WO2009058122A1 - Système rfid fournissant des données et de l'énergie - Google Patents

Système rfid fournissant des données et de l'énergie Download PDF

Info

Publication number
WO2009058122A1
WO2009058122A1 PCT/US2007/064155 US2007064155W WO2009058122A1 WO 2009058122 A1 WO2009058122 A1 WO 2009058122A1 US 2007064155 W US2007064155 W US 2007064155W WO 2009058122 A1 WO2009058122 A1 WO 2009058122A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
frequency
optical media
antenna
state
Prior art date
Application number
PCT/US2007/064155
Other languages
English (en)
Inventor
Paul Atkinson
James R. Kruest
Original Assignee
Kestrel Wireless Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kestrel Wireless Inc. filed Critical Kestrel Wireless Inc.
Priority to PCT/US2007/064155 priority Critical patent/WO2009058122A1/fr
Publication of WO2009058122A1 publication Critical patent/WO2009058122A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0701Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising an arrangement for power management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/077Constructional details, e.g. mounting of circuits in the carrier
    • G06K19/07749Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card
    • G06K19/07766Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card comprising at least a second communication arrangement in addition to a first non-contact communication arrangement
    • G06K19/07767Constructional details, e.g. mounting of circuits in the carrier the record carrier being capable of non-contact communication, e.g. constructional details of the antenna of a non-contact smart card comprising at least a second communication arrangement in addition to a first non-contact communication arrangement the first and second communication means being two different antennas types, e.g. dipole and coil type, or two antennas of the same kind but operating at different frequencies
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/14Mechanical actuation by lifting or attempted removal of hand-portable articles
    • G08B13/1409Mechanical actuation by lifting or attempted removal of hand-portable articles for removal detection of electrical appliances by detecting their physical disconnection from an electrical system, e.g. using a switch incorporated in the plug connector
    • G08B13/1418Removal detected by failure in electrical connection between the appliance and a control centre, home control panel or a power supply
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2428Tag details
    • G08B13/2431Tag circuit details

Definitions

  • the present invention relates to a target that is capable of providing an ID to a scanner using an RF communication.
  • the invention uses radio frequency (RF) devices and processes to provide sufficient coupling with the target for confidently retrieving the ID, or to operate activation circuitry.
  • RF radio frequency
  • Theft is a serious and growing problem in the distribution of products.
  • electronic devices continue to shrink in size, while increasing their utility. As these electronic devices become smaller and more capable, they also become easier and more attractive to steal.
  • Devices such as digital cameras, DVD players, MP3 players, and game devices are popular targets of theft, not only in the retail store by consumers, but also by others in the distribution chain. For example, retail store employees, shippers, warehousers, and even employees of the manufacturer often steal products, and even boxes of products, for their own use or to sell.
  • Other types of products are also subject to theft, such as DVDs, CDs, game discs, game cartridges, and other types of media. These types of products are also in high demand, and being relatively small and valuable, are easy and attractive to steal.
  • manufacturers often manufacture a product in several difference models, with each model having a different set of features. Although this is desirable from the consumer's standpoint, it complicates the manufacturing, shipping, inventorying, shelving, and retailing processes.
  • This problem exists in the configuration of electronic products, computers, gaming systems, DVDs, CDs, game cartridges, for example.
  • a DVD movie disc may be available in a family version, a theater version, and an "uncut" version.
  • Each has a different age restriction, and will appeal to different and significant markets. Accordingly, three different versions must be manufacture, shipped, inventoried, shelved, and managed. A similar problem exists with feature sets for games, computers, and other products.
  • a typical example of a rental business model is the rental of optical media, such as DVDs.
  • Rental models for content stored in physical media i.e. movies recorded on video tape or optical disc, are typically dependent on the physical distribution of the media and in particular the checking-out and checking-in of the media out of, or into the retailer's inventory.
  • charges are related to how long the consumer has the media, e.g. the period between when the media is checked-out and when it is checked-in.
  • charges are based on the number of media checked-out to a customer less those that have been checked-in.
  • the video rental business illustrates the some of the limitations of these models.
  • traditional video rental stores every time a customer rents a movie he must go to the store to pick-up the movie and then must go back to the store to return it.
  • the time-period for which the consumer is charged depends on when the movie is checked-out and when it is returned and checked-in to inventory.
  • the consumer bears the transport cost in the form of trips to and from the video store.
  • the consumer also incurs delays between the rental and selection decisions and the actual watching of the movie.
  • the video store incurs high costs too in the form of rent, inventory and the cost of checking- out and checking in each movie rented.
  • An RFID system for providing data and power.
  • the RFID system has a target that is configured to receive RF signals on multiple frequencies, and a corresponding multi-frequency scanner.
  • the RF scanner is configured to transmit an RF signal to the target and, in response, receive an ID message from the target.
  • the scanner may use one or both frequencies to communicate with the target.
  • the target may include a switch that may be set to enable the target to have a defined level of utility.
  • the target may receive, on one of the frequencies, sufficient or supplemental power to change the state of the switch.
  • the RFID system uses the second frequency to supplement power transmission to the target.
  • the RFID system may use the second frequency to enhance data communication with the target.
  • the present invention provides a target having a controlled utility, and a method for changing the utility of the target.
  • the target with controlled utility may be an electronic device, or alternatively, may be a tangible media, such as an optical disc.
  • the controlled target has a change effecting device that is set to a first state, which allows the target to operate according to a first utility.
  • the controlled target also has a receiver operating at a first RF frequency for receiving an authorization key, and logic which, responsive to the authorization key, selectively changes the change effecting device to a second state. When the change effecting device is in the second state, the target may operate according to a second utility.
  • the controlled target has a restricted access key that was stored during manufacture, and the restricted access key is used by the logic in changing the state of the change effecting device.
  • the controlled target is placed proximate to an activation device.
  • the activation device may read an accessible identifier from the controlled target using the first RF frequency system, and retrieve or generate an authorization key that is associated with the target.
  • the activation device may cooperate with a network operation center or other entity to retrieve the authorization key, and to obtain approval to change the utility of the controlled target. If approved, the activation device may then send the authorization code to the controlled target using one of the two available RF systems.
  • the second RF frequency may be used to provide additional power to the target for effecting the change in the switch. For example, additional power may be supplied by the second frequency to permanently change an electro-chromic material from opaque to substantially transparent.
  • a distribution control system is provided to support the controlled and selective changing of utility for a target.
  • the target with controlled utility may be an electronic device, or alternatively, may be a tangible media, such as an optical disc.
  • the distribution control system has a target with a change effecting device and a restricted access key.
  • An activation device retrieves or generates an authorization key, and sends the authorization key to the target.
  • the authorization key may be sent to the target wirelessly, for example, using a radio frequency signal.
  • the target has logic that uses the restricted access key and the authorization key to change the utility of the target.
  • the activation device retrieves the authorization key from a network operation center (NOC) by sending a target identifier to the NOC, and the NOC retrieves the authorization key for the identified target.
  • NOC network operation center
  • the activation device may also connect to other systems for obtaining approval to change the utility of the target.
  • the authorization key may be sent to the target upon receiving payment, password, or other confirmation.
  • a target is manufactured with a change effecting device set to compromise the utility of the target.
  • the compromised target would be nearly useless to a thief, and therefore would be less likely to be a target of theft.
  • the manufacturer has also stored an identifier and a restricted access key with the target.
  • the manufacturer also stores the accessible identifier and its associated key for later retrieval by a party authorized to restore the utility to the target.
  • the identifiers and keys are stored at a network operation center (NOC).
  • NOC network operation center
  • the compromised target may be moved and transferred through the distribution chain with a substantially reduced threat of theft. When a consumer decides to purchase the target, the target is passed proximally to an activation device.
  • Its accessible ID is read by activation device, and using a network connection to the NOC, sends the accessible ID.
  • the NOC retrieves the authorization key for the target. Additional approvals may be obtained, for example, confirmation of payment, identification, password, or age.
  • the activation device transmits the authorization key to the target, typically using a wireless communication.
  • the target receives the authorization key, and using its logic, compares the authorization key to its stored restricted access key. If the keys match, then the target uses an activation power source to switch the state of the change effecting device. Then, the target will have full utility available to consumer.
  • the RF system which has provided the data link between the target and the activation device may not be able to provide sufficient activation power. In this case, a second RF system may be used to supplement the activation power so that sufficient power is available to switch the state of the change effecting device.
  • Fig. 1 is a block diagram of an RFID system for a target device having controlled utility in accordance with the present invention.
  • Fig. 2 is a block diagram of an RFID system for a target device having controlled utility in accordance with the present invention.
  • Fig. 3 is a flowchart of a process of using an RFID system for a target device having controlled utility in accordance with the present invention.
  • Fig. 4 is a flowchart of a process of using an RFID system for a target device having controlled utility in accordance with the present invention.
  • Figs. 5A, 5B, and 5C are illustrations of optical discs with an RFID system having controlled utility in accordance with the present invention.
  • Figs. 6A and 6B are block diagrams of a dual antenna for an RFID system in accordance with the present invention.
  • Fig. 7 is a block diagram of an RFID system for a target device in accordance with the present invention.
  • Fig. 8 is a flowchart of a process of using an RFID system for a target device in accordance with the present invention.
  • Fig. 9 is a flowchart of a process of using an RFID system for a target device in accordance with the present invention.
  • Fig. 10 is a block diagram of a network for distributing a target with controlled utility.
  • Fig. 11 is a block diagram of a process for changing the utility state of a target with controlled utility.
  • Fig. 12 is a block diagram of a process for changing the utility state of a target with controlled utility..
  • Fig. 13 is a flowchart of a process for changing the utility state of a target with controlled utility
  • Fig. 14 is a block diagram of an electronic device with controlled utility.
  • Fig. 15 is a block diagram of a processor with controlled utility.
  • System 10 includes a target device 12 which may be, for example, an electronic device, an optical disk, or a consumer product.
  • target device 12 may be an electronic product that has had its utility 51 compromised at the time of manufacture and during distribution. Accordingly, device 12 is less likely to be a target of theft or pilfering since it would have no or only limited use to a thief.
  • the level of utility 51 is set according to the state of switch 49.
  • Switch 49 may have two or more states, with each state enabling a different level of utility 51. For example, one state may be a fully compromised state where the target device 12 has no or only limited utility.
  • Switch 49 may have another state that provides a demonstration capability, but does not enable full use of the device 12. Also, the switch 49 may have a state enabling full utility 51 for device 12. [0031] At some point in the distribution chain it will be desirable to enable, activate, or restore the full utility 51 for target device 12. Often, this activation may be done as part of a point-of-sale transaction. In performing the point-of- sale transaction, the target device 12 is brought near an activating device 14. Activating device 14 has a controller 53 for controlling operations, as well as managing local area and wide area communications. For example, the activating device 14 may be coupled to other point-of-sale terminals, to in-store servers, or to a network operations center (NOC) at a remote site.
  • NOC network operations center
  • the activating device has two radio frequency systems, with each system operating at a different radio frequency.
  • the first RF system 55 transmits, using transmitter 57, a signal to a first RF antenna 22 for device 12.
  • the RF signal is received by transceiver 27, and the received RF signal may contain data 35 and energy sufficient to activate power converter 37.
  • Power converter 37 supplies sufficient power to enable retrieval of readable ID 44, as well as transmission of the readable ID 44 through the transmitter and RF antenna 122 back to the receiver 59. In this way, an RFID process similar to known RFID processes has been established.
  • the activating device 14 has used a first frequency to signal and interrogate the target device 12 for an identification value.
  • the controller 53 may use its network connections to confirm the target device 12 is properly authorized, and if authorized, to retrieve an activation key or code.
  • the readable ID is transmitted to a network operations center, where a secure database is used to look up an activation key.
  • the controller 53 receives the activation key, and local events indicate that the target device 12 may be in a condition for activation, the first RF system 55 communicates the activation key to logic 45 using transceiver 27.
  • the logic 45 may compare the received activation key to a restricted access key 47 stored on the target device, and if the keys match, enabled the switch 49 to change states.
  • the first RF system 55 may not provide sufficient energy to enable the changing of the switch 49.
  • the first RF system 55 may operate at a UHF band, for example such as at 902 to 928 MHz, and therefore energy distribution may be subject to fadeouts and inconsistent densities. Accordingly, if target device 12 is in an area having a lower energy density, then sufficient power may not be available to effect the change. Further, for safety reasons, the power transmitted by first RF receiver 55 may be attenuated.
  • the activation device 14 has a second RF system 61 having a transmitter 63.
  • the second RF system 61 may be activated to provide an additional energy signal from transmitter 63 through RF antenna 21 into RF receiver 25.
  • the second RF transmitter may be constructed to operate at a lower frequency, for example in the high frequency or very high frequency band and preferably provides a continuous wave signal.
  • the second RF transmitter is chosen to transmit a more uniform power density field that is less sensitive to orientation and local environmental conditions.
  • the second frequency may be 13.56 MHz, although other frequencies may be used.
  • the receiver 29 has a power converter 33 for converting the second RF energy into local electrical power for powering the low-power circuit, including switch 49.
  • the RF transmitter 63 may be activated during the entire activation process, or may be activated concurrent with sending the activation key.
  • the target device 12 will only be activated upon having both sufficient power to change the switch, as well as an authorization from local logic 45. In this way, even though the second RF transmitter 63 may be transmitting sufficient power, the switch at 49 will not change states unless allowed by logic 45.
  • the antenna structure 16 may be constructed as a single antenna having different matching circuits for each frequency, or may be constructed as two separate antennas.
  • the antenna may be external to the target device, or may be integrally formed.
  • the antenna, receivers, and low-power circuit structures may be provided as an integrated circuit and incorporated into a device's electronics.
  • the activation circuitry may be external to a device, while the switch is internally formed. It will be appreciated that the physical form for the activation circuitry, receivers, antennas, and target device may take many alternative forms.
  • the target device 12 is an optical media with the switch being a change effecting device in the form of an electrochromic material.
  • the electrochromic material When set to an opaque state, the electrochromic material blocks a player's ability to effectively read stored content on the disk. Upon activation, the electrochromic material is made substantially transparent, thereby enabling a player to read the disk.
  • an electrochromic film may require about 3 to 5 volts at 2 to 4 milliamp for about one second to permanently change state.
  • the presence of a second RF transmitter enables the delivery of sufficient power to permanently change an EC film. More specifically, the second RF transmitter may be constructed at a lower frequency, for example in the high frequency or very high frequency band that is preferably provided as a continuous wave signal. The transmission is chosen to transmit a more uniform power density field that is less sensitive to orientation and local environmental conditions.
  • a frequency of about 13.56 MHz will satisfy this requirement, but the concept is not limited to this frequency, and may involve other frequencies such as 125 kHz or 125 MHz.
  • the coupling between the activating device and the targets RF antenna will be primarily in the magnetic field, and the RF antenna may be designed in a loop fashion for coupling to the h field.
  • the same coiled antenna may operate sufficiently well as the UHF antenna.
  • Activation of a disc using this duel frequency system generally involves three phases.
  • a communication may be established again with the UHF system to receive a confirmation message that activation has been successfully completed. Further, the UHF communication system may be used to download and store additional information in the target device, such as date and time of activation. Such information may be useful for repair or warranty purposes.
  • RFID system 100 has a target device 102 and an activating device 104.
  • the activating device 104 has a controller 123, a first RF system 125, and a second RF system 127.
  • the RF system 2 has a receiver 131, thereby enabling full communication using the second frequency.
  • the second frequency may provide supplemental power as previously described, but may also be used to establish more robust data communication.
  • the second RF system 127 may enable communications at different ranges or in different environments as compared to the first RF system 125.
  • the first RF system 125 may be a high frequency communication system enabling communications over a distance of several meters, thereby enabling communications in warehouses and for distance scanning of pallets.
  • RF system 127 may be constructed as a lower frequency system for establishing communication at a point-of-sale terminal or in a local area of about 1 foot.
  • the activating device 104 may be able to select, using controller 123, one of the transmission systems according to the particular requirements of a target. For example, the activating device 104 may recognize that a target has entered a scanning area, and be unable to retrieve accurate ID information using the first transmission system 125. In response, the activating device 104 may activate the second RF system 127 and attempt to retrieve the ID with the second RF system.
  • the activation device 104 has two RF systems with which to provide data or power to the target 102.
  • the first RF system 125 communicates to the first RF transceiver 111 through the RF antenna 108.
  • the second RF system 127 communicates to the second RF transceiver 110 through RF antenna 106. Since the second RF transceiver 110 has both a transmitter and a receiver portion, the second transceiver 110 is able to receive and transmit data 115.
  • Antennas 106 and 108 may be formed separately, or in another example may share a common structure. Both the RF subsystems may be used to provide both power and data to the low-power circuit 119.
  • the low-power circuit may have an onboard temporary power source 113, such as a battery, for providing additional battery power for the low-power circuit 119.
  • an onboard temporary power source 113 such as a battery
  • power supplied by one or both of the RF subsystems may be combined with battery power 113 to toggle the switch to change utility 121.
  • Process 150 may operate on a scanning or activation device, for example, at a point-of-sale terminal.
  • Process 150 first retrieves a readable ID from a target device using a first wireless system, as shown in block 152.
  • This first wireless system may operate, for example at a UHF frequency of about 902 to 928 MHz. This frequency range corresponds to frequencies currently used for RFID applications, and have been approved by most governmental agencies for RFID purposes.
  • An activation device receives the readable ID and determines if the target is authorized for activation as shown in block 154.
  • An activation key may be sent by one of the wireless systems to the target as shown in block 153.
  • the activation key is sent through the UHF antenna to the logic in the target device, and the UHF antenna may provide sufficient power to operate the logic.
  • a second wireless system is activated to provide supplemental power to the target as shown in block 156. This supplemental power is used by logic in the target device to change the state of a switch, which enables a different utility for the target device.
  • the target may respond with a confirmation message that the device has been properly activated as shown in block 158.
  • This activation message may be transmitted using the first wireless system, the second wireless system, or may include making a perceptible change to the target itself.
  • Method 175 preferably operates on a target device.
  • a readable ID is first retrieved from memory in the target device and is transmitted using a first wireless system as shown in block 177.
  • the retrieval and transmission of the ID is responsive to receiving an RF signal from an RFID scanning or activation device.
  • the target device may receive an activation key 185 from one of the wireless systems, such as wireless system 1.
  • wireless system 1 operates at a UHF frequency.
  • the wireless system 1 may also provide sufficient energy to power at least some of the local logic as shown in block 179.
  • the target also has a second wireless system operating at a second RF frequency, which is typically at a much lower frequency, such as an HF or VHF frequency.
  • This second wireless system 183 is used to receive supplemental power useful for changing the state of the switch as shown in block 189.
  • the logic may allow the switch to be changed. Accordingly, when the logic confirms that the target may be activated as shown in block 187, and sufficient power is available from wireless system 2 as shown in block 189, then the state of the switch may permanently change. In this way, the switch may set the level of available utility for the target device as shown in block 192.
  • System 200 includes an optical disc 202, which may be, for example a DVD, an HD DVD, a blu-ray DVD, an audio DVD, a software DVD, or a gaming disk.
  • a switch 206 in the form of an electro chromic material is positioned over an important area of the content area such that when the electrochromic material is opaque, a typical player will be unable to read the stored content. However, when the electrochromic material 206 has changed state to be substantially transparent, then the stored content may be read by a player.
  • a UHF antenna 205 is provided for receiving UHF energy and data from an activation device, as well as transmitting a readable ID back to the activation device.
  • the readable ID is stored in the logic 204, or may be stored on another area of the disc 202.
  • the UHF antenna 205 and the logic 204 also cooperate to receive an activation key, and make a determination that the switch 206 may be appropriately set to its transparent state. However, sufficient power may not be available through the UHF antenna 205 alone.
  • a HF or VHF antenna 207 is provided for providing additional energy for changing the state of the electrochromic material.
  • the supplemental antenna 207 may be arranged in a meandering pattern in the space between the spindle opening and the content area. It will be appreciated that the antenna may substantially extend around the spindle, or may take an alternative shape. Because the antenna 207 is intended to interact with a magnetic field, the meandering pattern facilitates a more efficient magnetic coupling. In some cases, the meandering antenna 207 may also be constructed in a way to sufficiently receive and transmit UHF communications. In this way, a single antenna may be used. However, greater efficiency may be enabled using two antenna structures as illustrated. [0043] Referring now to figure 5B, another optical disc target 225 is illustrated.
  • Optical disc 226 has an electrochromic switch 230 coupled to logic 228 and a UHF antenna 229 as discussed with reference to figure 5A. However, instead of a meandering antenna, the disc 226 has an HF or VHF antenna 233 constructed near the circumference or perimeter of disc 226. This perimeter area of an optical disc is typically unused, and is available for forming a metallic or other conductive antenna member. The antenna may be constructed on the surface of the disc, or may be integrally formed in an internal layer.
  • the circumference antenna 233 is connected to the logic 228 through conductors 231.
  • the conductors 231 may be conductive lines, for example, made from a transparent conducting ink.
  • the conductors 231 may be an opaque conducting material, such as a metal trace, etched into the surface of the disc 232.
  • a metal trace etched into the surface of the disc 232.
  • the error introduced to a typical player is minimal, and may be readily corrected by correction algorithms in the player.
  • the use of a narrow etch 232 facilitates using a metallic conductor, which is less costly than running transparent conductors radially across the disc. It will be appreciated that multiple etches may be made, thereby allowing a single smaller trace to extend radially through the content area. By sufficiently spacing these etches, potential reading errors may be reduced.
  • Optical disc 252 has an electrochromic material 256 coupled to logic 254 and a UHF antenna 255 as previously illustrated.
  • the supplemental antenna is not included on the disc itself, but is included external to the disc, for example on the disc packaging.
  • the disc has contact points 257 for coupling to the external antenna.
  • the supplemental antenna is included in the packaging for the disc, and makes contact with the contacts 257. In this way, the antenna is externally positioned and more readily couples to the radio frequency or magnetic energy.
  • an antenna configuration 300 is illustrated for an activation device or scanner.
  • the activation device or scanner has a UHF antenna 302 sized and tuned for transmitting and receiving UHF frequency communications, for example in the 902 to 928 MHz range.
  • a meandering HF or VHF antenna 303 is also provided.
  • the supplemental antenna 303 is provided in a meandering or looping construction for increased efficiency and coupling with the magnetic field of a lower frequency RF system.
  • the UHF antenna plane is separated from the ground plane 328 by an insulator 327.
  • Another insulator 331 separates the UHF antenna plane 302 from the individual high frequency or very high frequency lines of antenna 303.
  • An additional insulating layer 333 may be provided to protect the entire antenna structure. It will be appreciated that other antenna structures may be used for a scanning device.
  • the antenna structure 300 provides a compact structure that enables UHF communication and magnetically coupled power transmission in an effective and robust manner.
  • RFID system 350 has a target device 352, which may be in the form of an RFID tag.
  • the RFID tag 352 may be adhered to various devices, or may be integrally formed in other devices.
  • the RFID tag 352 is constructed to communicate with a scanner device 354.
  • the scanner device 354 has a controller 373 for controlling a first RF transmitter system 368 and a second RF communication system 371.
  • the first RF transmission system 368 operates at a UHF frequency
  • the second RF communication system 371 operates at a lower frequency, such as an HF or VHF frequency.
  • the RFID tag has a first antenna 358 coupled to a first RF transceiver 360.
  • the RFID tag 352 also has a second RF antenna 356 coupled to a second RF transceiver 362. Both the first and second transceivers couple to a low-power circuit 364, which includes a readable ID 366.
  • scanner 354 may use one of the RF systems to interrogate and read the ID from the RFID tag 352.
  • the scanner may use RF system 368 to communicate to RF transceiver 360 through RF antenna 358. This system may then retrieve the readable ID.
  • the scanner may select to use the second RF system 371 to communicate with the second RF transceiver 362 through the antenna 356 to read the readable ID 366.
  • the decision on which RF subsystem to use may be made dependent on the distance to the RFID tag, or may be made responsive to the failure of one of the RF systems to properly read the ID.
  • the systems may simply toggle back and forth to act as confirmation that a proper ID has been read.
  • the scanner may be set by a human or other controlling device to operate in one of the frequencies. In this way, the scanner may be set by a human to read palettes using the high frequency UHF system 368 when the palettes are several meters away. However, if the same scanning device is used for reading individual products that are only a few inches away, then the scanner may be manually set to use the lower frequency system 371. Irrespective of which frequency is selected on the scanner 354, the RFID tag 352 responds with the proper ID message.
  • Process 400 has a scanning device that is able to select a close or far read mode as shown block 404.
  • the selection may be made responsive to human input, or may be made responsive to application needs.
  • the close and far modes are simply toggled.
  • the far read mode uses a UHF antenna and frequency
  • the close mode uses an HF or VHF antenna and frequency.
  • a request may be sent using the first radio frequency as shown in block 406 and an ID received using RF 1 as shown in block 408, or the ID request may be set using the second RF system as shown in block 411, and the second ID received using the second RF system as shown in block 413.
  • Method 450 transmits a first request for an ID using a first RF system as shown in block 452.
  • the first RF system may be a UHF system.
  • An ID or partial ID may be received using the first RF system as shown in block 454.
  • the ID is analyzed to determine if additional interrogation activity is needed as shown in block 456.
  • the analysis of the ID may indicate there is an error in the first ID and the ID should be retrieved using a second wireless system.
  • the ID may indicate that the tag is capable of storing additional information, and may require that additional information be sent to the tag.
  • the ID may indicate that the target needs additional power to perform an additional activity, such as activating the device by changing an electrochromic switch or other switch device.
  • a second wireless system is activated as shown in block 461.
  • the second RF system may be used to 1) transmit additional energy or power to the RFID tag, 2) may send additional data, or 3) may send additional power and data.
  • the RFID tag may respond with a confirmatory message as shown in block 463. This confirmatory message may be received on either the RF one system or the RF two system.
  • Target 512 may be an electronic device such as a computer, TV, appliance, MP3 player, camera, game counsel, or toy.
  • the target may be a tangible media, such as an optical disc, DVD, CD, or game cartridge.
  • the change effecting device is used to control the utility available for the target or for use of the target. More particularly, the change effecting device has multiple states, with each state being associated with an available state of utility for the target. In a specific application, the change effecting device may be switched between two available states of utility.
  • the target when the target enters the distribution chain, the target is set to have one utility.
  • this utility could be a severely comprised utility, where the target has no useful function available.
  • the set utility may be to a demonstration utility that allows limited demonstration functionality. It will be appreciated that the available utility may be set according the requirements of the specific distribution chain. At some point in the distribution chain, for example, when the target is transferred to a consumer, it may be desirable to change the available utility. Accordingly, block 512b shows the target in the presence of an activation device 16 at a point-of-sale or other transfer location 514.
  • the activation device or another reader is able to read an identifier value or other identification from the target, for example, using an RF system operating at a first frequency.
  • the activation device uses the identifier to generate or retrieve an authorization key.
  • This authorization key may be stored locally at the point-of-sale device 514, or may be retrieved through a network connection to a network operations center or other remote server.
  • the point-of- sale terminal 514 may have a connection to an operations center 518.
  • the operation center may be in the same facility as the point-of-sale terminal 514, or may be in another facility at a different location.
  • the operation center 518 may also have multiple computer servers, and may distribute processes and databases throughout the network system.
  • the operation center 518 stores a set of associated identifications and authorization keys 521.
  • the operation center 518 operates algorithmic processes to generate keys responsive to information received from activation device 516. Whether generated or retrieved, the operation center 518 sends an authorization key for the target to the point-of-sale terminal 514 where it may then be available to activation device 516.
  • a point-of-sale terminal at the point-of-sale 514 which typically is coupled to the activation device, may also perform various other tasks or processes as a precondition to determining that the target has been approved to have its utility changed. For example, the point-of-sale terminal may confirm payment for the target, or may confirm that the consumer is age-appropriate for the particular target being purchased.
  • the activation device 516 transmits the authorization key to the target as shown in block 512c. In one example, the activation device 516 reads the ID from the target and transmits the authorization key to the target using an RF (radio frequency) communication.
  • the authorization key may be sent, for example, using the RF system operating at the first frequency. It will be appreciated that other types of wireless communication may be used. For example, the communication may use infrared (IR) communication in one or both directions. In another example, the target may make physical contact with the activation device for effecting the communications.
  • IR infrared
  • the target then uses the received authorization key to switch the change effecting device to another state.
  • the activation device may activate a second RF system operating at a different frequency.
  • This second RF system provides energy for effecting the change in the switch.
  • This second RF system may provide all or most of the power required for effecting the change, or may provide supplemental power for the first RF system.
  • the target has a different utility than when the change effecting device was in the first state.
  • the target has logic coupled to the change effecting device that uses the authorization key to effect a change in the target's utility.
  • the target has a restricted access key that was defined and stored with the target during the manufacturing process.
  • target 512 is illustrated to be an MP3 player.
  • a restricted access key is stored in the MP3 player.
  • a change effecting device is installed in the MP3 player, and set to a state so that the MP3 player's utility is compromised. More specifically, the change effecting device has a first state in which the MP3 player does not power on or otherwise properly function, and a second state where the MP3 player is allowed to be fully operational.
  • the change effect device may be, for example, a printed circuit board trace coupled to ground. This grounded trace may then be coupled to a pin on a processor of the MP3 player, and as long as that pin is held to ground, the MP3 player will not power on or initialize. It will be appreciated that the utility of the MP3 player may be compromised in several alternative ways and by several alternative change effecting structures.
  • the MP3 player is also manufactured with a power source associated with the change effecting device for selectively decoupling the trace to ground. This power source may be a battery, an electromagnetic or RF converter, or may be power obtained from the MP3 player's operational battery. [0055] The MP3 player is thereby manufactured and ready for sale as a compromised MP3 player that will not properly power on or function.
  • the compromised MP3 player would be nearly useless to a consumer, and therefore would be less likely to be a target of theft.
  • the manufacturer has also applied an accessible identification to the MP3 player.
  • the accessible identifier may be a bar code, or may be another stored value that is accessible through, for example, an RFID reader system.
  • the manufacturer stores the accessible identifier and its associated key value for later retrieval by a retailer or other party authorized to restore the utility to the MP3 player.
  • the compromised MP3 player may be shipped through the distribution chain and to the retailer with a substantially reduced threat of theft.
  • the retailer may display and make the MP3 player available for customer handling in a retail environment with reduce risk of theft. In this way, reduced security measures may be taken at the retail level, such as using locked cases or sophisticated packaging, since the consumer would obtain no benefit by stealing a nonworking, compromised MP3 player.
  • the consumer may take the MP3 player to the point-of-sale terminal 514 and have it passed proximally to an activation device 516.
  • its accessible ID is read by activation device 516, either using the bar code value or by retrieving the stored accessible ID using a wireless or EM (electromagnetic) communication.
  • the communication may be an RF (radio frequency) communication operating in the UHF range of 902-928 MHz.
  • the point-of-sale terminal may have a network connection to an operation center 518, and sends the accessible ID to the operation center.
  • the operation center which has a database of MP3 player identifications associated with their restricted access keys, retrieves the particular authorization key for the MP3 player that is at the point-of-sale device.
  • additional confirmation actions may be taking place. For example, a clerk may be accepting payment from the consumer, or may be checking a consumer's identification or age. These other confirmation criteria may then be used to confirm that the point-of-sale terminal is ready to restore the utility of the MP3 player.
  • the activation device 516 determines restoration is appropriate, the activation device 516 transmits the authorization key to the MP3 player, typically using the UHF wireless communication system.
  • the activation device activates a second RF system, which may operate, for example, at 13.56 MHz.
  • the MP3 player receives the authorization key, and using its logic, compares the authorization key to its pre-stored restricted access key. If the keys match, then the MP3 player uses power from the 13.56 MHz signal to open the trace to ground. With the ground trace now open, when the MP3 player is next turned on, full utility will be available to consumer.
  • the MP3 player may have additional circuitry for confirming that the utility has been restored. For example, the state of the change affecting device may be measured, or another test or measurement may be taken. According to whether or not activation was successful, a different value may be placed in a confirmation memory.
  • the confirmation memory may be read by the UHF system for activation device 16 to confirm to the consumer and to the network operations center that activation was successful. By confirming successful activation, the retailer may have a higher degree of confidence of consumer satisfaction, and may accurately and timely report and authorize payment to the supplier of the MP3 player.
  • a target is provided in a non- operating state, for example, with its main power in an off condition.
  • the target also has been manufactured with a controlled utility, which causes the target to operate only in a first level of utility as shown in block 602.
  • the first utility may be a highly compromised utility level where the target has no practical useful value to a consumer. In this way, a consumer, or someone in the distribution chain, will be unlikely to shoplift or steal the device.
  • the target receives an authorization key as shown in block 604.
  • this key will be received at a retail point-of-sale through a UHF wireless communication, although other locations and processes may be used.
  • the electrical device uses its logic and activation power to determine if it is authorized to change from the first utility level as shown in block 606. It will be appreciated that an HF/ VHF system may be used to provide supplemental power for effecting the change.
  • the electrical device uses its activation power and logic to change the state of a change effecting device from a first state to a second state as shown in block 608.
  • the consumer may plug in or power-on the electronic device as shown in block 611. Since the change effecting device is now in its second state, the target operates according to the second- level of available utility as shown in block 613.
  • the second utility may be a full operational utility.
  • the first utility may be a demonstration utility, and the second utility may be full operational utility.
  • the first utility may be a full operational utility, and the second utility may be restricted utility for an age restricted product.
  • a retailer may disable certain features or functions in an electronic device according to the age of the consumer.
  • a consumer may purchase a device according to a list of desired features.
  • the full operational device may be placed with the activating device, and undesired features compromised. In this way, a flexible configuration of electronic devices may be accomplished at a point-of-sale or service area in a retail environment.
  • a manufacturer may use the change effecting device to particularly configure an electronic device prior to shipment. In this way, a standard version of an electronic device may be made, and the utility selectively added or removed using one or more change effecting devices. It will also be understood that this dynamic configuring process may be performed at other times, for example, by service personnel at the retail outlet.
  • a manufacturer may prepare an optical media, such as an optical disk, with multiple change effecting devices, with each change effecting device arranged to affect a particular utility of the media. Then, at some point in the manufacturing or distribution process, the utility of the media may be changed. In this way, a standard version of a media, and media content, may be made, and the utility selectively added or removed using one or more change effecting devices. It will also be understood that this dynamic configuring process may be performed at other times, for example, by service personnel at the retail outlet.
  • Method 615 has an electronic device in its non-operating state as shown in block 616. This state may be for example, when the electronic device is not plugged in or when its power button is in an off configuration.
  • the electronic device may be placed in its operating state as shown in block 617.
  • the electronic device may be plugged in or have its power switch turned to on.
  • the level of utility available in the electronic device would be different. For example, if the change effecting device is in a first state as shown in block 619, then the electronic device is allowed to operate at a first level of utility as shown in block 621.
  • the electronic device operates at a second- level of utility as shown in block 620.
  • the electronic device has a level of utility which is always dependent on the state of the change effecting device. Accordingly, the change effecting device may cause an electronic device to be always unusable unless it has received the proper authorization key. If the authorization key is never received, the electronic device remains at its first state of utility. In a specific example, if the first level of utility is a highly compromised level, then the electronic device would have no practical usability by a consumer in its first state. In this way, risk of theft is dramatically reduced as no benefit can be derived from the electronic device if stolen and it is in its first state.
  • Method 625 has an electronic device target that has an operating state and a non-operating state. Typically, the non operating state will be a power off condition, while the operating state will be a normal power on condition.
  • the electronic device has also been manufactured to have its utility controlled and initially set to a first level of utility as shown in block 626. The electronic device moves through the distribution chain until it reaches a point where one of the parties in the distribution chain determines it is appropriate to change the utility of the electronic device. For example, this may be at a point-of-sale when a retailer transfers the electronic device to a consumer, or may be done by a distributor to add or delete particular utilitarian functions.
  • the utility of the electronic device Since the utility of the electronic device has been initially set to the first level of utility, if the electronic device is placed into its operating state, its utility will only be available as the first level of utility. For example, if the electronic device has had its utility fully compromised, then the electronic device may fail to power on, or will have its utility disabled to a point of being functionally useless.
  • the electronic device When the electronic device is in its non operating state, and it is desired to change to a second state of utility, the electronic device is moved proximate to an activating device.
  • This activating device may be, in one example, an activating terminal at a point-of-sale stand, or may be a device at another location.
  • the electronic device receives a query for an accessible ID using a UHF system as shown in block 627.
  • This accessible ID may be stored as a memory value to be read wirelessly by the UHF system, or may be a barcode value to be scanned.
  • the ID is sent back to the activating device as shown in block 629.
  • the activation terminal may cooperate with other local or remote systems to approve changing the target's utility as shown in block 631.
  • the activation terminal may confirm credit card payment, confirm password, confirm membership in an organization, confirm the activation terminal is authorized, or confirm the age of the consumer.
  • the activation terminal sends an authorization key using the UHF system that is received by the target as shown in block 633.
  • the authorization key will be received wirelessly, for example, using an electromagnetic process such as a radio frequency communication.
  • the target which is still in its non operating state, retrieves a restricted access key stored with the target. This restricted access key is not available to be read by an external device, and is in a non-alterable and nonvolatile memory.
  • the restricted access key typically has been stored with the target at the time of manufacturing, and a copy of the authorization key, along with the associate ID was stored for retrieval by the activation device. Accordingly, the logic within the target may retrieve or otherwise use the restricted access key and compare the restricted access key to the authorization key as shown in blocks 636 and 638. If the keys are the same, then the target has determined that the utility of the target should be changed as shown in block 640. The logic then cooperates with a change effecting device to change the state of the change effecting device to a second state as shown in block 642. A second RF system may be used to provide supplemental power for effecting the change to the switch. This change effecting device is coupled to a utility means, which is used to direct the particular utility available to the electronic device. Accordingly, when the electronic device is placed in the operating state as shown in block 644, the electronic device operates according to its second utility as shown in block 646.
  • Electronic device 702 has been manufactured with its principle utility compromised. In this way, as electronic device 702 moves through the distribution chain, it has little or no perceived value to a potential thief or shoplifter. Accordingly, the risk of theft is substantially reduced.
  • the electronic device 702 is constructed to have its utility means enabled through a logic circuit, power circuit, a value stored in memory, or processor operation as shown in block 724.
  • the particular utility means being used has no utility when an electronic connection is grounded as shown in block 722.
  • switch 719 closes, which pulls a reset pin to ground when the printed circuit board trace 717 is shorted to ground.
  • the electronic device 702 has its processor or logic circuit constantly in a state of reset, so that the electronic device has no useful utility. Accordingly, any time the electronic device 702 is turned on when the change effecting device 717 is in its first state, the key functionality or utility of electronic device is compromised.
  • an RF transmitter 704 such as a UHF transmitter, takes an ID value 706 and transmits it to the activation device. It will be appreciated although RF communication is illustrated, other types of wireless communication may be used.
  • the activation device may then cooperate with remote servers, network operating centers, clerks, and the consumer to determine that the target 702 is approved to have its utility restored.
  • the activation terminal has been properly authorized and the interested parties have determined that the electronic device may be restored, then the activation device sends an authorization key, which is received by UHF receiver 708.
  • the UHF receiver 708 passes the received authorization code to logic 715, where the authorization code is compared to a restricted access key 713.
  • the restricted access key 713 was stored in the electronic device during the manufacturing process. Provided the restored restricted access key 713 and the authorization key match, the logic causes the PCB trace to be opened.
  • a power source 711 is used to power the transmitter 704, the receiver 708, logic 715, and the change effecting device 717 when the electronic device is not in its operational condition.
  • This power source may be, for example, a battery, an RF/ EM power converter or may even be a connection to the operational power source 726.
  • the RF receiver 708 acts as a receiver for RF/EM power converter 711. Since this power may not be sufficient in some cases, an additional HF/ VHF receiver 709 is provided, which receives additional RF energy from the activation device. This additional power may be made continuously available, or may be provided at times selected by the activation device. This additional RF energy may be used to supplement power available for opening the PCB trace for the change effecting device 717.
  • Processor 752 may be, for example, a microprocessor, a gate array device, a DSP, or other processor circuit. Although a processor is illustrated, it will be appreciated that other logical and memory devices may be used. Processor 752 has been manufactured with a restricted access key 761. The restricted access key has also been stored in a database and associated with the processor ID value 756. Processor 752 has a change effecting device in the form of a logic value 765. The logic value may not be read externally, and is stored in a nonvolatile and nondestructable way.
  • the logic value is set such that when the logic value is set to a first state, the boot circuit 774 of the processor causes a boot failure.
  • the initially set value may cause the processor to only boot into a restricted mode, so that simple operations may be performed, but full utility is not available.
  • operational power 777 will be a pin or trace receiving power from an external source.
  • the activation circuits are protected from the operational power, and the operational circuits are protected from the activation circuits through an isolation transistor 768.
  • an operational transistor 768 may be properly biased and coupled to the operational power 777, so that the logic value may be read by boot circuit 774 when operational power is applied. In this way, each time processor 752 is powered up, it checks to see what level of utility it should provide.
  • the processor 752 may be sold as a discrete component, or may be installed as a component in a larger device, such as a computer system, camera, or MP3 player. In some cases, it may be useful to have the wireless communication and power circuits external to the processor device itself.
  • the processor or integrated device holding the processor are desired to be activated, the processor uses its UHF transmitter 754 to transmit a processor ID 756 to an activation device.
  • the activation device generates or retrieves an authorization key, which may be the same value as the restricted access key 761.
  • the authorization key is received by UHF receiver 757, which cooperates with logic 763 to set a new logic value into logic value area 765.
  • a power source such as an RF/ EM power converter 759 is provided to power the activation circuitry and to assist in setting the new logic value. Since this power may not be sufficient in some cases, an additional HF/ VHF receiver 709 is provided, which receives additional RF energy from the activation device. This additional power may be made continuously available, or may be provided at times selected by the activation device. This additional RF energy may be used to supplement power available for setting the change effecting device.
  • processor 752 has been illustrated with the UHF transmitter 754, the UHF receiver 757, and the power source 759 integrally arranged in the processor, it will be appreciated that all or some of these structures may be provided external to the processor housing.
  • the transmitter 754, receiver 757, and power source 759 may be positioned on the outside of the processor housing, or positioned on packaging holding the processor.
  • some of the structures may be placed external to the processor on supporting printed circuit boards, for example.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Theoretical Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Computer Security & Cryptography (AREA)
  • Electromagnetism (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Burglar Alarm Systems (AREA)

Abstract

L'invention porte sur un système RFID fournissant des données et de l'énergie et comportant une cible pouvant recevoir des signaux RF sur de multiples fréquences et un scanneur multifréquence correspondant. Le scanneur transmet un message RF à la cible et reçoit en réponse un message de la cible. En fonction d'une application particulière, le scanneur peut utiliser une des fréquences ou les deux pour communiquer avec la cible. Dans certaines applications la cible peut comporter un commutateur actionnable pour conférer à la cible un niveau défini d'utilité. La cible peut recevoir sur l'une des fréquences de l'énergie suffisante ou complémentaire pour modifier l'état du commutateur. En conséquence, le système RFID utilise la deuxième fréquence pour compléter la transmission d'énergie à la cible. Dans d'autres cas, le système RFID peut utiliser la deuxième fréquence pour améliorer la communication de données avec la cible.
PCT/US2007/064155 2007-03-16 2007-03-16 Système rfid fournissant des données et de l'énergie WO2009058122A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2007/064155 WO2009058122A1 (fr) 2007-03-16 2007-03-16 Système rfid fournissant des données et de l'énergie

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2007/064155 WO2009058122A1 (fr) 2007-03-16 2007-03-16 Système rfid fournissant des données et de l'énergie

Publications (1)

Publication Number Publication Date
WO2009058122A1 true WO2009058122A1 (fr) 2009-05-07

Family

ID=40591321

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/064155 WO2009058122A1 (fr) 2007-03-16 2007-03-16 Système rfid fournissant des données et de l'énergie

Country Status (1)

Country Link
WO (1) WO2009058122A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011055738A1 (de) * 2011-11-25 2013-05-29 Infineon Technologies Ag Kommunikationsverfahren zwischen elektronischen Geräten und entsprechende Geräte
EP3196807A1 (fr) * 2016-01-20 2017-07-26 Nxp B.V. Objets intelligents
EP3710851B1 (fr) * 2017-11-17 2023-10-04 Dimeq AS Système et procédé d'encadrement d'une personne

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020194072A1 (en) * 2001-06-14 2002-12-19 Blink Russell P. Multi-function customer satisfaction survey device
US20030183697A1 (en) * 2000-05-11 2003-10-02 Porter Jeffrey Wayne System and method for automated, wireless short range reading and writing of data for interconnected mobile systems, such as reading/writing radio frequency identification (RFID) tags on trains
US20040260470A1 (en) * 2003-06-14 2004-12-23 Rast Rodger H. Conveyance scheduling and logistics system
US20050136972A1 (en) * 2003-12-09 2005-06-23 Smith Derek M. Plug-in network appliance
US20060005035A1 (en) * 2004-06-22 2006-01-05 Coughlin Michael E Keystroke input device for use with an RFID tag and user verification system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030183697A1 (en) * 2000-05-11 2003-10-02 Porter Jeffrey Wayne System and method for automated, wireless short range reading and writing of data for interconnected mobile systems, such as reading/writing radio frequency identification (RFID) tags on trains
US20020194072A1 (en) * 2001-06-14 2002-12-19 Blink Russell P. Multi-function customer satisfaction survey device
US20040260470A1 (en) * 2003-06-14 2004-12-23 Rast Rodger H. Conveyance scheduling and logistics system
US20050136972A1 (en) * 2003-12-09 2005-06-23 Smith Derek M. Plug-in network appliance
US20060005035A1 (en) * 2004-06-22 2006-01-05 Coughlin Michael E Keystroke input device for use with an RFID tag and user verification system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102011055738A1 (de) * 2011-11-25 2013-05-29 Infineon Technologies Ag Kommunikationsverfahren zwischen elektronischen Geräten und entsprechende Geräte
US8977198B2 (en) 2011-11-25 2015-03-10 Infineon Technologies Ag Communication method between electronic appliances, and corresponding appliances
DE102011055738B4 (de) 2011-11-25 2021-10-21 Infineon Technologies Ag Kommunikationsverfahren zwischen elektronischen Geräten und entsprechende Geräte
EP3196807A1 (fr) * 2016-01-20 2017-07-26 Nxp B.V. Objets intelligents
US10083386B2 (en) 2016-01-20 2018-09-25 Nxp B.V. Smart objects
EP3710851B1 (fr) * 2017-11-17 2023-10-04 Dimeq AS Système et procédé d'encadrement d'une personne

Similar Documents

Publication Publication Date Title
US20060100983A1 (en) Method and system for selectively controlling the utility a target
US20070194945A1 (en) Mobile Device for Selectively Activating a Target and Method of Using Same
US20060131432A1 (en) Method and system for identifying a target
US20060192653A1 (en) Device and method for selectively controlling the utility of an integrated circuit device
US7447143B2 (en) RFID security device for optical disc
US7482929B2 (en) Point-of-sale activation of consumer electronics
US20070011033A1 (en) System and process for providing insurance
EP2759975B1 (fr) Système d'étiquette, article pouvant être vendu et procédé permettant de faciliter l'achat d'un article pouvant être vendu
US20070008169A1 (en) A Radio Frequency Activated Integrated Circuit and Method of Disabling the Same
US20080106385A1 (en) Method and system for protecting rfid tags on purchased goods
US20160125380A1 (en) Apparatus and methods for communicating asset information
US20070016462A1 (en) System and process for distributing products
WO2009058122A1 (fr) Système rfid fournissant des données et de l'énergie
WO2004036521A2 (fr) Indication de l'etat de securite de l'equipement d'un consommateur
WO2006089280A2 (fr) Dispositif et procede de commande selective de la fonctionnalite d'un dispositif a circuit integre
WO2008036546A2 (fr) Système, conditionnement et procédé pour distribution de supports
CN101438528A (zh) 用于选择性地控制对象效用的方法、系统及网络
CN101444034A (zh) 用于选择性控制目标效用的设备和方法
EP1817712B1 (fr) Procede et appareil permettant de transferer un support de donnees d'un premier systeme a un second systeme

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07863333

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 07863333

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15/03/10

122 Ep: pct application non-entry in european phase

Ref document number: 07863333

Country of ref document: EP

Kind code of ref document: A1