US20120265653A1 - Secure, Differentiated Reading of Sensors and RFID Tags - Google Patents
Secure, Differentiated Reading of Sensors and RFID Tags Download PDFInfo
- Publication number
- US20120265653A1 US20120265653A1 US13/531,678 US201213531678A US2012265653A1 US 20120265653 A1 US20120265653 A1 US 20120265653A1 US 201213531678 A US201213531678 A US 201213531678A US 2012265653 A1 US2012265653 A1 US 2012265653A1
- Authority
- US
- United States
- Prior art keywords
- variable
- value
- location
- items
- supplier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/087—Inventory or stock management, e.g. order filling, procurement or balancing against orders
Definitions
- This invention relates generally to the field of network communications, and more particularly to inventory management.
- IT Information Technology
- the retailer or supplier may tag products with Radio Frequency ID (“RFID”) tags ( 100 ) which are detectable by RFID readers ( 102 ) positioned in the store so that it becomes possible to automatically determine how many units ( 104 ) of a given product are on the store shelves.
- RFID Radio Frequency ID
- VLAN Virtual Local Area Network
- a given supplier e.g., supplier ( 112 )
- it is necessary for the retailer to determine which supplier provided the product for each supplier inquiry about a product in order to limit the access of supplier ( 112 ) access to only data associated with product provided by that supplier ( 112 ).
- a method for providing a supplier with secure access to inventory data indicative of units of product at a seller's premises comprises the steps of: associating a product identifier with each unit of product; associating a supplier identifier with each unit of product; detecting, with a reader, the product identifier and supplier identifier associated with a unit of product, thereby producing inventory data; establishing a secure Virtual Private Network (“VPN”) tunnel between the supplier and the seller; steering inventory data associated with the supplier identifier that matches the supplier to the VPN tunnel; and filtering inventory data associated with supplier identifiers that do not match the supplier from the VPN tunnel.
- VPN Virtual Private Network
- apparatus for providing a supplier with secure access to inventory data indicative of units of product at a seller's premises comprises: a machine-readable product identifier associated with each unit of product; a machine-readable supplier identifier associated with each unit of product; a reader operable to detect the product identifier and supplier identifier associated with a unit of product, thereby producing inventory data; a secure Virtual Private Network (“VPN”) tunnel established between the supplier and the seller; and at least one network device operable to steer inventory data associated with the supplier identifier that matches the supplier to the VPN tunnel and filter inventory data associated with supplier identifiers that do not match the supplier from the VPN tunnel.
- VPN Virtual Private Network
- the invention has advantages including providing the supplier with direct access to inventory data without exposing sensitive information related to the seller and other suppliers.
- Supplier access to inventory data is enhanced because associations between products and suppliers need not be manually entered.
- each unit of product is tagged with a supplier identifier it is no longer necessary to refer to a database to determine which supplier provided a particular unit of product.
- a particular supplier's VPN tunnel is only permitted to carry inventory data associated with the supplier's identifier it is no longer necessary to refer to a table to determine whether a particular supplier is permitted to receive data concerning a particular unit of product.
- FIG. 1 is a prior art network diagram illustrating inventory control.
- FIG. 2 illustrates an embodiment of inventory control in accordance with the invention.
- FIG. 3 illustrates the RFID tag in greater detail.
- FIG. 4 illustrates the gateway of FIG. 2 in greater detail.
- an enterprise such as a retailer has a network including a gateway ( 200 ), database ( 202 ), switches ( 204 ) and RFID readers ( 206 ).
- RFID tags ( 208 ) are affixed to units ( 104 ) of product by the enterprise or suppliers.
- the RFID readers are strategically positioned within stores in order to detect the RFID tags and thereby to determine the number of units of product present in the store.
- each RFID tag ( 208 ) includes product type identifier ( 300 ) which uniquely identifies the product in a manner similar to an Electronic Packaging Code (“EPC”).
- EPC Electronic Packaging Code
- the readers are operable to scan for RFID tags either periodically or in response to a prompt, and to forward the resulting data to the gateway ( 200 ) via the Layer 2 ⁇ 3 switch ( 204 ).
- each unit ( 104 ) of product is a particular supplier, e.g., supplier ( 112 ).
- the binding is accomplished via the RFID tags ( 208 ).
- each RFID tag includes a unique supplier identifier ( 302 ) similar to an EPC.
- the gateway ( 200 ) employs secure VLAN tunnels ( 210 , 212 , 214 ) and the supplier identifiers ( 302 ) to provide suppliers with accurate, timely inventory data while mitigating the need for manually associating particular products with particular suppliers.
- Each supplier is provided with a secure VLAN tunnel to the gateway via the Internet, e.g., supplier ( 112 ) has tunnel ( 210 ), supplier ( 114 ) has tunnel ( 212 ), and supplier ( 116 ) has tunnel ( 214 ).
- the supplier database ( 202 ) is employed to store these bindings between VLAN tunnels and supplier identifiers.
- the gateway ( 200 ) performs a filtering function such that only data regarding products having a particular supplier identifier in the RFID can be provided on a given VLAN tunnel, e.g., if the supplier ID ( 302 ) corresponds to supplier ( 112 ) then tunnels ( 212 , 214 ) are only then permitted to transport that data. Further, the gateway performs a steering function such that a given VLAN tunnel is only permitted to receive data associated with a particular supplier identifier, e.g., if the supplier ID ( 302 ) corresponds to supplier ( 112 ) then the data is directed to tunnel ( 210 ).
- the supplier identifier to VLAN tunnel bindings in the database may be manually maintained. However, this maintenance is less complex and time-consuming than maintaining a database of bindings between suppliers and individual products because there are likely to be fewer entries, and those entries are less likely to change over time.
- the reader ( 206 ) determines the supplier ID from some other identifier. For example, if a particular product ID is only supplied by one supplier then the product ID itself is a supplier ID.
- the reader ( 206 ) may also be operable to mark packets with an appropriate supplier code, or even the appropriate VLAN identifier.
- data from an RFID tag is combined with data from an EPC label to provide inventory data.
- the RFID tag might include the product ID, but not the supplier ID, while the EPC label includes an indication of the supplier ID, e.g., an index into an EPC manufacturer's code in database ( 202 ).
- an inventory update could be created at the point of sale by sensing the RFID tag at the time the EPC label is scanned, performing an EPC lookup to identify the manufacturer, and then transporting the data on the VPN tunnel assigned to that EPC manufacturer's code.
- the reader or Layer 2 ⁇ 3 switch may implement filtering and steering.
- secure VPN tunnels may be created between the suppliers and each reader or Layer 2 ⁇ 3 switch.
- the VPN tunnels could be formed using IPSec or SSL protocols. Only one supplier is permitted to be associated with any given tunnel.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Theoretical Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
- This Application is a Divisional of U.S. patent application Ser. No. 13/245,156 entitled SECURE DIFFERENTIATED READING OF SENSORS AND RFID TAGS, filed Sep. 26, 2011, which is a continuation of U.S. patent application Ser. No. 11,287,131 entitled SECURE, DIFFERENTIATED READING OF SENSORS AND TAGS, filed Nov. 23, 2005, which claims priority to U.S. Provisional patent application 60/630,411, filed Nov. 23, 2004, which is incorporated herein by reference.
- This invention relates generally to the field of network communications, and more particularly to inventory management.
- Information Technology (“IT”) has enabled enterprises to more accurately monitor and control critical aspects of their business such as inventory. With accurate, timely inventory data an enterprise can order supplies and build products in a timely manner, thereby reducing the possibilities of running short of supplies or products, and storing more product than can be sold in a reasonably short amount of time. However, recent trends in business practices have made it more difficult for some enterprises to obtain accurate and timely inventory data.
- It is now common for suppliers to large retailers to retain ownership of products up until the time of purchase. Further, the suppliers may be held responsible for maintaining a sufficient supply of product in the stores. Obtaining accurate and timely inventory data under such circumstances is difficult because, apart from manually monitoring the stores, the inventory data can only be obtained via the network of the retailer. Referring to
FIG. 1 , the retailer or supplier may tag products with Radio Frequency ID (“RFID”) tags (100) which are detectable by RFID readers (102) positioned in the store so that it becomes possible to automatically determine how many units (104) of a given product are on the store shelves. Data from all RFID readers in a store, and even from multiple stores, may be provided to the retailer's RFID Event Management System (106), and subsequently to a data center (108) via a Virtual Local Area Network (“VLAN”) on an Enterprise IP network (110). However, in order to prevent a given supplier, e.g., supplier (112), from obtaining sensitive data associated with the retailer or other suppliers (114, 116) it is necessary to limit the supplier's access to data in the data center (108). In particular, it is necessary for the retailer to determine which supplier provided the product for each supplier inquiry about a product in order to limit the access of supplier (112) access to only data associated with product provided by that supplier (112). This can be complicated and time consuming because associations between products and suppliers are manually entered by the retailer, e.g., via an RFID back office station (118), and a retailer may sell many different types of products, change product lines frequently, and obtain particular products from multiple suppliers. For these and other reasons suppliers would like to have technology that eliminates the need for them to maintain a large centralized database from their warehouse by shifting responsibility for data retrieval and retention to the individual suppliers. - In accordance with the invention, a method for providing a supplier with secure access to inventory data indicative of units of product at a seller's premises comprises the steps of: associating a product identifier with each unit of product; associating a supplier identifier with each unit of product; detecting, with a reader, the product identifier and supplier identifier associated with a unit of product, thereby producing inventory data; establishing a secure Virtual Private Network (“VPN”) tunnel between the supplier and the seller; steering inventory data associated with the supplier identifier that matches the supplier to the VPN tunnel; and filtering inventory data associated with supplier identifiers that do not match the supplier from the VPN tunnel.
- In further accordance with the invention apparatus for providing a supplier with secure access to inventory data indicative of units of product at a seller's premises comprises: a machine-readable product identifier associated with each unit of product; a machine-readable supplier identifier associated with each unit of product; a reader operable to detect the product identifier and supplier identifier associated with a unit of product, thereby producing inventory data; a secure Virtual Private Network (“VPN”) tunnel established between the supplier and the seller; and at least one network device operable to steer inventory data associated with the supplier identifier that matches the supplier to the VPN tunnel and filter inventory data associated with supplier identifiers that do not match the supplier from the VPN tunnel.
- The invention has advantages including providing the supplier with direct access to inventory data without exposing sensitive information related to the seller and other suppliers. Supplier access to inventory data is enhanced because associations between products and suppliers need not be manually entered. In particular, since each unit of product is tagged with a supplier identifier it is no longer necessary to refer to a database to determine which supplier provided a particular unit of product. Further, because a particular supplier's VPN tunnel is only permitted to carry inventory data associated with the supplier's identifier it is no longer necessary to refer to a table to determine whether a particular supplier is permitted to receive data concerning a particular unit of product.
-
FIG. 1 is a prior art network diagram illustrating inventory control. -
FIG. 2 illustrates an embodiment of inventory control in accordance with the invention. -
FIG. 3 illustrates the RFID tag in greater detail. -
FIG. 4 illustrates the gateway ofFIG. 2 in greater detail. - Referring to
FIGS. 2 and 3 , an enterprise such as a retailer has a network including a gateway (200), database (202), switches (204) and RFID readers (206). RFID tags (208) are affixed to units (104) of product by the enterprise or suppliers. The RFID readers are strategically positioned within stores in order to detect the RFID tags and thereby to determine the number of units of product present in the store. In particular, each RFID tag (208) includes product type identifier (300) which uniquely identifies the product in a manner similar to an Electronic Packaging Code (“EPC”). The readers are operable to scan for RFID tags either periodically or in response to a prompt, and to forward the resulting data to the gateway (200) via the Layer ⅔ switch (204). - In order to facilitate secure provision of inventory data to the suppliers, a binding is created between each unit (104) of product and a particular supplier, e.g., supplier (112). The binding is accomplished via the RFID tags (208). In particular, each RFID tag includes a unique supplier identifier (302) similar to an EPC. By including both a product ID (300) and supplier ID (302) in the RFID tag it becomes possible to differentiate between identical products provided by different suppliers. Further, as will be discussed below, it becomes possible to facilitate secure access to inventory data.
- Referring now to
FIGS. 2-4 , the gateway (200) employs secure VLAN tunnels (210, 212, 214) and the supplier identifiers (302) to provide suppliers with accurate, timely inventory data while mitigating the need for manually associating particular products with particular suppliers. Each supplier is provided with a secure VLAN tunnel to the gateway via the Internet, e.g., supplier (112) has tunnel (210), supplier (114) has tunnel (212), and supplier (116) has tunnel (214). The supplier database (202) is employed to store these bindings between VLAN tunnels and supplier identifiers. The gateway (200) performs a filtering function such that only data regarding products having a particular supplier identifier in the RFID can be provided on a given VLAN tunnel, e.g., if the supplier ID (302) corresponds to supplier (112) then tunnels (212, 214) are only then permitted to transport that data. Further, the gateway performs a steering function such that a given VLAN tunnel is only permitted to receive data associated with a particular supplier identifier, e.g., if the supplier ID (302) corresponds to supplier (112) then the data is directed to tunnel (210). The supplier identifier to VLAN tunnel bindings in the database may be manually maintained. However, this maintenance is less complex and time-consuming than maintaining a database of bindings between suppliers and individual products because there are likely to be fewer entries, and those entries are less likely to change over time. - In an alternative embodiment the reader (206) determines the supplier ID from some other identifier. For example, if a particular product ID is only supplied by one supplier then the product ID itself is a supplier ID. The reader (206) may also be operable to mark packets with an appropriate supplier code, or even the appropriate VLAN identifier. Alternatively, data from an RFID tag is combined with data from an EPC label to provide inventory data. For example, the RFID tag might include the product ID, but not the supplier ID, while the EPC label includes an indication of the supplier ID, e.g., an index into an EPC manufacturer's code in database (202). In this scenario an inventory update could be created at the point of sale by sensing the RFID tag at the time the EPC label is scanned, performing an EPC lookup to identify the manufacturer, and then transporting the data on the VPN tunnel assigned to that EPC manufacturer's code.
- In another alternative embodiment the reader or Layer ⅔ switch may implement filtering and steering. In particular, secure VPN tunnels may be created between the suppliers and each reader or Layer ⅔ switch. The VPN tunnels could be formed using IPSec or SSL protocols. Only one supplier is permitted to be associated with any given tunnel.
- While the invention is described through the above exemplary embodiments, it will be understood by those of ordinary skill in the art that modification to and variation of the illustrated embodiments may be made without departing from the inventive concepts herein disclosed. Moreover, while the preferred embodiments are described in connection with various illustrative structures, one skilled in the art will recognize that the system may be embodied using a variety of specific structures. Accordingly, the invention should not be viewed as limited except by the scope and spirit of the appended claims.
Claims (29)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/531,678 US20120265653A1 (en) | 2004-11-23 | 2012-06-25 | Secure, Differentiated Reading of Sensors and RFID Tags |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US63041104P | 2004-11-23 | 2004-11-23 | |
US11/287,131 US8036956B1 (en) | 2004-11-23 | 2005-11-23 | Secure, differentiated reading of sensors and RFID tags |
US13/245,156 US8401933B2 (en) | 2004-11-23 | 2011-09-26 | Secure, differentiated reading of sensors and RFID tags |
US13/531,678 US20120265653A1 (en) | 2004-11-23 | 2012-06-25 | Secure, Differentiated Reading of Sensors and RFID Tags |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/245,156 Division US8401933B2 (en) | 2004-11-23 | 2011-09-26 | Secure, differentiated reading of sensors and RFID tags |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120265653A1 true US20120265653A1 (en) | 2012-10-18 |
Family
ID=44730026
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/287,131 Expired - Fee Related US8036956B1 (en) | 2004-11-23 | 2005-11-23 | Secure, differentiated reading of sensors and RFID tags |
US13/245,156 Expired - Fee Related US8401933B2 (en) | 2004-11-23 | 2011-09-26 | Secure, differentiated reading of sensors and RFID tags |
US13/531,678 Abandoned US20120265653A1 (en) | 2004-11-23 | 2012-06-25 | Secure, Differentiated Reading of Sensors and RFID Tags |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/287,131 Expired - Fee Related US8036956B1 (en) | 2004-11-23 | 2005-11-23 | Secure, differentiated reading of sensors and RFID tags |
US13/245,156 Expired - Fee Related US8401933B2 (en) | 2004-11-23 | 2011-09-26 | Secure, differentiated reading of sensors and RFID tags |
Country Status (1)
Country | Link |
---|---|
US (3) | US8036956B1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9367770B2 (en) * | 2011-08-30 | 2016-06-14 | Digimarc Corporation | Methods and arrangements for identifying objects |
US10474858B2 (en) * | 2011-08-30 | 2019-11-12 | Digimarc Corporation | Methods of identifying barcoded items by evaluating multiple identification hypotheses, based on data from sensors including inventory sensors and ceiling-mounted cameras |
US11288472B2 (en) | 2011-08-30 | 2022-03-29 | Digimarc Corporation | Cart-based shopping arrangements employing probabilistic item identification |
US9224184B2 (en) | 2012-10-21 | 2015-12-29 | Digimarc Corporation | Methods and arrangements for identifying objects |
US10567986B2 (en) * | 2016-09-06 | 2020-02-18 | Qualcomm Incorporated | Back-off mechanisms for fair joint access of unlicensed sidelink |
CN108337148B (en) * | 2018-02-07 | 2019-10-18 | 北京百度网讯科技有限公司 | For obtaining the method and device of information |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6671729B1 (en) * | 2000-04-13 | 2003-12-30 | Lockheed Martin Corporation | Autonomously established secure and persistent internet connection and autonomously reestablished without user intervention that connection if it lost |
US20050150102A1 (en) * | 2004-01-13 | 2005-07-14 | Bosco Edward M. | System and method for validating radio frequency identification tags |
US6996538B2 (en) * | 2000-03-07 | 2006-02-07 | Unisone Corporation | Inventory control system and methods |
US8225388B2 (en) * | 2000-09-20 | 2012-07-17 | United Parcel Service Of America, Inc. | Method and apparatus for authorizing the transfer of information |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050010494A1 (en) * | 2000-03-21 | 2005-01-13 | Pricegrabber.Com | Method and apparatus for Internet e-commerce shopping guide |
JP2006502814A (en) * | 2002-10-18 | 2006-01-26 | マッケソン オートメーション システムズ,インコーポレイテッド | Drug substitution / confirmation / report automation system |
-
2005
- 2005-11-23 US US11/287,131 patent/US8036956B1/en not_active Expired - Fee Related
-
2011
- 2011-09-26 US US13/245,156 patent/US8401933B2/en not_active Expired - Fee Related
-
2012
- 2012-06-25 US US13/531,678 patent/US20120265653A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6996538B2 (en) * | 2000-03-07 | 2006-02-07 | Unisone Corporation | Inventory control system and methods |
US6671729B1 (en) * | 2000-04-13 | 2003-12-30 | Lockheed Martin Corporation | Autonomously established secure and persistent internet connection and autonomously reestablished without user intervention that connection if it lost |
US8225388B2 (en) * | 2000-09-20 | 2012-07-17 | United Parcel Service Of America, Inc. | Method and apparatus for authorizing the transfer of information |
US20050150102A1 (en) * | 2004-01-13 | 2005-07-14 | Bosco Edward M. | System and method for validating radio frequency identification tags |
Also Published As
Publication number | Publication date |
---|---|
US8036956B1 (en) | 2011-10-11 |
US20120030071A1 (en) | 2012-02-02 |
US8401933B2 (en) | 2013-03-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20120265653A1 (en) | Secure, Differentiated Reading of Sensors and RFID Tags | |
US6883710B2 (en) | Article tracking system and method | |
CA2359430C (en) | Managing production and operations using read/write rfid tags | |
US20200265446A1 (en) | Food chain product label and method of use, and food trust identifier system | |
CN1955998B (en) | For the system and method for visualizing auto-id data | |
US7954712B2 (en) | Product, asset, and device tracking, identification, and pricing system | |
US7721957B2 (en) | Method of processing a ticket order | |
EP1583014B1 (en) | Article management system and article management apparatus | |
US7707064B2 (en) | RFID receiving process for use with enterprise resource planning systems | |
CN103593745A (en) | Commodity logistics anti-counterfeiting managing method and system of vending machine | |
CN103440590A (en) | Commodity pre-sales and after-sales management system and management method | |
CN114715592B (en) | Logistics storage management system and method | |
EP1514247B1 (en) | Article tracking system and method | |
CN100550061C (en) | Identify the system and method for clauses and subclauses | |
JP2008159016A (en) | Intelligent maintenance service mechanism and method | |
CN114897117A (en) | Asset equipment positioning management system and method based on RFID | |
CN108830529A (en) | Cargo intelligent control method and system based on Internet of Things | |
US20060186998A1 (en) | Association of business processes with scanning of physical objects | |
CN101556903B (en) | Radio frequency identification (RFID) real-time common information system of semiconductor supply chain system | |
KR20070106846A (en) | Process for managing a commodity and system therefor | |
WO2007070938A1 (en) | Method and system of radio frequency identification tagging | |
FI3893175T3 (en) | Arrangement for picking goods | |
KR101560444B1 (en) | Total distribution history system based on RFID | |
Rahaman et al. | Privacy Preservation Agri-Food SCM Operation Based on Online/Offline RFID Using Block Chain | |
CN118246842A (en) | Multi-material tracking and tracing method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: ROCKSTAR CONSORTIUM US LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROCKSTAR BIDCO, LP;REEL/FRAME:029235/0241 Effective date: 20120509 |
|
AS | Assignment |
Owner name: ROCKSTAR CONSORTIUM US LP, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROCKSTAR BIDCO, LP;REEL/FRAME:032425/0867 Effective date: 20120509 |
|
AS | Assignment |
Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ROCKSTAR CONSORTIUM US LP;ROCKSTAR CONSORTIUM LLC;BOCKSTAR TECHNOLOGIES LLC;AND OTHERS;REEL/FRAME:034924/0779 Effective date: 20150128 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT, IL Free format text: SECURITY AGREEMENT;ASSIGNORS:RPX CORPORATION;RPX CLEARINGHOUSE LLC;REEL/FRAME:038041/0001 Effective date: 20160226 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION |
|
AS | Assignment |
Owner name: RPX CORPORATION, CALIFORNIA Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030 Effective date: 20171222 Owner name: RPX CLEARINGHOUSE LLC, CALIFORNIA Free format text: RELEASE (REEL 038041 / FRAME 0001);ASSIGNOR:JPMORGAN CHASE BANK, N.A.;REEL/FRAME:044970/0030 Effective date: 20171222 |