TWI228683B - Methods and apparatuses for identification - Google Patents

Methods and apparatuses for identification Download PDF

Info

Publication number
TWI228683B
TWI228683B TW91123291A TW91123291A TWI228683B TW I228683 B TWI228683 B TW I228683B TW 91123291 A TW91123291 A TW 91123291A TW 91123291 A TW91123291 A TW 91123291A TW I228683 B TWI228683 B TW I228683B
Authority
TW
Taiwan
Prior art keywords
bits
response
tag
reader
patent application
Prior art date
Application number
TW91123291A
Other languages
Chinese (zh)
Inventor
Curtis L Carrender
John M Price
Frederick A Nylander
John H Rolin
Roger G Stewart
Original Assignee
Alien Technology Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alien Technology Corp filed Critical Alien Technology Corp
Application granted granted Critical
Publication of TWI228683B publication Critical patent/TWI228683B/en

Links

Landscapes

  • Near-Field Transmission Systems (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

An identification system includes a reader and one or more tags. The reader identifies tags such as radio frequency (RF) tags. The system divides a number space into n bins, wherein each bin is associated with m unique bits of the number space, and the number space contains the identification codes of the tags. A command is issued to test v bits of the number space. A response is received from a tag, wherein the response occurs when a first portion of an identification code of the tag matches the v bits of the number space, a timing of the response corresponds to a particular bin and m unique bits associated with the particular bin correspond to a second portion of the identification code.

Description

1228683 ⑴ 玖、發明說明 (發明說明應敘明:發明所屬之技術領域、先前技術、内容、實施方式及圖式簡單說明) 相關申請案交互參考 本申請案係根據2001年10月9日提出申請的共同待審的 美國臨時專利案號06/328,360 ,其名稱為 「Method and Apparatusses for Identification」,其申請曰的好處是可主張35 U.S.C. § 119(e)。 發明領域 本發明係關於辨識領域,並且進一步地關於用以辨識標 籤之方法與裝置。 背景技藝 吾人希望透過由訊問傳輸器傳送編碼並且讓有回應的標 籤傳輸資訊的方式,以訊問數個無線標籤。常見的實現方 式是讓標蕺監聽訊問信息,並且以特有的序號及/或其它 資訊回應。不過,吾人希望能夠擴大無線標籤的範圍,使 得並不需要讓每個標籤都接近用於讀取的閱讀機。當擴大 讀取系統的範圍時,通常會發生兩個問題。其中一個問題 是可用以從該無線標籤進行傳輸的功率有限,因此如果該 範圍非常廣大的話,便很可能會有多個標籤落在該訊問系 統的範圍内,而彼此之間的答訊便會互相破壞。目前射頻 (RF)標籤的實現方式都需要大量的邏輯來解決介面協定及 反碰撞的問題,當數個落在閱讀機範圍内的標籤全都試圖 回答訊問信息時,便會產生該等問題。舉例來說,目前使 用於RF標籤中的積體電路都需要約3,000個邏輯閘負責操縱 介面協定及反碰撞協定。積體電路所需要的大量空間,會 1228683 _ m 發明說明續頁 增加RF標籤的成本,並且因而使得此標籤不適合一般用途 。在美國專利案號5,266,925、5,883,582及6,072,801便敘述著 讀取數個RF標籤時,用以避免碰撞的先前技藝。不過,當 讀取數個RF標籤時,該等先前技藝的方法所提供的避免碰 撞的解決方式的效率並不彰。 發明概要 根據本發明的觀點,提供一種由閱讀機來辨識標籤而實 施的方法,其中該標籤具有一辨識碼。該方法包括,傳輸 資料給該標籤;以及接收至少一個回應以傳輸資料,其中 該回應的時序位置與該標籤之辨識碼的第一部份一致。該 回應包括該標籤之辨識碼的第一部份。 在其它觀點中,則係提供由標籤來實施的方法,其包括 ,從閱讀機接收一第一資料;將該第一資料與該標籤之辨 識碼的第一部份進行關聯處理;以及,如果該第一資料與 該標籤之辨識碼的第一部份匹配的話,傳輸回應給該閱讀 機。與該傳輸相關聯的時序位置會與該標籤之辨識碼的第 一部份一致。傳輸給該閱讀機的回應包括該標籤之辨識碼 的第一部份。 圖式簡單說明 本發明將透過實例加以闡述,不過並不受限於隨附的圖 式中,其中相同的元件符號代表相同的元件。 圖1所示的係一辨識系統,其包括一閱讀機及複數個射 頻(RF)標籤。 圖2A所示的係一與本發明一起使用之RF標籤具體實施例 1228683 _ 發明說明續頁 範例。 圖2Β所示的係一關聯電路,其可使用於根據本發明之RF 標籤的特定具體實施例中。 圖3所示的係一流程圖,其表示的係根據本發明之閱讀 機之示範方法。 圖4所示的係將一標籤群的回應分成η個位元。 圖5所示的係一基本命令架構。 圖6所示的係一標籤(共有80個位元)的捲動式答訊。 圖7所示的係發訊答訊回應週期,閱讀機調變係界定回 應位元。 圖8所示的係標籤3 (表5 )的標籤發訊答訊。 圖9所示的係以二元樹所表示的前三個最小意義位元 (LSB)。 圖10所示的係示範發訊(詢問1)的答訊間隔期間的背向散 射調變。 圖11所示的係針對兩個發訊命令的詢問樹。 圖12所示的係示範發訊(詢問2)的答訊間隔期間的背向散 射調變。 圖13所示的係閱讀機至標籤調變。 圖14所示的係基本循環及時脈時序間隔,以及資料「0」 及資料「1」。 圖15所示的係標籤至閱讀機位元格編碼,以及8位元格 的標籤至閱讀機傳輸(倒置)。 圖16所示的係相同時脈頻率(相差一個位元)之兩個標籤 1228683 _ μ、 發明說明續頁 的競奪,以及時脈頻率相差50%、有一個位元差異之兩個 標籤的競奪。 圖17所示的係無碰撞的反碰撞閱讀機。 圖1 8所示的係有碰撞的反碰撞閱讀機。 圖19所示的係靜音間隔。 圖20Α及20Β所示的係標籤記憶體之記憶體映對具體實施 例。 較佳具體實施例詳細說明 在後面本發明具體實施例之詳細說明中,將參考隨附的 圖示(其中相同的元件符號代表相同的元件),其中係透過 可實現本發明的圖例、特定具體實施例來顯示。該等具體 實施例的說明相當地詳盡,以便讓熟習本技藝的人士可實 行本發明。所以,後面的詳細說明並不作任何限制,同時 ,本發明的範疇僅由隨附的申請專利範圍來界定。 圖1所示的係一辨識系統10的範例,其包括一閱讀機12 ,及複數個標籤18、19及20。該系統通常係一閱讀機優先 交談式的RF ID系統,其使用被動或半被動的主動背向散射 詢答機當作標籤。為促使有更長的讀取範圍,其延伸特徵 是在標籤中併入電池及/或記憶體;然而,使用電池並卻 必須以某種代價來交換,例如巨額成本、有限的壽命、龐 大的形狀、重量增加及壽命結束時的處置條件限制。因此 ,標籤18、19及20可能具有記憶體及/或電池,亦或可能不 具任何該等元件。可以發現到,可能會將不同類型的標籤 混合在一系統中,其中閱讀機可能會訊問含電池的標籤以 1228683 _ 發明說明續頁 及不含電池的標籤。 可供本發明使用的至少有四種標籤:(1)無電源的標籤, 其僅能由標籤的天線取得電源,而該標籤包括一具有該標 籤之辨識碼的唯讀記憶體;(2)無内部電源的標籤,但是, 當由閱讀機提供電力之後,其便能夠將資料寫入該標籤的 非揮發性記憶體中,此類型的標籤亦包括用以儲存辨識碼 的記憶體;(3)具小型電池的標籤,其可提供電力給該標籤 中的電路(此類標籤亦包括非揮發性記憶體及用以儲存該 標籤的辨識碼的記憶體);以及(4)能夠與其它標籤或其它 元件溝通的標籤。 圖1所示的係一閱讀機具體實施例。該閱讀機12通常包 括一接收器14及一傳輸器16,其各都耦合至1/0(輸入/輸出) 控制器21。接收器14可能具有自己的天線14a,而傳輸器16 亦可能具有自己的天線16a。依照本揭露,熟習本技藝的 人士將會發現,在具有接收/傳輸切換器的前提下,傳輸 器16及接收器14便可共用同一根天線,該切換器係控制天 線中的信號,並且將接收器及傳輸器彼此隔離。接收器14 及傳輸器16可能與目前閱讀機中所發現的慣用的接收器及 傳輸器單元相同。在其中一具體實施例中,該接收器及傳 輸器通常都能操作於約900百萬赫茲的頻率範圍中(北美地 區)。 該接收器及傳輸器都會耦合至I/O控制器21,其可控制由 該接收器接收資料以及由該傳輸器16傳輸資料,例如命令 。該I/O控制器會耦合至一匯流排22,其接著便會耦合至微 1228683 _ 發明說明續頁 處理器23及記憶體24。閱讀機12中的元件21、22、23及24 所代表的處理系統可以有各種不同的實現方式。其中一種 實現方式是,該微處理器23係一可程式的微控制器,例如 8051微控制器或其它熟知的微控制器或微處理器(例如 PowerPC微處理器)。其中一種實現方式是,該記憶體24包 括動態隨機存取記憶體,以及用以控制該記憶體操作的記 憶體控制器。該記憶體24可能還包括非揮發性的唯讀記憶 體,用以儲存資料及軟體程式。 該記憶體24通常包含程式,用以控制該微處理器23的操 作;並且包含標籤處理期間及標籤訊問時所使用的資料。 在後面進一步說明的具體實施例中,該記憶體24通常包括 一電腦程式,其可讓該微處理器23透過I/O控制器21傳送搜 尋命令給該傳輸器,並且透過該接收器14及該I/O控制器21 從該等標籤接收回應。該記憶體24可能進一步包括一種如 二元樹般的資料結構(如圖4、9及11所示的二元樹),其中 係因為特殊的搜尋演算法才會產生該樹或其一部份。後面 將進一步地敘述一種特殊的搜尋演算法。閱讀機12可能還 包括一網路介面,例如乙太網路介面,其可讓該閱讀機透 過網路與其它的處理系統溝通。該網路介面通常會耦合至 匯流排22,如此方能接收資料,例如從該微處理器23或從 該記憶體24接收訊問中所辨識的標籤清單。 圖2A所示的係一與本發明一起使用之標籤的實現方式範 例。標籤30包括一耦合至傳輸/接收(TR)切換器33的天線3 1 。此切換器會耦合至接收器及解調變器35,且會耦合至傳 -11 - 1228683 發明說明續頁 (7) 輸器39。關聯器及控制器單元37亦會耦合至該接收器及解 調變器35且會耦合至傳輸器39。圖2A中的標籤特殊實例可 使用於各種具體實施例中,其中在該標籤中會保留記憶體 ,以便保留命令之間的資料;而且其中在該標籤中會對逐 個位元進行關聯處理。此種關聯處理可回應標籤所執行的 命令,用以實行後面所述的「匹配」操作。 該接收器及解調變器35會經由天線3 1及切換器33接收信 號,並且解調變該等信號,以便提供該等信號給關聯器及 控制器單元37。該接收器35所接收到的命令會被遞送至單 元37的控制器中,以便控制該標籤的操作。該接收器35所 接收到的資料會被遞送至該控制器單元37,而且在後面所 述的具體實施例中,此資料可能會與該標籤的辨識碼進行 關聯處理。在該控制器單元37的控制下,傳輸器39會經由 切換器33及天線31傳輸回應或其它資料給該閱讀機。依照 本揭露,熟習本技藝的人士可發現,該傳輸器可能僅是一 切換器或其它元件,其會調變來自天線(例如天線31)的反 射。 圖2B所示的係一可使用於標籤(如圖2 A所示的標籤)中的 關聯系統50具體實施例。該關聯系統會運用一移位暫存器 ,接收指向該標籤記憶體;一暫存器/下行計數器,接收 欲與標籤記憶體比較的位元數量;以及一暫存器,捕捉該 標籤欲比較的位元數值。接著,該標籤便會以一次一個位 元的方式(如同從該閱讀機接收的方式般),將該閱讀機所 接收到的位元數值與標籤辨識記憶體中的位元作比較。如 -12 - (8)1228683 發明說明續頁 果所有位元都匹配的話 如果並非所有位元都匹 閱讀機。 ’那麼該標籤便會回應該閱讀機。 配的話,那麼該標藏便不會回應該 一回到圖2B,序列㈣52係從該閱讀機所接收到的。库列 貝料52會在序列資料控制區塊54中作確認,、、,,Y 、 種命令。當該序列資料控制 :#碼成各 會遞送1訊命令給⑽存器5 = 元時’便1228683 玖 发明, description of the invention (the description of the invention should state: the technical field, prior art, content, implementation, and drawings of the invention are briefly explained) Related applications Cross reference This application is filed on October 9, 2001 The co-pending U.S. provisional patent case number 06 / 328,360, entitled "Method and Apparatusses for Identification", has the benefit of filing an application that can claim 35 USC § 119 (e). FIELD OF THE INVENTION The present invention relates to the field of identification, and further to methods and devices for identifying labels. Background Art I hope to interrogate several wireless tags by transmitting codes through an interrogation transmitter and allowing the responding tags to transmit information. A common implementation is for the tag to listen to the interrogation message and respond with a unique serial number and / or other information. However, I hope to expand the range of wireless tags so that it is not necessary to get each tag close to the reader used for reading. When expanding the range of a reading system, two problems usually occur. One problem is that the power available to transmit from the wireless tag is limited, so if the range is very large, it is likely that multiple tags will fall within the range of the interrogation system, and the answer between each other will be Destroy each other. At present, the implementation of radio frequency (RF) tags require a lot of logic to solve the interface agreement and anti-collision problems. These problems will occur when several tags falling within the range of the reader are trying to answer the interrogation information. For example, the integrated circuits currently used in RF tags each require approximately 3,000 logic gates to handle interface protocols and anti-collision protocols. The large amount of space required by the integrated circuit will be 1228683 _ m Invention Description Continued This adds to the cost of the RF tag and thus makes this tag unsuitable for general use. U.S. Patent Nos. 5,266,925, 5,883,582, and 6,072,801 describe previous techniques for avoiding collisions when reading several RF tags. However, when reading several RF tags, these prior art methods provide inefficient collision avoidance solutions. SUMMARY OF THE INVENTION According to an aspect of the present invention, there is provided a method implemented by a reader to recognize a tag, wherein the tag has an identification code. The method includes transmitting data to the tag; and receiving at least one response to transmit the data, wherein the timing position of the response is consistent with the first part of the tag's identification code. The response includes the first part of the tag's identification code. In other perspectives, a method implemented by a tag is provided, which includes receiving a first piece of data from a reader; associating the first piece of data with the first part of the tag's identification code; and, if If the first data matches the first part of the identification code of the tag, a response is transmitted to the reader. The timing position associated with the transmission will coincide with the first part of the tag's identification code. The response transmitted to the reader includes the first part of the tag's identification code. Brief Description of the Drawings The present invention will be explained by way of example, but it is not limited to the accompanying drawings in which the same element symbols represent the same elements. The identification system shown in FIG. 1 includes a reader and a plurality of radio frequency (RF) tags. A specific embodiment of the RF tag used with the present invention shown in FIG. 2A is 1228683 _ Description of the Invention Continued Example. An associated circuit shown in FIG. 2B can be used in a specific embodiment of an RF tag according to the present invention. Fig. 3 is a flowchart showing an exemplary method of a reader according to the present invention. The system shown in FIG. 4 divides the response of a tag group into n bits. Figure 5 shows a basic command architecture. Figure 6 shows a scrolling answer of a tag (80 bits in total). The response cycle shown in Figure 7 is the response cycle of the reader. The reader modifies the response bit. The tag transmission response of the tag 3 (Table 5) shown in FIG. 8. The system shown in Figure 9 is represented by the first three least significant bits (LSBs) of the binary tree. The backscatter modulation shown in Fig. 10 during the response interval of the exemplary transmission (Query 1). The query tree shown in FIG. 11 is for two signaling commands. The backscatter modulation shown in Fig. 12 during the response interval of the exemplary transmission (Query 2). The reader-to-tag modulation shown in FIG. 13. The system shown in FIG. 14 has a basic cycle and a clock timing interval, and data "0" and data "1". The tag-to-reader bit-grid coding shown in Figure 15 and the 8-bit tag-to-reader transmission (inverted). The two labels shown in FIG. 16 are the same clock frequency (one bit difference) 1228683 _ μ, the contention of the continuation page of the invention description, and two labels with a clock frequency difference of 50% and a bit difference. Scramble. The collision-free anti-collision reader shown in FIG. 17. An anti-collision reader with a collision shown in FIG. 18. The silent interval shown in FIG. 19. A specific embodiment of the memory mapping of the tag memory shown in Figs. 20A and 20B. Detailed description of the preferred embodiments In the following detailed description of the specific embodiments of the present invention, reference will be made to the accompanying drawings (where the same element symbols represent the same elements). Examples to show. The description of these specific embodiments is quite detailed so that those skilled in the art can practice the invention. Therefore, the following detailed description does not make any limitation, and at the same time, the scope of the present invention is only defined by the scope of the accompanying patent application. An example of an identification system 10 shown in FIG. 1 includes a reader 12 and a plurality of tags 18, 19, and 20. This system is usually a reader-first conversational RF ID system that uses a passive or semi-passive active backscatter interrogator as a tag. To facilitate a longer read range, its extended feature is the incorporation of batteries and / or memory into the tag; however, the use of batteries must be exchanged at some price, such as huge costs, limited life, large Shape, weight gain, and disposal conditions at the end of life. As such, tags 18, 19, and 20 may have memory and / or batteries, or may not have any of these components. It can be found that different types of tags may be mixed in a system, where the reader may interrogate tags with batteries as 1228683 _ Description of Continuation Sheet and tags without batteries. There are at least four types of tags that can be used in the present invention: (1) a tag without power, which can only obtain power from the tag's antenna, and the tag includes a read-only memory with an identification code for the tag; (2) A tag without internal power, but when the reader is powered, it can write data into the tag's non-volatile memory. This type of tag also includes memory to store the identification code; (3 ) Tags with a small battery that can provide power to the circuits in the tag (such tags also include non-volatile memory and memory used to store the tag ’s identification code); and (4) can be used with other tags Or other component communication labels. A specific embodiment of the reader shown in FIG. 1. The reader 12 typically includes a receiver 14 and a transmitter 16, each of which is coupled to a 1/0 (input / output) controller 21. The receiver 14 may have its own antenna 14a, and the transmitter 16 may have its own antenna 16a. According to this disclosure, those skilled in the art will find that under the premise of having a receiving / transmitting switch, the transmitter 16 and the receiver 14 can share the same antenna. The switch controls the signals in the antenna and will The receiver and transmitter are isolated from each other. The receiver 14 and transmitter 16 may be the same as the conventional receiver and transmitter unit found in current readers. In one embodiment, the receiver and transmitter are typically capable of operating in a frequency range of approximately 900 megahertz (North American region). Both the receiver and the transmitter are coupled to the I / O controller 21, which can control data received by the receiver and data transmitted by the transmitter 16, such as commands. The I / O controller is coupled to a bus 22, which in turn is coupled to a micro 1228683 _ Description of the Invention Continued page Processor 23 and memory 24. The processing system represented by the elements 21, 22, 23, and 24 in the reader 12 can be implemented in various ways. One way to achieve this is that the microprocessor 23 is a programmable microcontroller, such as an 8051 microcontroller or other well-known microcontroller or microprocessor (such as a PowerPC microprocessor). In one implementation manner, the memory 24 includes a dynamic random access memory and a memory controller for controlling the operation of the memory. The memory 24 may also include non-volatile read-only memory for storing data and software programs. The memory 24 usually contains a program for controlling the operation of the microprocessor 23; and contains data used during tag processing and tag interrogation. In a specific embodiment described further below, the memory 24 generally includes a computer program that allows the microprocessor 23 to transmit search commands to the transmitter through the I / O controller 21, and through the receiver 14 and The I / O controller 21 receives a response from the tags. The memory 24 may further include a binary tree-like data structure (such as the binary tree shown in FIGS. 4, 9 and 11), in which the tree or a part thereof is generated due to a special search algorithm. . A special search algorithm will be further described later. The reader 12 may also include a network interface, such as an Ethernet interface, which allows the reader to communicate with other processing systems via the network. The network interface is typically coupled to the bus 22 so that it can receive data, such as a list of tags identified in the interrogation from the microprocessor 23 or from the memory 24. An example implementation of a tag used with the present invention is shown in FIG. 2A. The tag 30 includes an antenna 3 1 coupled to a transmission / reception (TR) switch 33. This switch is coupled to the receiver and the demodulator 35, and is coupled to the transmitter -11-1228683 Description of the Invention Continued (7) Transmitter 39. The correlator and controller unit 37 is also coupled to the receiver and demodulator 35 and to the transmitter 39. The specific example of the tag in FIG. 2A can be used in various specific embodiments, in which memory is retained in the tag so as to retain data between commands; and in which the association processing is performed bit by bit in the tag. This association process can respond to the command executed by the tag to perform the "match" operation described later. The receiver and demodulator 35 receive signals via the antenna 31 and the switcher 33, and demodulate the signals so as to provide the signals to the correlator and controller unit 37. The command received by the receiver 35 is delivered to the controller of the unit 37 to control the operation of the tag. The data received by the receiver 35 will be delivered to the controller unit 37, and in a specific embodiment described later, this data may be processed in association with the identification code of the tag. Under the control of the controller unit 37, the transmitter 39 transmits a response or other data to the reader via the switch 33 and the antenna 31. According to this disclosure, those skilled in the art may find that the transmitter may only be a switch or other element that modulates the reflection from an antenna (such as antenna 31). The system shown in FIG. 2B is a specific embodiment of an association system 50 that can be used in a tag (such as the tag shown in FIG. 2A). The association system will use a shift register to receive the tag memory; a register / down counter to receive the number of bits to be compared with the tag memory; and a register to capture the tag to be compared The bit value of. The tag then compares the bit value received by the reader with the bits in the tag's identification memory, one bit at a time (as it does from the reader). Such as -12-(8) 1228683 Continued description of the invention If all bits match, if not all bits match the reader. ’Then the tag will respond to the reader. If it is matched, then the label will not respond. Once back to FIG. 2B, the sequence ㈣52 is received from the reader. The library material 52 will be confirmed in the sequence data control block 54 by the ,,,, and Y commands. When the sequence data controls: # 码 成 each will send 1 command to the memory 5 = yuan ’then

存器6〇。記憶體控制器62會在標鐵辨識碼記… 中存取咖暫存請數㈣中所規定的位元數量。對每次 的記憶體存取而言,都會在聰邏輯63中將位於該暫 :器6〇中由該閱讀機所接收到的位元數值與從該記憶體所 瑣出的位兀數值作比較。X0R邏輯63的比較輸出則會被遞 J控制邏輯64。该匹配控制邏輯64會確認在該VAL 暫存器60中由該閱讀機所接收到的v個位元是否匹配儲存 在枯籤辨硪記憶體68中的標籤辨識碼的適當位元。LEn暫 存。° /计數為58内的LEN計數器會持續地遞減,該過程則會 .....'進行直到測5式過所有v個位元為止,此時LEN計數器則 會抵達零值。Register 60. The memory controller 62 will access the number of bits specified in the temporary storage request number in the tag identification code ... For each memory access, the bit value received by the reader in the temporary memory device 60 and the bit value trivial from the memory will be calculated in Satoshi logic 63. Compare. The comparison output of X0R logic 63 is passed to J control logic 64. The matching control logic 64 confirms whether the v bits received by the reader in the VAL register 60 match the appropriate bits of the tag identification code stored in the dead tag identification memory 68. LEn is temporarily stored. ° / The LEN counter with a count of 58 will be continuously decremented, and the process will be ..... 'until all v bits have been measured in Formula 5, and the LEN counter will reach zero.

如果所有v個位元都匹配的話,調變控制7〇便會根據該 標籤辨識碼的下面⑺個最小意義位元(LSB)選擇一回應位元 。調變控制70及傳輸/接收切換器33(圖2A)會對下面z個最 ’J心義位元(2個LSB包括前述的m個LSB)進行調變,並且以 資料72的形式傳輸給該閱讀機。 依…、本揭硌,熟習本技蟄的人士可發現,該閱讀機所傳 -13 - 1228683 _ /ΟΛ 發明說明續頁 送的位元數V係一般性的,並且可能為該標籤辨識碼的至 少一部份。同樣地,m及ζ代表的是一般的位元數。在後面 章節所實施的具體實施例中m二3而z=8,不過本發明並不受 限於此。同樣地,如後面的實例所述,ζ個位元可包括m個 位元,不過本發明並不受限於此。在另一具體實施例中, 經過調變且傳送給該閱讀機的ζ個位元可跟隨在用以選擇 該回應位元的m個位元後面。 在本發明的其中一具體實施例中,可經由射流自組裝的 製程製造標籤。舉例來說,可利用半導體晶圓中複數個其 它的積體電路來製造積體電路。必要時,除了天線31 (圖2A) 之外,該積體電路可包括一特殊R F標籤所有必要的邏輯。 因此,標籤30(圖2A)中所有的邏輯都可能内含於單一的積 體電路中,並且利用單一半導體晶圓中相同的積體電路來 製造。每個電路都可以一特有的辨識碼進行程式化,然後 對該晶圓進行處理,從該晶圓中移除每個積體電路以製造 懸浮於液體中的區塊。接著便可將該液體分散於基板(例 如彈性的基板)中,亦製造分離的RF標籤。該基板中的接 收區則會容納至少一積體電路,接著其便能夠與該基板中 的天線相連接形成一 RF標籤。在美國專利案號5,545,291中 便敘述一種射流自組裝的實例。在其它的具體實施例中, 封裝成RF標籤之後,便可利用RF能量或與該積體電路直 接接觸將該辨識碼及其它的資料程式設計於該積體電路 中 。 圖3所示的係根據本發明用以操作閱讀機的方法實例 1228683 發明說明續頁 (10) 方法101起始於操作103中,其中該閱讀機會判斷開放頻道 的可用性。在其中一具體實施例中,該閱讀機會監聽某段 期間中是否沒有標籤背向散射調變,如果沒有此類背向散 射調變的話,便可使用該頻道。在另一具體實施例中,該 閱讀機會監聽是否沒有來自其它閱讀機的傳輸信號,以判 斷該頻道是否可用。此時,該閱讀機便可能會試圖獲取任 何的標籤。舉例來說,其可能會廣播一信號來判斷是否有 任何的標籤存在。如果沒有標籤存在的話,該閱讀機便會 靜止不動,並且稍後重新開始進行操作103。相反地,如 果有標籤存在的話,那麼在操作105中,該閱讀機便會實 施一任選測試以選擇應該讀取哪些標籤(如果存在的話)。 舉例來說,該閱讀機可能會以不同的功率位準廣播一測試 碼,此項測試的結果是,無法成功接收到完整且合法的測 試碼的標籤便不會出聲。在操作107中則可對該任選測試 碼結果會出聲的標籤進行搜尋。 或者,可單獨或配合前述的測試碼方法,使用其它確認 閱讀機及標籤之間通信鏈路之完整性的方法。舉例來說, 該閱讀機在傳輸給該標籤(或該等標籤)時可能包括錯誤檢 查資訊,例如同位位元或循環冗餘檢查(CRC)位元。在該 等情形中,該標籤會評估該錯誤檢查資訊的完整性,以促 成後續的回應。所以,無法成功通過錯誤檢查測試的標籤 便不會破壞來自其它標籤的合法回應。 一般來說,可從該閱讀機接收命令(搜尋命令)以搜尋該 標籤的身分,當產生匹配時,則可以該閱讀機所規定的方 1228683 發明說明續頁 (Π) 式回應該等搜尋命令。該閱讀機所傳送的命令順序通常會 指定欲比較的一部份標籤記憶體給該閱讀機所傳送的資料 。在本發明的典型具體實施例中,通常只有標籤中的資料 匹配方能讓該標籤回應搜尋命令。當標籤中產生資料匹配 時,則會以該閱讀機的命令順序,由傳送給該標籤的協定 及參數來界定該特定的標籤回應。 一般來說,該閱讀機會經由一連串的閱讀機命令及標籤 回應確認出一特有的標籤。當在標籤中找到一特殊的辨識 碼之後,該閱讀機便可視情況來證實該辨識碼。此項證實 操作包含在該閱讀機中對該辨識碼實施檢查和,然後將該 檢查和傳輸給該標籤,並且讓該標籤實施相同的檢查和操 作,並且證實其達到相同的檢查和。當該標籤並未達到相 同的檢查和時便會產生一錯誤信號,讓該標籤本身保持靜 音同時不作回應,讓該閱讀機從其經過辨識的標籤清單中 移除該標籤的辨識碼。或者可使用其它證實該碼的方法。 操作111包含實施額外的操作,例如從該等標籤讀取其它 資料或將資料寫入該等標籤等。本發明所提供的辨識系統 能夠在閱讀機的領域中辨識單一個標籤。反碰撞功能則係 用以管理在該閱讀機領域中讀取數個標籤。該系統可管理 因為RF干擾及邊界標籤所產生的錯誤。利用各標籤種類的 讀寫系統便能夠保持相容性。 通信層 協定概要 系統通信可遵循兩段式的命令答訊型態,其中係由該閱 1228683 (12) 發明說明續頁 讀機啟動異動(閱讀機優先交談,RTF)。在第一階段中, 該閱讀機會利用連續波(CW)射頻(RF)能量提供電力給一個 或多個被動或半被動的標籤。標籤開啟之後會處於「清醒 (Awake)」狀態中,準備處理命令。該閱讀機會利用下面所 述的閱讀機至標籤編碼技術,以調幅的方式傳輸資訊給標 籤的領域。完成傳輸之後,該閱讀機便會停止調變,並且 在答訊階段期間繼續傳輸CW RF能量以提供電力給該等標 籤。在此期間,標籤會配合圖15及圖16以下面所述的位元 編碼方式,透過電感式耦合或背向散射調變(取決於該閱 讀機中的傳輸器所採用的頻率)的方式與該閱讀機進行溝 通。 基本命令格式 「基本命令格式」係可調整的,並且可與前述的至少四 種標籤一起使用。在其中一具體實施例中,每個低價值(VLC) 、單晶片的標籤都具有有限的振盪器穩定度。在基本命令 格式中,該閱讀機可提供一系列的脈衝用以在開始進行每 個傳輸時同步化該標籤的内部振盪器。來自該等標籤的答 訊經過建構之後,只要在該標籤能夠提供的時脈頻率中, 該閱讀機便能夠解譯該等標籤所傳輸的資訊。在至少八十 (80)個位元的異動期間,該等閱讀機能夠適應基本調變率 差異及調變率中的單調漂移。 在其中一具體實施例中,基本命令可設計成用以限制該 等標籤於異動間必須儲存的狀態資訊數量。被動標籤可用 的功率係由所傳輸的功率、標籤/閱讀機天線方向、區域 1228683 發明說明續頁 (13) 環境及外部干擾源等所構成的複雜函數。因此,該RF電場 的邊界或邊緣中的標籤的電力可能會不穩定,因而無法利 用該閱讀機記憶前面的異動。因此,基本命令格式可配置 成以該等標籤利用「極細微的」異動。也就是,每個命令 中必須含有足夠的資訊,讓標籤不必參考前面的異動便可 作出正確的回應。If all v bits match, the modulation control 70 will select a response bit according to the least significant bit (LSB) below the tag identification code. The modulation control 70 and the transmitting / receiving switch 33 (FIG. 2A) will modulate the z most significant J bits below (the two LSBs include the aforementioned m LSBs) and transmit them to the data 72 The reader. According to this disclosure, those who are familiar with this technology can find that the number of bits V sent by the reader is -13-1228683 _ / ΟΛ Description of the continuation page is general and may be the tag identification code At least part of it. Similarly, m and ζ represent the general number of bits. In the specific embodiments implemented in the following sections, m = 3 and z = 8, but the present invention is not limited to this. Similarly, as described in the following examples, the z bits may include m bits, but the present invention is not limited thereto. In another specific embodiment, the z bits that are modulated and transmitted to the reader may follow m bits that are used to select the response bit. In one embodiment of the present invention, the label can be manufactured through a process of jet self-assembly. For example, a plurality of other integrated circuits in a semiconductor wafer may be used to manufacture the integrated circuits. If necessary, in addition to the antenna 31 (FIG. 2A), the integrated circuit may include all necessary logic for a special RF tag. Therefore, all the logic in the tag 30 (Fig. 2A) may be contained in a single integrated circuit and manufactured using the same integrated circuit in a single semiconductor wafer. Each circuit can be programmed with a unique identification code, then the wafer is processed, and each integrated circuit is removed from the wafer to make a block suspended in a liquid. This liquid can then be dispersed in a substrate, such as a flexible substrate, and a separate RF tag can also be manufactured. The receiving area in the substrate will contain at least one integrated circuit, and then it can be connected to the antenna in the substrate to form an RF tag. An example of jet self-assembly is described in U.S. Patent No. 5,545,291. In other specific embodiments, after packaging into an RF tag, the identification code and other data can be programmed into the integrated circuit using RF energy or direct contact with the integrated circuit. An example of a method for operating a reader according to the present invention shown in FIG. 3 is 1228683 Description of the invention continued (10) Method 101 starts in operation 103, where the reading opportunity determines the availability of an open channel. In one specific embodiment, the reader monitors whether there is no tag backscatter modulation during a certain period of time. If there is no such backscatter modulation, the channel can be used. In another specific embodiment, the reader monitors whether there are no transmission signals from other readers to determine whether the channel is available. At this point, the reader may attempt to obtain any tags. For example, it may broadcast a signal to determine if any tags are present. If no tag is present, the reader will stand still and resume operation 103 at a later time. Conversely, if tags are present, then in operation 105, the reader performs an optional test to select which tags, if any, should be read. For example, the reader may broadcast a test code at different power levels. As a result of this test, a tag that fails to receive a complete and valid test code will not sound. In operation 107, the tag whose audible test code result is audible may be searched. Alternatively, other methods of confirming the integrity of the communication link between the reader and the tag may be used alone or in conjunction with the aforementioned test code method. For example, the reader may include error checking information when transmitting to the tag (or tags), such as parity bits or cyclic redundancy check (CRC) bits. In such cases, the tag evaluates the integrity of the error check information to facilitate subsequent responses. Therefore, tags that fail the error checking test will not break legitimate responses from other tags. Generally, a command (search command) can be received from the reader to search for the identity of the tag. When a match is generated, the reader can respond to these search commands in the way specified by the reader. . The order of the commands sent by the reader usually specifies a part of the tag memory to be compared to the data sent by the reader. In a typical embodiment of the present invention, usually only a data match in a tag can cause the tag to respond to a search command. When a data match is generated in the tag, the specific tag response is defined by the protocol and parameters sent to the tag in the order of the reader's command. Generally, the reader recognizes a unique tag through a series of reader commands and tag responses. When a special identification code is found in the tag, the reader can verify the identification code as appropriate. This verification operation involves performing a checksum of the identification code in the reader, and then transmitting the checksum to the tag, and having the tag perform the same check and operation, and verifying that it reaches the same checksum. When the tag does not reach the same checksum, an error signal is generated, keeping the tag itself silent and not responding, and allowing the reader to remove the tag's identification code from its list of recognized tags. Alternatively, other methods of verifying the code can be used. Operation 111 includes performing additional operations, such as reading other data from the tags or writing data to the tags. The identification system provided by the present invention can identify a single tag in the field of a reader. The anti-collision function is used to manage the reading of several tags in this reader field. The system manages errors due to RF interference and boundary tags. Compatibility can be maintained using a read / write system for each tag type. Communication layer Protocol overview System communication can follow a two-stage command answering mode, which is based on this 1228683 (12) Invention Description Continued The reader initiates a change (reader priority conversation, RTF). In the first phase, the reader uses continuous wave (CW) radio frequency (RF) energy to provide power to one or more passive or semi-passive tags. After the tag is opened, it will be in "Awake" state, ready to process commands. This reader uses the reader-to-tag encoding technology described below to transmit information to the field of the tag in an amplitude modulated manner. After the transmission is complete, the reader stops modulating and continues to transmit CW RF energy to provide power to the tags during the answer phase. During this period, the tag will cooperate with the bit-coding methods described below in Figures 15 and 16 through inductive coupling or backscatter modulation (depending on the frequency used by the transmitter in the reader). The reader communicates. Basic Command Format The Basic Command Format is adjustable and can be used with at least four of the aforementioned tags. In one embodiment, each low-value (VLC), single-chip tag has limited oscillator stability. In the basic command format, the reader provides a series of pulses to synchronize the tag's internal oscillator at the beginning of each transmission. After the answer from the tags is constructed, the reader can interpret the information transmitted by the tags as long as it is in the clock frequency that the tags can provide. During a change of at least eighty (80) bits, these readers are able to adapt to basic modulation rate differences and monotonic drift in the modulation rate. In one embodiment, the basic command may be designed to limit the amount of state information that the tags must store between transactions. The power available for passive tags is a complex function consisting of transmitted power, tag / reader antenna orientation, and area 1228683 Description of the Invention Continued (13) Environment and external interference sources. Therefore, the power of the tag in the boundary or edge of the RF electric field may be unstable, so that the reader cannot use the previous movement to memorize. Therefore, the basic command format can be configured to take advantage of "minimal" changes with these tags. That is, each command must contain enough information for the label to respond correctly without having to refer to previous changes.

該等命令可用以「閱讀」該標籤的位址或辨識碼。位址 及辨識碼可以交換使用的方式參照特有的標籤,其意味著 ,兩者可毫無限制地互相取代。可根據本發明所需要的實 現方式增加或減少該標籤位址中的位元數量。本發明並不 受限於該所選擇的標籤位址的位元數量。在其中一具體實 施例中,可使用64位元的位址數量。在另一具體實施例中 ,則可能希望使用96位元的位址數量。因此,本發明並無 限制。 基本命令These orders can be used to "read" the address or identifier of the tag. Addresses and identifiers can be used interchangeably with reference to unique labels, which means that the two can be replaced with each other without restriction. The number of bits in the tag address can be increased or decreased according to the implementation required by the present invention. The invention is not limited to the number of bits of the selected tag address. In one embodiment, the number of 64-bit addresses can be used. In another embodiment, it may be desirable to use a 96-bit address number. Therefore, the present invention is not limited. Basic commands

在其中一具體實施例中,此處簡述及後面會詳述的四個 基本命令可用以讀取該標籤的位址數值。在本發明的一具 體實施例中,如下面所述,該位址數值係由64個位元所構 成的。 捲動一與該閱讀機所傳送的資料匹配的標籤會藉由回傳 全部的位址(先傳LSB)外加十六(16)個位元的循環冗餘檢查 (CRC)作為錯誤檢查進行答訊。該閱讀機所傳送的資料可 能是可變的長度。在替代的具體實施例中,該捲動命令可 能包括一附加在其後面的額外命令(例如睡眠命令)。當完 -18 - 1228683 發明說明續頁 (14) 成該捲動命令所喚起的捲動操作之後,便可執行此附加的 命令。 睡眠一與該閱讀機所傳送的資料匹配的標籤會進入不對 閱讀機命令作任何回應的狀態中。只要該標籤維持著電力 ,便可保持此「狀態」。標籤開啟之後會處於内定的「清 醒」狀態中,以回應該閱讀機。該閱讀機所傳送的資料可 能是可變的長度。In one embodiment, the four basic commands briefly described here and detailed later can be used to read the address value of the tag. In a specific embodiment of the present invention, as described below, the address value is composed of 64 bits. Scrolling a tag that matches the data sent by the reader will answer the error by returning the full address (LSB first) plus sixteen (16) cyclic redundancy checks (CRC). News. The data transmitted by this reader may be of variable length. In alternative embodiments, the scroll command may include an additional command (e.g., a sleep command) appended thereto. This additional command can be executed after the completion of -18-1228683 Invention Description Continued (14) The scroll operation evoked by the scroll command is completed. After sleeping, a tag matching the data transmitted by the reader will enter a state where it does not respond to any commands from the reader. This "state" can be maintained as long as the tag maintains power. After the tag is opened, it will be in the default "wake" state in response to the reader. The data transmitted by this reader may be of variable length.

銷毀一與該閱讀機所傳送的整個64位元位址、16位元CRC 及一特殊的破壞碼匹配的標籤將會被永久地關閉,而不再 對閱讀機的查詢作任何回應。在其中一具體實施例中,該 「破壞」命令可讓該標籤永遠地不作用。在其中一具體實 施例中,該銷毀命令可能會要求該閱讀機提供較強的電場 強度,因此是一短範圍(例如閱讀機至標籤的距離為30公 分(cm))的操作。其它的具體實施例則可能允許較長的或較 短的位址,不同的CRC或其它錯誤檢查編碼,以及結合不 同的破壞碼。破壞碼可作用的距離會隨著所需要的範圍而 改變。 發訊一該命令係下面將詳述的多重標籤反碰撞演算法的 一部份。與該閱讀機所傳送的資料匹配的標籤會回應於由 該閱讀機所傳送的時脈標記所界定的η個時間位元中的其 中一個。由閱讀機所指定的位置開始的該標籤位址的m個 最小意義位元(LSB)會決定該回應位元。在其中一具體實施 例中,該回應本身會傳輸該η個時間位元中其中一個之中 的八位元的資訊。其它的具體實施例則可用以改變時間位 -19 - 1228683 發明說明續頁 (15) 元的數量及/或用以決定該標籤可回應的時間位元的位元 數量或位置。在其它的具體實施例中,可改變該回應中所 傳輸的該標籤辨識碼的位元數量。在闡述本文所述的實例 時,該標籤在回應時會傳送八個位元的資訊,但其並非一 項限制。 該閱讀機所產生的用以界定該等η個時間位元的時脈標 記長度可能很短亦可能很長,其係取決於本發明的特殊實 現方式。一般來說,時脈長度必須足以容納該接收器的設 定時間或是該標籤振盪器的漂移。 根據本發明不同的實現方法,該發訊命令可以彈性地運 用。圖4所示的係η個時間位元與該標籤位址的m個最小意 義位元之間的關係圖。參考圖4,二元樹400包含列402,其 含有兩個位元404及406。在位元404中的數值為m=0,其代 表的是回應於與位元404相當的時間位元中的標籤的最小 意義位元(LSB)。同樣地,數值m=l代表的是回應於與位元406 相當的時間位元中的標籤的LSB。 在第二列410中則包含四個時間位元412、414、416及418 ,其包含分別回應於與412、414、416及418相當的時間位 元中的標籤位址的兩個LSB。在第三列30中則包含八個位 元 432、434、436、438、440、442、444 及 446,其包含分別 回應於與其相當的時間位元中的標籤位址的三個LSB。當 列編號增加至450、470及480時,位元的數量則會分別成長 至n=l6、n=32及n=64,而該標籤位址中已知的LSB的最大數 量亦會增加。其結果是,隨著列編號η的增加,則會有少 -20- 1228683 發明說明續頁 (16) 量的標籤回應於一位元中。 程式化命令 在基本命令格式之後的便是在製造時用以將資訊程式化 至該等標籤中的命令。在其中一具體實施例中,有下面所 述的四個程式化命令可用以程式化該等標籤。 刪除一刪除命令會將該標籤的所有位元值都設為「0」。 此命令會集體刪除整個記憶體陣列。一般來說,刪除操作 係在用以對記憶體進行初始清除的程式命令之前便會進行 。刪除命令並不會對已經被鎖定(參考鎖定命令)的標籤產 生作用。 程式設計一程式設計命令會伴隨著記憶體位址資訊及欲 程式設計至該標籤中的資料。為節省時間,通常會同時程 式設計數個位元(例如16個)。各種記憶體架構都會規定欲 進行程式設計的資料長度,以達到最佳的效率。程式設計 循環之前可能是刪除循環,以確保所有的資料都能程式設 計至正確的狀態。只有以前未被鎖定的標籤方能進行程式 設計。 驗證一驗證命令可如同程式設計循環的一部份般,用以 檢查記憶體的内容,讓程式設計元件可驗證所有的標籤記 憶體都已經正確地程式設計。驗證命令可能是在程式設計 或刪除命令之後才執行。該命令會定址該記憶體的所有位 元,並且將其内容傳輸給程式設計員。驗證命令並不會對 已經被鎖定的標籤產生作用。 鎖定--旦執行鎖定命令之後,以後便無法再使用刪除 1228683 (17) 發明說明續頁 、程式設計及驗證命令,而且該命令通常是在已經成功地 程式設計標籤記憶體之後才會執,于。執行鎖定命令便可讓 所有的程式化命令都無法操作。 基本命令欄 位元數 ——--- ___ 攔位說明 ~ ----—---- [SPINUP] 20 每個基本命令前面都會有_系列彳共標籤時序使用的邏 輯〇。該標籤的同步電路會利用這部份的信息建立其電 路板中的時序,以便讀取/解碼信息及提供時脈用以答 訊該閱讀機。 [SOF] 1 開始框指示符號。邏輯1。 [CMD] 8 S位元的襴位,用以規定欲傳送給該等標籤的命令。(參 看下面的命令資料表)8個位元可提供高達256個命令。 其中四個係供翻I的賴使用,其餘陳址空間則保 留供進階的、等級π及更高的標籤使用。 [PJ 1 [(JMDj攔位資料的奇數同位元。 [PTR] 7 /1雜兀-該標籤位址中的位置指標。其值係由lsb開 始並且向上計算。[PTR]係試圖與[VALUE]欄位中所規 定的資料產生匹配的標籤的開始指桿。 [P2] 1 [PTR]攔位貧料的奇數同位元。 [LEN] 7 7個位元一等於欲在[VALUE]攔位中傳送的資料長度。 [P3] 1 [LEN]欄位貧料的奇數同位元。 [VALUE] 可變的 (1-96) 對於等級1的標蕺來說,有1至96個資料位元。進行發訊 、捲動、睡眠或銷毀命令時’其便是該標籤試圖與其 位址產生匹配的資料。(LSB優先) [P4] 1 [VALUE]欄位資料的奇數同位开。 [P5] [EOF] 1 所有同位元襴位的奇數同位元。 — --—---- - A 1 4-丄一 »^ . 一 … __ -~- - _____ 1 、、、口束訊框4日不付號。邏輯1。 表1基本命令欄說明。 -22- 1228683 (18) 發明說明績頁 閱讀機命令結構一(閱讀機至標籤的通信) 閱讀機至標籤的基本命令格式係由七個欄位及五個同位 元資訊所構成的。圖5所示的便係基本命令結構。參考圖5 ,其中一具體實施例的基本命令襴位已經表列及定義於上 面的表1中。其它的具體實施例則可能會改變該等欄位的 長度及編碼方式,及/或同位元類型,以便達到資料的大 小或添加額外的命令。 本發明其中一具體實施例的基本命令位元圖樣已經表列 於表2中。表2中圖時顯示出該等標籤於回應該等基本命令 之後所產生的答訊。 基本命令[CMD] 8位元圖樣 MSB<-LSB 標籤的答訊 (請參閱下列的回應間隔) 捲動 0000 0001 「捲動答訊」 睡眠 0000 0010 銷毀 0000 0100 無 發訊 0000 1000 「發訊答訊」 後半段保留供程式化及等級 III-IV的命令使用(四個位元) 氺氺氺氺 表2基本命令位元圖樣及標籤答訊。 程式化命令[CMD] 8位元圖樣 MSB<-LSB 備註 程式設計 0011 0001 刪除 0011 0010 鎖定 0011 0100 驗證 0011 1000 表3程式化命令位元圖樣。 1228683 (19) __ 發明說明續頁 1------- —_____ 回應間隔(標籤至閱讀機的通信) 在其中一具體實施例中,只有揭^ 起標籤產生回應的基本命令。在該2 =發訊命令是能夠引 讀機在[VALUE]襴位中所傳送的資等°P令作用下,如果閱 規定的位置開始的標籤内部位址而"匹配攸[PTR]攔位中所 估結果皆正確的話,標籤便會進所有同位元襴位的評 義位元(LSB)循著位元意義朝上進7回應。資料會從最小意 兩種方式中任一種進行回應:(1 ^較。匹配的標籤可以 笈〜 捲動答訊」或(2)「發訊 。成」。未匹配的標籤則不會進 邙八A ] 5周,菱。雖然對捲動及發 A命令來說,用以判斷標籤是否 相a 馬、该回應命令的條件完全 同’但是該標籤所發出的回應圖 、+、 化圖樣亚不相同。其差異簡 下。亦可使用其它的具體實施例改變已經程式設計至 二襟籤記憶體中的位元順序,從而改變從lSB搜尋至最大 、義位元(MSB)及從MSB搜寻至LSB的順序。在本發明的教 義中可能會有許多種資料表示方式。 捲動答訊 回應捲動命令的標籤係藉由傳輸其全部64個位元的位址 外加16個位元的crc(總共八十(80)個位元)給該閱讀機以進 行答訊,其使用的係下面配合圖I5及16所述的調變方法。 如圖6所示,在其中一具體實施例中’標籤係從LSB開始調 變至MSB,其中位元5〇2相當於該標籤位址的LSB,而位元5〇4 則相當於該標籤位址的MSB。 依照該閱讀機,可利用下面三個標籤的實例來闡述捲動 命令。如果該閱讀機發出具有下面貧料的命令的話: -24- 1228683 發明說明續頁 (20) [CMD]二〇〇〇〇〇〇〇1 (捲動); [PTR]=000011 1 (7); [LEN]=0001001 (9); [VALUE]=000101101。 標籤會試圖將其由位置七開始的位址資料中的九個位元 與數值欄位中所規定的資料進行比較,從LSB開始循著位 元意義向上比較。Destroying a tag that matches the entire 64-bit address, 16-bit CRC, and a special destruction code transmitted by the reader will be permanently closed without any further response to the reader's query. In one embodiment, the "destroy" command makes the tag inactive forever. In one of the specific embodiments, the destruction command may require the reader to provide a strong electric field strength, so it is a short-range operation (for example, the distance between the reader and the tag is 30 cm (cm)). Other embodiments may allow longer or shorter addresses, different CRC or other error checking codes, and a combination of different corrupted codes. The distance that the tamper code can operate will change with the required range. Send a message-This command is part of the multi-label anti-collision algorithm described in detail below. A tag matching the data transmitted by the reader will respond to one of the n time bits defined by the clock mark transmitted by the reader. The m least significant bits (LSBs) of the tag address starting from the position specified by the reader determine the response bit. In one embodiment, the response itself transmits eight bits of information among one of the n time bits. Other specific embodiments can be used to change the time bits. -19-1228683 INTRODUCTION TO THE CONTINUATION (15) The number of bits and / or the number or position of bits used to determine the time bits that the tag can respond to. In other specific embodiments, the number of bits of the tag identification code transmitted in the response may be changed. In explaining the example described in this article, the tag transmits eight bits of information in response, but it is not a limitation. The length of the clock marks generated by the reader to define the n time bits may be short or long, depending on the particular implementation of the present invention. In general, the clock length must be sufficient to accommodate the receiver's set time or the tag's oscillator drift. According to different implementation methods of the present invention, the signaling command can be flexibly used. Figure 4 shows the relationship between n time bits and m least significant bits of the tag address. Referring to FIG. 4, a binary tree 400 includes a column 402, which contains two bits 404 and 406. The value in bit 404 is m = 0, which represents the least significant bit (LSB) in response to a tag in a time bit equivalent to bit 404. Similarly, the value m = 1 represents the LSB of the tag in response to the time bit corresponding to bit 406. In the second column 410, there are four time bits 412, 414, 416, and 418, which include two LSBs that respond to tag addresses in time bits equivalent to 412, 414, 416, and 418, respectively. The third column 30 contains eight bits 432, 434, 436, 438, 440, 442, 444, and 446, which contain three LSBs corresponding to the tag address in the corresponding time bits, respectively. When the column number is increased to 450, 470, and 480, the number of bits will grow to n = 16, n = 32, and n = 64, respectively, and the maximum number of known LSBs in the tag address will also increase. As a result, as the column number η increases, there will be fewer -20-1228683 invention description continued pages (16). The number of tags responds to one bit. Stylized commands Following the basic command format are the commands used to program information into those labels at the time of manufacture. In one embodiment, there are four stylized commands described below that can be used to stylize the tags. The delete-delete command sets all bit values of the tag to "0". This command collectively deletes the entire memory array. Generally, the delete operation is performed before the program command used to initially clear the memory. The delete command has no effect on a label that has been locked (refer to the lock command). Programming-A programming command is accompanied by memory address information and data to be programmed into the tag. To save time, several bits (such as 16) are usually programmed simultaneously. Various memory architectures specify the length of data to be programmed for optimal efficiency. The programming cycle may be deleted before the cycle to ensure that all data can be programmed to the correct state. Only previously unlocked tags can be programmed. The verify-verify command can be used as part of the programming loop to check the contents of the memory, so that the programming element can verify that all tag memories have been programmed correctly. The verification command may be executed after programming or deleting the command. This command addresses all bits of the memory and transfers their contents to the programmer. The verify command has no effect on tags that are already locked. Lock-Once the lock command is executed, it can no longer be used after deletion . Executing the lock command makes all stylized commands inoperable. Number of basic command fields ------------ ___ Block description ~ ------------ [SPINUP] 20 Each basic command will be preceded by a logic of _ series and common label timing. The tag's synchronization circuit will use this part of the information to establish the timing in its circuit board in order to read / decode the information and provide the clock to answer the reader. [SOF] 1 Start box indicator. Logic 1. [CMD] An 8-bit nibble that specifies the order to be transmitted to these tags. (See the command data table below) 8 bits can provide up to 256 commands. Four of them are used by Lai I, while the rest of the site space is reserved for advanced labels of grade π and higher. [PJ 1 [(JMDj parity of odd parity data. [PTR] 7/1 Miscellaneous-Position indicator in the tag address. Its value starts from lsb and is calculated upwards. [PTR] is an attempt to compare with [VALUE The information specified in the] field generates the starting finger of the matching tag. [P2] 1 [PTR] Blocks the odd parity of the material. [LEN] 7 7 bits equal to the position to be blocked in [VALUE] The length of the data transmitted in the [P3] 1 [LEN] field is odd odd parity. [VALUE] Variable (1-96) For level 1 targets, there are 1 to 96 data bits When sending, scrolling, sleeping, or destroying an order, it is the data that the tag is trying to match with its address. (LSB first) [P4] 1 [VALUE] The odd number of data in the field is in the same position. [P5] [EOF] 1 Odd parity of all parity units. — --——-----A 1 4- 丄 一 »^. One ... __-~--_____ 1, 4 Do not pay. Logic 1. Table 1 Description of the basic command bar. -22- 1228683 (18) Description of the invention. Page reader command structure 1 (reader-to-tag communication) The basic command format from reader to tag is It consists of seven fields and five parity information. The basic command structure shown in Figure 5 is shown in Figure 5. Referring to Figure 5, the basic command bit of a specific embodiment has been listed and defined in Table 1 above. Other specific embodiments may change the length and encoding method of these fields, and / or the type of parity, in order to reach the size of the data or add additional commands. The basic command bits of a specific embodiment of the present invention The pattern has been listed in Table 2. The graph in Table 2 shows the response generated by the labels after responding to the basic commands. Basic Command [CMD] 8-bit pattern MSB < -LSB label response ( Please refer to the response interval below) Scroll 0000 0001 "Scroll answer" Sleep 0000 0010 Destroy 0000 0100 No message 0000 1000 "Message answer" The second half is reserved for stylized and level III-IV commands (4 (Units) 氺 氺 氺 氺 Table 2 Basic command bit pattern and label answer. Stylized command [CMD] 8-bit pattern MSB < -LSB Remarks Programming 0011 0001 Delete 0011 0010 Lock 0011 0100 Verify 0011 1000 Table 3 stylized command bit pattern. 1228683 (19) __ Description of the invention continued on 1 ------- --_____ Response interval (tag-to-reader communication) In one embodiment, only Uncover the basic commands that generate a tag response. Under this 2 = sending command is able to read the information transmitted by the reader in the [VALUE] position. ° P order, if you read the internal address of the tag starting at the specified position and " match the [PTR] block If the estimated result in the bit is correct, the label will enter all the parity bit (LSB) of the niche bit, and follow the bit meaning upwards7. The data will be responded in one of two ways: (1 ^ Compare. Matching tags can be 卷 ~ scrolled answer "or (2)" Send message. Success ". Unmatched tags are not entered Eight A] 5 weeks, Ling. Although scrolling and issuing order A, it is used to determine whether the tag is a horse, and the conditions of the response command are exactly the same. Not the same. The difference is simplified. Other specific embodiments can also be used to change the bit order that has been programmed into the two-patch memory, thereby changing the search from lSB to the maximum, sense bit (MSB) and search from MSB Sequence to LSB. There may be many ways of data representation in the teachings of the present invention. Scrolling Answer The tag responding to the scrolling command is by transmitting its full 64-bit address plus 16-bit crc (A total of eighty (80) bits) is provided to the reader for answering, and it uses the modulation method described below in conjunction with FIGS. I5 and 16. As shown in FIG. 6, in one of the specific embodiments 'Tags are modulated from LSB to MSB, where the bit is 502 phase At the LSB of the tag address, bit 504 is equivalent to the MSB of the tag address. According to the reader, the following three examples of tags can be used to illustrate the scroll command. If the reader issues the following Lean words: -24-1228683 Description of the invention continued (20) [CMD] 200000001 (Scrolling); [PTR] = 000011 1 (7); [LEN] = 0001001 ( 9); [VALUE] = 000101101. The tag will try to compare the nine bits in its address data starting from position seven with the data specified in the value field, starting from the LSB and comparing upwards in bit meaning .

在下面的表4中,標籤1及3會回應該捲動命令,而標籤2 則不會回應。 標籤ID編碼/位元位置 會回應捲動命令的標籤 MSB LSB 位元位置 ...32109876543210987654321 - 標籤1 ...01000100000101101110101 回應 標籤2 ...10011110000100101001001 不回應(位元10不匹配) 標籤3 ...10110101000101101111011 回應 表4捲動命令實例。In Table 4 below, tags 1 and 3 respond to the scroll command, while tag 2 does not respond. Tag ID code / bit position will respond to the MSB LSB bit position of the scroll command ... 32109876543210987654321-tag 1 ... 01000100000101101110101 respond to tag 2 ... 10011110000100101001001 no response (bit 10 does not match) tag 3 .. .10110101000101101111011 Respond to the table 4 scroll command example.

發訊答訊 發訊命令係廣泛地應用在下面所述的反碰撞演算法中。 在其中一具體實施例中將說明的係相當於圖4中列430的實 例,其中n=8而m=3。在此具體實施例中,發訊命令會要求 標籤藉由調變八位元的資料(被編碼成位元格)答訊於由該 閱讀機的調變(或「標記」)所界定的八個時間位元中的其 -25 - 1228683 發明說明續頁 (21) 中一個之中。特殊標籤用以回應的位元係取決於位於該發 訊命令所規定的[PTR]、[LEN]及[VALUE]欄位所表示之該標籤 位址部份後面該標籤位址的三個LSB。LSB為「000」的標籤 (圖7中的702)會回應於第一個位元中、LSB為「001」的標籤 會答訊於第二個位元中,依此類推,LSB為「111」的標籤( 圖7中的716)則會回應於第八個位元中。Transponder The transponder command is widely used in the anti-collision algorithm described below. The system that will be described in one of the specific embodiments is equivalent to the example of column 430 in FIG. 4, where n = 8 and m = 3. In this specific embodiment, the signaling command will require the tag to respond to the eighth defined by the reader's modulation (or "tag") by modulating the eight-bit data (encoded into a bit cell). Among the time bits, -25-1228683 invention description is one of the continuation pages (21). The bit used by the special tag to respond depends on the three LSBs of the tag address following the part of the tag address indicated by the [PTR], [LEN], and [VALUE] fields specified in the sending order. . A label with an LSB of "000" (702 in Figure 7) will respond in the first bit, and a label with an LSB of "001" will respond in the second bit, and so on, with an LSB of "111 "Label (716 in Figure 7) will respond to the eighth bit.

圖7中702至716所示的便係該等八個時間位元。位元702至 716的時間前後順序可以任意的順序排列。圖7所示的順序 僅係根據本發明一具體實施例的其中一個實例。本發明並 不受限於圖中所排列的位元順序或數量。同時請注意,在 任兩個或多個位元中的位元數量可能會不同。 下面的命令襴位數值可用以闡述一發訊命令實例。如果 該閱讀機發出具有下面資料的命令的話: [CMD]=00001000(發訊); [PTR]=0000111 (7);These eight time bits are shown by 702 to 716 in FIG. 7. The time sequence of bits 702 to 716 can be arranged in any order. The sequence shown in FIG. 7 is only one example of a specific embodiment according to the present invention. The invention is not limited to the order or number of bits arranged in the figure. Please also note that the number of bits in any two or more bits may differ. The following command bit values can be used to illustrate an example of a signaling command. If the reader issues a command with the following information: [CMD] = 00001000 (send); [PTR] = 0000111 (7);

[LEN]=0001001 (9); [VALUE]=000101101。 接收此命令的標籤會試圖將其由位置七開始的位址資料 中的九個位元與數值欄位中所規定的資料進行比較,從LSB 開始比較至MSB。該等匹配的標籤會回應於其已經匹配的 位址資料後面的三個LSB所決定的八個位元中其中一個。 在下面的表5中,會有三個標籤於三個不同的位元(由該 標籤位址的三個LSB決定)回應該發訊命令。在表5中,劃 有底線的位元係進行比較的部份,而斜體位元則會被傳送 -26- 1228683 (22) 發明說明續頁 給該閱讀機。因此,標籤1係回應於圖7中710的位元5 (LSB二100) :標籤3係回應於圖7中712的位元6(LSB=101);而標籤4則係 回應於圖7中702的位元1 (LSB二000)。因為標籤2的標籤位址中 位元10(0)與[VALUE]中對應的位元(1)不匹配,所以不會回應 。圖8所示的係從該標籤進行傳輸的順序,其係由最小意 義位元至最大意義位元進行傳輸。 標籤ID編碼/位元位置 會回應發訊 命令的標籤 回應位元 8位元回應 MSB LSB MSB LSB 位元位置 ...32109876543210987654321 - - - 標籤1 ...01000100000101101110101 回應 位元5 (100) 01000100 標籤2 •••10011110000100101001001 不回應 (位元10不匹配) 霸 - 標籤3 • ••10110101000101101111011 回應 位元6 (101) 10110101 標籤4 ...10110000000101101111011 回應 位元1 (000) 10110000 表5發訊命令回應實例。 在替代的具體實施例中,該些標籤可藉由調變音調信號 取代以單音頻調變資料來回應發訊命令。舉例來說,每個 標籤可能都具有一特有的音調。因此,在響應發訊命令時 ,標籤可能會傳輸其音調用以宣告其存在。在其它的具體 -27- 1228683 發明說明績頁 (23) 實施例中,可使用其中一個音調表示「1」,而使用另一個 音調表示「0」。因此,標籤可藉由調變兩個音調以表示其 位址的下一個位元的方式,以便以正確的位元箱來回應發 訊命令。在其它的具體實施例中,標籤能夠使用數個音調 編碼其位址後面的數個位元。因為該等音調都是在閱讀機 至標籤通信所使用的頻道外面,所以,此方式可讓該閱讀 機輕易地偵測到該等發訊命令響應。在其中一具體實施例 中,該閱讀機可能包括一數·位信號處理(DSP)晶片,其係配 置以偵測該些音調信號。 反碰撞演算法 在所討論的具體實施例中,發訊命令會依照其位址,將 標籤回應存放在八個不同的時間片段中,以便將一標籤群 分成八個子群。該存放操作係使用在一次最多以m個位元 來調查一數值空間或二元位址樹的演算法中。藉由發出數 個發訊命令給該閱讀機的領域、分析其回應並且最後發出 正確的捲動命令,便可將個別的標籤從該閱讀機領域中眾 多的標籤群中隔離出來。 在其中一個反碰撞演算法的具體實施例中,m二3。圖9所 示的係以二元樹900所表示的標籤位址空間之前三個LSB。 圖中的二元樹可持續發展成64位元的標籤辨識碼,不過, 圖中僅顯示出前面三層。 [PTR]=0、[LEN]=0以及[VALUE]=0的發訊命令會從此樹的 頂端向下調查前三個位元(當結構為m = 3時)。LSB為000的 標籤會回應於902的位元1、LSB為001的標籤會回應於904的 -28 - 1228683 (24) 發明說明續頁 位元2,依此類推,LSB為111的標籤則會回應於916的位元 8。即使碰撞會使得難以讀取該等標籤所傳送的資料的八 個位元,但是,閱讀機仍可在每個位元中搜尋來自該等標 籤的背向散射,並且得知該標籤群。不過,如果在特定的 位元中有背向散射存在的話,即表示有一個或多個標籤匹 配該項詢問。位元編號會告訴閱讀機下面三個標籤位址的 MSB。[LEN] = 0001001 (9); [VALUE] = 000101101. The tag receiving this command will try to compare the nine bits in its address data starting at position seven with the data specified in the value field, starting from LSB to MSB. These matching tags will respond to one of the eight bits determined by the three LSBs following the address data that they have matched. In Table 5 below, there will be three tags in three different bits (determined by the three LSBs of the tag address) in response to the send command. In Table 5, the underlined bits are compared, while the italicized bits are transmitted. -26-1228683 (22) Description of the Invention Continued pages are given to the reader. Therefore, tag 1 responds to bit 5 (LSB 2 100) of 710 in FIG. 7: tag 3 responds to bit 6 (LSB = 101) of 712 in FIG. 7; and tag 4 responds to FIG. 7 Bit 1 of 702 (LSB 2000). Because bit 10 (0) in the tag address of tag 2 does not match the corresponding bit (1) in [VALUE], it will not respond to. The sequence shown in FIG. 8 is the transmission order from the tag, which is transmitted from the least significant bit to the most significant bit. Tag ID code / bit position will respond to the tag response bit of the sending command 8 bit response MSB LSB MSB LSB bit position ... 32109876543210987654321---Tag 1 ... 01000100000101101110101 Response bit 5 (100) 01000100 Tag 2 ••• 10011110000100101001001 does not respond (bit 10 does not match) Ba-tag 3 • •• 10110101000101101111011 responds to bit 6 (101) 10110101 tag 4 ... 10110000000101101111011 responds to bit 1 (000) 10110000 Instance. In an alternative embodiment, the tags may respond to the signaling command by modulating the tone signal instead of monotone modulation data. For example, each tag may have a unique tone. Therefore, in response to a signaling command, the tag may transmit its tone call to announce its presence. In other specific -27-1228683 invention description pages (23) In the embodiment, one tone may be used to indicate "1" and the other tone may be used to indicate "0". Therefore, a tag can respond to a signaling command with the correct bitbox by modulating two tones to indicate the next bit of its address. In other embodiments, the tag can encode the bits following its address using a number of tones. Because these tones are outside the channel used by the reader-to-tag communication, this method allows the reader to easily detect the response to these signaling commands. In one embodiment, the reader may include a digital signal processing (DSP) chip configured to detect the tone signals. Anti-collision algorithm In the specific embodiment discussed, the sending command stores the tag response in eight different time segments according to its address in order to divide a tag group into eight subgroups. The storage operation is used in an algorithm that investigates a numerical space or a binary address tree with a maximum of m bits at a time. By issuing several messaging commands to the reader's domain, analyzing its response, and finally issuing the correct scroll command, individual tags can be isolated from the many tag groups in the reader's domain. In one embodiment of the anti-collision algorithm, m = 2. Figure 9 shows the first three LSBs of the tag address space represented by the binary tree 900. The binary tree in the figure can be developed into a 64-bit tag identifier. However, only the first three layers are shown in the figure. Sending commands for [PTR] = 0, [LEN] = 0, and [VALUE] = 0 will investigate the first three bits from the top of the tree (when the structure is m = 3). A tag with an LSB of 000 will respond to bit 902, and a tag with an LSB of 001 will respond to -28-1228683 of the 904. (24) Description of the continuation page Bit 2, and so on, a tag with an LSB of 111 will In response to bit 8 of 916. Even if the collision makes it difficult to read the eight bits of data transmitted by the tags, the reader can still search for backscatter from the tags in each bit and know the tag group. However, if backscatter is present in a particular bit, it means that one or more tags match the query. The bit number tells the MSB of the three tag addresses below the reader.

反碰撞實例 下面的非限制性實例將闡述如何利用發訊命令將兩個標 籤回應分成不同的位元。該兩個標籤位址的LSB為011及 101 ° 詢問1 · [CMD]=00001000(發訊); [PTR]=0000000 ; [LEN]=0000000 ;Anti-collision example The following non-limiting example will explain how to use a signaling command to split two tag responses into different bits. The LSBs of the two tag addresses are 011 and 101 °. Inquiry 1 · [CMD] = 00001000 (send); [PTR] = 0000000; [LEN] = 0000000;

[VALUE]=0。 參考圖10,在答訊期間,於位元4(圖10的1004)及位元6( 圖10的1006)之中發現到背向散射調變。因為該等每個位元 中都會有數個標籤進行調變,因此會發生競奪,不過,該 閱讀機知道有標籤存在,而且知道有兩個前三個LSB分別 為011及101的不同標籤群。利用此項資訊,該閱讀機便可 發出第二個發訊命令(訊問2),用以探索位元4中的標籤群 ,同時保留位元6中的標籤於稍後進行分析。 詢問2 : -29- 1228683 (25) 發明說明續頁 [CMD]=00001000(發訊); [PTR]=0000000 ; [LEN]=000001 1 (3); [VALUE]=011。 此命令的作用是從圖11所示的011位置更進一步地 該樹中的另外三個位元。 參考圖11,所強調的分支包含著與詢問2匹配的標 。該等標籤與回應位元4中第一個詢問的標籤相同。 新的詢問中,會在位元2、位元7及位元8 (圖12中的位天 、1107及1108)中出現答訊間隔期間的標籤調變。該閱 現在知道該等標籤的六個位址資訊位元,以及知道言 中未繼續追蹤的分支中之標籤的三個位址資訊位元。 讀機會反覆地持續進行,並且使用該發訊命令循著一 遍尋整個標籤位址空間,直到探索出該標籤整個64位 位址及16個位元的CRC為止。 發訊命令之「除以八」的特性使其能夠迅速地減少 個位元中進行答訊的標籤數量。對100個標籤群進行 可發現,利用隨機的位址平均而言都需要四個以下的 命令以分離出每個標籤。如果僅有單一個標籤於特定 元回應的話,該閱讀機便能夠對該標籤所傳送的八位 訊進行解碼,並且發出捲動命令給使用用以成功地將 離出來的[PTR][LEN]及[VALUE]資料的標籤。 本發明的其中一具體實施例中,每項具有標籤群的 都是獨立式的操作。命令一回應對係一種極細微的異 探索 戴群 在此 .1102 讀機 0問1 該閱 分支 元的 於每 模擬 發訊 的位 元資 其分 異動 動, -30- 1228683 發明說明續頁 (26) 其並不需要知道該標籤過去發生什麼事。「無記憶體」的 特性則能夠大幅地增強被動式標籤在雜訊很大的地方或臨 界RF功率位準處的效能。該閱讀機可透過代表標籤辨識碼 的二元樹保留與進度有關的資訊。具有標籤信號但是未立 即探索的分支則可保留在記憶體中,稍後再進行檢查,以 改良整體的處理流量。具有不同功能的閱讀機都可使用相 同的協定。 能夠實施位元中競奪偵測的精密閱讀機可非常快速地對 標籤群進行排序。使用一系列的發訊命令便可迅速地對標 籤進行分離,接著便可利用捲動命令讀取該等標籤。不具 有偵測競奪能力的簡單式閱讀機(例如僅具有類比濾波器 搜尋「類標籤」調變的閱讀機)仍然能夠僅利用發訊命令 進行排序及辨識。 前面所述的命令能夠在不同的情況中辨識標籤位址。下 面將敘述幾種如何使用該等命令的實例。 情況1 一單標籤情況 在此實例中,本應用的特性可確保只有單一個標籤會出 現在該閱讀機的領域中。這是一種常見的應用,而且可在 收費站、畜牧場的滑運道及輸送帶中發現。反碰撞未必是 必要的功能,閱讀機可能只要反覆地發出[PTR]=0、[LEN]=0 及[VALUE]=0的捲動命令,讓該區域中的任何標籤發出其 位址及CRC給該閱讀機即可。這是一種不必比較傳送給 [VAL]襴位中的標籤的位元的特殊捲動命令情形。如前面 所述,如果[LEN]欄位不等於零的話,内含於[VAL]欄位中 1228683 (27) I發明說明績ΐ 、 元便必須匹配该等標籤數值,以便讓該標藏進行回 應0 命令 捲動、[PTR]=0、[LEN卜〇、[VALUE]=〇 扎1 ·[ 64位元的標籤id編碼]+ [ 16位元的CRC ] 情泥2〜多重標籤、隨機位址 在此非限制的貫例中,該閱讀機會遇到四個標籤。表6 所^ 1便係該等標籤的標籤ID編碼。可使用發訊命令分離 Λ : ^ ^捲動叩令則可用以讀取及驗證該等標籤的位址 。該閱讀機可發出下面的命令: 命令1 :發訊、[PTR卜〇、「 [LEN]=〇、[VALUE]=0 據此,每個標籤都备 胃&出表6中的斜體位元給該閱讀機 。表7所示的係該等標 ,關$ '、纖用以傳輸其回應的位元。在表7中 ,閱頊機發現到位元i 菸骑奋 七虹义 及位元6中有分離的標籤,位元4則 散生双奪,有數個標一 元中。 (標籤3及標籤4)欲回應於同一個位 標籤ID編碼/位元位置 位元位置 -—__ LSB 標籤1 '...32109876543210987654321 標籤2 、...01000100000101101110101 標籤3 —^…10011110000100101001000 標籤4 "—〜s1011010100010010111101 1 ...1011000001 1101 101 10101 1 表6標籤位址。 -32 - 1228683 發明說明續頁 (28) 答訊1 : 答訊位元 1 2 3 4 5 6 7 8 位元數值 000 001 010 011 100 101 110 111 是否發生競奪 否 - - 是 - 否 - - 標籤1回應 01110101 標籤2回應 01001000 標籤3回應 01111011 標籤4回應 01101011 表7該閱讀機所讀取的標籤信號。[VALUE] = 0. Referring to FIG. 10, during the answering period, backscatter modulation was found in bit 4 (1004 in FIG. 10) and bit 6 (1006 in FIG. 10). Because there are several tags in each of these bits to be modulated, competition will occur, but the reader knows that there are tags, and it knows that there are two different tag groups whose first three LSBs are 011 and 101 . With this information, the reader can issue a second signaling command (Interrogation 2) to explore the tag group in bit 4 while retaining the tags in bit 6 for later analysis. Enquiry 2: -29- 1228683 (25) Description of the invention continued [CMD] = 00001000 (send); [PTR] = 0000000; [LEN] = 000001 1 (3); [VALUE] = 011. The effect of this command is to go further from the 011 position shown in Figure 11 to the other three bits in the tree. Referring to FIG. 11, the highlighted branch contains a label matching query 2. These tags are the same as those that respond to the first query in bit 4. In the new inquiry, the tag change during the answer interval will occur in bit 2, bit 7, and bit 8 (bit days, 1107, and 1108 in Figure 12). The reader now knows the six address information bits of the tags and the three address information bits of the tags in the branches that are not being followed further in the speech. Read opportunities continue repeatedly, and use the signaling command to search the entire tag address space until the entire 64-bit address and 16-bit CRC of the tag are explored. The "divide by eight" feature of the sending order enables it to quickly reduce the number of tags for answering in bits. For 100 tag groups, it can be found that using random addresses on average requires less than four commands to separate each tag. If there is only a single tag that responds to a specific meta, the reader can decode the eight-bit message transmitted by the tag and issue a scroll command to the [PTR] [LEN] used to successfully remove the tag. And [VALUE] data. In one embodiment of the present invention, each item having a tag group is an independent operation. The order-response pair is a very subtle exploration of different types. Dai Qun is here. 1102 Reader 0Q1 The reading of each bit of the reading unit is subject to change, -30-1228683 Invention Description Continued ( 26) It does not need to know what happened to the tag in the past. The “memory-free” feature can greatly enhance the performance of passive tags in places with large noise or at critical RF power levels. The reader retains progress-related information through a binary tree representing the tag identifier. Branches with labeled signals but not immediately explored can be kept in memory and checked later to improve overall processing flow. Readers with different functions can use the same protocol. A precision reader capable of bit-for-bit detection can sort tag groups very quickly. Tags can be quickly separated using a series of signaling commands, which can then be read using scroll commands. Simple readers that do not have the ability to detect competition (for example, readers that only have analog filters to search for "class tag" modulations) can still sort and identify using only signaling commands. The previous command can identify the tag address in different situations. Examples of how to use these commands are described below. Case 1-Single Tag Case In this example, the characteristics of this application ensure that only a single tag will appear in the field of this reader. This is a common application and can be found in toll booths, slideways and conveyor belts at livestock farms. Anti-collision may not be a necessary function. The reader may simply issue the scrolling commands of [PTR] = 0, [LEN] = 0 and [VALUE] = 0 repeatedly, and let any tag in the area issue its address and CRC Just give the reader. This is a special scroll command situation that does not have to compare the bits of the tag passed to the [VAL] bit. As mentioned earlier, if the [LEN] field is not equal to zero, it is contained in the [VAL] field. 1228683 (27) I Inventory Note: The value must match the value of these tags in order for the tag to respond. 0 Command scrolling, [PTR] = 0, [LEN BU〇, [VALUE] = 〇 扎 1 · [64-bit tag id encoding] + [16-bit CRC] Love mud 2 ~ Multiple tags, random bits In this non-limiting example, the reader encounters four tags. ^ 1 in Table 6 is the tag ID number of these tags. Signaling commands can be used to separate Λ: ^ ^ scroll commands can be used to read and verify the address of these tags. The reader can issue the following commands: Command 1: Send a message, [PTRbuo, [[LEN] = 〇, [VALUE] = 0], each tag is prepared & the italic position in Table 6 The reader is shown in Table 7. These are the bids shown in Table 7. The bits used to transmit the response are shown in Table 7. In Table 7, the reader found the bit i Yanqi Fenqi Hongyi and the bit. There is a separate label in bit 6 and bit 4 is scattered. There are several labels in one bit. (Label 3 and label 4) To respond to the same bit label ID number / bit position Bit position -__ LSB label 1 '... 32109876543210987654321 Tag 2, ... 01000100000101101110101 Tag 3 — ^ ... 10011110000100101001000 Tag 4 "-~ s1011010100010010111101 1 ... 1011000001 1101 101 10101 1 Table 6 Tag address. -32-1228683 Description of the invention continued ( 28) Answer 1: Response bit 1 2 3 4 5 6 7 8-bit value 000 001 010 011 100 101 110 111 Is there a competition? No--Yes-No--Tag 1 responds 01110101 Tag 2 responds 01001000 Tag 3 Responses 01111011 Label 4 Responses 011 01011 Table 7 Tag signals read by this reader.

〒々2 ·捲動、[PTR卜〇、 _ L EN卜3、[VALUE]=000。 合訊2 ·標籤2匹配捲動條〒々 2 · Scroll, [PTR Bu 0, _L EN Bu 3, [VALUE] = 000. Hexun 2 · Tag 2 matching scroll bar

维满1 + 你-Μ 、。標籤2送出[64位元的標籤ID 編碼]+ [16位π的CRC]給該閱难 口貝機。 該閱讀機會再發出第三 命令捲動、叫。、:;、:: 答訊3:標籤丨匹配捲動條件]=、[糧岡=1〇卜Full 1 + you -Μ ,. Tag 2 sends [64-bit tag ID code] + [16-bit π CRC] to the reader. The reader then issues a third command to scroll and call. ,:;, :: Answer 3: Label 丨 Matching scrolling conditions] =, [lianggang = 1〇 卜

編碼]+ [16位元的CRC]給哕。襟籤ί送出[64位元的標籤ID 閱讀棬 該閱讀機會再發出楚 、° ' 弟四個命八 命令4 ··發訊、[PTR卜〇、Ύ ’ 比較佳的係、,底線部分的^3_、[VALUE卜〇11。 位元傳送給該閱讀機。至 立70。將下面表8所示的斜體 時該閱讀機可找出如表9所_已經解決了競奪的問題,同 $的位元6及8中的分離標籤。 '33 , 1228683 發明說明續頁 (29) 標籤ID編碼/位元位置 MSB LSB 位元位置 ...32109876543210987654321 標籤1 ...01000100000101 101 1 10101 標籤2 ...1001 11 10000100101001000 標籤3 ...101 1010100010010111101 1 標籤4 ...10110000011101101101011 表8傳輸標籤3及標籤4的位址資料。 答訊4 : 答訊位元 1 2 3 4 5 6 7 8 位元數值 000 001 010 011 100 101 110 111 是否發生競奪 - - - - • 否 - 否 標籤1回應 標籤2回應 標籤3回應 00101111 標籤4回應 01101101 表9閱讀機發現到# & < p 』位疋6及位元8中的分離標籤。 現在,該閱讀機便會菸+ X出捲動命令以完成標籤3及標籤4 的定址。 命令 5 :捲動、[PTR]=0、αΕΝ]=6、 答訊5 :標籤4匹配捲動條件。標 編碼]+ [16位元的CRC]給 命令6 :捲動、[pTR]:=〇、 該閱讀機[LHlsij=g Λ [VALUE] = 101011。 籤4送出[64位元的標 〇 [VALUE] = 111011 0Encoding] + [16-bit CRC] for 哕. Send a [64-bit tag ID to read the badge. The reader will then issue the Chu, ° 'Four four lives and eight orders 4 · · Send a message, [PTR 卜 〇, 比较' Better Department, the bottom line of the ^ 3_, [VALUE 卜 〇11. Bits are transmitted to the reader. To stand 70. When italicized as shown in Table 8 below, the reader can find the separation problem as shown in Table 9_, which is the same as that in bits 6 and 8 of $. '33, 1228683 Description of the invention continued (29) Tag ID coding / bit position MSB LSB bit position ... 32109876543210987654321 tag 1 ... 01000100000101 101 1 10101 tag 2 ... 1001 11 10000100101001000 tag 3 ... 101 1010100010010111101 1 Tag 4 ... 10110000011101101101011 Table 8 transmits the address data of tag 3 and tag 4. Answer 4: Answer bit 1 2 3 4 5 6 7 8-bit value 000 001 010 011 100 101 110 111 Whether there is competition----• No-No Tag 1 Response Tag 2 Response Tag 3 Response 00101111 Tag 4 Responses to 01101101 Table 9 The reader found the separated tags in # 6 and # 8. The reader will now smoke + X out the scroll command to complete the addressing of tags 3 and 4. Command 5: Scroll, [PTR] = 0, αΕΝ] = 6, Answer 5: Tag 4 matches the scroll condition. Standard code] + [16-bit CRC] gives command 6: scroll, [pTR]: = 〇, the reader [LHlsij = g Λ [VALUE] = 101011. Sign 4 and send [64-bit standard 〇 [VALUE] = 111011 0

籤ID >34- 1228683 發明說明續頁 (30) 答Λ 6 .標戴3匹配捲動條件。標籤3送出[64位元的標栽山 編碼]+ [16位元的CRC]給該閱讀機。 至此便完成該反碰撞演算法,辨識出所有的標籤。應該 注意的係,亦可採用其它的具體實施例來實施各種應用、 資料處理與儲存方法、標籤程式化順序、標籤偵測幾何、 以及使用本發明所教授之協定所提供的基本命令具現各種 閱讀機。因此,本發明並不受限於此。 RF傳輸層 本發明可運用於各種的頻譜中。此章節中,將利用超高 頻(UHF)操作所規定的參數敘述RF傳輸層的其中一種具體 實施例。不過,熟習本技藝的人士將會發現本發明並不受 限於UHF頻譜。 RF功率管理 閱讀機射頻(RF)功率管理應該符合當地的規範。在美國 ’未經許可的超高頻(UHF)頻帶會要求閱讀機的R;p發射必 須符合 Federal Communications Commission (FCC)第 15.247 節以及Sign ID > 34-1228683 Description of Invention Continued (30) Answer Λ 6. Standard 3 matches scrolling conditions. Tag 3 sends [64-bit standard plant code] + [16-bit CRC] to the reader. This completes the anti-collision algorithm and identifies all tags. It should be noted that other specific embodiments can also be used to implement various applications, data processing and storage methods, tag stylization sequence, tag detection geometry, and the use of basic commands provided by the protocol taught by the present invention to achieve various readings. machine. Therefore, the present invention is not limited to this. RF transmission layer The present invention can be applied to various spectrums. In this section, one specific embodiment of the RF transmission layer will be described using the parameters specified by ultra high frequency (UHF) operation. However, those skilled in the art will find that the invention is not limited to the UHF spectrum. RF power management The reader's radio frequency (RF) power management should comply with local regulations. In the U.S. ’unlicensed ultra-high frequency (UHF) bands will require the reader ’s R; p emissions must comply with Federal Communications Commission (FCC) Section 15.247 and

Electromagnetic Exposure (ΕΜΕ)的規定。在該等規範下,於天 線輸入處所量測到的閱讀機輸出功率不會超過1瓦。同時 ’閱讀機的傳輸天線增益不超過6分貝(dB),其中是以線形 天線所量測到的自由空間等向發射器的〇dB增益(dBi)作為 參考值。可以控制的方式改變閱讀機的心輸出功率,以達 到下面的目的: 〇改變閱讀機的讀取範圍; 〇改良對於各種應用、設施及情況的適應性; -35 - (31) 1228683 發明說明續頁 〇節省電力消耗(針ϊ+ 對電池供電的系統); 0於數個閱讀機的it ri θ /、同RF電%空間中管理標籤的讀取 即頻道控制、祧頻等);及/或 〇如果β以的話,測斗、* 、J 4連接至一個或多個標籤的下行鏈 路及上行鏈路的保真度。 半雙工操作 在此具體實施例中,標籤至閱讀機及閱讀機至標籤的鏈 路都係定義為半雙工。除非該閱讀機欲進行傳輪,否則並 不需要標籤至閱讀機的資料鏈路,然而在此鍵路期間,該 閱讀機僅會提供電力給標籤,而不必傳送f料。在閱讀機 至標籤的鏈路期間,標籤則不能傳輸資料。 頻率 在其中一具體實施例中,採用的是北美的RF傳輸層,其 頻帶為902-928 MHz (UHF)。本發明的其它具體實施例中亦 可能使用13·56 MHz、2450 MHz及其它的頻帶。不同的頻帶 及國家在頻帶、功率、調變、及檢定規範方面都會有些許 不同。依照本發明,熟習本技藝的人士將會發現到其並不 叉限於該R F傳輸層所採用的頻率。 在其中一具體實施例中,採用915 MHz附近的(UHF頻帶 可π來下面的系統效能。在美國,可產生每秒64,000個位 元(即64 kbps)的高速閱讀機至標籤系統的資料傳輸率。於i 公尺以上的範圍中,如| r命中率」夠高的話,便可提供 128 kbps或更快的標籤至閱讀機系統資料傳輸率。因此,從 標戴至閱讀機的「上行鏈路」資料傳輸率快於(約^倍,甚 -36- 1228683 發明說明續頁 (32) 至某些情況下可達4仵t ^ ° 乂上)從閱讀機至標籤的「下行键 路」資料傳輸率。吾人希访 〃 〆 望將該%標轂的回應速率(上行 鏈路資料傳輸率)設定. 4與下行鏈路資料傳輸率呈非簡語 速率。此處需要用到小】 I的標籤及閱讀機天線。因為Q值 的條件要求不高,因此 使用本技藝熟知的技術來製造便 宜的、印刷式天線。人啕 此現象在美國是可接受白勺 X、、!常會曝露在915 MHz的信號中, 美國的頻帶相當地寬,足以在 其中進行有意義的跳頻動作 在採用北美UHF操作 於902至928 MHz的頻帶 統應該至少有50個跳頻 虛擬隨機方式進行存取 頻道中的停留時間都不 最大允許的20 dB頻寬 kHz) 〇Electromagnetic Exposure (ΕΜΕ). Under these specifications, the output power of the reader measured at the antenna input will not exceed 1 watt. At the same time, the gain of the reader ’s transmitting antenna does not exceed 6 decibels (dB), where the 0dB gain (dBi) of the free-space isotropic transmitter measured by the linear antenna is used as a reference value. The cardiac output power of the reader can be changed in a controlled manner to achieve the following objectives: 〇Change the reading range of the reader; 〇Improve the adaptability to various applications, facilities and conditions; -35-(31) 1228683 Description of the invention continued Page 〇 Save power consumption (pin + battery-powered system); 0 it ri θ / in several readers, reading management tags in the same RF power% space (channel control, audio frequency, etc.); and / Or 〇 If β, measure the fidelity of the downlink and uplink of the bucket, *, J 4 connected to one or more tags. Half-duplex operation In this embodiment, the tag-to-reader and reader-to-tag links are both defined as half-duplex. The reader does not need a data link from the tag to the reader unless the reader wants to pass rounds. However, during this keying, the reader will only provide power to the tag without transmitting f data. During the reader-to-tag link, the tag cannot transmit data. Frequency In one embodiment, the North American RF transmission layer is used, and its frequency band is 902-928 MHz (UHF). Other specific embodiments of the present invention may also use 13.56 MHz, 2450 MHz and other frequency bands. Different frequency bands and countries will be slightly different in terms of frequency band, power, modulation, and verification specifications. According to the present invention, those skilled in the art will find that it is not limited to the frequency used by the RF transmission layer. In one embodiment, the system performance is around 915 MHz (UHF band can be π to lower the system performance. In the United States, 64,000 bits per second (ie 64 kbps) high-speed reader to tag system data transmission In the range above i meters, if | r hit rate is high enough, it can provide a data rate of 128 kbps or faster tags to the reader system. Therefore, the "uplink" from the standard to the reader The "link" data transfer rate is faster than (approximately ^ times, even -36-1228683 Invention Description Continued (32) to 4 仵 t ^ ° 乂 in some cases) from the reader to the "downlink" "Data transmission rate. I hope to visit 〃 I hope to set the response rate (uplink data transmission rate) of this% standard hub. 4 and the downlink data transmission rate are non-simplified rates. Here we need to use small I tag and reader antennas. Because the requirements of the Q value are not high, we use the technology well-known in the art to make cheap, printed antennas. This phenomenon is acceptable in the United States. In the 915 MHz signal, the United States The frequency band is quite wide enough to perform meaningful frequency hopping operations. In the UHF band operating at 902 to 928 MHz in North America, there should be at least 50 frequency hopping virtual random methods to access the channel. 20 dB bandwidth kHz) 〇

白勺其中一具體實施例中,閱讀機係 中以祧頻系統的方式進行操作。系 。桃頻應該以符合FCC第15.247節的 他~個為1 0秒的週期中,在每個 叱超過400毫秒(ms)已佔用的頻道之 不能趄過每秒5〇〇,〇〇〇個循環(即500In a specific embodiment, the reader system operates in the manner of an audio frequency system. Department. The peach frequency should be in accordance with FCC section 15.247. It should be 10 seconds. In each channel, the channel occupied by more than 400 milliseconds (ms) cannot exceed 50000 cycles per second (Ie 500

北美地區以外的UHF彳呆作的其它具體實施例中,則可修 改閱讀機使其符合當地的規範環境,達到最佳的效能。在 針對歐洲市場的具體實施例中,可預期該等標鐵(USA的閱 5買機則不必然)會彳呆作於868 MHz的頻帶或是其它可用的頻 帶中。 閱讀機至標籤調變 在其中一具體實施例中,閱讀機會處於三種可用狀態中 的任一種:(1)關機(不發射RF能量);(2)CW(以不進行調幅 的方式於某些功率位準中發射RF能量);以及(3)主動(以調 -37- 1228683 發明說明續頁 (33)In other specific embodiments of UHF stunts outside North America, the reader can be modified to conform to the local regulatory environment to achieve the best performance. In a specific embodiment for the European market, it can be expected that these standard irons (not necessarily for the US 5 buying machine) will stay in the 868 MHz frequency band or other available frequency bands. Reader-to-Tag Modulation In one of the specific embodiments, the reader is in any of three available states: (1) off (no RF energy is emitted); (2) CW (in some ways without amplitude modulation) RF energy is transmitted at the power level); and (3) active (with tuning -37-1228683 invention description continued page (33)

幅的方式發射RF能量)。在主動狀態中,閱讀機會以調幅(AM) 的方式傳輸資料給標籤群。在其中一具體實施例中,該標 籤至閱讀機的鏈路為〇〇K(通斷鍵控(〇n-〇ff Keying)),其最 小調變深度為90%(圖13)。調變上升及下降時間通常會被 旁帶發射限制在300奈秒(ns)。調變速率係可變化的,而資 料傳輸率則會取決於當地所規範的環境。適用於美國操作 的具體實施例可採用64 kHz的標稱最大調變速率。因此, 在此具體實施例中,該標籤必須以與16 kHz至64 kHz範圍之 間的調變速率成比例的方式進行容差調整及回應閱讀機。 下面將配合圖13至圖16說明此具體實施例。 編石馬RF energy is transmitted in an amplitude manner). In the active state, the reader transmits data to the tag group in AM. In one specific embodiment, the tag-to-reader link is 00K (On-Off Keying), and its minimum modulation depth is 90% (Figure 13). Modulation rise and fall times are usually limited to 300 nanoseconds (ns) by sideband emissions. The modulation rate is variable, and the data transmission rate depends on the local environment. Specific embodiments suitable for U.S. operation may use a nominal maximum modulation rate of 64 kHz. Therefore, in this specific embodiment, the tag must be tolerance-adjusted and responsive to the reader in a manner proportional to the modulation rate in the range from 16 kHz to 64 kHz. This specific embodiment will be described below with reference to FIGS. 13 to 16. Stone horse

調變期間,呈現主動狀態的閱讀機會提供標稱62.5 kHz的 時脈信號給鄰近的標籤。圖13中,該等標籤會與處於RF包 絡1302負向緣的主動閱讀機(即閱讀機傳輸的關閉期間)同 步。如圖14的1432所示,每62.5 kHz的時脈間隔都包括一基 本的子時脈循環,而且其時間長度實質上為16微秒(ps)。 從閱讀機傳送至標籤的二元資料經過編碼之後會變成界於 2 ps與6 ps實質限制之間的低位準脈衝之脈寬調變。較佳的 係,對任何的命令訊框來說,該閱讀機時脈的容差都必須 在1%之内。負向脈寬最.小值的變化為±1%。因此,在62.4 kHz 時其值為2 ps,而63.36 kHz時其值為1.972 ps。歐洲的操作 中,要求負向脈寬必須與調變頻率成比例。較佳的係,其 它全部的「基本時脈循環」時序都必須與該調變時脈頻率 的±1%之值成比例。 -38- 1228683 (34) 發明説明續頁 調變時序 表10包含的是用以傳輸資料給標籤的負向脈寬調變之標 稱值(RF中斷週期)。 調變時序 2 ps±0.2 ps 閱讀機邏輯0 (上升及下降300 ns) 4 ps±l ps 於調變時脈中觸發的標籤判別點 6 ps±0.2 ps 閱讀機邏輯1 10 ps±l ps 開始閱讀機的邏輯-1相位轉移(上升及下降500 ns) 12 ps土1 ps 結束閱讀機的邏輯-1相位轉移(上升及下降500 ns) 2 ps±l ps 邏輯-1相位轉移脈寬 16 ps±0.2 ps 閱讀機的下個調變時脈緣 表10調變時序 在圖14的1462中,對於閱讀機至標籤的時脈時序來說, 當資料=「〇」時,係以該62.5 kHz時脈的2 ps「窄」脈寬 進行編碼。在圖14的1402中,對於閱讀機至標籤的時脈時 序來說,當資料=「1」時,則係以該62.5 kHz時脈的6 ps 「寬」脈寬進行編碼。 標籤至閱讀機調變 在下面所討論的具體實施例中,如圖15中1500處所示般, 標籤會利用遵循4 一間隔位元格編碼技術的背向散射調變 來回應閱讀機命令。從圖中可看出,在1502的位元格中, 位準0有二次的轉移;而在1504中,位準1則有四次的轉移。 標籤至閱讀機的標稱資料傳輸率為每秒128,000個位元(即 -39- 1228683 (35) 發明說明續頁 128 kbps),但是由於該標籤中可能會有振盪漂移,因 整個80位元的回應窗中,其變化可能高達25%。對標 閱讀機來說,該位元格時間的長度約為8 ps。 如圖15所示,與曼徹斯特編碼不同的地方在於,此 技術中,在位元的中間一定會發生轉移,因而在編碼 反向的期間便判斷出0與1。參考圖15,1530代表的是-元的貢料序列’而1540代表的則是该8位元貧料序列 置序列。 競奪偵測 一般來說,競奪偵測對大部分的反碰撞演算法而言 當重要。當兩個標籤具有相同的時脈頻率,而且其背 射調變波形僅相差一個位元的時候,該閱讀機必須能 易地偵測出該等背向散射調變波形所造成的差異。圖 的1600所示的便是此種情形。在圖16的1602中可辨識 一個位元的差異,其中在該邏輯狀態中(即1)具有兩 上的連續位元。如果該兩個標籤的時脈頻率不同的話 重標籤的競奪偵測會更加容易。圖16的1630所示的係 標籤之間的信號差異,該兩個標籤的調變波形中有一 元的差異,而且其時脈頻率差異為50%。標籤回應之 競奪會產生不同於位元格1502及1504(圖15)組合情形的 波形。 閱讀機密集的環境中的閱讀機至閱讀機反碰撞方法 與其它的封閉系統比較起來,在一般的連鎖供應商 售環境中,比較難以管理大量閱讀機及標籤的互動情 此在 籤至 編石馬 發生 -8位 的倒 都相 向散 夠輕 16中 出該 個以 ,多 兩個 個位 間的 調變 或零 形。 -40- 1228683 發明說明續頁 (36) 干擾源 的方法 有多個 僅會有 與其標 1706、 式的閱 機」模 的 10%) 機都能 的標籤 狀悲的 〇 之後, ,以確 。圖17 」時》 許輸出 有1 ms 可決定 低功率的背向散射調變信號會被該環境中的各種 (包括其它閱讀機的調變信號)遮蔽。 其中一種將閱讀機至閱讀機干擾降低至最小程度 具體實施例則是在局部的鄰域中實施合作分時。當 閱讀機操作於同一個即時空間時,在該「鄰域」中 一個「主動」閱讀機能夠以全功率進行操作,並且 籤進行雙向對談,如圖17的1702a及1704a所示。如1704, 1708及1710所示,該即時區域中其它處於非主動模 讀機則稱為「靜音」閱讀機,並且可能是處於「關 式,或是操作於功率較小(通常小於最大允許RF功率 的連續波(CW)模式中。所有操作於靜音模式的閱讀 偵測到全功率主動閱讀機及落在其天線圖樣範圍内 之間的通信活動。當處於低功率靜音模式下,靜音 閱讀機仍可維持其跳頻圖樣,但卻不會調變其輸出 當主動的閱讀機與其範圍内的標籤完成通信循環 其便會停止調變至少20 ms(此時將變成靜音閱讀機) 保另一個靜音閱讀機有充裕的時間能變成主動模式 中的1720所示的便是該20 ms週期。 當靜音閱讀機在1730中偵測到一 「開放鄰域間隔 其中一個閱讀機便會變成主動模式,進入最大的允 功率狀態,並且開始與鄰近的標籤進行溝通。當至少 的週期未偵測到有任何主動閱讀機進行傳輸時,便 為開放間隔狀況。 如前面所述,在偵測到「開放鄰域間隔」之後,所有希 1228683 發明說明續頁 (37) 望變成主動模式的靜音閱讀機都可能在介於〇至 u ms之間 的虛擬隨機延遲週期之後作出此項動作。圖17 一 、 T 的 174〇 所 示的便是該虛擬隨機延遲週期。 參考圖18,同一個鄰域中,如果有兩個或多個靜音閱讀 钱(例如閱讀機18 0 8及1 810)同時轉變成主動模式,而 、 們都偵測到1820的狀況的話,便會立即返回靜音模式中Y 然後,便必須靜音模式中停留另一段虛擬隨機延遲時間’ 方能再試圖變成主動杈式。該虛擬隨機延遲時間應該介於 1-20 ms之間,1812中的Rd2便代表此時間。 、 當延遲1812啟動之後,閱讀機181〇便必須監聽是否有另 一部閱讀機即將變成主動模式,如果在183〇中偵測的話, 其便應該中止變成主動模式的企圖。閱讀機181〇應該保持 靜音模式,直到下次頻道間隔淨空為止。除了 172〇所規定 的20 ms間隔之外,該等閱讀機都不能轉變成主動模式。 當該等閱讀機反覆執行此虛擬隨機延遲循環的時候,在 其鄰域中的所有其它閱讀機都必須保持靜音,並且在偵測 到下個鄰域間隔之前都無法變成主動模式。在該開放偵測 時間間隔之外,閱讀機都不能從靜音模式變成主動模式。 如果1740的Rdl與1812的Rd2之和,加上開放頻道 偵’則週期,無法使彳于該閱讀機於172〇所規定的2〇聰間隔之 内變成主動模式的話,該閱讀機便應該保持在靜音或關機 狀態中’直到偵測到下一個開玫間隔為止。 任何情况下,都可以軟體的方式來建構每個閱讀機的間 隔週期性的使用規則。然而,在任何情況下,靜音閱讀機 -42- (38)1228683 發明說明續頁 須 檢 查 鄰 域 間 隔 的 可 用 性 〇 啟 動 選 用 裝 置 0 此 時 5 該 等 音 模 式 閱 讀 機 日召 射 的 RF 電 場 信 號 〇 如 果 未 觀 測 到 都 卜 勒 該 閱 讀 機 領 域 中 的 標 籤 群 並 便 不 需 要 太 高 的 功 率 而 該 率 模 式 中 0 在 部 分 情 形 中 變 成 主 動 模 式 〇 在 其 它 的 情 定 期 (或隨機)啟 動 方 式 讓 靜 的 係 為 了 將 功 率 傳 輸 、 功 率 程 度 0 在轉變成主動模式之前,都必 閱讀機亦可能會配備都卜勒 閱讀機便能夠偵測被低功率靜 中的任何移動所引起的都卜勒 信號的話’該閱讀機便可假設 無任何變化。因此,該標籤群 等閱讀機則可繼續保持在低功 可利用定期規則讓靜音閱讀機 形中’則可結合都卜勒啟動及 音閱讀機變成主動模式。其目 消耗及頻寬使用率降低至最小 如圖19所示,在4096個頻率為62.5_的時脈循環間隔 中’所有的閱讀機可於至少16個頻率為砭邊的時脈循環 (256㈣中定期且同時中止AM調變(將其關閉載波或執行 RF)。 「巨時脈循環(Macro_Cl〇ck Cycle)」的啟動點可由「主 閱讀機」或其它控制單元(如果有的話)來控制’不然,便 必須由第一閱讀機啟動及控制此巨時脈循環,以便在範圍 廣達300公尺的「儲存區」中活動。該等靜音時段的變化 範圍可能介於16至4096個時脈週期(256 至65 ms)。 「靜音 時段」規則優先順序高於任何其它的週期或啟動規則。在 靜音時段中,閱讀機都不能試圖變成主動模式。r靜音時 段」規則的目的係為讓其它的FCC元件有機會進行通信, 並且促進等極3、等級4標籤以及其它長距離元件的操作。 「靜音時段」規則亦可促進閱讀機至閱讀機及閱讀機至主 -43 - 1228683 發明說明續頁 (39) 機的互動,並且提供較佳的跳頻窗。 在閱讀機第一次變成主動模式之前,其必須先監聽至少 一段完整的巨時脈循環,並且從主閱讀機、其它閱讀機、 或300公尺範圍之内的其它控制單元中偵測62.5 kHz的調 變。接著,每個閱讀機便會將其62.5 kHz調變與此共同的參 考時間進行同步,並且在下個巨時脈循環開始時變成主動 模式。 所有的閱讀機跳頻都必須發生在巨時脈循環的靜音間隔 中,並且與靜音時段的起點或終點保持至少1 ps的重疊。 應用層 如前面所述,本文的標籤含有一辨識符號,可將其稱為 位址或辨識碼。位址或編碼等術語可交換使用,本發明内 文中對兩者的使用方式沒有任何限制。在其中一具體實施 例中,標籤位址長度可能是64個位元,不過在其它的具體 實施例中有可能較短或較長。 該編碼之後便是儲存在該標籤中的資料。亦可將資料儲 存在網路或網際網路中,並且利用從該標籤中擷取出來的 編碼到該網路或網際網路中存取該等資料。可以數種方式 存取及解譯編碼後面的資料。舉例來說,編碼可能是由一 個或多個資料欄位所組成的,與該等閱讀機介接的主機系 統都能夠暸解該等資料欄位的明確意義。 此外,在程式化期間可運用資料壓縮技術,將標籤所需 求的記憶體大小降低至最小程度。常駐在閱讀機、主機系 統或網路(包括網際網路)中的演算法則可將該標籤資料解 -44 - 1228683 (40) 發明說明續頁 壓縮成具有可直接應用的形式。雖然,實現的方式有所 同,不過,其目標都是讓資訊與實體物件產生連結。 標籤記憶體結構 下面將說明一種記憶體配置的具體實施例,當然,亦 實施其它的配置方式。雖然標籤可具有不同的記憶體 量,不過,如果設計條件是希望促進使用共同的辨識技 及搜尋方法的話,其記憶體便至少有一部份配置必須 同。圖20A及20B所示的便係一 96位元記憶體配置的具體 施例。 標籤記憶體可能是唯讀記憶體、非揮發性記憶體或兩 並用。舉例來說,可由標籤製造商將該編碼寫入標籤中 如果欲由使用者寫入該標籤編碼的話,該標籤便必須具 非揮發性記憶體(例如EEPROM)或可一次程式化的記憶 (OPT)。混合的方式是,將標頭、製造商及產品欄位儲 在唯讀記憶體中,將序號儲存在EEPROM中。該標籤所 求的記憶體只要足夠儲存辨識碼即可。 前面所述的各種具體實施例都並非欲限制本發明。可 計不同的標籤等級以適應不同的應用及成本條件。在部 具體實施例中,不同等級的標籤可一起工作。標籤與感 器、時脈、顯示器及其它元件之間亦可能會有標準化的 線輸入/輸出(I/O)介面。 標藏資料及其使用 本文所述的標籤可運用於各式各樣的應用中。舉例 說,可將標籤應用在產品製造上,用以進行編碼及驗證 不 可 容 術 相 實 者 〇 有 體 存 需 設 分 測 有 來 -45 - 1228683 發明說明續頁 (41) 可將標籤登入電子標籤資料庫中。於生產設備中追蹤進行 中的工作。利用標籤管理及控制存貨,亦可利用標籤進行 查核。標籤亦可運用於配貨及倉庫應用中,包括運輸、接 收、追蹤及遞送。亦可應用於交通運輸中,例如監視來往 的車輛。 由於該標内含有特有的辨識符號,因此可進行防偽的應 用。 零售應用包括接收、存貨管理、追蹤商店内的物品,以 及防竊,例如,前後門的竊賊偵測以及竊賊預警。 亦可將標籤關閉(不發揮作用)並且保持待命狀態(可重新 啟動的標籤)。可以破壞性序列程式化標籤,以保護客戶 的隱私。 標籤可運用於客戶購物車、自動結帳櫃檯、及在商店的 顯示器中與客戶進行互動。其特點包括客戶忠誠功能、產 品歸還、所有權證明以及擔保等。 在家庭中(貨物售出後)亦可使用閱讀機,並且可將其内 建於家電或傢倶之中,例如微波爐、冰箱、料理台、櫥櫃、 洗衣機、影音設備及電腦設備。 標籤亦可使用於(用完之後的)廢棄物處理分類中,例如 提供處置資訊、回收資訊、危險材料辨識及處理資訊。 標籤及閱讀機可使用於飛機行李處理、機票、通關及許 可管制中。 可以想像的是,標籤可放置於各種不同類型的物件中, 例如交易流中的產品,而且該等標籤都可與上述任一種具 -46- 發明說明續頁 1228683 (42) 體貫施例共同使用。舉例來說,可將特有的標籤放置在雜 貨店或超級市場的商品中(例如麥片商品的包裝盒、湯罐 等)。一般來說,製造商(例如康寶(CAMBELL)濃湯或 KELLOGGS)都會將特有的標籤放置在每一種商品的包裝 上,然後利用此仏戴維遵倉庫、貨車(或其它運輸工具)或 商店中(雜貨店、超級市場或服飾店)的存貨。 進一步地說,可將標籤使用在商店中的商品「結帳」運 用中(其方式類似慣用的商品條碼,只不過進行購買時必 須在超級市場的結帳櫃檯之類的地方進行條碼的掃描)。 不論是維護存貨或進行商品結帳操作,都必須以閱讀機讀 取該標籤方能取得該標籤特有的編碼。經由比對資料庫中 與該編碼相關的其它資訊,例如商品名稱、商品規格、零 售價格等,便可利用該特有的編碼進行商品辨識。每件商 品樣本(例如,每罐FROSTED FLAKES麥片)的標籤都具有一 特有的辨識碼,或者相同商品的標籤(例如,每罐16盎司 的FROSTED FLAKES麥片)具有相同的辨識碼。 亦可將標籤放置在家電用品中,例如烤麵包機、咖啡調 理機、TV、DVD播放機等,當將具有標籤的家電用品帶回 家時,閱讀機便會對該標籤進行訊問’接著便可將其進行 配置以便與家中(尤其是具有區域網路(LAN)或區域操作網 路(LON)的地方)的其它家電用品一起工作。 並非必須以無線的方式方能與標籤進行溝通(例如標藏 與閱讀機間的溝通)。通信媒介可能是無線的或有線的。 舉例來說,可透過家用電源線或匯流排進行有線連接取代 -47- 1228683 發明說明續頁 (43) 無線通信。During modulation, the active reader provides a nominal 62.5 kHz clock signal to neighboring tags. In Figure 13, the tags are synchronized with the active reader at the negative edge of the RF envelope 1302 (that is, the off period of the reader's transmission). As shown in FIG. 1432, each 62.5 kHz clock interval includes a basic sub-clock cycle, and its time length is substantially 16 microseconds (ps). The binary data transmitted from the reader to the tag, after encoding, will become the pulse width modulation of the low level pulse bounded between the 2 ps and 6 ps substantial limits. Preferably, for any command frame, the clock tolerance of the reader must be within 1%. Negative direction pulse width is the smallest. The smallest change is ± 1%. Therefore, it is 2 ps at 62.4 kHz and 1.972 ps at 63.36 kHz. European operation requires that the negative pulse width must be proportional to the modulation frequency. For a better system, all other "basic clock cycle" timings must be proportional to the value of ± 1% of the modulation clock frequency. -38- 1228683 (34) Description of the Invention Continued Modulation Timing Table 10 contains the nominal value of the negative pulse width modulation (RF interrupt period) used to transmit data to the tag. Modulation timing 2 ps ± 0.2 ps Reader logic 0 (rise and fall 300 ns) 4 ps ± l ps Tag discrimination point triggered in the modulation clock 6 ps ± 0.2 ps Reader logic 1 10 ps ± l ps start Reader logic-1 phase transition (up and down 500 ns) 12 ps soil 1 ps End reader logic-1 phase transition (up and down 500 ns) 2 ps ± l ps logic-1 phase transition pulse width 16 ps ± 0.2 ps The next modulation timing of the reader. Table 10 The modulation timing is shown in 1462 in Figure 14. For the clock timing of the reader to the tag, when the data = "0", the 62.5 kHz is used. The 2 ps "narrow" pulse width of the clock is encoded. In 1402 of FIG. 14, for the clock timing from the reader to the tag, when the data = "1", it is encoded with the 6 ps "wide" pulse width of the 62.5 kHz clock. Tag-to-Reader Modulation In the specific embodiment discussed below, as shown at 1500 in FIG. 15, the tag responds to the reader command with a backscatter modulation that conforms to 4-spaced bit-lattice coding technology. It can be seen from the figure that in bit field 1502, level 0 has two transitions; in 1504, level 1 has four transitions. The nominal data transfer rate from the tag to the reader is 128,000 bits per second (ie -39-1228683 (35) Description of the Invention Continued 128 kbps), but due to the possibility of oscillation drift in the tag, the entire 80 bits In the response window, the change may be as high as 25%. For target readers, the length of this bit time is approximately 8 ps. As shown in Figure 15, the difference from Manchester coding is that in this technique, a transition must occur in the middle of the bits, so 0 and 1 are determined during the time when the coding is reversed. Referring to FIG. 15, 1530 represents a -yuan tributary sequence 'and 1540 represents the 8-bit lean sequence. Race Detection In general, race detection is important for most anti-collision algorithms. When two tags have the same clock frequency and their back-modulated waveforms differ by only one bit, the reader must be able to easily detect the differences caused by these back-scattered modulated waveforms. This is shown in Figure 1600. In 1602 of Fig. 16, a bit difference can be identified, in which there are two consecutive bits in the logical state (i.e., 1). If the clock frequencies of the two tags are different, the re-tagging competition detection will be easier. The signal difference between the system tags shown in 1630 in FIG. 16 has a one-dimensional difference in the modulation waveforms of the two tags, and the clock frequency difference is 50%. The competition for tag responses will produce a waveform that is different from the combination of bit cells 1502 and 1504 (Figure 15). The reader-to-reader anti-collision method in a reader-intensive environment is compared with other closed systems. In the general chain supplier sales environment, it is more difficult to manage the interaction of a large number of readers and tags. The horses in the eighth place are all oppositely scattered enough to light the 16 out of this one, with more than two bits of modulation or zero shape. -40- 1228683 Description of the Invention Continued (36) There are multiple methods of interference sources, and there will only be 10% of the tags that are compatible with the standard 1706-style reader. Fig. 17 "Time" allows the output to have 1 ms to determine that the low-power backscatter modulation signal will be obscured by various environments in the environment (including the modulation signals of other readers). One of them reduces the reader-to-reader interference to a minimum. A specific embodiment is to implement cooperative time sharing in a local neighborhood. When the readers operate in the same real-time space, an "active" reader in the "neighborhood" can operate at full power and sign for two-way talks, as shown in Figures 1702a and 1704a. As shown in 1704, 1708, and 1710, other non-active mode readers in this real-time area are called "silent" readers, and may be "off" or operate with less power (usually less than the maximum allowable RF) Power continuous wave (CW) mode. All readings operating in silent mode detect communication activity between the full-power active reader and the antenna pattern that falls within its range. When in low-power silent mode, the reader is silent It can still maintain its frequency hopping pattern, but it will not modulate its output. When the active reader completes the communication cycle with the tags in its range, it will stop modulating for at least 20 ms (this time it will become a silent reader). The silent reader has ample time to become active mode. This is the 20 ms period shown in 1720. When the silent reader detects an open space in 1730, one of the readers will become active mode. Enter the maximum allowable power state and start communicating with neighboring tags. When no active reader is detected for transmission for at least the period, it is an open interval As mentioned earlier, after detecting the "Open Neighborhood Interval", all Greek 1228683 Invention Description Continued (37) silent readers that are expected to become active mode may have a virtual range between 0 and u ms. This action is made after a random delay period. Figure 17 shows the virtual random delay period at 174 of T. Refer to Figure 18, if there are two or more silent reading money in the same neighborhood (for example, Reader 18 0 8 and 1 810) at the same time changed to active mode, and if we all detect the condition of 1820, they will immediately return to silent mode Y. Then, we must stay in silent mode for another period of virtual random delay time ' Only then can it try to become an active fork. The virtual random delay time should be between 1-20 ms, and Rd2 in 1812 represents this time. After the delay 1812 starts, the reader 1810 must monitor whether there is another A reader is about to change to active mode. If detected in 1830, it should stop attempting to change to active mode. Reader 1810 should remain silent until the next channel. Until the headroom. Except for the 20 ms interval specified by 1720, these readers cannot switch to active mode. When these readers repeatedly execute this virtual random delay cycle, all other in their neighborhood The readers must remain silent and cannot change to active mode until the next neighborhood interval is detected. Outside of this open detection interval, the readers cannot change from silent mode to active mode. The sum of Rd2 of 1812, plus the open channel detection period, can't make the reader into active mode within the 20 Cong interval specified by 1720, the reader should be kept silent or turned off. Medium 'until the next open interval is detected. In any case, software can be used to construct periodic usage rules for the interval of each reader. However, in any case, the mute reader-42- (38) 1228683 Description of the Invention The continuation page must check the availability of the neighborhood interval. Activating the optional device. 0 At this time. 5 RF field signals emitted by the reader of the isophonic mode. If you do not observe the tag group in the reader field of Doppler, you do n’t need too much power. In this mode, 0 becomes the active mode in some cases. In order to transfer the power, the power level is 0. Before the transition to the active mode, the reader may also be equipped with a Doppler reader to be able to detect the Doppler signal caused by any movement in the low power static state. 'The reader can assume no change. Therefore, readers such as the tag group can continue to keep low power. Periodic rules can be used to keep silent readers in shape. 'Combined with Doppler activation and audio readers become active mode. Its net consumption and bandwidth usage rate are reduced to a minimum as shown in Figure 19. In a 4096 clock cycle interval with a frequency of 62.5_, all readers can operate at least 16 clock cycles with a frequency of 砭 (256㈣ Intermittently and simultaneously suspend AM modulation (turn off the carrier or perform RF). The starting point of the "Macro_Clock Cycle" can be from the "Master Reader" or other control unit (if any) To control, otherwise, the first clock cycle must be activated and controlled by the first reader in order to move in a "storage area" with a range of up to 300 meters. These silent periods may vary from 16 to 4096 Clock period (256 to 65 ms). The "silent period" rule takes precedence over any other period or activation rule. During the silent period, the reader cannot attempt to become active. The purpose of the "silent period" rule is Give other FCC components the opportunity to communicate, and promote the operation of equal 3, level 4 tags and other long-distance components. The "silent period" rule can also promote reader to reader and reader to master -43-1228683 INTRODUCTION TO THE CONTINUATION (39) The machine interacts and provides a better frequency hopping window. Before the reader becomes active mode for the first time, it must first listen for at least one complete giant clock cycle, and 62.5 kHz modulation detected in the master reader, other readers, or other control units within 300 meters. Each reader then synchronizes its 62.5 kHz modulation with this common reference time , And become active mode at the beginning of the next giant clock cycle. All reader frequency hopping must occur in the quiet interval of the giant clock cycle and keep at least 1 ps overlap with the start or end of the quiet period. Application layer As mentioned above, the label in this article contains an identification symbol, which can be referred to as an address or identification code. Terms such as address or encoding are used interchangeably, and there is no restriction on the use of the two in the context of the present invention. In a specific embodiment, the tag address length may be 64 bits, but in other specific embodiments, it may be shorter or longer. The encoding is then stored in the tag. Data in the Internet. You can also store the data on the Internet or the Internet, and use the code extracted from the tag to access the network or the Internet. You can access it in several ways. And interpret the data behind the code. For example, the code may be composed of one or more data fields, and the host system that interfaces with these readers can understand the clear meaning of the data fields. , The data compression technology can be used during programming to reduce the memory size required for the tag to a minimum. Algorithms resident in the reader, the host system or the network (including the Internet) can resolve the tag data -44-1228683 (40) Description of the invention The continuation page is compressed into a form that can be directly applied. Although implemented in a different way, the goal is to link information to physical objects. Tag Memory Structure The following will describe a specific embodiment of the memory configuration. Of course, other configurations are also implemented. Although tags can have different amounts of memory, if they are designed to promote the use of common identification techniques and search methods, at least a portion of their memory must be configured the same. 20A and 20B are specific examples of a 96-bit memory configuration. Tag memory may be read-only memory, non-volatile memory, or both. For example, the code can be written into the tag by the tag manufacturer. If the tag code is to be written by the user, the tag must have non-volatile memory (such as EEPROM) or one-time programmable memory (OPT ). The hybrid approach is to store the header, manufacturer, and product fields in read-only memory and the serial number in EEPROM. The memory required by the tag is sufficient to store the identification code. The foregoing specific embodiments are not intended to limit the present invention. Different labeling levels can be counted to suit different applications and cost conditions. In some embodiments, tags of different levels may work together. There may also be standardized line input / output (I / O) interfaces between tags and sensors, clocks, displays, and other components. Collection information and its use The labels described herein can be used in a wide variety of applications. For example, the label can be applied to product manufacturing for coding and verification. The physical storage needs to be set up. -45-1228683 Description of the invention continued page (41) The label can be entered into the electronic Tag library. Track work in progress in production equipment. Use labels to manage and control inventory, and also use labels to check. Tags can also be used in distribution and warehouse applications, including shipping, receiving, tracking, and delivery. It can also be used in transportation, such as monitoring passing vehicles. Since the standard contains a unique identification symbol, it can be used for anti-counterfeiting applications. Retail applications include receiving, inventory management, tracking items in stores, and preventing theft, such as thief detection at front and back doors and thief alert. Labels can also be closed (no effect) and left on standby (restartable labels). The tags can be destructively sequenced to protect customer privacy. Tags can be used in customer shopping carts, automated checkout counters, and to interact with customers on store displays. Its features include customer loyalty functions, product return, proof of ownership, and guarantees. Readers can also be used in homes (after the goods are sold) and can be built into appliances or furniture, such as microwave ovens, refrigerators, cooking tables, cabinets, washing machines, audiovisual equipment and computer equipment. Labels can also be used in waste disposal classification (after use), such as providing disposal information, recycling information, identification of hazardous materials, and disposal information. Tags and readers can be used in aircraft baggage handling, air tickets, customs clearance and permit control. It is conceivable that labels can be placed in a variety of different types of objects, such as products in a transaction stream, and these labels can be used in conjunction with any of the above-mentioned inventions. use. For example, unique labels can be placed in grocery or supermarket items (such as cereal boxes, soup cans, etc.). Generally, manufacturers (such as CAMBELL thick soup or KELLOGGS) place unique labels on the packaging of each product, and then use this to comply with David ’s warehouse, truck (or other transportation) or store (Grocery, supermarket, or clothing store). Furthermore, the label can be used in the "checkout" operation of the product in the store (the method is similar to the conventional product barcode, except that the barcode must be scanned at the checkout counter in the supermarket when making a purchase) . Regardless of the maintenance of inventory or the checkout of goods, the tag must be read by a reader to obtain the unique code of the tag. By comparing other information related to the code in the database, such as product name, product specifications, retail price, etc., the unique code can be used for product identification. Each product sample (for example, each can of FROSTED FLAKES oatmeal) has a unique identification code, or the label of the same product (for example, 16 ounces of FROSTED FLAKES oatmeal) has the same identification code. The tag can also be placed in home appliances, such as a toaster, coffee maker, TV, DVD player, etc. When the home appliance with the tag is brought home, the reader will interrogate the tag It can be configured to work with other appliances in your home, especially where you have a local area network (LAN) or a local operating network (LON). It is not necessary to communicate with the tag wirelessly (such as communication between the tag and the reader). The communication medium may be wireless or wired. For example, a wired connection can be replaced by a household power cord or bus -47-1228683 Invention Description Continued (43) Wireless communication.

部分上述的演算法會將數值空間分成二部分,以進行標 籤搜尋。可發現到其它的數值空間分割方式可能會更有 效。因此,本發明的演算法可以不將數值空間進行二分處 理(除以2)(當一開始的空間非常大的時候,例如264個可能 的標籤辨識碼,將欲搜尋的空間二分之後仍然非常大), 而將該空間其分割成更小的部分(例如該數值空間的1/50或 1/100,然後搜尋該等較小的部分)。Some of the above algorithms will divide the numerical space into two parts for label search. It is found that other numerical space segmentation methods may be more effective. Therefore, the algorithm of the present invention can not perform binary processing (divide by 2) on the numerical space (when the initial space is very large, for example, 264 possible tag identification codes, the space to be searched is still very large after the binary ), And divide the space into smaller parts (for example, 1/50 or 1/100 of the numerical space, and then search for these smaller parts).

依照本揭露,可發現到該等配合圖式所述的方法可以機 器可執行的指令(例如軟體)來具現。該等指令可用以讓已 經過該等指令程式化之後的一般用途或特殊用途的處理器 執行所述的操作。或者,可由包含執行該等操作之硬體邏 輯之特定硬體組件,或藉由程式化的電腦組件及客戶硬體 組件的任何組合來執行。本方法可提供做為一電腦程式產 品,其可能包含一機器可讀取媒體,其上儲存著指令,用 於程式化一電腦(或其它電子元件以執行該等方法。 為達此規格,「機器可讀取媒體」一詞應該包括任何媒 體,其能夠儲存或編碼欲由該機器執行的指令序列,並且 讓該機器執行本發明的任一種方法。因此,「機器可讀取 媒體」一詞應該包括,但不受限,固態記憶體、光學及磁 式碟片、以及載波信號。 再者,當欲進行動作或產生結果的時候,本技藝中經常 會提到任一種形式的軟體(例如程式軟體、程序軟體、製 程軟體、應用軟體、模組軟體、邏輯軟體)。此類表示法 -48 - 1228683 發明說明續頁 (44) 都僅係一種簡略的表達方式,用以敘述由電腦執行該軟體 以便讓該電腦的處理器執行一項動作或產生一種結果。 可能的修改 在「發訊」或「捲動」標籤回應中的資料數量及類型都 可改變。舉例來說,「發訊」標籤可能包括單一個位元、 16位元或以上的群組、或非ID資訊(例如虛擬隨機安全碼、 錯誤校正碼、所儲存的資料、感測器資料等)、以及其中 一具體實施例中所述的8位元的辨識碼資訊群組。同樣地, 「捲動」可能包括2個至數百個位元,可能包括CRC錯誤校 正碼資訊、安全編碼、所儲存的資料、感測器資料等。 此協定中所有的參數都可加以改變,以適應各種應用, 該等變化包括:位元的數量、所下載的命令的類型及長度、 背向散射資料速率、以及該閱讀機是否要從該標籤回應中 抽取出所有的資料或是僅抽取其中一部份(其大部分是取 決於環境的雜訊干擾程度)。背向散射資料速率的範圍可 從低於歐洲的16 kHz下行鏈路速率至美國的64-80 kHz。在其 中一具體實施例中可到128 kHz,某些具體實施例中則可到 256 kHz甚至更高。背向散射資料速率可能是下行鏈路資料 /時脈速率的非整數倍,在其中一實例中,下行鏈路可能 是80 kHz,而背向散射資料速率可能是130 kHz。 某些具體實施例可能會使用「快速捲動」的操作模式, 其中會使用到兩種以上的「位元時脈」(舉例來說,可稱 為「位元0」及「位元1」)。「位元0」時脈的操作方式與 目前的位元相同。不過,如果閱讀機判斷出最後的「發訊」 -49 - 1228683 (45) 發明說明續頁 命令係來自單一個標籤的話,其便會立即提供「位元1」 時脈給該標籤,讓送出該最後的發訊命令的標籤能夠立即 對其餘的所有ID及CRC資訊重新進行背向散射,用以進入 快速的部分「捲動」模式中。其它的標籤(除了剛完成「發 訊」回應的標籤之外)將會忽略由該閱讀機所傳送過來的 該「位元1」時脈。當完成該「部分捲動」之後,閱讀機 便會向下傳送「位元〇」,讓下個位元中的任意標籤進行 回應。依照此方式,利用一個閱讀機命令便能夠辨識出至 少一個(多則8至16個)的標籤,大幅地提升標籤辨識搜尋速 率〇 同樣地,某些具體實施例可能會使用較短的(一般為4個 位元,但是其範圍可能從1個位元至80個位元)「後置 (suffix)」命令,其僅會操作於剛完成捲動命令並回傳給該 閱讀機的標籤上。該等命令可能包括睡眠命令,或可以編 碼匹配(例如16位元的CRC編碼)情形作調整的睡眠命令。 其它的後置命令包括讀取、寫入等。該等後置命令的主要 優點在於,與直接從該閱讀機向下傳送整個131位元的標 籤專用命令比較起來,其操作速度快了數倍。 至此,已經說明新穎的辨識方法及裝置。雖然已經參考 特定的具體實施例對本發明作說明,不過,熟習本技藝的 人士都可輕易地對其進行修改。因此,所有這些變化及修 改都必須視為涵蓋於隨附申請專利範圍所定義的本發明的 範®壽中。因此,說明書暨附圖都應僅視為一種解說,而不 應視為一種限制。 -50-According to this disclosure, it can be found that the methods described in the accompanying drawings can be realized by machine executable instructions (such as software). These instructions may be used to cause a general-purpose or special-purpose processor that has been programmed with these instructions to perform the described operations. Alternatively, it may be performed by specific hardware components containing hardware logic to perform these operations, or by any combination of programmed computer components and customer hardware components. This method can be provided as a computer program product, which may include a machine-readable medium on which instructions are stored for programming a computer (or other electronic component to perform these methods. To achieve this specification, " The term `` machine-readable medium '' should include any medium capable of storing or encoding a sequence of instructions to be executed by the machine and having the machine perform any of the methods of the present invention. Therefore, the term "machine-readable medium" It should include, but is not limited to, solid-state memory, optical and magnetic discs, and carrier signals. Furthermore, when you want to perform actions or produce results, this form of software is often mentioned in any form (such as (Program software, program software, process software, application software, module software, logic software). Such notations -48-1228683 Description of the Invention (continued on page 44) are only a brief expression used to describe the execution by the computer Software to allow the processor of the computer to perform an action or produce a result. Possible modifications in the "messaging" or "scrolling" tab responses The amount and type of data can be changed. For example, the "Send" tag may include a single bit, a group of 16 bits or more, or non-ID information (such as a virtual random security code, error correction code, stored Data, sensor data, etc.), and the 8-bit identifier information group described in one of the specific embodiments. Similarly, "scroll" may include 2 to hundreds of bits, and may include CRC error correction code information, security code, stored data, sensor data, etc. All parameters in this agreement can be changed to adapt to various applications. These changes include: number of bits, downloaded commands Type and length, backscattered data rate, and whether the reader wants to extract all or only a portion of the data from the tag response (most of which depend on the level of environmental noise interference). The backscattered data rate can range from a lower 16 kHz downlink rate in Europe to 64-80 kHz in the United States. In one embodiment it can reach 128 kHz, in some embodiments it can be Up to 256 kHz or higher. The backscattered data rate may be a non-integer multiple of the downlink data / clock rate. In one example, the downlink may be 80 kHz and the backscattered data rate may be 130. kHz. Certain embodiments may use a "fast scrolling" mode of operation, which uses more than two "bit clocks" (for example, it can be called "bit 0" and "bit 1 "). The operation method of the" bit 0 "clock is the same as the current bit. However, if the reader judges the last" message "-49-1228683 (45) Invention description The continuation page command is from a single If it is a tag, it will immediately provide the "bit 1" clock to the tag, so that the tag sending the last signaling order can immediately backscatter all the remaining ID and CRC information to enter the fast In some "scroll" modes. Other tags (except the tags that have just completed the "message" response) will ignore the "bit 1" clock transmitted by the reader. When the “Partial Scrolling” is completed, the reader will send “Bit 0” down, and let any tag in the next bit respond. In this way, at least one (up to 8 to 16) tags can be identified with a single reader command, greatly improving the tag identification search rate. Similarly, some specific embodiments may use shorter (generally It is 4 bits, but its range may be from 1 bit to 80 bits) "suffix" command, which will only operate on the tag that has just completed the scroll command and returned to the reader . Such commands may include sleep commands, or sleep commands that can be adjusted for code matching (eg, 16-bit CRC encoding) situations. Other post commands include read, write, etc. The main advantage of these post-commands is that they operate several times faster than the tag-specific commands that directly transmit the entire 131-bit tag down from the reader. So far, the novel identification method and device have been described. Although the present invention has been described with reference to specific embodiments, those skilled in the art can easily modify it. Therefore, all these changes and modifications must be regarded as covered by the scope of the present invention as defined in the scope of the accompanying patent application. Therefore, the description and drawings should only be regarded as an explanation, not as a limitation. -50-

Claims (1)

122續設123291號專利中請案γ :警 中文申請專利範圍替換本(93年4月食i ^ 拾、申請專利範圍 1. 一種用以辨識複數個標籤的方法,每個標籤都具有儲存 於記憶體中的辨識碼,該方法包括: 廣播一具有第一資料的命令;以及122 Continuation of Patent No. 123291 γ: Police Chinese Application for Patent Scope Replacement (April, 1993) ^ Pickup, Application for Patent Scope 1. A method for identifying multiple labels, each label has a storage in The identification code in the memory, the method comprising: broadcasting a command with the first data; and 從標籤中接收該命令的回應;其中該回應與複數個位 元中的一位元有關,該位元相當於被選定的儲存在該標 籤的資訊中的位元組數值,該被選定的位元組係該第一 資料的函數。 2. 如申請專利範圍第1項之方法,其中該回應包含該資訊另 一位元組的數值。 3. 如申請專利範圍第1項之方法,其中該回應包含來自不同 於該資訊的第二資訊中的資料。 4. 如申請專利範圍第1項之方法,其中該資訊係該標籤的該 辨識碼。Receive a response to the command from the tag; where the response is related to a bit in a plurality of bits, which is equivalent to the value of the selected byte stored in the tag's information, the selected bit The tuple is a function of the first data. 2. For the method of claim 1 in the scope of patent application, wherein the response contains a value of another byte of the information. 3. The method of item 1 in the scope of patent application, wherein the response contains data from a second piece of information that is different from the information. 4. The method according to item 1 of the scope of patent application, wherein the information is the identification code of the label. 5. 如申請專利範圍第1項之方法,其中該資訊係該標籤的記 憶體的狀態。 6. 如申請專利範圍第1項之方法,其中該資訊係被選定的該 標籤的輸入/輸出資料。 7. 如申請專利範圍第1項之方法,其中該資訊係被選定的該 標籤的輸入/輸出資料。 8. 如申請專利範圍第1項之方法,其中該等複數個位元中每 一個位元都與所對應的該回應的預設時間延遲有關。 9.如申請專利範圍第1項之方法,其中該等複數個位元中每一 12286835. The method according to item 1 of the scope of patent application, wherein the information is the state of the memory of the tag. 6. The method according to item 1 of the scope of patent application, wherein the information is the input / output data of the selected tag. 7. The method according to item 1 of the scope of patent application, wherein the information is the input / output data of the selected tag. 8. The method of claim 1 in the patent application range, wherein each of the plurality of bits is related to a corresponding preset time delay of the response. 9. The method of claim 1 in the scope of patent application, wherein each of the plurality of bits is 1228683 申請專利範圍續頁 個位元都與所對應的來自該閱讀機的預設信號有關。 中每 的時 個位 調信 調信 二音 等複 體中 資訊 第一 應給 其中 資訊 10. 如申請專利範圍第1項之方法,其中該等複數個位元 一個位元都與不同於該等複數個位元中另一個位元 間延遲有關。 11. 如申請專利範圍第1項之方法,其中可改變該等複數 兀的編號。 12. 如申請專利範圍第1項之方法,其中該回應係透過音 號來接收。 13. 如申請專利範圍第12項之方法,其中該等複數個音 號包括代表邏輯0的第一音調,以及代表邏輯1的第 調。 14. 一種由複數個標籤中的一個標籤所執行的方法,該 數個標籤中的每個標籤都具有儲存於該標籤之記憶 的辨識碼,該方法包括: 從閱讀機接收第一資料; 將該第一資料與所選出的儲存在該標籤記憶體的 中的位元組進行關聯處理,該被選定的位元組係該 貧料的函數,以及 如果該第一資料與該位元組有關的話,便傳輸回 該閱讀機,該回應與複數個位元中的一位元有關, 該回應的位元會對應該被選定的位元組的數值。 15. 如申請專利範圍第14項之方法,其中該回應包含該 另一位元組的數值。 16.如申請專利範圍第14項之方法,其中該資訊係該標籤的 122868 丨修正 年月The continuation of the patent application range. Each bit is related to the corresponding preset signal from the reader. In the case of each unit, the first message in the complex such as the second letter and the second tone should be given the information. 10. For the method of the first scope of the patent application, where the multiple bits and one bit are different from those The delay between the other bits in the plurality of bits is related. 11. In the method of applying for the item 1 of the patent scope, the plural numbers may be changed. 12. The method of claim 1 in which the response is received via a tone. 13. The method according to item 12 of the patent application, wherein the plurality of tones include a first tone representing a logical zero and a tone representing a logical one. 14. A method performed by one of a plurality of tags, each of the tags having an identification code stored in a memory of the tag, the method comprising: receiving first data from a reader; The first data is associated with the selected byte stored in the tag memory, the selected byte is a function of the lean material, and if the first data is related to the byte If so, it is transmitted back to the reader, and the response is related to one of the plurality of bits, and the bit of the response will correspond to the value of the selected byte. 15. The method of claim 14 in which the response includes the value of the other byte. 16. The method according to item 14 of the scope of patent application, wherein the information is 122868 of the label 申請專利範圍續頁 該辨識碼。 17. 如申請專利範圍第14項之方法,其中該資訊係該標籤的 記憶體狀態。 18. 如申請專利範圍第14項之方法,其中該資訊係被選定的 該標籤的輸入/輸出資料。 19. 如申請專利範圍第14項之方法,其中該等複數個位元中 每一個位元都與所對應的該回應的預設時間延遲有關。Patent Application Continued This identification code. 17. The method according to item 14 of the patent application, wherein the information is the memory status of the tag. 18. The method of claim 14 in which the information is the input / output data of the selected tag. 19. The method according to item 14 of the patent application, wherein each of the plurality of bits is related to a corresponding preset time delay of the response. 20. 如申請專利範圍第14項之方法,其中該等複數個位元中 每一個位元都與所對應的來自該閱讀機的預設信號有 關。 21. 如申請專利範圍第14項之方法,其中該回應係透過複數 個音調信號來傳輸。 22. 如申請專利範圍第21項之方法,其中該等複數個音調信 號包括代表邏輯0的第一音調,以及代表邏輯1的第二音 調。20. The method according to item 14 of the patent application, wherein each of the plurality of bits is related to a corresponding preset signal from the reader. 21. The method of claim 14 in which the response is transmitted through a plurality of tone signals. 22. The method of claim 21, wherein the plurality of tone signals include a first tone representing a logic zero and a second tone representing a logic one. 23. —種由閱讀機執行用以從複數個標籤中辨識出其中一個 標籤的方法,該等複數個標籤中的每個標籤都具有一辨 識碼及一記憶體,該方法包括: 將數值空間分割成η個位元,其中每個位元都與該數值 空間中m個位元所界定的不同數值有關,而且該數值空 間會與儲存在該等複數個標籤之記憶體中的資訊有關,η 為大於2的整數; 發出命令測試由該數值空間中ν個位元所界定的數值 ;以及 申請專利範圍續頁 1228683 ^9a 從該等複數個標籤中的其中一個標籤中接收回應,其 中當儲存在該標籤中該資訊的V個位元組匹配該命令的V 個位元數值時才會發生回應,該回應的時序會對應於該η 個位元的其中一個位元,與該位元相關的m個位元數值 會匹配從該所選出的資訊中選出的m個位元的數值。 24. 如申請專利範圍第23項之方法,其中除了匹配該命令中 的該v個位元的v個位元以及與該位元有關的該m個位元 之外,該回應進一步包括代表該資訊的一部份的資料。 25. 如申請專利範圍第23項之方法,其中該資訊包括該標籤 的該辨識碼。 26. 如申請專利範圍第23項之方法,其中該回應的該時序與 該命令的時序有關。 27. 如申請專利範圍第23項之方法,當未從該等複數個標籤 中接收到回應時,進一步包括發出第二命令給從該等複 數個標籤中所選出的一個或多個標籤。 28. 如申請專利範圍第23項之方法,當未從該等複數個標籤 中接收到回應時,進一步包括發出第二命令測試由該數 值空間中一組位元所界定的另一個數值。 29. 如申請專利範圍第23項之方法,進一步包括: 從於一位元中回應的兩個或多個標籤中接收回應;以 及 根據該等回應發出另一命令。 30. —種由閱讀機執行的方法,該方法包括: 發出命令給一標籤;以及 申請專利範圍續頁 1228683 從標籤接收回應,其中該回應包括該標藏的辨識碼, 而且該接收及該發出動作不會同時進行。 31. —種用以從複數個標籤中辨識出其中一個標籤的方法, 該等複數個標籤中的每個標籤都具有一辨識碼及一記憶 體,該方法包括:23. A method implemented by a reader to identify one of a plurality of tags, each of the plurality of tags having an identification code and a memory, the method comprising: Divided into n bits, each of which is related to a different value defined by m bits in the numerical space, and the numerical space will be related to the information stored in the memory of the plurality of tags, η is an integer greater than 2; issue a command to test a value defined by ν bits in the value space; and apply for a patent application continued on page 1228683 ^ 9a receive a response from one of the plurality of tags, where A response occurs only when the V bytes of the information stored in the tag match the V bits of the command, and the timing of the response will correspond to one of the n bits and the bit The associated m bit values will match the m bit values selected from the selected information. 24. The method of claim 23, wherein in addition to matching the v bits of the v bits in the order and the m bits related to the bit, the response further includes representing the Part of the information. 25. The method of claim 23, wherein the information includes the identification code of the tag. 26. The method of claim 23, wherein the timing of the response is related to the timing of the command. 27. The method of claim 23, when no response is received from the plurality of tags, further includes issuing a second order to one or more tags selected from the plurality of tags. 28. The method of claim 23, when no response is received from the plurality of tags, further includes issuing a second command to test another value defined by a set of bits in the value space. 29. The method of claim 23, further comprising: receiving a response from two or more tags responding in one bit; and issuing another order based on the responses. 30. A method performed by a reader, the method comprising: issuing a command to a tag; and receiving a patent application continuation page 1228683 receiving a response from the tag, wherein the response includes an identification code of the tag, and the receiving and the issuing The actions are not performed simultaneously. 31. A method for identifying one of a plurality of tags, each of the plurality of tags having an identification code and a memory, the method comprising: 由該等複數個標籤中的其中一個標籤從閱讀機接收一 命令以測試數值空間的v個位元,該數值空間係對應於該 標籤所儲存的資訊;以及 如果該所接收到的V個位元的數值匹配該資訊的V個對 應位元的數值,便發出回應給該閱讀機,其中該回應的 時序會對應該被儲存的資訊的m個位元的數值。 32. 如申請專利範圍第31項之方法,其中除了匹配該命令中 的該v個位元的v個位元以及對應於該時序的該m個位元 之外,該回應進一步包括代表該資訊的一部份的資料。A command is received from the reader by one of the plurality of tags to test the v bits of the numerical space, which corresponds to the information stored in the tag; and if the received V bits The value of the element matches the value of the V corresponding bits of the information, and a response is sent to the reader, wherein the timing of the response is to the value of the m bits of the information that should be stored. 32. The method of claim 31, wherein in addition to matching the v bits of the v bits in the command and the m bits corresponding to the timing, the response further includes representing the information Part of the information. 33. 如申請專利範圍第31項之方法,其中該資訊包括該標籤 的該辨識碼。 34. 如申請專利範圍第31項之方法,其中該回應的該時序與 該命令的時序有關。 35. 如申請專利範圍第31項之方法,其中該標籤的辨識碼會 匹配該等複數個標籤中的另一個標籤的辨識碼。 36. 如申請專利範圍第3 1項之方法,其中該回應係透過複數 個音調信號來傳輸。 37.如申請專利範圍第36項之方法,其中該等複數個音調信 號包括代表邏輯0的第一音調,以及代表邏輯1的第二音 122868333. The method of claim 31, wherein the information includes the identification code of the tag. 34. The method of claim 31, wherein the timing of the response is related to the timing of the command. 35. The method of claim 31, wherein the identification code of the tag matches the identification code of another tag among the plurality of tags. 36. The method according to item 31 of the patent application, wherein the response is transmitted through a plurality of tone signals. 37. The method of claim 36, wherein the plurality of tone signals include a first tone representing a logic 0 and a second tone representing a logic 1 1228683 申請專利範圍續頁 調。 38. —種由標籤執行用以從複數個標籤中辨識出其中一個標 籤的方法,該等複數個標籤中的每個標籤都具有一辨識 碼,該方法包括: 接收來自閱讀機的命令,測試一數值空間中的v個位元 的數值;以及Patent Application Continued 38. A method executed by a tag to identify one of a plurality of tags, each tag of the plurality of tags having an identification code, the method comprising: receiving a command from a reader, testing The value of v bits in a value space; and 如果該所接收到的命令的該v個位元的數值匹配該標 籤辨識碼第一部份的數值的話,便發出回應給該閱讀機 ,其中該回應包括該辨識碼。 39. —種由複數個閱讀機中其中一閱讀機執行用以從複數個 標籤中辨識出其中一個標籤的方法,該等複數個標籤中 的每個標籤都具有一辨識碼,該方法包括:If the value of the v bits of the received command matches the value of the first part of the tag identification code, a response is sent to the reader, where the response includes the identification code. 39. A method executed by one of the plurality of readers to identify one of the plurality of tags, each of the plurality of tags having an identification code, the method comprising: 回應該等複數個閱讀機中其中的第一閱讀機進入主動 模式執行通信循環的結果而進入靜音模式中,其中當完 成該通信循環之後,該第一閱讀機會進入靜音模式維持 一第一時間間隔;以及 當偵測到第二時間間隔中沒有主動閱讀機進行傳輸, 便可在第一虛擬隨機延遲週期之後進入主動模式。 40. 如申請專利範圍第39項之方法,進一步包括: 回應偵測到該等複數個閱讀機中有另一閱讀機同時欲 進入主動模式的結果而進入靜音模式中;以及 當偵測到在第一虛擬隨機延遲週期期間沒有主動閱讀 機進行傳輸,便可在第二虛擬隨機延遲週期之後進入主 動模式。 1228683Responding to the result that the first reader of the plurality of readers enters the active mode to perform a communication cycle and enters the silent mode, wherein after completing the communication cycle, the first reader enters the silent mode for a first time interval And when it is detected that no active reader is transmitting in the second time interval, it can enter the active mode after the first virtual random delay period. 40. The method according to item 39 of the patent application scope, further comprising: responding to the detection that another reader among the plurality of readers wants to enter the active mode at the same time and enters the silent mode; and when it is detected that Without an active reader during the first virtual random delay period, it can enter the active mode after the second virtual random delay period. 1228683 申請專利範圍續頁 41. 如申請專利範圍第40項之方法,其中如果已經過該第一 時間間隔’則無法第二次進入主動模式中。 42. —種包含可執行指令的機器可讀取媒體,當被機器執行 之後,便可讓該機器執行下面的操作: 廣播一具有第一資料的命令;以及Continuation of the scope of patent application 41. For the method of applying scope 40 of the patent application, if the first time interval has elapsed, the active mode cannot be entered for the second time. 42. A machine-readable medium containing executable instructions that, when executed by a machine, allows the machine to perform the following operations: broadcast a command with first data; and 從標籤中接收該命令的回應;其中該回應與複數個位 元中的一位元有關,該位元相當於被選定的儲存在該標 籤的資訊中的位元組數值,該被選定的位元組係該第一 資料的函數。 43. 如申請專利範圍第42項之機器可讀取媒體,其中該回應 包含該資訊另一位元組的數值。 44. 如申請專利範圍第42項之機器可讀取媒體,其中該回應 包含來自不同於該資訊的第二資訊中的資料。 45. 如申請專利範圍第42項之機器可讀取媒體,其中該資訊 係該標籤的該辨識碼。Receive a response to the command from the tag; where the response is related to a bit in a plurality of bits, which is equivalent to the value of the selected byte stored in the tag's information, the selected bit The tuple is a function of the first data. 43. If the machine-readable medium of item 42 of the patent application scope, the response contains the value of another byte of the information. 44. If the machine-readable medium of item 42 of the patent application scope, the response contains data from a second piece of information different from that. 45. If the machine-readable medium of item 42 of the patent application scope, the information is the identification code of the tag. 46. 如申請專利範圍第42項之機器可讀取媒體,其中該資訊 係該標籤的記憶體狀態。 47. 如申請專利範圍第42項之機器可讀取媒體,其中該資訊 係被選定的該標籤的輸入/輸出資料。 48. 如申請專利範圍第42項之機器可讀取媒體,其中該資訊 係由該標籤的感測器所獲取的資料。 49. 如申請專利範圍第42項之機器可讀取媒體,其中該等複 數個位元中每一個位元都與所對應的該回應的預設時間 延遲有關。 122868346. If the machine-readable medium of item 42 of the patent application scope, the information is the memory status of the tag. 47. If the machine-readable medium of item 42 of the patent application scope, the information is the input / output data of the selected tag. 48. If the machine-readable medium of item 42 of the patent application scope, the information is obtained by the sensor of the tag. 49. If the machine-readable medium of item 42 of the patent application scope, wherein each of the plurality of bits is related to the corresponding preset time delay of the response. 1228683 申請專利範圍續頁 50. 如申請專利範圍第42項之機器可讀取媒體,其中該複數 個位元中每一個位元都與所對應的來自該閱讀機的預設 信號有關。 51. 如申請專利範圍第42項之機器可讀取媒體,其中該複數 個位元中每一個位元都與不同於該複數個位元中另一個 位元的時間延遲有關。 52. 如申請專利範圍第42項之機器可讀取媒體,其中可改變 該複數個位元的編號。 53. —種包含可執行指令的機器可讀取媒體,當被機器執行 時可由該機器執行下面的操作: 接收閱讀機所廣播的命令,該命令具有一第一資料; 將該第一資料與所選出的儲存在該機器記憶體的資訊 中的位元組進行關聯處理,該被選定的位元組係該第一 資料的函數,以及 如果該第一資料與該位元組有關,便傳輸回應給該閱 讀機,該回應與複數個位元中的一位元有關,其中該回 應的位元會對應該被選定的位元組的數值。 54. 如申請專利範圍第53項之機器可讀取媒體,其中該回應 包含該資訊另一位元組的數值。 55. 如申請專利範圍第53項之機器可讀取媒體,其中該資訊 係該機器的該辨識碼。 56. 如申請專利範圍第53項之機器可讀取媒體,其中該資訊 係該機器的記憶體狀態。 57·如申請專利範圍第53項之機器可讀取媒體,其中該資訊 1228683 1 4. 2 9 申請專利範圍續頁 係被選定的該機器的輸入/輸出資料。 58. 如申請專利範圍第53項之機器可讀取媒體,其中該等複 數個位元中每一個位元都與所對應的該回應的預設時間 延遲有關。 59. 如申請專利範圍第53項之機器可讀取媒體,其中該複數 個位元中每一個位元都與所對應的來自該閱讀機的預設 信號有關。 60. —種包含可執行指令的機器可讀取媒體,當被機器執行 時可由該機器執行下面的操作: 發出命令測試一數值空間的v個位元所界定的數值,該 數值空間具有η個位元,其中每個位元都與該數值空間中 m個位元所界定的不同數值有關,而且該數值空間會與 儲存在該等複數個標籤之記憶體中的資訊有關,η為大於 2的整數;以及 從該等複數個標籤中的其中一個標籤中接收回應,其 中當儲存在該標籤中該資訊的ν個位元組匹配該命令的ν 個位元數值時才會發生回應,該回應的時序會對應於該η 個位元的其中一個位元,與該位元相關的m個位元數值 會匹配從該所選出的資訊中選出的m個位元的數值。 61. 如申請專利範圍第60項之機器可讀取媒體,其中除了匹 配該命令中的該ν個位元的ν個位元以及與該位元有關的 該m個位元之外,該回應進一步包括代表該資訊的一部 份的資料。 62.如申請專利範圍第60項之機器可讀取媒體,其中該資訊 申請專利範圍續頁 1228682/ - 係該標籤的該辨識碼。 63. 如申請專利範圍第60項之機器可讀取媒體,其中該回應 的該時序與該命令的時序有關。 64. 如申請專利範圍第60項之機器可讀取媒體,進一步包含 可執行的指令,當被該機器執行時可由該機器執行下面 的操作:Continuation of the scope of patent application 50. If the machine-readable medium of the scope of patent application No. 42 is used, each of the plurality of bits is related to the corresponding preset signal from the reader. 51. In the case of a machine-readable medium according to item 42 of the patent application, wherein each of the plurality of bits is related to a time delay different from the other bit of the plurality of bits. 52. If the machine-readable medium of item 42 of the patent application scope, the number of the plurality of bits can be changed. 53. A machine-readable medium containing executable instructions which, when executed by the machine, can perform the following operations: receiving a command broadcast by a reader, the command having a first piece of data; combining the first piece of data with The selected bytes stored in the information of the machine memory are processed in association, the selected bytes are a function of the first data, and if the first data is related to the byte, it is transmitted A response is sent to the reader, and the response is related to a bit in the plurality of bits, where the bit of the response corresponds to the value of the byte that should be selected. 54. If the machine-readable medium of item 53 of the patent application, the response contains a value of another byte of the information. 55. If the machine-readable medium of item 53 of the patent application scope, the information is the identification code of the machine. 56. If the machine-readable medium of item 53 of the patent application scope, the information is the memory status of the machine. 57. If the machine-readable media of item 53 of the scope of patent application, the information is 1228683 1 4. 2 9 The scope of patent application continued page is the input / output data of the selected machine. 58. If the machine-readable medium of the scope of application for item 53 of the patent application, each of the plurality of bits is related to a corresponding preset time delay of the response. 59. For example, the machine-readable medium of the 53rd patent application, wherein each of the plurality of bits is related to a corresponding preset signal from the reader. 60. A machine-readable medium containing executable instructions which, when executed by a machine, can perform the following operations: Issue a command to test a value defined by v bits in a value space, which has n Bits, where each bit is related to a different value defined by m bits in the value space, and the value space is related to the information stored in the memory of the plurality of tags, n is greater than 2 An integer; and receiving a response from one of the plurality of tags, wherein the response occurs only when the ν bytes of the information stored in the tag match the ν bit value of the command, which The timing of the response will correspond to one of the n bits, and the value of m bits associated with the bit will match the value of m bits selected from the selected information. 61. If the machine-readable medium of the scope of patent application number 60, in addition to the v bits matching the v bits in the command and the m bits related to the bit, the response It further includes information that represents part of the information. 62. The machine-readable medium of item 60 of the scope of patent application, wherein the information on the scope of patent application, continuation page 1228682 /-is the identification code of the tag. 63. If the machine-readable medium of item 60 of the patent application scope, the timing of the response is related to the timing of the command. 64. If the machine-readable medium of item 60 of the patent application scope further contains executable instructions, when executed by the machine, the machine can perform the following operations: 當未從該等複數個標籤中接收到回應時,便發出第二 命令給從該等複數個標籤中所選出的一個或多個標籤。 65. 如申請專利範圍第60項之機器可讀取媒體,進一步包含 可執行的指令,當被該機器執行時可由該機器執行下面 的操作: 當未從該等複數個標籤中接收到回應時,便發出第二 命令測試由該數值空間中一組位元所界定的另一個數 值。When no response is received from the plurality of tags, a second command is issued to one or more tags selected from the plurality of tags. 65. If the machine-readable medium of item 60 of the patent application scope further includes executable instructions, the machine can perform the following operations when executed by the machine: When no response is received from the plurality of tags , A second command is issued to test another value defined by a set of bits in the value space. 66. 如申請專利範圍第60項之機器可讀取媒體,進一步包含 可執行的指令,當被該機器執行時可由該機器執行下面 的操作: 從於一位元中回應的兩個或多個標籤中接收回 應,以及 根據該等回應發出另一命令。 67. 如申請專利範圍第66項之機器可讀取媒體,其中藉由觀 察一邏輯狀態或寬度小於一位元寬的邏輯狀態中兩個以 上的連續位元,便可辨識出該等回應。 68. —種包含可執行指令的機器可讀取媒體,當被機器執行 -10- 1228683 〇;:. 申請專利範圍續頁 時可由該機器執行下面的操作: 發出命令給複數個標籤中其中一個標籤;以及 從標籤接收回應,其中該回應包括該標籤的辨識 碼,而且該接收及該發出動作不會同時進行。 69. —種包含可執行指令的機器可讀取媒體,當被機器執行 時可由該機器執行下面的操作:66. If the machine-readable medium of item 60 of the patent application further includes executable instructions, when executed by the machine, the machine can perform the following operations: Two or more responses from one bit Receive responses in the tag and issue another order based on those responses. 67. If the machine-readable medium of item 66 of the patent application scope, these responses can be identified by observing two or more consecutive bits in a logical state or a logical state that is less than one bit wide. 68. — A machine-readable medium containing executable instructions, when executed by the machine-10- 1228683 〇 ;. When the patent application continues, the machine can perform the following operations: Issue a command to one of a plurality of tags A tag; and receiving a response from the tag, where the response includes the tag's identification code, and the receiving and sending actions do not occur simultaneously. 69. —A machine-readable medium containing executable instructions that, when executed by a machine, can perform the following operations: 從一閱讀機接收一命令以測試一數值空間,該數值空 間會對應於該機器所儲存的資訊;以及 如果該所接收到的ν個位元的數值匹配該資訊的ν個對 應位元的數值的話,便發出回應給該閱讀機,其中該回 應的時序會對應該被儲存的資訊的m個位元的數值。 70. 如申請專利範圍第69項之機器可讀取媒體,其中除了匹 配該命令中的該ν個位元的ν個位元以及對應於該時序的 該m個位元之外,該回應進一步包括代表該資訊的一部 份的資料。Receiving a command from a reader to test a numerical space that corresponds to the information stored by the machine; and if the value of the received v bits matches the value of v corresponding bits of the information If so, a response is sent to the reader, where the timing of the response will be the value of m bits of information that should be stored. 70. If the machine-readable medium of item 69 of the patent application scope, in addition to matching the v bits of the v bits in the command and the m bits corresponding to the timing, the response further Includes data that represents part of the information. 71. 如申請專利範圍第69項之機器可讀取媒體,其中該資訊 係該標籤的該辨識碼。 72. 如申請專利範圍第69項之機器可讀取媒體,其中該回應 的該時序與該命令的時序有關。 73. 如申請專利範圍第71項之機器可讀取媒體,其中該標籤 的辨識碼會匹配該等複數個標籤中的另一個標籤的辨識 碼。 74. —種包含可執行指令的機器可讀取媒體,當被機器執行 時可由該機器執行下面的操作: -11 - 1228683 ’牟, 申請專利範圍續頁 接收來自閱讀機的命令,測試一數值空間中的V個位元 的數值;以及 如果該所接收到的命令的該V個位元的數值匹配該標 籤辨識碼第一部份的數值的話,便發出回應給該閱讀機。 75. 如申請專利範圍第74項之機器可讀取媒體,其中該回應 包括該辨識碼。71. If the machine-readable medium of item 69 of the patent application, the information is the identification code of the tag. 72. If the machine-readable medium of item 69 of the patent application scope, the timing of the response is related to the timing of the command. 73. If the machine-readable medium of item 71 of the patent application scope, the identification code of the tag will match the identification code of another of the plurality of tags. 74. —A machine-readable medium containing executable instructions. When executed by the machine, the machine can perform the following operations: -11-1228683 'Mou, patent application continued pages receive commands from the reader to test a value The value of the V bits in the space; and if the value of the V bits of the received command matches the value of the first part of the tag identification code, a response is sent to the reader. 75. If the machine-readable medium of item 74 of the patent application, the response includes the identification code. 76. 如申請專利範圍第74項之機器可讀取媒體,其中該回應 包括來自該機器之感測器的資料。 77. 如申請專利範圍第74項之機器可讀取媒體,其中該回應 包括來自儲存於該機器之記憶體中的資料。 78. 如申請專利範圍第74項之機器可讀取媒體,其中該回應 包括來自該機器之輸入/輸出資料。 79. —種包含可執行指令的機器可讀取媒體,當被複數個閱 讀機中其中一個閱讀機的機器執行時可由該機器執行下 面的操作:76. If the machine-readable medium of item 74 of the patent application, the response includes information from the sensor of the machine. 77. If the machine-readable medium of item 74 of the patent application scope, the response includes data from the memory of the machine. 78. If the machine-readable medium of item 74 of the patent application scope, the response includes input / output data from the machine. 79. — A machine-readable medium containing executable instructions which, when executed by a machine of one of the plurality of readers, can be performed by the machine: 回應該等複數個閱讀機中其中的第一閱讀機進入主動 模式執行通信循環的結果,進入靜音模式,其中當完成 該通信循環之後,該第一閱讀機會進入靜音模式維持一 第一時間間隔;以及 當偵測到第二時間間隔中沒有主動閱讀機進行傳輸, 便可在第一虛擬隨機延遲週期之後進入主動模式。 80. 如申請專利範圍第79項之機器可讀取媒體,進一步包含 可執行的指令,當被該機器執行時可由該機器執行下面 的操作: -12- 1228683 1止瞀换貝 年—月日 申請專利範圍續頁 回應偵測到該等複數個閱讀機中有另一閱讀機同時欲 進入主動模式的結果而進入靜音模式中;以及 當偵測到在第一虛擬隨機延遲週期期間沒有主動閱讀 機進行傳輸,便可在第二虛擬隨機延遲週期之後進入主 動模式。In response to the result that the first reader of the plurality of readers enters the active mode to perform a communication cycle, it enters a silent mode, wherein after the communication cycle is completed, the first reader enters the silent mode for a first time interval; And when it is detected that no active reader is transmitting in the second time interval, it can enter the active mode after the first virtual random delay period. 80. If the machine-readable medium of item 79 of the patent application scope further includes executable instructions, the machine can perform the following operations when executed by the machine: -12- 1228683 1 The patent application continues to respond to the detection that another reader among the plurality of readers wants to enter the active mode at the same time and enters the silent mode; and when it is detected that there is no active reading during the first virtual random delay period Machine to transmit, it can enter active mode after the second virtual random delay period. 81. 如申請專利範圍第80項之機器可讀取媒體,其中第二次 進入主動模式中進一步包括在經過該第一時間間隔之前 便第二次進入主動模式中。 82. —種用以辨識標籤的裝置,每個標籤都具有一辨識碼, 該裝置包括: 一用以提供第一資料的處理器;81. If the machine-readable medium of item 80 of the patent application scope, the second entry into the active mode further includes the second entry into the active mode before the first time interval elapses. 82. A device for identifying a label, each label having an identification code, the device comprising: a processor for providing first data; 一用以傳輸該第一資料給複數個標籤的傳輸器;以及 一從標籤中接收該第一命令的回應並且提供給該處理 器的接收器,該回應係由標籤所傳送的,其中該回應與 複數個位元中的一位元有關,該位元相當於被選定的儲 存在該標籤的資訊中的位元組數值,該被選定的位元組 係該第一資料的函數。 83. 如申請專利範圍第82項之裝置,其中該回應包含該資訊 另一位元組的數值。 84. 如申請專利範圍第82項之裝置,其中該回應包含來自不 同於該資訊的第二資訊中的資料。 85. 如申請專利範圍第82項之裝置,其中該複數個位元中每 一個位元都與所對應的該回應的預設時間延遲有關。 86. 如申請專利範圍第82項之裝置,其中該複數個位元中每 -13 - 申請專利範圍續頁 I2286834,29 一個位元都與所對應的來自該閱讀機的預設信號有關。 87. 如申請專利範圍第82項之裝置,其中該複數個位元中每 一個位元都與不同於該複數個位元中另一個位元的時間 延遲有關。 88. —種標籤,其包括: 一用以從從閱讀機接收第一資料的接收器;A transmitter for transmitting the first data to the plurality of tags; and a receiver for receiving the first command response from the tag and providing it to the processor, the response transmitted by the tag, wherein the response Related to a bit in a plurality of bits, the bit is equivalent to a selected byte value stored in the information of the tag, and the selected byte is a function of the first data. 83. If the device of the scope of the patent application is No. 82, the response contains a value of another byte of the information. 84. In the case of a device under the scope of patent application No. 82, the response contains information from a second piece of information that is different from the information. 85. The device according to item 82 of the patent application, wherein each of the plurality of bits is related to a corresponding preset time delay of the response. 86. For the device in the scope of patent application No. 82, in which every -13 of the plurality of bits-patent application range continued I2286834,29 One bit is related to the corresponding preset signal from the reader. 87. The device of claim 82, wherein each of the plurality of bits is related to a time delay that is different from another bit of the plurality of bits. 88. A tag, comprising: a receiver for receiving first data from a reader; 一控制單元,用以將該第一資料與儲存在該標籤中的 一部份資訊進行關聯處理;以及 一傳輸器,如果該第一資料匹配該資訊的該部分的 話,便從該控制單元傳輸回應該注意的係,給該閱讀機, 該回應與複數個位元中的一位元有關,該位元相當於被 選定的儲存在該標籤的資訊中的位元組數值,該被選定 的位元組係該第一資料的函數。 89. 如申請專利範圍第88項之標籤,進一步包括:A control unit for associating the first data with a part of the information stored in the tag; and a transmitter for transmitting from the control unit if the first data matches the part of the information In response, to the reader, the response is related to a bit in a plurality of bits, which is equivalent to the value of the selected byte stored in the information of the tag. The selected The bytes are a function of the first data. 89. If the label in the scope of patent application No. 88, further includes: 一用以從該閱讀機接收信號的天線,該信號包括來自 該閱讀機的該第一資料;以及 一接收/傳輸切換器,用以選擇性地讓該天線傳輸或接 收信號。 90. 如申請專利範圍第88項之標籤,其中該回應包括該標籤 的辨識碼。 91. 如申請專利範圍第88項之標籤,其中該資訊係該標籤的 辨識碼。 92. 如申請專利範圍第88項之標籤,其中該複數個位元中每 一個位元都與所對應的該回應的預設時間延遲有關。 -14- 申請專利範圍續頁 1228683广. <总4 93. —種用以辨識標籤的裝置,每個標籤都具有一辨識碼, 該裝置包括: 一用以傳送至少一個命令的處理器,其中會將一數值 空間分成η個位元,其中每個位元都與該數值空間的m個 位元有關,以及該數值空間包含該標籤的該辨識碼; 一傳輸器,用以傳輸至少一個命令,用以測試該數值 空間中的v個位元;以及An antenna for receiving a signal from the reader, the signal including the first data from the reader; and a receiving / transmitting switch for selectively allowing the antenna to transmit or receive a signal. 90. In the case of applying for a label in the 88th area of the patent application, the response includes the identification code of the label. 91. For the label under the scope of patent application No. 88, the information is the identification code of the label. 92. For example, the label in the 88th area of the patent application, wherein each of the plurality of bits is related to a corresponding preset time delay of the response. -14- The scope of application for patents is continued on 1228683. < Total 4 93. — A device for identifying tags, each tag has an identification code, the device includes: a processor for transmitting at least one command, A numerical space is divided into n bits, where each bit is related to m bits of the numerical space, and the numerical space contains the identification code of the tag; a transmitter for transmitting at least one Command to test the v bits in the numerical space; and 一從標籤中接收回應並且提供來自該回應的資料給該 處理器的接收器,其中當該標籤的辨識碼的第一部份匹 配該v個位元的數值時才會發生回應,該回應的時序會對 應一特殊的位元,該特殊的位元會與該辨識碼的第二部 分的m個位元的特殊數值有關。 94. 如申請專利範圍第93項之裝置,其中該回應的該時序與 該命令的時序有關。A response is received from the tag and the data from the response is provided to the receiver of the processor, wherein the response only occurs when the first part of the tag's identification code matches the value of the v bits. The timing will correspond to a special bit, and the special bit will be related to the special value of m bits in the second part of the identification code. 94. For the device under the scope of patent application No. 93, the timing of the response is related to the timing of the command. 95. 如申請專利範圍第93項之裝置,當未從該等複數個標籤 中接收到回應時,該裝置便會傳送第二命令給從該等複 數個標籤中所選出的一個或多個標籤。 96. 如申請專利範圍第93項之裝置,其中該裝置會接收於一 位元中之兩個或多個標籤的回應,該裝置會根據該等回 應傳送另一命令。 97. 如申請專利範圍第96項之裝置,其中藉由觀察一邏輯狀 態或寬度小於一位元寬的邏輯狀態中兩個以上的連續位 元,便可辨識出該等回應。 98. —種複數個標籤之中的標籤,每個標籤都具有一辨識碼 -15 - 申請專利範圍續頁 122868》 ,該標籤包括: 一接收來自閱讀機的命令的接收器,該命令包括一數 值空間中的V個位元; 一處理器,用以將該等所接收到的V個位元與該標籤辨 識碼的第一部份作比較;以及95. If the device under the scope of patent application is No. 93, when no response is received from the plurality of tags, the device will send a second order to one or more tags selected from the plurality of tags . 96. If the device under the scope of patent application No. 93, wherein the device will receive a response of two or more tags in one bit, the device will send another order based on the responses. 97. For the device under the scope of application for patent No. 96, these responses can be identified by observing more than two consecutive bits in a logical state or a logical state that is less than one bit wide. 98. — A tag among a plurality of tags, each tag having an identification code -15-Patent Application Continued Page 122868 ", the tag includes: a receiver that receives a command from a reader, the command includes a V bits in the numerical space; a processor for comparing the V bits received with the first part of the tag identification code; and 一傳輸器,如果該所接收到的V個位元匹配該辨識碼的 第一部份的話,便從該處理器發出回應給該閱讀機,其 中該回應的時序對應於該辨識碼的第二部分。 99. 如申請專利範圍第98項之標籤,其中該回應進一步包括 該辨識碼的第三部份。 100. 如申請專利範圍第99項之標籤,其中該第二部份等於該 第三部份中的至少一部份。 101. 如申請專利範圍第98項之標籤,其中該辨識碼的第一部 份係從該辨識碼中特定的位元位置開始。A transmitter, if the received V bits match the first part of the identification code, send a response from the processor to the reader, wherein the timing of the response corresponds to the second part of the identification code section. 99. In the case of applying for the label of item 98, the response further includes the third part of the identification code. 100. If the label of the scope of application for item 99 is applied, the second part is equal to at least one part of the third part. 101. The label of the scope of application for item 98, wherein the first part of the identification code starts from a specific bit position in the identification code. 102. 如申請專利範圍第98項之標籤,其中該回應的該時序與 該命令有關。 103. 如申請專利範圍第98項之標籤,進一步包括: 一用以從該閱讀機接收信號的天線,該信號包括來自 該閱讀機的該命令;以及 一耦合至該天線及該接收器的接收Η專輸切換器,其中 回應該處理器的控制結果,該接收/傳輸切換器可選擇性 地讓該接收器接收該命令,以及選擇性地從該天線傳輸 該回應。 104. 如申請專利範圍第98項之標籤,其中回應來自該閱讀機 -16- 122860 .〜-,--Μ: - 卜換貝 月· S 申請專利範圍續頁 ’ 參 的第二命令(其包括該數值空間的一組位元)的結果,當 該組位元匹配該標籤辨識碼對應的部份,該標籤便會傳 送另一回應,其中該另一回應包括該辨識碼。 105. —種用以從複數個標籤中辨識出其中一個標籤的閱讀 機,每個標籤都具有儲存於記憶體中的辨識碼,該閱讀 機包括: 用以廣播一具有第一資料的命令的構件;以及102. If the label of the scope of patent application is No. 98, the timing of the response is related to the order. 103. The tag of claim 98, further comprising: an antenna for receiving a signal from the reader, the signal including the command from the reader; and a receiver coupled to the antenna and the receiver ΗA dedicated input switch, in response to the control result of the processor, the receiving / transmitting switch can selectively allow the receiver to receive the command and selectively transmit the response from the antenna. 104. If the label of the scope of patent application is 98, the response is from the reader -16-122860. ~-, --M:-Bu Beibei · S Application for the scope of patent continuation of the second order (see Including a set of bits in the numerical space). When the set of bits matches the corresponding part of the tag ID, the tag sends another response, where the other response includes the ID. 105. A reader for identifying one of a plurality of tags, each tag having an identification code stored in a memory, the reader comprising: a device for broadcasting a command having first data Building blocks; and 用以從標籤中接收該命令的回應的構件;其中該回應 與複數個位元中的一位元有關,該位元相當於被選定的 儲存在該標籤的資訊中的位元組數值,該被選定的位元 組係該第一資料的函數。 106. 如申請專利範圍第105項之閱讀機,其中該回應包含該資 訊另一位元組的數值。 107. 如申請專利範圍第105項之閱讀機,其中該回應包含來自 不同於該資訊的第二資訊中的資料。A means for receiving a response to the command from a tag; wherein the response is related to a bit in a plurality of bits, the bit corresponding to a selected byte value stored in the tag's information, the The selected byte is a function of the first data. 106. If the reader of the scope of the patent application is No. 105, the response contains the value of another byte of the information. 107. If the reader of the scope of the patent application is No. 105, the response contains information from a second information different from the information. 108. 如申請專利範圍第105項之閱讀機,其中該資訊係該標籤 的該辨識碼。 109. 如申請專利範圍第105項之閱讀機,其中該複數個位元中 每一個位元都與所對應的該回應的預設時間延遲有關。 110. —種複數個標籤之中的標籤,每個標籤都具有一辨識碼 ,該標籤包括: 用以從閱讀機接收第一資料的構件; 用以將該第一資料與所選出的儲存在該機器記憶體的 資訊中的位元組進行關聯處理的構件,該被選定的位元 -17- 申請專利範圍續頁 ‘ ’ P I2286fc;,; 組係該苐一貢料的函數,以及 一構件,如果該第一資料與該位元組有關,便可傳輸 回應給該閱讀機,該回應與複數個位元中的一位元有 關,其中該回應的位元會對應該被選定的位元組的數值。 111. 如申請專利範圍第110項之標籤,其中該回應包含該資訊 另一位元組的數值。108. For the reader of the scope of application for patent No. 105, the information is the identification code of the tag. 109. For example, the reader of the scope of application for patent No. 105, wherein each of the plurality of bits is related to a corresponding preset time delay of the response. 110. A tag among a plurality of tags, each tag having an identification code, the tag includes: a component for receiving the first data from the reader; and for storing the first data with the selected storage in The component of the machine memory's information for the associated processing of the bytes, the selected bits-17- Patent Application Continued Page '' P I2286fc;,; a function of the tributary material, and a Component, if the first data is related to the byte, the response can be transmitted to the reader, the response is related to one of the plurality of bits, where the bit of the response is to the bit that should be selected The value of the tuple. 111. If the label of the scope of patent application is 110, the response contains a value of another byte of the information. 112. 如申請專利範圍第110項之標籤,其中該資訊係該標籤的 該辨識碼。 113. 如申請專利範圍第110項之標籤,其中該複數個位元中每 一個位元都與所對應的該回應的預設時間延遲有關。 114. 一種用以從複數個標籤中辨識出其中一個標籤的閱讀 機,該等複數個標籤中的每個標籤都具有一辨識碼,該 閱讀機包括:112. If the label of the scope of patent application is No. 110, the information is the identification code of the label. 113. For example, the label in the scope of application patent 110, wherein each of the plurality of bits is related to a corresponding preset time delay of the response. 114. A reader for identifying one of a plurality of tags, each of the plurality of tags having an identification code, the reader comprising: 用以發出命令測試由一數值空間的V個位元所界定的 數值的構件,該數值空間具有η個位元,其中每個位元都 與該數值空間中m個位元所界定的不同數值有關,而且 該數值空間會與儲存在該等複數個標籤之記憶體中的資 訊有關,η為大於2的整數;以及 用以從該等複數個標籤中的其中一個標籤中接收回應 的構件,其中當儲存在該標籤中該資訊的ν個位元組匹配 該命令的ν個位元數值時才會發生回應,該回應的時序會 對應於該η個位元的其中一個位元,與該位元相關的m個 位元數值會匹配從該所選出的資訊中選出的m個位元的 數值。 -18- 1228683 申請專利範圍續頁 · ^ ψ 115. 如申請專利範圍第114項之閱讀機,其中除了匹配該命令 中的該ν個位元的ν個位元以及與該位元有關的該m個位 元之外,該回應進一步包括該資訊的一部份。 116. 如申請專利範圍第114項之閱讀機,其中該資訊包括該標 籤的該辨識碼。 117. 如申請專利範圍第114項之閱讀機,其中該回應的該時序 與該命令的時序有關。A component for issuing a command to test a value defined by V bits in a value space, the value space having n bits, where each bit is different from a value defined by m bits in the value space Relevant, and the numerical space will be related to the information stored in the memory of the plurality of tags, n is an integer greater than 2; and a means for receiving a response from one of the plurality of tags, The response occurs only when the ν bytes of the information stored in the tag match the ν bits of the command, and the timing of the response will correspond to one of the n bits, and the The bit-related m bit values will match the m bit values selected from the selected information. -18- 1228683 Application for Patent Scope Continued · ^ ψ 115. For the reader of patent application No. 114, except for ν bits matching the ν bits in the order and the ν bits related to the bit Beyond m bits, the response further includes a portion of the information. 116. If the reader of the scope of application for patent No. 114, the information includes the identification code of the label. 117. If the reader of the scope of application for patent No. 114, the timing of the response is related to the timing of the command. 118. 如申請專利範圍第114項之閱讀機,當未從該等複數個標 籤中接收到回應時,進一步包括發出第二命令給從該等 複數個標籤中所選出的一個或多個標籤。 119. 如申請專利範圍第114項之閱讀機,其中: 該用以接收的構件可進一步從於一位元中回應的兩個 或多個標籤中接收回應;以及 該用以發出命令的構件可進一步根據該等回應發出另 -命令 ° 120. 如申請專利範圍第119項之閱讀機,其中該用以接收的構 件可藉由觀察一邏輯狀態或寬度小於一位元寬的邏輯狀 態中兩個以上的連續位元,辨識出該等回應。 121. 如申請專利範圍第114項之閱讀機,其中該用以發出命令 的構件可進一步發出第二命令給一標籤,而該用以接收 的構件可進一步從該標籤接收回應,其中該回應包括該 標籤的辨識碼,而且該接收及該發出動作不會同時進行 122.—種複數個標籤之中的標籤,每個標籤都具有一辨識碼 -19- 1228683 申請專利範圍續頁 ‘ > w ,該標籤包括: 用以從一閱讀機接收一命令的構件以測試一數值空間 中的V個位元,該數值空間會對應於該複數個標籤所儲存 的資訊;以及118. If the reader of the scope of application for patent No. 114, when no response is received from the plurality of tags, further includes issuing a second order to one or more tags selected from the plurality of tags. 119. If the reader of the scope of patent application No. 114, wherein: the means for receiving can further receive a response from two or more tags responding in one bit; and the means for issuing an order can According to these responses, another order is issued. 120. For example, the reader of patent application No. 119, in which the component for receiving can be observed by a logical state or two logical states whose width is less than one bit wide The above consecutive bits identify such responses. 121. If the reader of the scope of application for patent No. 114, the component for issuing a command may further issue a second command to a tag, and the component for receiving may further receive a response from the tag, where the response includes The identification code of the label, and the receiving and sending actions will not be performed at the same time 122.—A label among a plurality of labels, each of which has an identification code -19-1228683 Patent Application Continued Page '> w The tag includes: a component for receiving a command from a reader to test V bits in a numerical space, the numerical space corresponding to the information stored in the plurality of tags; and 一構件,如果該所接收到的V個位元的數值匹配該資訊 的V個對應位元的數值的話,便可發出回應給該閱讀機, 其中該回應的時序會對應該被儲存的資訊的m個位元的 數值。 123. 如申請專利範圍第122項之標籤,其中除了匹配該命令中 的該v個位元的v個位元以及對應於該時序的該m個位元 之外,該回應進一步包括代表該資訊的一部份的資料。 124. 如申請專利範圍第122項之標籤,其中該資訊包括該標籤 的辨識碼。 125. 如申請專利範圍第122項之標籤,其中該回應的該時序與 該命令的時序有關。 126. —種複數個標籤之中的標籤,每個標籤都具有一辨識碼 ,該標籤包括: 用以接收來自閱讀機的命令的構件以測試一數值空間 中的v個位元的數值;以及 一構件,如果該所接收到的命令的該v個位元的數值匹 配該標籤辨識碼第一部份的數值,便可發出回應給該閱 讀機,其中該回應包括該標籤的辨識碼。 127. —種複數個閱讀機中的一閱讀機,用以從複數個標籤中 辨識出其中一個標籤,該等複數個標籤中的每個標籤都 -20- 1228683 申請專利範圍續頁 ψ 具有一辨識碼,該閱讀機包括: 一構件,用以回應該等複數個閱讀機中其中的第一閱 言買機進入主動模式執行通信循環的結果而進入靜音模式 中,其中當完成該通信循環之後,該第一閱讀機會進入 靜音模式維持一第一時間間隔;以及 一構件,當偵測到第二時間間隔中沒有主動閱讀機進 行傳輸,便可在第一虛擬隨機延遲週期之後進入主動模A component, if the value of the received V bits matches the value of the V corresponding bits of the information, a response can be sent to the reader, wherein the timing of the response is to the information that should be stored. The value of m bits. 123. If the label of the scope of patent application No. 122, in addition to matching the v bits of the v bits in the command and the m bits corresponding to the timing, the response further includes representing the information Part of the information. 124. In the case of applying for a label in the scope of patent application No. 122, the information includes the identification code of the label. 125. If the label of the scope of patent application is No. 122, the timing of the response is related to the timing of the order. 126. A tag among a plurality of tags, each tag having an identification code, the tag including: a component for receiving a command from a reader to test the value of v bits in a value space; and A component, if the value of the v bits of the received command matches the value of the first part of the tag identification code, a response can be sent to the reader, where the response includes the tag's identification code. 127. — A reader among a plurality of readers, for identifying one of the plurality of tags, each of the plurality of tags is -20-1228683 Patent Application Continued Page ψ has a An identification code, the reader includes: a component for responding to the result that the first reader of the plurality of readers enters an active mode and executes a communication cycle to enter a mute mode, wherein after the communication cycle is completed, The first reader enters the silent mode to maintain a first time interval; and a component, when it is detected that there is no active reader for transmission in the second time interval, it can enter the active mode after the first virtual random delay period 128.如申請專利範圍第127項之閱讀機,進一步包括: 一構件,用以回應偵測到該等複數個閱讀機中有另一 閱讀機同時欲進入主動模式的結果而進入靜音模式中; 以及 一構件,當偵測到在第一虛擬隨機延遲週期期間沒有 主動閱讀機進行傳輸,便可在第二虛擬隨機延遲週期之 後進入主動模式。128. The reader of the scope of application for patent 127, further comprising: a component for entering the silent mode in response to detecting that another reader among the plurality of readers simultaneously wants to enter the active mode; And a component, when it is detected that no active reader is transmitting during the first virtual random delay period, it can enter the active mode after the second virtual random delay period. 129.如申請專利範圍第127項之閱讀機,其中該用以進入主動 模式中維持一第二時間的構件進一步包括:當偵測到在 第一虛擬隨機延遲週期期間沒有主動閱讀機進行傳輸, 便可在經過該第二虛擬隨機延遲週期之後及經過該第一 時間間隔之前第二次進入主動模式。 -21 -129. The reader of claim 127, wherein the means for entering the active mode for a second time further comprises: when it is detected that no active reader is transmitting during the first virtual random delay period, Then, the active mode can be entered a second time after the second virtual random delay period elapses and before the first time interval elapses. -twenty one -
TW91123291A 2001-10-09 2002-10-09 Methods and apparatuses for identification TWI228683B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US32836001P 2001-10-09 2001-10-09

Publications (1)

Publication Number Publication Date
TWI228683B true TWI228683B (en) 2005-03-01

Family

ID=36013512

Family Applications (1)

Application Number Title Priority Date Filing Date
TW91123291A TWI228683B (en) 2001-10-09 2002-10-09 Methods and apparatuses for identification

Country Status (2)

Country Link
CN (1) CN101231685A (en)
TW (1) TWI228683B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI448100B (en) * 2008-01-31 2014-08-01 Microsoft Corp Unique identification of devices using color detection

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2965382B1 (en) * 2010-09-24 2013-04-05 Thales Sa SYSTEM FOR COMMUNICATING A READER WITH A CONTACTLESS MEDIA AND ASSOCIATED ASSEMBLY.
WO2012078158A1 (en) * 2010-12-09 2012-06-14 Utc Fire & Security Corporation Wake-up circuit for a security device
CN110730028B (en) * 2019-08-29 2022-05-13 广东工业大学 Unmanned aerial vehicle-assisted backscatter communication device and resource allocation control method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI448100B (en) * 2008-01-31 2014-08-01 Microsoft Corp Unique identification of devices using color detection

Also Published As

Publication number Publication date
CN101231685A (en) 2008-07-30

Similar Documents

Publication Publication Date Title
US8279047B2 (en) Methods and apparatus for anti-collision for radio frequency communication
EP1665120B1 (en) Methods and apparatuses to identify devices
US9483671B2 (en) Methods and apparatuses to identify devices
AU2004290371B2 (en) Methods and apparatuses to identify devices
US20140253291A1 (en) Ultra wideband radio frequency identification system, method, and apparatus
US20040066281A1 (en) System and method to identify multiple RFID tags
US20070274242A1 (en) Multi-tag emulator
US10141982B2 (en) RFID protocols with non-interacting variants
US11030429B2 (en) Multipurpose RFID transponder and a system for reading it
US10671822B1 (en) Multipurpose RFID transponder and a system for reading it
US8570159B2 (en) Manifest integrity management via radio frequency identification (RFID)
TWI228683B (en) Methods and apparatuses for identification
US20220343089A1 (en) Multipurpose rfid transponder and a system for reading it
US20060125606A1 (en) Method for reading an IC tag concealing part of data
KR101112535B1 (en) Method for Authenticating RFID Readers by Using Flags in RFID Tag
CN100541527C (en) The method and apparatus that is used for identification equipment
TWI695323B (en) Radio frequency identification reader
Nanjundaiah Enhanced class 0 RFID anticollision protocol

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees