of the
`cabinet. A computer is coupled to the cabinet using Ethernet
`or a similar connection. The computer controls access to the
`cabinet and also communicates with a database having all
`the product information associated with each products
`RFID tag.
`In another aspect of the invention, the locking front door
`and the side panels of the cabinet are constructed of a
`transparent material Such that the user may see into the
`cabinet without having to unlock and open the locking front
`door. The transparent material is manufactured to Sufi
`ciently contain the RFID field generated by the RFID
`detector within the interior of the cabinet. In one embodi
`ment, the transparent material is an acrylic panel that has a
`coating comprising a number of vertical stripes of a silver
`based conductive ink and a number of horizontal stripes of
`a carbon based conductive ink arranged in a checkerboard
`pattern.
`
`DETAILED DESCRIPTION OF THE
`INVENTION
`
`Described below are several exemplary embodiments of
`the invention. Although certain features are described, for
`ease of discussion, in relation to certain illustrated embodi
`ments, those skilled in the art will appreciate, based on the
`disclosure herein, that various of the inventive features can
`be combined in accordance with many different embodi
`ments of the invention. The illustrated embodiments below,
`therefore, are provided merely by way of example and
`should not be considered to limit the scope of the invention,
`which is defined only by the appended claims.
`One aspect of the invention provides a cabinet with a
`locking door, or multiple individually controlled doors. In
`another aspect, the invention may provide a room (or
`multiple rooms) with an electronically controlled lock. The
`cabinet or room may contain multiple quantities of multiple
`items.
`Certain items require specific shelving fixtures because
`certain items contain a liquid or metal content that prevents
`the transmission of Sufficient signal strength to various tags
`on the products. Shelving fixtures are designed specifically
`for those items, or classes of items, to keep them Suitably
`spaced apart. The spacing allows the RFID field to suffi
`ciently energize all the tags in the system.
`An RFID detector (or multiple detectors) is placed within
`the interior of the cabinet. RFID detector provides continu
`ous monitoring of the items within the cabinet, e.g. identi
`fying the data embedded on the tag of each product. The
`RFID detectors are capable of repeatedly scanning all prod
`ucts in a short time period, preferably less than two seconds.
`The system determines when an item has been removed by
`comparing the resulting list of items present with a previ
`ously generated item list. Since the scanning time period is
`preferably short, the invention provides any alerts prior to
`the user leaving the vicinity of the cabinet and the control
`ling computer.
`The method of the present invention is preferable to
`existing systems, for example systems that detect an item
`being moved through a detecting portal area. In existing
`systems, any detection errors result in cumulative persistent
`errors that can only be corrected by a manual cycle count.
`The present invention avoids such errors by repeatedly
`taking an inventory of all products. In effect, the present
`invention is a repeated electronic full cycle count.
`
`CROSS REFERENCE TO RELATED
`APPLICATIONS
`
`This application is a non-provisional application and
`claims the benefit of U.S. provisional application No.
`60/592.907, filed Jul. 29, 2004, the complete disclosure of
`which is herein incorporated by reference.
`
`BACKGROUND OF THE INVENTION
`
`5
`
`10
`
`15
`
`In the healthcare industry, the availability of supply
`products is critical. Various systems exist that provide track
`ing of product usage, quick replenishment, user tracking,
`and patient tracking for billing purposes.
`In addition, closed cabinet systems exist that prevent the
`removal of items without the entry of necessary data to
`perform the above tracking and prevent diversion or theft.
`Such a system is particularly applicable to the expensive
`items that are used in an operating room (OR) or cath lab.
`However, closed cabinet systems are also applicable to the
`high Volume diversion of inexpensive items that are useful
`outside the healthcare facility Such as batteries, bandages,
`shampoos, pens etc., where the user may consider the item
`too small to be considered “theft.”
`In developing Such systems, the challenge lies in balanc
`ing convenience and speed of access along with entering the
`necessary data to identify the user, the product and the
`account number or patient. Systems that dispense an indi
`vidual product in the same manner as a candy machine,
`while desirable for convenience and security, are usually too
`expensive, require special packaging, and are not flexible in
`terms of the various size and configurations of product that
`need to be stocked in a hospital. They are also not very space
`efficient, since items are individually spaced and housed.
`The use of RFID tags on products presents an opportunity
`to track individual products without the need for expensive
`dispensing systems. This is particularly true of expensive
`product where it is worth incurring the additional expense of
`40
`applying the RFID tags. RFID tags are not currently avail
`able on products like bar codes, and are not likely to be
`generally available on healthcare products for many years.
`
`25
`
`30
`
`35
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`45
`
`FIG. 1 is a perspective view of one embodiment of the
`present invention.
`FIG. 2 is a side view of the embodiment of FIG. 1.
`FIG. 3 is a perspective view of another cabinet according
`to the invention.
`
`BRIEF SUMMARY OF THE INVENTION
`
`The invention provides both methods and apparatus for
`tracking, monitoring, protecting and safeguarding an inven
`tory of products in a medical environment using RFID tags.
`In general, a cabinet is provided, the cabinet is constructed
`of a material sufficient to confine an RFID field generated
`from an RFID detector within the interior of a cabinet. The
`RFID detector scans the RFID tags of all products within the
`cabinet and generates an up-to-the-second inventory list of
`all products within the cabinet.
`One particular aspect of the present invention provides a
`cabinet for housing an inventory of products in a medical
`environment. Each product within the cabinet is furnished
`an RFID tag that is unique to each product. The cabinet
`
`50
`
`55
`
`60
`
`65
`
`Page 6 of 10
`
`Health Care Logistics, Inc.
`Exhibit 10012
`
`

`

`US 7,348,884 B2
`
`5
`
`10
`
`15
`
`3
`For multiple readings of RFID tags (and associated inven
`tory) within a cabinet, it is advantageous to change the
`power distribution during each scan so that different power
`fields sweep the cabinet. Changing the power distribution
`provides additional and differentiated coverage, which also
`boosts the read accuracy.
`In accordance with the present invention, the data asso
`ciated with the RFID tag may take many forms. In one
`example, the invention uses a fixed ID number that is unique
`to the universe of tags used for all time. At an appropriate
`point in time, either at the cabinet or a separate workstation
`or system in central Supply, this unique number is read into
`a database. Other data regarding the product is also entered
`into the database for subsequent retrieval. This data may
`include the item type ID, its UPN, expiration date, serial
`number, manufacturer or other parameters.
`In another example, the RFID tags are WORM (write
`once, read many) tags. In the case of a WORM tag, Some or
`all of the data may be written once on the readable memory
`of the tag and thus can be read directly off the RFID tag. If
`the central database is unavailable, the product can still be
`identified. In addition, if access to the central server is
`unavailable, any user alerts given at the time of removal can
`be made by the local computer and cabinet system.
`In yet another example, the RFID tag utilizes a writable
`tag. For a writable tag, information may be added to the
`product by the user. For example, the Writable tag may
`contain information selected by the user such as the ID of the
`patient, the user ID, the date and time of removal, and the
`like. In all cases, the data formats associated with the tags
`should be compatible with the software systems, so that
`accurate reporting down to the item-level detail can be
`automated.
`FIGS. 1 and 2 illustrate one example of a cabinet in
`accordance with the present invention. Cabinet 1 comprises
`a housing frame with locking doors 2, with hinges 3, handles
`4 and indicator lights 5. Transparent material 6 in the doors
`2 allows the user to see through to the item on the shelves
`8, but mesh 7 prevents the radio frequency from the trans
`mitter receiver assembly 9 mounted on the inside rear of the
`cabinet from propagating outside the cabinet. In another
`embodiment, the mesh might be replaced by a translucent
`coating on the glass or plastic transparent material of the
`door.
`Cabinet 1 may be manufactured of any material. How
`45
`ever, it is desirable to manufacture cabinet 1 of a metal to
`contain the RFID field inside the cabinet. Preferably, the
`types of metals that may be used are steel, although alumi
`num may also be used. The front door and sides may be
`transparent to allow the user to see the products inside the
`cabinet. The front door may include a thermal printer that
`can provide a paper record of the item taken out from the
`cabinet. Within the cabinet, it will often be preferable to use
`non-metal components for shelving and partitions in order to
`not interfere with the RFID field.
`A wire mesh can be used as a shield to contain the RFID
`field within the cabinet while maintaining the desired level
`of transparency. The maximum diameter of the holes in the
`mesh is dictated by the frequency of the RFID field used. In
`the alternative, a conductive film in the pattern of a mesh
`may be coated on the transparent Surfaces of the doors,
`either as a thin translucent layer or as an opaque coating.
`This arrangement provides the necessary containment of the
`RFID field within the cabinet while allowing the user to see
`inside the cabinet. More particularly, a regular acrylic panel,
`and coated a first pass in the vertical orientation with silver
`based conductive ink in Stripes, one-halfinch on center, the
`
`55
`
`4
`stripes having a width in the range of 0.05 to 0.25 inches.
`Then, in the horizontal direction, with carbon based con
`ductive ink in stripes, halfinch on center, the stripes having
`a width in the range of 0.05 to 0.25 inches. Without any
`specific ground connections, the resulting checkerboard
`pattern of vertical silver based conductive ink stripes and
`horizontal carbon based conductive ink stripes contains the
`RFID field such that the RFID tags associated with items are
`not read outside the cabinet, while retaining the visibility of
`the contents of the cabinet.
`The use of effective shielding allows for the use of a
`single powerful energizer and receiving antenna within the
`cabinet. The use of a single, more powerful energizer and
`receiving antenna provides reliable detection and a cost
`effective solution relative to the prior art that use multiple
`energizers and antennas of shorter range in each shelf or
`section of a larger cabinet.
`A computer 10 controls access to the interior of the
`cabinet by unlocking and opening the locked front door.
`Typically, there will be multiple doors, and only the appli
`cable door will be opened according to the level of access
`associated with the user's ID. This ID may be provided by
`a variety of means including an RFID badge, a personal
`identification number, a voice command, a biometric scan, a
`magnetic card, a barcode badge read or the like depending
`upon the particular requirements of the cabinet.
`It is preferable to use a guiding light to locate the correct
`cabinet, door and in some cases actual location of the
`product. By using guiding lights, it is preferable to flash all
`lights on a cabinet for a few seconds, then on a door or
`shelves and then down to the item. Such a method is
`described in U.S. Pat. Nos. 5,745,366, 5,805,455, 5,805,456,
`6,039,467, 6,272,394, and 6,385,505 incorporated herein by
`reference for all purposes.
`The computer may be either embedded within the interior
`of the cabinet or in close proximity to the cabinet, and
`coupled to the cabinet by Ethernet, wireless, optical infra
`red, serial cable, USB or any other data connection means.
`One advantage of not having the computer embedded within
`the interior of the cabinet is the use of general-purpose
`computers with varying form factors. The type, size, shape
`and/or configuration is unconstrained by the cabinet design.
`As software rapidly evolves for the cabinet control, newer
`versions often need a new operating system and these in turn
`need a new computer. By keeping the computer external,
`upgrading both Software and computer hardware is both
`easy and inexpensive.
`In accordance with another aspect of the present inven
`tion, the user accesses the cabinet using a user ID and
`password, an RFID badge, a bar code, a mag card or various
`biometrics such as a thumbprint, face recognition or the like.
`Typically, the particular ID device is located at the user login
`location or the computer interface. However, in some
`embodiments, particularly those detecting the RFID badge
`of a user, the identification of a user occurs at the cabinet.
`One method of authorization would allow the user to
`approach the cabinet and have the cabinet recognize the user
`and unlock the cabinet doors without any action by the user.
`Such quick recognition presents the ultimate in convenience
`to busy clinicians where time is a critical factor. Such as
`physicians, and OR nurses requiring items during a case.
`The user may or may not be required to select a patient
`identification or cost center. Instead, accounting for an item
`may be determined by: 1) the location of the equipment (e.g.
`the account number for supplies for the OR department in
`which the equipment is located); 2) identifying the user and
`associating that user with a department; 3) association to a
`
`25
`
`30
`
`35
`
`40
`
`50
`
`60
`
`65
`
`Page 7 of 10
`
`Health Care Logistics, Inc.
`Exhibit 10012
`
`

`

`US 7,348,884 B2
`
`5
`case by way of the user and the time of day, since the case
`management system will usually know which users are
`working on which case; or 4) association to a case and/or
`patient by use of an identifier Such as a mag card or and
`RFID card. The RFID cards may have a case or patient
`number encoded on them. Alternatively, these cards may
`have a permanent ID that is temporarily associated at the
`beginning of the day with the patient or case for that day.
`There may be governmental/regulatory requirements
`regarding access to certain contents in the cabinets. The user
`access rules accommodate and authenticate any unique
`access requirements. For example, the user may be
`prompted to scan a bar code or otherwise enter information
`about the product or push a button assigned to a selected
`item. The user may enter the name(s) or an alias name(s) for
`a product(s) at the computer. The computer can generate a
`visual picture of the layout of the cabinet, highlighting
`where the product(s) is (are) located within the interior of the
`cabinet. A visual picture is useful, since, for cost reasons,
`there may be no lights to guide the user to a specific door.
`Although the advantage of RFID is that an item removal
`is recorded with no action from the user, many facilities have
`cabinets currently in place where the removal of an item is
`recorded by Scanning a barcode, pushing a button, or keying
`an item ID. There are considerable advantages in combining
`existing apparatus and methods with the apparatus and
`methods of the present invention. Existing cabinets are
`upgraded utilizing aspects of the present invention to accom
`modate RFID tags. In initial introduction, before a process
`is fully set up to tag and identify items, a mixed system may
`be needed. For cost reasons, it may be desirable to stock low
`cost items that are used in association with high cost items
`(e.g. gauze pads, tubing, gloves and the like) in the same
`location. While it may not be worth RFID tagging the low
`cost items, their use should be recorded to track inventory
`levels and ensure prompt re-ordering.
`Depending on the user's access privileges, one or more of
`the doors on the cabinet unlock upon Successful completion
`of the entry requirements at the computer user interface. It
`is desirable to temporarily disable the RFID reader when the
`door is opened so that an item removed but held near the
`open door is not mistakenly interpreted by the system as an
`unremoved item. The user then removes or returns the items
`from or to the opened compartments.
`If the computer is remote, then a sound and/or visual
`sensor at the cabinet may alert the user to check the monitor
`of the computer after removing a product. The alert tells the
`user that the computer has determined that further action is
`needed in addition to the removal of the product, such as 1)
`entering of a serial number or other information into the
`computer; 2) reading of Such information using a bar code
`scanner mounted at the cabinet or at the computer; or 3)
`alerting the user that an expiration date for the product may
`have occurred. Preferably, these “sounds' will be recorded
`speech to clearly instruct the user as to what is needed Such
`as "please scan the serial number and expiration date'. In
`many cases, it is preferable to use text to speech since this
`allows information specific to the item to be included. For
`example, “You just removed a Cordis 78 French Catheter.
`Please check that this is the right item.”
`A particularly useful text to speech function is to state the
`quantity on hand. To the degree a system can be in error, the
`correction of the quantity on hand ensures timely restocking
`and the availability of product to the caregiver at all times.
`For example the system might say “You just removed a
`Medtronic 8F Guiding Catheter. There should be three
`remaining. If not, please correct the inventory level.”
`
`40
`
`45
`
`6
`Another useful query is an automated speech to the user
`asking “Did you get what you needed? If NOT, then, please
`press 1—If YES, then, no response is necessary.” Such a
`query provides a view into the product usability and cus
`tomer satisfaction.
`Typically, items are placed on the shelves in fixed loca
`tions according to the identity of the product using a labeling
`system. The current quantity on hand for each type of item
`is tracked by the embedded or local PC, and may be
`transmitted to a central server. The system generates a
`restock list any time the quantities of particular items drop
`below a predetermined par level. Since different items may
`be restocked from different sources, the system needs to be
`able to identify different restock lists for those sources.
`There may be times when the item removed from the
`cabinet cannot be returned to the cabinet without additional
`processing. For example, Some regulated items may not be
`returned to the cabinet by the user without additional autho
`rization and verification. Also, some items may have a
`limited, out-of-cabinet life and may need some verification
`that the item was not exposed to adverse environment.
`Some authorization and verification may be local, but
`Some may be remote. If local, then it is appropriate to use a
`“fill-or-kill method where the next time a restock request is
`generated comparing par level with actual quantity on hand,
`no memory of any previous unfulfilled orders is retained.
`For other products, particularly those ordered outside, it is
`necessary to track what has been previously ordered, and
`Subtract that from any new comparison of par level minus
`the current on hand order quantity, but also to net out
`previous orders that are delivered over time.
`When an order is placed with a specific source of material,
`it is important that the cabinet location receives information
`regarding what was ordered and order identification number.
`Therefore, when the restock technician comes to the cabinet
`after receiving the item for that order, he/she can select the
`appropriate restock order list by entering (or bar coding or
`RFID scanning) the number of the restock list. This action
`allows the computer to register the items that have been
`brought and the quantities being put away. If this procedure
`is omitted, the restock technician must select each item in
`the computer and enter the quantity they are restocking.
`The cabinet restock process is easy with the system of the
`present invention in place. The restock person simply enters
`their ID and adds the items to the cabinet. In an alternate
`approach, the user is required to identify a restock list with
`the associated items. In this case, when he/she adds the items
`to the cabinet, a shortage list may be produced. A shortage
`list is useful when relying on an outside fulfillment house to
`deliver and restock the cabinet, since this will detect diver
`sion of product between the time it was picked in the remote
`warehouse and when it reached the cabinet. More particu
`larly, since the restock person knows there will be a check,
`there is less temptation to divert product for one's personal
`consumption.
`With cabinet RFID reading device set up on an Ethernet
`network, either directly or through a local compute control
`ling access to the cabinet, the material manager can connect
`to the reader or cabinet computer database, and get an up to
`the second inventory of items contained within the cabinet
`through the Inventory Control Module software. This can be
`an automated process that enables the RFID Readers to scan
`items in the remote cabinet and to alert the staff if any items
`are critically low or out of stock.
`If a caregiver needs a particular item that is not stocked in
`the cabinet in their department, they can use the care giver
`software to check other RFID enabled cabinets on the
`
`10
`
`15
`
`25
`
`30
`
`35
`
`50
`
`55
`
`60
`
`65
`
`Page 8 of 10
`
`Health Care Logistics, Inc.
`Exhibit 10012
`
`

`

`US 7,348,884 B2
`
`2O
`
`40
`
`7
`network to find the item they needs and how many are
`actually on hand in that cabinet, all in real time.
`With access to the cabinet information derived in real time
`through the RFID reader, or the computer database support
`ing the RFID reader, the materials manager can scan the 5
`RFID cabinets for items that are past their expiration date or
`items that are in a lot that has been recalled so they can be
`collected for return to the manufacturer. It is particularly
`important to get this information in real time, since items
`may have been taken then Subsequently returned etc., and in 10
`previous systems the associated information (lot # serial
`number) had to be tracked at each step. Using RFID, you
`essentially have instant inventory review—fresh instanta
`neous reading of exactly what is in each location, not a
`deduction of what is in each location as a result of manual 15
`recordings of takes, returns, etc., which over time can be
`incorrect if any step in the recording process is missed.
`FIG. 3 illustrates another cabinet 20 having RF shielding
`22 on its outer walls 24 and doors 26.
`What is claimed is:
`1. An RFID cabinet for monitoring items having an RFID
`tag, the cabinet comprising:
`a cabinet comprising a back, a first side, a second side, a
`top, a bottom and at least one locking front door,
`an RFID detector for monitoring each item contained 25
`within the cabinet and for identifying data embedded
`on an RFID tag located on at least some of the items
`placed within the cabinet, the RFID detector located
`within the interior of the RFID cabinet; and
`a computer coupled to the RFID cabinet, wherein the 30
`computer controls opening and closing of the locking
`front door, wherein the computer is configured to
`receive an input that identifies a user, and wherein the
`computer is configured to periodically record data read
`from all of the RFID tags in the cabinet by the RFID 35
`detector.
`2. The RFID cabinet of claim 1, wherein cabinet is
`manufactured of a material that confines an RFID field
`produced by the RFID detector within the interior of the
`RFID cabinet.
`3. The RFID cabinet of claim 1, wherein the first side, the
`second side and the locking front door are manufactured of
`a transparent material.
`4. The RFID cabinet of claim 3, wherein the transparent
`material is screened with a conductive material such that the 45
`RFID field is contained within the cabinet, but a user is
`permitted to see through the transparent material into the
`cabinet.
`5. The RFID cabinet of claim 1, wherein the sides
`comprise a wire mesh.
`6. The RFID cabinet of claim 1, wherein the sides
`comprise a combination of a transparent plastic and a wire
`mesh.
`7. The RFID cabinet of claim 1, wherein the RFID
`detector scans each item contained within the cabinet in a 55
`time period, such that the RFID cabinet may determine if an
`item is removed from the interior of the RFID cabinet.
`8. The RFID cabinet of claim 7, wherein time period is
`less than two seconds.
`9. The RFID cabinet of claim 1, wherein coupling the 60
`computer to the RFID cabinet is through an interface chosen
`from a group comprising Ethernet, wireless, optical infrared,
`serial cable, or USB cable.
`10. The RFID cabinet of claim 1, wherein the input that
`identifies a user is chosen from a group comprising a userID 65
`and password, an RFID badge, a bar code, Voice recognition,
`a mag card, or biometrics.
`
`50
`
`8
`11. The RFID cabinet of claim 1, wherein the RFID
`detector is coupled to an Ethernet network, either directly or
`through the computer, wherein a material manager can
`connect to the reader or a database in the computer and get
`an up-to-the-second inventory of each items placed within
`the cabinet.
`12. The RFID cabinet of claim 11, wherein the cabinet is
`remote from the computer, and wherein an inventory control
`module software enables the RFID detecting device to scan
`items in the remote cabinet and to alert the material manager
`if any items are critically low or stocked out.
`13. The RFID cabinet of claim 1, wherein a means for
`accessing the RFID cabinet comprises an RFID badge,
`wherein the locking front door of the RFID cabinet opens in
`response to the RFID badge coming into a close proximity
`of the RFID cabinet.
`14. The RFID cabinet of claim 1, wherein the cabinet is
`made of a material that provides a shield sufficient to allow
`a strong enough field within the cabinet Such that all items
`can be read using the RFID detector.
`15. A method for removing items having an RFID tag
`from an RFID cabinet, the method comprising:
`providing a cabinet having an RFID detector for moni
`toring each item contained within the cabinet and for
`identifying data embedded on an RFID tag located on
`each item contained within the cabinet, the RFID
`detector located within the interior of the RFID cabinet
`and a computer coupled to the RFID cabinet, wherein
`the computer controls opening and closing of the
`locking front door,
`reading an input that identifies a user;
`receiving the input that identifies a user at the computer;
`unlocking the door to the RFID cabinet if the user is
`allowed access; and
`at least periodically scanning all the items in the RFID
`cabinet to determine if any items have been removed by
`the user.
`16. The method of claim 15, further comprising disabling
`the RFID detector when the door to the RFID cabinet is
`open.
`17. A method for scanning items having an RFID tag in
`an RFID cabinet, the method comprising:
`providing a cabinet having an RFID detector for moni
`toring each item contained within the cabinet and for
`identifying data embedded on an RFID tag located on
`each item contained within the cabinet, the RFID
`detector located within the interior of the RFID cabinet
`and a computer coupled to the RFID cabinet, wherein
`the computer controls opening and closing of the
`locking front door, and wherein the computer is con
`f

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket