US20020063622A1 - Method and system for communicating with and tracking RFID transponders - Google Patents

Method and system for communicating with and tracking RFID transponders Download PDF

Info

Publication number
US20020063622A1
US20020063622A1 US09/726,136 US72613600A US2002063622A1 US 20020063622 A1 US20020063622 A1 US 20020063622A1 US 72613600 A US72613600 A US 72613600A US 2002063622 A1 US2002063622 A1 US 2002063622A1
Authority
US
United States
Prior art keywords
variable
identification code
rfid transponders
rfid
transponder
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US09/726,136
Other versions
US20020175805A9 (en
US7253717B2 (en
Inventor
John Armstrong
John Richert
John Palmer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US09/726,136 priority Critical patent/US7253717B2/en
Application filed by Individual filed Critical Individual
Priority to EP01308754A priority patent/EP1211630B1/en
Priority to EP07075598A priority patent/EP1857960B1/en
Priority to EP04024167A priority patent/EP1505531B1/en
Priority to DE60139037T priority patent/DE60139037D1/en
Priority to DE60107922T priority patent/DE60107922T2/en
Publication of US20020063622A1 publication Critical patent/US20020063622A1/en
Publication of US20020175805A9 publication Critical patent/US20020175805A9/en
Priority to US11/469,477 priority patent/US7626488B2/en
Application granted granted Critical
Publication of US7253717B2 publication Critical patent/US7253717B2/en
Adjusted expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2465Aspects related to the EAS system, e.g. system components other than tags
    • G08B13/2488Timing issues, e.g. synchronising measures to avoid signal collision, with multiple emitters or a single emitter and receiver
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10019Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
    • G06K7/10029Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. the collision being resolved in the time domain, e.g. using binary tree search or RFID responses allocated to a random time slot
    • G06K7/10039Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. the collision being resolved in the time domain, e.g. using binary tree search or RFID responses allocated to a random time slot interrogator driven, i.e. synchronous
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10316Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves using at least one antenna particularly designed for interrogating the wireless record carriers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10316Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves using at least one antenna particularly designed for interrogating the wireless record carriers
    • G06K7/10356Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves using at least one antenna particularly designed for interrogating the wireless record carriers using a plurality of antennas, e.g. configurations including means to resolve interference between the plurality of antennas
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2402Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
    • G08B13/2405Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
    • G08B13/2414Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
    • G08B13/2417Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip

Definitions

  • the invention relates generally to a system and method for communicating between a host computer and a plurality of RFID transponders (sometimes called tags) through one or more interrogator units, and more specifically to a system and method which greatly reduces the interference caused by transmissions from RFID transponders to those interrogator units, which increases the spatial area available between an interrogator and an RFID transponder and which allows communication between an interrogator and a large body of RFID transponders, among various other advantages.
  • the invention also relates to a system and method for tracking a large body of RFID transponders in the case where more than one interrogator unit is employed.
  • the host computer Upon receipt of such “request to transmit” signal, the host computer transmits a first acknowledgment signal to all of the transponders. If the transponder which has transmitted the “request to transmit” signal receives this first acknowledgment signal within a predetermined period of time, it concludes that it has been given permission to transmit, and transmits an information-based signal to the host computer. If the transponder does not receive the first acknowledgment signal within the predetermined period of time, it generates a new random number and initiates the counter again. In this manner, a large body of transponders may communicate with a host computer. A problem with this approach, as with any approach utilizing random response delays, is that there must be a good estimate of the total transponder population. If there are fewer transponders than expected in the field, this approach will spend an unduly long time waiting for responses, while if the population is too great, this method will be contending with large numbers of collisions for long periods of time.
  • the '547 Patent discloses a “treesplitting” algorithm for determining which transponder should transmit wherein the interrogator first transmits a read command and then transmits a failure notice upon the detection of a collision. Approximately half of the transponders will not transmit thereafter, based upon certain internal operations keyed to an internally-generated random number. This operation continues until no failures (collisions) are detected, and then the transponders begin to communicate.
  • This filtering process during which no data is recovered by the interrogator, is time intensive when communication is with a large body of transponders. It is also time intensive because it is limited to only a single transponder response per one or more interrogator commands.
  • the '570 Patent discloses a system wherein the interrogator signals the transponders when a collision is detected, and the transponders cease communicating for a period of time established by a random number generated within the transponder.
  • the system of the '570 Patent also provides satisfactory results, but also is time intensive when random wait periods exceed the minimal statistical requirements of the transponder population, and therefore is not optimal.
  • the '603 Patent discloses a system in which each transponder includes circuitry which is able to detect transmissions by other transponders, and each transponder only transmits when it detects no other transmissions. If a transmission by another transponder is detected, each transponder waits a predetermined time before listening for competing transmissions again.
  • the '603 Patent provides adequate operation, it requires transponders having additional complexity (and therefore additional cost) for the circuitry required to receive transmissions from the other transponders and is also time intensive when faced with a large body of transponders, and thereby presents certain drawbacks.
  • Another drawback of conventional RFID systems relates to the spatial range between the interrogator and each transponder.
  • Conventional RFID systems have been designed for a variety of categories of operation, all of which must be approved or licensed by regulatory agencies, e.g., the U.S. Federal Communications Commission (FCC) for systems intended for use in the United States.
  • the FCC has approved conventional RFID systems, without requiring an operator's license, at various frequency bands and with maximum RF power levels specified for each frequency band.
  • the FCC has placed strict limitations on the carrier modulation and on the mode of signal returned from the RFID transponder. For example, most unlicensed systems may not include any form of RF amplification within the transponder of signals returned by the transponder to the interrogator.
  • Another class of conventional RFID systems disclosed in U.S. Pat. No. 5,030,807, has focused on reading a single transponder on moving objects, e.g., for vehicle identification and automatic toll collection. These systems operate at ranges up to 6 meters, but are not designed to read more than one transponder.
  • a further class of conventional RFID systems focused on communicating with a plurality of transponders by frequency shift keying (FSK) the backscatter (i.e., re-radiated) signal from a particular transponder.
  • FSK frequency shift keying
  • a precision (e.g., crystal) oscillator is located on the transponder, and the backscatter antenna of the transponder is voltage controlled by a signal at a frequency derived from that precision oscillator.
  • the resulting reflected signal contains a subcarrier that is offset in frequency from the signal originating from the interrogator.
  • the offset frequency subcarrier signal is itself modulated according to the data being transmitted by the transponder.
  • the data communication rate is quite low (e.g., 1 kbps) because it is necessarily at a low frequency in comparison with the subcarrier.
  • the system of the '278 Patent is deficient in that it is susceptible to jamming from other on channel carriers, including frequency hopped spread spectrum (FHSS) signals, has long acquisition times (see Column 5, line 60: “ . . . several hundred data bit periods.”), and requires a high speed onboard clock to clock the onboard PN generators.
  • FHSS frequency hopped spread spectrum
  • the system described in the '278 Patent also uses carrier regeneration to return signals to the interrogator and is thus not a reflective transponder.
  • An alternative to the DSSS system of the '278 Patent is to use the DSSS system and method disclosed in U.S. Pat. No. 5,559,828, which sends a pseudo-noise (PN) code reference together with PN coded data on the in-phase and quadrature phases of the same carrier frequency.
  • PN pseudo-noise
  • this method sometimes referred to as a Quadrature Fast Acquisition Spread Spectrum Technology (QFAST®) system, there is no need for the transponder to have an on-board code generator to recorrelate the coded signal to the original data bandwidth.
  • QFAST® systems demodulate with a simple delay-and-multiply strategy, which may be implemented with passive analog delay components.
  • the DSSS system and method of the '828 Patent has not been adapted for use in an RFID system.
  • a problem with the pulsed RADAR system was that the power in the transmitted pulse had to be quite high in order for the received signal to have a reasonable signal to noise ratio.
  • a second range gating system utilized a continuous RF signal whose center frequency was changed continuously. A returned signal even from a stationary object, would have a different frequency than the current transmitted frequency or receiver Local Oscillator. This frequency offset resulted in a synthetic Doppler component in the demodulator output, with the range to the object being “encoded” in the amount of frequency offset.
  • This type of system is referred to as a “chirp” system. While this system overcame the need for high peak power, and provided long integration times, it was easily jammed by the presence of other emitters in the band. Placing a secondary phase modulation on the transmitted signal, which could be checked, reduced the jamming problem.
  • a further problem facing conventional RFID systems is that, in order to read RFID transponders that may be distributed over an area that is considerably larger than the spatial range of a single interrogator antenna assembly, either an interrogator must roam the area or fixed-position interrogators must be positioned in an array located within the area.
  • the latter configuration is preferred in most automated applications.
  • adjacent interrogators in such an array are used simultaneously to read data from transponders in the area, their signals might possibly interfere with each other. Therefore, it is usually necessary to operate the multiple interrogators one at time in a sequential manner. In some applications, a typical floor space may require 500 or more interrogators.
  • the present invention is directed to an RFID system comprising a plurality of RFID transponders which each have a unique identification code and which each receive a signal and generate a response signal based on the received signal.
  • Each RFID transponder further includes a random number generator used for determining whether to respond to a received message addressed to all of the RFID transponders.
  • the RFID system further includes a host computer for generating a message for transmission to the RFID transponders and one or more interrogators connected to the host computer which include an interrogator transmitter and an interrogator receiver that operate in half-duplex mode.
  • the interrogator transmitter transmits messages received from the host computer to the RFID transponders during a first part of the half-duplex mode and provides an illumination signal to the RFID transponders during a second part of the half-duplex mode.
  • the interrogator receiver receives signals reflected by the RFID transponders and provides the received signals to the host computer.
  • the host computer identifies each of the unique identification codes associated with each of the plurality of RFID transponders by iteratively transmitting a message including a variable having a predetermined initial value to each of the RFID transponders. Only the RFID transponders which generate a random number greater than the variable respond to the message by transmitting identification codes associated with the respective RFID transponders.
  • each of the signals sent between the interrogator and the RFID transponders is transmitted in spread spectrum format.
  • communications between the interrogator and each of the RFID transponders is preferably in TDMA format whereby a predetermined number of time slots are available for transmission.
  • each of the RFID transponders also use the random number generator to assign a time slot to use for transmission of the response signal.
  • the host computer preferably intelligently adjusts the variable after receipt of each response signal to ensure that an adequate number of responses are received during a next iteration.
  • the random number generator is also used to generate a unique identification code for each of the plurality of RFID transponders.
  • a particular aspect of the present invention is a method for a host to read an identification code from RFID transponders each having unique identification codes.
  • the host iteratively transmits a read identification code command and a variable having a predetermined initial value to the RFID transponders.
  • Each of the RFID transponders receive the read identification code command and the variable, generate a random number, and compare the variable with the generated random number. If the generated random number is greater than the variable in a particular RFID transponder, that transponder transmits an identification code associated therewith and then becomes inactive such that each RFID transponder does not respond to further read identification code commands during the current read identification code command iteration.
  • the host intelligently adjusts the value of the variable for the next iteration of the transmission of the read identification code command and the variable.
  • the host also examines the variable and ceases the iterative transmission of the read identification code command when no RFID transponders respond by transmitting their identification code in response to a final value of the variable.
  • the predetermined value for the variable is set as a high value
  • the step of intelligently adjusting the value of the variable reduces the value of the variable
  • the final value is zero.
  • the host system may have more than one antenna for transmission to the RFID transponders, and the read identification code command is sent on each of the antennas.
  • the identification code is stored in memory along with information about which antenna was used to transmit the read identification code command. Thereafter, all direct communications to the RFID transponder are made using the associated antenna information.
  • Another aspect of the present invention is a method for re-selecting an identification code for each of a group of RFID transponders.
  • the host transmits a re-select identification code command to each of the RFID transponders.
  • each of the RFID transponders generates a first random number and calculates a new identification code based upon the first random number.
  • the identification codes are read as described above.
  • all of the RFID transponders are first received in a state where each has a common identification code, which is useful in testing, batch programming, etc.
  • the re-select identification code mode is used to establish a unique identification code for each RFID transponder.
  • the system of the present invention includes an interrogator which is connected to a host computer for communicating with the RFID transponders.
  • the interrogator comprises one or more antennas, a transmitter connected to one of the antennas for transmitting an FSK modulated spread spectrum signal on that antenna during a transmitting mode and a BPSK modulated spread spectrum signal during a receiving mode, a receiver connected to one of the antennas for receiving a spread spectrum signal in PSK format, and a controller connected to the transmitter and the receiver for controlling the transmitter and the receiver and communicating with a host computer.
  • there are two antennas a first antenna having a first polarization and a second antenna having a second polarization which is orthogonal to the first polarization, and an antenna switch matrix for selecting one of the two antennas for connection to the transmitter and a second of the two antennas for connection to the receiver.
  • the transmitter of the interrogator comprises an FSK transmitter section for generating a message for transmission as a spread spectrum output signal in FSK format, a BPSK transmitter section for generating an illumination signal for transmission as a spread spectrum signal in BPSK format, an output amplifier, and a switch which selectively connects the FSK transmitter section or the BPSK transmitter section to the output amplifier.
  • the FSK transmitter section consists of a Manchester encoder connected to the controller, a PN generator connected to the controller, and an FSK modulation generator connected to the Manchester encoder and the PN generator.
  • the BPSK transmitter section consists of a PN generator, a low noise oscillator, and a balanced modulator connected to the PN generator and the low noise oscillator.
  • the receiver comprises a band pass filter having an input connected to the at least one antenna for receiving a signal, a first mixer and a second mixer each having a first input connected in parallel to an output of the band pass filter and a second input connected to a signal derived from a transmitted signal, a first bandpass filter connected to an output of the first mixer, a first data and clock recovery circuit connected to an output of the first bandpass filter for recovering an in-phase version of the received signal, a second bandpass filter connected to an output of the second mixer, and a second data and clock recovery circuit connected to an output of the second bandpass filter for recovering an quadrature-phase version of the received signal.
  • an antenna assembly for an RFID interrogator which comprises a first antenna having a first polarization, a second antenna having a second polarization which is orthogonal to the first polarization, and an antenna switch network connected to the first and second antennas for selectively selecting one of the first and the second antennas for connection to a transmitter.
  • the antenna assembly further comprises a third antenna having a third polarization which is orthogonal to both the first polarization and the second polarization.
  • An additional aspect of the present invention is a transponder for communicating with an interrogator in an RFID system, which includes a first antenna element having a first predetermined dimensional configuration, a second antenna element having a second predetermined dimensional configuration, an impedance modulator connected between the first antenna element and the second antenna element which causes the first antenna element to be electrically connected to the second element in a first state and to be electrically isolated from the second element in a second state, a receiver for receiving a message within an FSK modulated spread spectrum signal connected to the first antenna element, the second antenna element and the impedance modulator, and a controller connected to the receiver which receives the message and selectively responds to the message in BPSK format by reflecting an illumination signal transmitted by the interrogator by selectively switching the impedance modulator between the first state and the second state.
  • the transponder receiver comprises a frequency discriminator having an input connected to the first and second antenna elements, a bandpass quantizer having an input connected to an output of the frequency discriminator, and a low pass filter connected to an output of the bandpass quantizer.
  • the first predetermined dimensional configuration is preferably a length of one-quarter wavelength and the second predetermined dimensional configuration is preferably a length of three-quarter wavelength.
  • the first antenna element preferably consists of two first sub-elements connected by a ninety degree angle and have a predetermined length relationship to each other.
  • the second antenna element preferably consists of a plurality of second sub-elements connected by ninety degree angles in a geometrically folding configuration and each of the second sub-elements have a predetermined length relationship to each other.
  • the first antenna element and the second antenna element together preferably form a dipole configuration.
  • a method and apparatus for generating a random number in an RFID transponder is disclosed.
  • a random seed first is calculated based upon the difference between a local clock signal and a clock signal derived from either a received signal or random noise.
  • the random seed is loaded into a random number generator.
  • a random number is generated based upon the random seed.
  • the apparatus includes a first clock input derived from a local clock oscillator, a second clock input derived from a received signal or random noise, and means connected to the first clock input and the second clock input for generating a random number based upon the timing difference between the first clock input and the second clock input.
  • a method for controlling a plurality of groups of interrogators in an RFID system is disclosed.
  • Each interrogator within a group of interrogators is arranged in nearest neighbor format. Thereafter, only corresponding interrogators within each group of interrogators are activated for transmission of signals to at least one RFID transponder within a zone of covered by the respective activated interrogators.
  • One particular embodiment of the present invention is an RFID system for tracking election ballots.
  • a plurality of RFID transponders are included in this application.
  • Each of the plurality of RFID transponders has a unique identification code and is connected to a separate ballot.
  • the RFID transponders receive a signal and generate a response signal based thereon.
  • Each of the RFID transponders includes a random number generator used for determining whether to respond to a received message addressed to all of the plurality of RFID transponders and a memory for storing election data.
  • This embodiment further includes a host computer for generating a message for transmission to at least one of the RFID transponders and for controlling the storage of election data within each of the ballots, e.g., during an election.
  • this embodiment includes at least one interrogator connected to the host computer having an interrogator transmitter and an interrogator receiver which operate in half-duplex mode.
  • the interrogator transmitter transmits messages received from the host computer to the plurality of RFID transponders during a first part of the half-duplex mode and provides an illumination signal to the plurality of RFID transponders during a second part of the half-duplex mode.
  • the interrogator receiver receives signals reflected by the at least one RFID transponders and provides the received signals to the host computer.
  • the host computer identifies each of the unique identification codes associated with each of the plurality of RFID transponders by iteratively transmitting a message including a variable having a predetermined initial value to each of the RFID transponders, and only the RFID transponders which generate a random number greater than the variable respond to the message by transmitting identification codes associated with the RFID transponders.
  • all of the ballots within one voting group e.g., a precinct, may be initialized using a main host-interrogator combination prior to an election, and a separate host-interrogator combination may later be used as a separate voting booth.
  • FIG. 1 is a block diagram of the system of the present invention
  • FIG. 2 is a flow chart detailing the six modes of operation of the system
  • FIG. 3 is a chart of the message structure of the six modes of operation
  • FIG. 4 is a flowchart of the Security Alarm mode of operation
  • FIGS. 5, 5A and 5 B comprise a flowchart of the READ Tag_ID mode of operation
  • FIG. 6 is a flowchart of the Re-select Tag_ID mode of operation
  • FIG. 7 is a flowchart of the Replace Tag_ID mode of operation
  • FIG. 8 is a flowchart of the Read Tag_Data mode of operation
  • FIG. 9 is a flowchart of the Write Tag_Data mode of operation
  • FIG. 10A is a high level block diagram of the interrogator system
  • FIG. 10B is a detailed block diagram of the interrogator system
  • FIG. 11 is a block diagram of the transponder system
  • FIG. 12 is a partial schematic diagram of the transponder system
  • FIG. 13 is diagram showing the physical layout of the transponder antenna
  • FIG. 14 is a block diagram showing a first embodiment of an interrogator array configuration
  • FIG. 15 is a block diagram showing a second embodiment of an interrogator array configuration.
  • FIG. 16 is a block diagram of the random number generator used in the present invention.
  • the present invention is a system and method by which information is written to or read from as many as several thousand arbitrarily located transponders in a spatial range extending to 20 feet or more from each of a plurality of interrogators using radio communications.
  • the present invention provides for the efficient and reliable location and control of very large numbers of transponders, based upon a particular communication protocol and utilizes radar direct sequence range gating and Time Division Multiple Access (TDMA) communications methods.
  • TDMA Time Division Multiple Access
  • TDMA time division multiple access
  • TDMA separates the timing of all responding transponders into discrete intervals (i.e., time slots) such that partial collisions are avoided
  • TDMA permits a multiplicity of transponders to be read in each interrogator frame (the collection of time slots comprising the interrogator command time slot and the plurality of transponder response time slots) thus improving the time efficiency of data collection.
  • the invention can be utilized to track articles in manufacturing, shipping, warehousing, security, retailing industries and the like. Specifically, the invention can be utilized to perform check-in, check-out, inventory, and security surveillance for various types of retail stores such as supermarkets, department stores, warehouse stores, specialty stores, etc.
  • the present system can be utilized to perform automatic inventory of articles located on tables or shelves, or hanging from racks, using an array of antennas located in the ceiling of the area in which such articles are located.
  • Other possible applications of the invention include, for example, retail sales in general, delivery control, tracking of in-process goods or manufactured items, electronic article surveillance in general, medical and other records for animals and people, prisoner identification, counterfeit goods detection, etc.
  • Still other possible applications of the invention are in fields where any plurality of low cost tokens are used to represent substantial sums of money, and where it is desired to keep track of said tokens, whether they are by themselves, grouped with similar tokens, e.g., surgical sponges, gaming pieces such as poker chips and election ballots, or attached to other articles in an extended environment, such as a room or building, e.g., postal and shipping labels.
  • similar tokens e.g., surgical sponges, gaming pieces such as poker chips and election ballots
  • a memory within the transponder could be used to store election data, thereby simplifying the tabulation of election results.
  • the RFID system of the present invention consists of a host computer 100 which is connected to a plurality of interrogators 190 (e.g., interrogators 115 , 120 and 125 ) by a communications link 110 , e.g., a LAN.
  • Host computer 100 includes a connection 105 for establishing connection to other host computers (not shown) for the management of areas which are larger than may be handled by a single host computer 100 , e.g., spread out over a plurality of floors or buildings.
  • Each interrogator 190 generates RF signals used to communicate with a plurality of transponders 150 through an antenna array 130 , 135 or 140 controlled by the associated interrogator 115 , 120 or 125 .
  • Each interrogator 115 , 120 and 125 has a predetermined spatial area (shown by the three enclosed regions 160 , 170 and 180 ) in which communications with transponders 150 may occur. Therefore, an array of interrogators 190 may be set up to cover areas wider than that covered by a single interrogator 190 , as shown by overlapping regions 160 , 170 and 180 , (e.g., interrogator 115 only communicates with transponders 150 within enclosure 160 ) and as discussed in further detail with respect to FIGS. 14 and 15.
  • interrogators 190 When a plurality of interrogators 190 , e.g., interrogators 115 and 120 , are used in the system of the present invention, neighboring interrogators 190 are positioned close enough to each other so that the spatial area defining the regions in which each interrogator 190 may communicate with transponders 150 (e.g., the area defined by enclosures 160 and 170 , respectively) intentionally overlap, to prevent possible gaps or voids where transponders 150 could be out of communication range with any interrogator 190 . Although there are three interrogators 115 , 120 and 125 shown in FIG.
  • the number of interrogators 190 for a particular installation is selected based upon the size of the area in which the transponders 150 may be present, taking into account the necessary overlap required to prevent communication voids from occurring.
  • the host computer 100 executes a high level program which provides an interface that allows a user to cause each of the one or more interrogators 190 to perform sequences of simple communications tasks that, when taken together, comprise a complex communications task which either requests information from a transponder 150 or causes a transponder 150 to perform a task.
  • Each interrogator 190 receives commands from host computer 100 over a communications link, e.g., a cable connected to the parallel port of host computer 100 , and responds thereto, performing each command in order, and signaling host computer 100 when the command has been performed, whereupon host computer 100 may then issue a next command to interrogators 190 .
  • transponders 150 are identified by their transponder identification code (“Tag_ID”).
  • the Tag_ID is generated internally and automatically by each transponder 150 (FIG. 1) upon receipt of a communication command (i.e., the Reselect Tag_ID Command discussed with respect to FIGS. 2 and 6) from an interrogator 190 .
  • a communication command i.e., the Reselect Tag_ID Command discussed with respect to FIGS. 2 and 6
  • a random number is generated at each transponder 150 using the clock skew between the associated interrogator 190 and each transponder 150 as a random variable.
  • the internally-generated random number in each transponder 150 is also used to select a TDMA time slot for transmission and, in conjunction with the Read Tag_ID mode discussed with respect to FIGS. 2 and 5, to determine when to transmit.
  • communications may be made directly with each transponder 150 using the associated Tag_ID as an address for the particular transponder 150 .
  • the modes which each interrogator 190 (FIG. 1) can perform at the request of an operator (user) (step 205 ) include: (1) Security Alarm 210 ; (2) Re-Select Tag_ID 220 ; (3) Replace Tag_ID 270 ; (4) Read Tag_ID 230 ; (5) Read Tag_Data 240 ; and (6) Write Tag_Data 250 .
  • the user selects the mode in step 205 , and the system carries out the operations needed to perform the selected mode (i.e., one of steps 210 , 220 , 270 , 230 , 240 or 250 ) and then returns to a waiting loop for the selection of the next mode at step 260 .
  • Each mode of operation consists of a series of steps, usually iterative, involving communications between host computer 100 , one or more interrogators 190 and a plurality of transponders 150 .
  • Each mode of operation includes an associated command that is transmitted from host computer 100 to transponders 150 , through interrogators 190 .
  • One or more transponders 150 depending on the mode of operation, respond to the received command by transmitting a response that is received by an interrogator 190 and passed to host computer 100 .
  • each communication from host computer 100 to one or more transponders 150 is first passed to one or more interrogators 190 for transmission to transponders 150 , and each communication from a transponder 150 to host computer 150 first is received by an interrogator 190 and then passed to host computer 100 .
  • the flow charts are highly simplified representations intended to outline each mode, and the specifics of each mode are discussed in greater detail herein.
  • transponders 150 are connected to an article, e.g., goods in a store (“a tagged article”). Areas where tagged articles are not allowed, e.g., a restroom or an exit doorway, are designated security areas and each such security area has a dedicated interrogator 190 mounted therein that constantly transmits the Strobe command.
  • the Strobe command is used for different purposes in the present invention, upon receipt of the Strobe command, a transponder 150 will transmit its Tag_ID, latch the previous command and clear its deselected status.
  • the associated transponder 150 When a tagged article enters a security area, the associated transponder 150 receives the Strobe command and responds by transmitting its Tag_ID (among other actions taken by transponder 150 ), which causes host computer 100 to trigger an alarm which, as one of ordinary skill in the art will readily recognize, may be either audible or silent.
  • host computer 100 sends the Strobe command to an interrogator 190 associated with a security area and the interrogator 190 transmits the Strobe command to any transponder 190 in the security area (step 410 in FIG. 4).
  • the format of the Strobe command is shown in line 300 of FIG. 3, and includes a preamble field 305 , a break field 310 , a synch field 315 and a header field 320 .
  • the header field 320 carries the information designating the particular command being transmitted, in this case the Strobe command.
  • an interrogator 190 Upon receipt of the Strobe command from host computer 100 , an interrogator 190 transmits the Strobe command within the security area (i.e., the interrogator illuminates the security area) (step 410 ).
  • any transponder 150 within the security area receives the Strobe command and, in response, transmits a message including its Tag_ID to host computer 100 (step 420 ).
  • Host computer 100 determines whether any responses have been received from any transponders 150 within the security area (step 430 ). If a response has been received, host computer 100 reports an alarm (step 440 ), and reverts to the start, to continue looking for additional transponders 150 which might appear within the security area. If no response was received, host computer 100 also reverts to the start, but without setting the alarm.
  • transponders 150 of the present invention do not actively generate a transmission signal, but rather reflect a signal being transmitted by an interrogator 190 . Therefore, whenever interrogator 190 transmits a command that requires a response by one or more transponders 150 , it then transmits an illumination signal during which it listens for a response from a transponder 150 , e.g., step 420 in FIG. 4.
  • each transponder 150 that receives a Strobe command transmits its Tag_ID to an interrogator 190 in each of a predetermined number of successive TDMA time slots (i.e., slots 1 ( 350 ), 2 ( 355 ), to N ( 360 ) in transponder response field 300 in FIG. 3). Thereafter, if the same Tag_ID is read in a predetermined number of successive time slots 350 to 360 , then the Tag_ID is logged and an alarm is triggered (step 440 ).
  • each transponder 150 that receives a Strobe command returns its Tag_ID to the interrogator 190 sixteen times over a period of sixty milliseconds (i.e., N is equal to 16 in transponder response field 300 in FIG. 3).
  • N is equal to 16 in transponder response field 300 in FIG. 3.
  • the Read Tag_ID mode of operation allows the host computer 100 to communicate with a large plurality of transponders 150 efficiently and with a greatly reduced incidence of communications collisions.
  • this is accomplished through the use of a controlled variable (“Opp_Cost”), which is set to a predetermined value initially and varied in operation by host computer 100 and which is transmitted to each transponder 150 along with the Read Tag_ID command.
  • Opp_Cost a controlled variable
  • each transponder 150 receives the Read Tag_ID command and the associated Opp_Cost, it generates a random number and compares it to the received Opp_Cost.
  • a transponder 150 either transmits its Tag_ID to an interrogator 190 or it waits for the next transmission of the Read Tag_ID command (where the associated Opp_Cost value may be adjusted slightly and a new random number is generated in any event).
  • the initial Opp_Cost is set to a high value by host computer 100 and each transponder 150 only transmits its Tag_ID when its value is greater than that of the received Opp_Cost.
  • the Opp_Cost may be adjusted slightly downward, if the number of Tag_IDs received in the immediately prior step falls below a predetermined threshold.
  • the response field 325 is used to signal a transponder 150 that its previous transmission of its Tag_ID was properly received.
  • the use of a TDMA format allows a predetermined maximum number of transponders 150 , sixteen in the preferred embodiment, to respond in a single frame (i.e., to a single transmission of the Read Tag_ID command). Therefore, response field 325 must be able to signal each of the predetermined number of transmitting transponders 150 that it received its previous signal.
  • each transponder 150 transmits its Tag_ID two times and, upon verification that its second transmission was received by interrogator 190 , it becomes inactive (deselected).
  • the Opp_Cost value is initially set high and is decremented as more and more transponders 150 are read successfully, based upon the number of transponders 150 responding in each previously successive iteration.
  • each transponder 150 compares the received Opp_Cost with a locally-generated random number.
  • Each transponder 150 sends its Tag_ID only if its random number is larger than the Opp_Cost value, otherwise it waits for the next transmission from host computer 100 . Consequently, the number of responses of a large population of transponders 150 is greatly reduced by the comparison with the Opp_Cost value.
  • host computer 100 monitors the number of transponder 150 responses to each Read TAG_ID transmission (since communication is in TDMA format, there will be a plurality of responses to each such transmission), and when the number of responses drops below a predetermined number (preferably four when, as in the preferred embodiment, there are sixteen TDMA time slots), the Opp_Cost is decremented to allow the number of responses to increase in the next transmission.
  • a predetermined number preferably four when, as in the preferred embodiment, there are sixteen TDMA time slots
  • a measure of collisions coupled with a binary search, is used to set the Opp_Cost to optimally fill the TDMA time slots available.
  • an independent measure of the population of transponders 150 is generated, e.g., when the system is re-inventorying a group of articles having transponders 150 attached thereto, and the Op_Cost is varied based upon that independent measure.
  • the Tag_ID of a particular transponder 150 For the Tag_ID of a particular transponder 150 to be accepted as read successfully, it must be read twice (i.e., each transponder 150 must transmit its Tag_ID during two different message transmissions).
  • transponder 150 looks for a response bit in the response field that corresponds to the time slot in which that particular transponder 150 transmitted its Tag_ID. If that response bit is affirmative, i.e., an acknowledgment or ACK, transponder 150 increments an internal counter. As soon as transponder 150 receives two such acknowledgments, it becomes inactive (deselected).
  • each transponder 150 executes any pending operations awaiting a Strobe command (i.e., causes the previously received command operation to be completed, if necessary), and clears transponder 150 from its deselected status, meaning it is no longer deselected (step 503 ).
  • Each transponder 150 also transmits its Tag_ID immediately in response to the Strobe command, as discussed above, but in this case this transmission is ignored.
  • a transponder 150 transmits its Tag_ID twice, and has twice received acknowledgment, it becomes deselected and no longer responds to received Read Tag_ID commands.
  • Host computer 100 next sets the initial Opp_Cost value (step 505 ), and passes the Read Tag_ID command (which is in the format shown as field 310 in FIG. 3 and which includes the current Opp_Cost 330 and the response field 325 , i.e., the acknowledgment (ACK) or non-acknowledgment (NAK) of previous reception for each of the TDMA time slots) to transponders 150 (step 507 ).
  • ACK acknowledgment
  • NAK non-acknowledgment
  • Each transponder 150 within a predetermined distance from a transmitting interrogator 190 receives the Read Tag_ID command (step 509 ) and, in response, each transponder 150 generates a random variable K (step 510 ). If a transponder 150 determines that this is the first Read Tag_ID command since the last Strobe command, then processing skips down to step 515 , otherwise processing proceeds to step 512 . In step 512 , each transponder 150 which transmitted its Tag_ID in response to the immediately prior Read Tag_ID command examines response field 325 to determine if the transmission was successful, and if so, updates its response counter.
  • each transponder 150 determines, in the preferred embodiment, if the Opp_Cost is less than the internally generated random variable K (step 515 ). If it is not, then that transponder 150 simply awaits the next transmission from the host computer 100 (step 516 ). If the Opp_Cost is less than K, each transponder 150 then, based upon the value of K, determines the appropriate TDMA time slot and transmits its Tag_ID in one of the time slots 1 ( 350 ) to N ( 360 ) shown in FIG. 3 for the Read Tag_ID response field (step 519 ).
  • Host computer 100 receives and logs the Tag_IDs (up to a maximum equal to the number of available TDMA time slots, i.e., N in FIG. 3), incrementing the count for each received Tag_ID (step 521 ).
  • Host computer 100 next updates the Opp_Cost value by identifying the number of Tag_IDs received in the current iteration and comparing that number to predetermined conditions, e.g., a minimum number, and if less than the predetermined number, adjusting the Opp_Cost downwards appropriately (step 523 ). After adjusting the Opp_Cost, host computer 100 compares the updated Opp_Cost to a predetermined number, zero in the preferred embodiment (step 525 ).
  • the predetermined number depends on the initial value and variation methodology of the Opp_Cost value.
  • the Opp_Cost remains greater than zero, there may be transponders 150 which have not yet successfully communicated their Tag_ID twice. Therefore the processing loops back to step 507 to begin another Read Tag_ID iteration. If the Opp_Cost equals zero, all transponders 150 have either successfully communicated their Tag_ID twice or they have encountered some type of communication lapse.
  • host computer 100 next identifies each transponder 150 which successfully communicated its Tag_ID only a single time (step 527 ), and for each identified transponder 150 , the host computer passes a Read Tag Data command, which, as discussed below with respect to FIG. 8, is specifically addressed to a particular transponder 150 (step 531 ). If the transponder 150 succeeds in providing the appropriate response, including its Tag_ID, the counter associated with that transponder 150 in host computer 100 is incremented, indicating that the Tag ID is valid (step 533 ). If there is no valid response to the Read Tag_Data command, the Tag_ID is considered invalid, and is deleted from the list (step 533 ).
  • each transponder 150 of the present invention is manufactured identical to each other transponder 150 , and does not require preprogramming of any sort.
  • Each transponder 150 has a common default Tag_ID and common default Tag_Data as manufactured, which are available immediately upon power-up of the transponder 150 .
  • this feature allows batch testing and programming of the transponders 150 , before they acquire a unique Tag_ID after completion of the Reselect Tag_ID mode.
  • each transponder 150 generates a random Tag_ID number based upon an internally generated random number in response to an initial Re-select Tag_ID command (FIG. 6).
  • this random number-based Tag_ID is communicated to host computer 100 during a Read Tag_ID process, and thereafter permits host 100 to subsequently address only that specific transponder using the associated Tag_ID. If, in the course of time, an article arrives having a transponder 150 possessing the same Tag_ID as another transponder 150 currently within the population of transponders 150 , host computer 100 can cause groups or individual transponders 150 to select a new Tag ID. This is achieved by performing a Re-select Tag ID command (FIG. 6) (which includes part of the Read Tag ID processing of FIG. 5). In particular, as shown by the flowchart of FIG. 6, host computer 100 transmits the Re-Select Tag ID command to transponders 150 (step 600 ).
  • FIG. 6 Re-select Tag ID command
  • Each transponder 150 which receives the Re-Select Tag ID command generates a new candidate Tag_ID, which is based upon a random number, and stores it in temporary memory (step 620 ).
  • host computer 100 transmits a Strobe command (step 640 ) and each transponder stores the candidate Tag_ID as its new Tag_ID (step 660 ).
  • step 640 there exists a population of transponders 150 having separate Tag_IDs, based upon the use of internally generated random numbers in each transponder 150 to generate the Tag_ID. Processing next proceeds to point A in FIG. 5, where the Read Tag_ID processing essentially begins, so that the Tag_ID of each transponder 150 within the population is identified and stored in memory within host computer 100 , in the manner discussed above.
  • the Replace Tag_ID command may be used to replace the duplicate Tag_ID with a separate and distinct Tag_ID (FIG. 7).
  • the identification of a duplicate Tag_ID must be made prior to allowing the tagged article having a duplicate Tag_ID to join the population of tagged articles containing its duplicate, e.g., there must be a staging area having a dedicated interrogator 190 which is used to identify the Tag_IDs (using the Read Tag_ID command) of tagged articles that are to be added to the general population of tagged articles.
  • the duplicate Tag_ID must be replaced prior to allowing the associated article to join the population containing its duplicate, or else it will be necessary to enter the Replace Tag_ID mode, since there is no provision for a single interrogator 190 to address only one of two transponders 150 having the same Tag_ID to replace the Tag_ID in only one of the transponders 150 .
  • host computer transmits a Replace Tag_ID command, including the old Tag_ID and the new Tag_ID, to the particular transponder 150 (step 700 ), in the format shown in field 330 in FIG.
  • Transponder 150 receives the Replace Tag_ID command, along with the old Tag_ID and the new Tag_ID, in step 720 and stores the new Tag_ID in a temporary register therein (step 730 ). Transponder 150 then transmits the new Tag_ID to the host computer 100 (step 740 ). Host computer 100 receives the new Tag_ID from the transponder and compares it to the transmitted new Tag_ID (step 760 ).
  • step 700 If host computer 100 determines that the transmitted new Tag_ID is not the same as the received new Tag_ID (indicating that an error occurred at some point), processing reverts to step 700 and the new Tag_ID is resent in a new Replace Tag_ID command. Otherwise, when the received new Tag_ID matches the transmitted new Tag_ID, processing moves to step 770 , where an acknowledge signal (ACK) is transmitted to transponder 150 . Upon receipt of the acknowledge signal, transponder 150 sets the stored Tag_ID as its new Tag_ID, completing the Replace Tag_ID process.
  • ACK acknowledge signal
  • the Read Tag_Data process i.e., the steps required to read data (“Tag_Data”) from a transponder 150 .
  • the Tag_ID of the transponder 150 must be stored in memory within host computer 100 .
  • host computer 100 may obtain knowledge of the Tag_IDs from a variety of sources, such as prior Read Tag_ID commands, e-mail from a larger (external) database, scanned barcodes, etc.
  • the message structure of the Read Tag_Data command is illustrated in FIG.
  • command 320 includes a preamble field 305 , a break field 310 , a sync field 315 , a header field 320 and a Tag_ID field 325 .
  • the addressed transponder 150 responds with its Tag_ID 370 , followed by Tag_Data 380 , preferably in 16-bit increments.
  • host computer 100 first transmits a Read Tag_Data command addressed to a particular transponder 150 (step 800 ). All transponders 150 receive the Read Tag_Data command, including the addressed Tag_ID, (step 820 ) and compare the received Tag_ID to their own Tag_ID (step 830 ).
  • step 800 If the received Tag_ID does not compare to the Tag_ID of the transponder 150 , that transponder simply awaits the next command from host computer 100 (step 800 ). If the received Tag_ID is the same as the Tag_ID of the transponder 150 , processing proceeds to step 840 , where the addressed transponder 150 transmits its Tag_ID and its Tag_Data to the host computer 100 . Host computer 100 receives the Tag_ID and Tag_Data and determines if the Tag_Data has been received intact using conventional error detection techniques (step 870 ). If no portion of the Tag_Data has been received intact, processing reverts to step 800 where the Read Tag_Data command is re-transmitted by host computer 100 .
  • step 880 determines if some portion of the Tag_Data has been received intact. If some portion of the Tag_Data has been received intact, processing proceeds to step 880 , where the intact portion of the Tag_Data is stored. Next, host computer determines if all of the Tag_Data has been received intact (step 890 ). If it has not been received intact, processing also reverts to step 800 where the Read Tag Data command is retransmitted by host computer 100 . If all of the Tag Data has been received intact, then processing is complete for this Read Tag Data process.
  • Tag Data is written to a specific transponder 150 in 12-bit increments.
  • the message structure 330 of the Write Tag_Data command is illustrated in FIG. 3, and includes a preamble field 305 , a break field 310 , a sync field 315 , a header field 320 , a Tag_ID field 325 and a Tag_Data field 340 .
  • the upper 8-bits of header field 320 contain the memory location in transponder 150 to which the received Tag_Data is to be written.
  • Each transponder 150 includes N 12-bit memory locations (N is equal to four in the preferred embodiment) that are used to store Tag_Data.
  • the addressed transponder 150 Once the addressed transponder 150 has stored the current 12-bit increment, it transmits the full contents thereof back to host computer 100 for confirmation. After N successful exchanges between host computer 100 and transponder 150 , all N ⁇ 12 data bits will have been successfully transferred to transponder 150 .
  • host computer To perform the Write Tag_Data process, host computer first transmits the Write Tag_Data command, which includes the Tag_ID for the particular transponder 150 and the Tag_Data, to all transponders 150 (step 900 ). Each transponder 150 receives the Write Tag_Data command (step 915 ), and compares the received Tag_ID to its Tag_ID (step 920 ). If there is no match, the transponder 150 waits for the next command from host computer 100 (step 900 ). If there is a match, transponder 150 stores the received Tag_Data (step 925 ) and transmits its Tag_ID and the stored Tag_Data back to host computer 100 (step 930 ) for verification.
  • Host computer 100 receives the Tag_ID and Tag_Data and determines if a portion of the received Tag_Data was received intact (step 945 ). If no portion was received intact, processing reverts to step 900 where the last Write Tag_Data command is retransmitted to transponders 150 . If a portion of the received Tag_Data was received intact, processing continues to step 950 , where it is determined if all of the received Tag_Data was received intact. If not, again, processing reverts to step 900 where the last Write Tag_Data command is re-transmitted to transponders 150 .
  • step 955 host computer 100 determines if there is additional Tag_Data for transmission to the currently addressed transponder 150 . If so, an appropriate index is incremented to signal that the next portion of Tag_Data is to be transmitted, and processing reverts to step 900 where the Write Tag_Data command is transmitted (with the next portion of Tag_Data) to transponders 150 . Otherwise, if there is no additional Tag_Data for transmission, processing ends.
  • the present invention employs half-duplex Direct Sequence Spread Spectrum (DSSS) radio communication between each interrogator 190 (FIG. 1) and one or more transponders 150 . This is performed by spreading the spectrum of radio signals transmitted from interrogator 190 , using Manchester-encoded frequency-modulation of the transmission from interrogator 190 to transponders 150 , and amplitude/phase shift keying of re-radiated signal transmission from transponders 150 to an interrogator 190 . Batch reading of transponders 150 is provided through the use of a TDMA communications protocol.
  • an interrogator 190 includes a processor/controller 1000 connected to a spread spectrum transmitter 1001 , a spread spectrum receiver 1002 and an antenna switch matrix 1003 .
  • a delay line 1017 is connected from transmitter 1001 to receiver 1002 .
  • three antennas 1004 , 1005 and 1006 are connected to switch matrix 1003 , in a manner discussed in further detail below, although, as will be clear to one of ordinary skill in the art, two antennas may be used in one alternative embodiment, and in some cases a single antenna will suffice.
  • processor/controller 1000 communicates with host computer 100 via a full-duplex communications channel.
  • Interrogator 190 provides modulated signals to transmit messages to one or more transponders 150 (transmit mode), and also provides an illumination signal (receive mode) that is used by transponders 150 for use in reflecting a response message to interrogator 190 as backscatter modulated with amplitude/phase shift keying.
  • the modulation mode of transmitter 1001 is switched between FSK modulated spread spectrum when transmitting data to transponders 150 , and BPSK modulated spread spectrum when receiving data from transponders 150 .
  • Interrogator 190 sends Manchester-encoded data on an FSK Direct Sequence Spread Spectrum (DSSS) signal and recovers differentially encoded Manchester data from transponders 150 when illuminating (i.e., transmitting) with a BPSK DSSS signal.
  • DSSS FSK Direct Sequence Spread Spectrum
  • the use of a DSSS illumination signal provides a range gating effect and provides a measure of multipath immunity.
  • differential encoding provides data polarity decisions based on a bit to bit phase comparison, wherein, for example, a data one is encoded as a change in phase between one bit and the next, while a data zero is encoded as no change.
  • receiver 1002 is able to operate in the presence of transmissions by transmitter 1001 , because even though the system operates in a half-duplex mode, the signals received by receiver 1002 are based upon the BSPK DSSS signals transmitted by transmitter 1001 .
  • the isolation between transmitter 1001 and receiver 1002 , and the effective range for communication with a transponder 150 is governed by the physical separation between the transmit and receive antennas and the range gating provided through digital Direct Sequence modulation of the spreading code.
  • transmitter 1001 sends a replica of the signal fed to antennas 1004 - 1006 through delay line 1017 to receiver 1002 , as a coherent local reference signal that is used to optimally demodulate a return signal having the same net delay, thus improving both transponder discrimination and reducing the effect of direct illumination of the receiver antenna by the transmitted signal.
  • interrogator 190 data for transmission from processor/controller 1000 is first Manchester encoded by encoder 1019 , and then spread by a pseudo-random code generator 1020 in combination with FSK modulated generator 1018 .
  • the FSK modulated generator 1018 generates a DSSS signal which predominantly is in one half of the band (upper or lower) when the input from Manchester encoder 1019 is a logic one, and conversely occupies the other half of the band when the input is a logic zero.
  • the resultant emission spectrum occupies the entire bandwidth when averaged over one or more bit times.
  • the emission spectrum could be generated using a Frequency Hopped Spread Spectrum (FHSS) system which hops randomly in one half of the band (upper or lower) when the input from Manchester encoder 1019 is a logic one, and conversely which hops randomly in the other half of the band when the input is a logic zero.
  • FHSS Frequency Hopped Spread Spectrum
  • the output of the FSK modulated generator is directed via switch 1014 to the Transmit Power Amplifier 1015 .
  • the output of the Transmit Power Amplifier 1015 is routed, via the Power Divider 1016 to the Delay Line 1017 and to the Transmit port of Antenna Switch Matrix 1003 .
  • the Antenna Switch Matrix 1003 under command of processor/controller 1000 selects one of the preferably three antennas 1004 - 1006 to be used for transmission.
  • the DSSS illumination signal is generated in a balanced Modulator 1013 by convolving a stable, low phase noise carrier (915 MHz, in the preferred embodiment) generated by oscillator 1012 with the output of Pseudo Noise (PN) generator 1020 .
  • PN Pseudo Noise
  • the resultant BPSK-DSSS signal is amplified by Power Amplifier 1015 and then transmitted by a selected one of interrogator antennas 1004 - 1006 , under the control of antenna switch matrix 1003 .
  • a signal received from a transponder 150 is routed from a selected one of three interrogator antennas 1004 - 1006 (different from the antenna chosen for transmission) to low noise amplifier 1022 , filtered by band pass filter 1023 , split into I and Q baseband components and by mixing with delayed quadrature phase components of the transmitted signal by circuit 1050 , (comprised of quadrature power divider 1021 , in-phase mixer 1024 and quadrature-phase mixer 1025 ).
  • the signals out of the in-phase mixer 1024 and quad-phase mixer 1025 are deconvolved to baseband as an I/Q representation of the received signal.
  • Each output contains a DC component representative of the static clutter in the field being illuminated, plus a smaller AC component representative of the modulated return from each transponder 150 .
  • Other AC components are: low frequency noise, predominately from the transmitter; and high frequency noise from external interference sources along with residual code lines from the transmitted DSSS signal. Since Manchester coding is employed for the modulated return, it is amenable to bandpass filtering for separation of the baseband data from undesired noise. This is accomplished in the baseband processor section 1033 consisting predominately of I and Q amplifiers 1027 and 1029 , respectively, and I and Q bandpass filters 1028 and 1030 , respectively.
  • the amplified and filtered I and Q outputs of baseband processor 1033 are routed to identical clock and data recovery circuits, circuits 1031 for the RxI signal and circuits 1032 for the RxQ signal.
  • the data recovery channel performs a one bit integration to recover NRZ from the Manchester data, and then performs a modulo-2 addition of the current bit with the prior bit, to achieve the differential decoding, thus recovering the original unencoded NRZ data.
  • DDPLL digital discrete phase lock loop
  • Processor/controller 1000 processes both the RxI and RxQ data inputs looking for a valid Preamble, Break, and Synch message header. (See FIG. 3). The processor then determines which channel (i.e., RxI or RxQ) data it will use for the duration of the message. The decision is made simply based on which channel accepts the Synch portion of the message header first.
  • the processor/controller 1000 then processes the Header and the remainder of the message using data from the selected channel.
  • a state machine handles the receive and transmit messaging as discussed with respect to FIGS. 2 - 9 , above, although as one of ordinary skill in the art will readily recognize, alternatives such as a microprocessor may be substituted.
  • interrogator 190 consists of a low noise RF signal source (preferably a SAW resonator oscillator), modulators and amplifiers and an application specific integrated circuit (ASIC) including a digital processor.
  • the digital processor receives commands from processor/controller 1000 , formats the appropriate outgoing message, generates the pseudo-noise code, and creates a spread spectrum signal which is broadcast to the transponders 150 .
  • Receiver 1002 in interrogator 190 samples the transmitted signal, delays it in time by an amount equal to the round trip propagation time between interrogator 190 and a transponder 150 , and utilizes this delayed signal as the receiver local oscillator.
  • receiver 1002 Signals reflected by the antennas and from nearby objects do not correlate as well as signals whose range is being matched by the receiver delay.
  • the “optimum” range is 18 feet, and the correlation window is approximately 36 feet, null to null. In operation, ranges in excess of 30 feet have been observed.
  • the output of receiver 1002 is fed back to processor/controller 1000 , where data clock and data are extracted from the received signal.
  • the antennas 1004 and 1006 used in the preferred embodiment are planar arrays, which are constructed using an excited slot in a conducting sheet and which are linearly polarized. In operation, an array of antennas (two or more with differing polarization) must be utilized to provide unambiguous coverage of the possible transponder 150 antenna orientations that might be present during a read cycle.
  • a third antenna 1005 having polarization complementing antennas 1004 and 1006 is included in the antenna array.
  • Switching matrix 1003 permits selection of any one of the six possible transmit/receive combinations available from the three antennas 1004 - 1006 , which selection is under the control of host computer 100 .
  • an antenna comprised of elements 1100 and 1105 receives RF transmission from an interrogator 190 and an RF switch acting as an impedance modulator 1110 at the antenna feed point is operated by controller 1155 via the Rx/Tx control line for either directing signals to the receiver portion of transponder 150 or modulating the re-radiation (reflection) of RF illumination from interrogator 190 back to interrogator 190 .
  • the modulation effect produced by the Impedance Modulator 1110 appears to an observer near transponder 150 as Amplitude Shift Keying (ASK).
  • ASK Amplitude Shift Keying
  • the switch alternately shorts the antenna terminals causing the antenna to be a reflector, or it passes the signal to a load (Frequency Discriminator 1115 ), which causes the antenna to be absorptive.
  • the modulated signal received at the interrogator is no longer simple ASK.
  • the weak return signal is summed with a much larger unmodulated component with arbitrary phase.
  • the vector sum composite, as received by the interrogator can be either pure AM, pure PM, or any combination in between, referred to elsewhere as “amplitude/phase shift keying”. It is for this reason that interrogator 190 employs I and Q demodulation.
  • Signals received by transponder 150 pass through impedance modulator 1110 , with minimal attenuation, and through a passive frequency selective network, i.e., frequency discriminator 1115 , that demodulates the frequency-modulated signal component of the received signal.
  • frequency discriminator 1115 a passive frequency selective network
  • Signal detection is provided by, in the preferred embodiment, a conventional Foster-Seeley discriminator, or as one of ordinary skill in the art will readily recognize, other frequency selective differential diode detection and voltage comparison circuits.
  • the received signal passes though bandpass quantizer 1120 (a conventional comparator based data slicer) and an anti-aliasing lowpass filter 1125 (a conventional RC Low Pass Filter).
  • the signal at the output of lowpass filter 1125 is a recovered amplitude limited analog baseband signal, which is split into two channels, a first channel in which the signal first digitally sampled in Rx data recovery circuit 1130 , which provides data bandpass filtering and conditioning, conversion of the received Manchester data to NRZ, and reclocking of the recovered data (i.e., a digital baseband replica of the Interrogator transmitted NRZ Data (RxD)), and a second channel in which the signal is first digitally sampled in Rx clock recovery circuit 1135 to extract data transitions for filtering by a digital phase locked loop which creates a local replica of the transmit data clock in both phase and frequency (i.e., a digital baseband replica of the Interrogator transmitted Manchester encoded Clock (RxD CLK)) that is provided to state machine 1155 and to Rx data recovery circuit 1130 .
  • RxD CLK digital baseband replica of the Interrogator transmitted Manchester encoded Clock
  • transponder 150 may be implemented in hardware, software, and/or firmware.
  • the resulting demodulated NRZ data from Rx data recovery circuit 1130 is fed to state machine 1155 which processes and responds to the received signal as discussed with respect to FIGS. 2 - 9 above.
  • State machine 1155 consists of clock crystal 1170 , clock generator 1165 , tag memory 1160 , random number generator 1175 , and tag Rx/Tx control 1180 .
  • Clock generator 1165 consists of an oscillator stabilized by crystal 1170 and a cascade of frequency dividers.
  • Crystal 1170 in the presently preferred embodiment, is a 32,678 Hz crystal of a type normally used in quartz wristwatches. The crystal frequency is used for sampling in the Rx data recovery 1130 and Rx clock recovery 1135 , with eight times over sampling in the present embodiment, setting the Rx data rate at 4096 Hz.
  • Clock generators 1165 are used to set the transmit data rate of transponder 190 (16,384 Hz in the present embodiment) and to provide clocks for other blocks within the state machine 1155 .
  • the choice of these frequencies is not critical and that other choices of data rates and clock frequencies would also provide adequate performance. Further, one of ordinary skill in the art would understand that the control of the clock frequencies can be accomplished by other methods.
  • Random number generator 1175 is used by state machine 1155 for a variety of operations, as discussed with respect to FIGS. 2 - 9 , above. It is important that the number generated be non-deterministic (i.e., truly random) to uphold the statistical validity of the ability of the present invention to process large numbers of transponders 150 in one field at one time. In order to achieve the required randomness while maintaining the desired economy in terms of current drain and gate count, the presently preferred embodiment combines a short pseudo random noise generator (PNG) (known alternatively in the literature as a shift register generator (SRG) or as a Linear Feedback Shift Register Generator (LFSR)) with a process controlled by thermal noise which generates randomly occurring pulses.
  • PNG pseudo random noise generator
  • SRG shift register generator
  • LFSR Linear Feedback Shift Register Generator
  • the present invention uses a conventional 16 bit SRG 1605 (shown within the dotted box in FIG. 16).
  • a conventional stall detector 1610 is included within 16 bit SRG 1605 to exclude the “all zeroes” state. Taps are included at the outputs of stages 1, 3, 12 and 16 of SRG 1605 which are exclusive OR'd and fed back to the input of stage 1.
  • the state of 16 bit SRG 1605 is modified by applying the output(s) from a toggle flip-flop and select mask contained within invert register 1625 .
  • the input at 1615 is a random pulse source derived from clock skew information provided by Rx clock recovery circuit 1135 .
  • the SRG 1605 is clocked, in the preferred embodiment, by the highest frequency clock available from clock generator 1165 .
  • the clock skew pulses are as random as the noise provided by bandpass quantizer 1120 .
  • the skew pulses occur at a rate proportional to the frequency offset between the baud rate master clock 1011 (FIG. 10B) in interrogator 190 and crystal 1170 in transponder 150 , which is a second random variable.
  • Random number generator 1175 runs continuously and the contents of 16 bit SRG 1605 are latched into other registers when a random number is needed. When a random number larger than 16 bits is required, the output is latched twice in succession to provide the additional bits.
  • the number of stages in 16 bit SRG 1605 could be greater than or less than 16. For each length there are tables available which provide choices of feedback tap locations which guarantee the sequence produced by the generator will be maximal.
  • Tag Rx/Tx control 1180 implements the state machine steps and processes for proper transponder operation, as discussed with respect to FIGS. 2 - 9 above.
  • Tag memory 1160 holds the transponder data which is written into transponder 150 with the Write Tag_Data command or the Replace Tag Data command as described with respect to FIGS. 3 and 9 above.
  • tag memory 1160 is accessed whenever a Read Tag Data command is accepted by transponder 150 as described with respect to FIGS. 3 and 8 above.
  • a battery 1140 is provided within transponder 150 shown in FIG. 11 as a power source therefor.
  • the battery is preferably a coin cell of the 3 Volt Lithium type.
  • interrogator 150 is transmitting continuously with a constant envelope signal during the entire cycle of issuing commands to transponders 150 and then providing an illumination signal for receiving reflected signals from transponders 150 .
  • antenna elements 1200 and 1205 (which correspond to antenna elements 1100 and 1105 in FIG. 11 and which are described in detail with respect to FIG. 13 below) receive signals from and modulate reflected signals to a corresponding interrogator 190 .
  • Diode 1210 is a PIN diode in the presently preferred embodiment that is connected between antenna elements 1200 and 1205 as shown in FIG. 12 with the anode of diode 1210 connected to antenna element 1200 and the cathode of diode 1210 connected to antenna element 1205 .
  • Diode 1210 acts as an impedance modulator (i.e., a transmit/receive switch) under the control of logic array 1276 via resistor 1215 , resistor 1220 and inductive element 1230 .
  • Resistor 1215 is connected between the anode of diode 1210 and logic array 1276 and the series combination of resistor 1220 and inductive element 1230 is connected between the cathode of diode 1210 and logic array 1276 .
  • Logic array 1276 sets the bias on diode 1220 though the loop formed by resistor 1220 , inductive element 1230 , diode 1210 and resistor 1215 .
  • Resistors 1215 and 1220 also provide isolation to logic array 1276 from RF signals present at the terminals of diode 1210 .
  • Bypass capacitor 1225 connected between the junction of resistor 1220 and inductive element 1230 and ground and provides further isolation from RF signals to logic array 1276 .
  • I nductive element 1230 provides a low inductance connection from bypass capacitor 1225 to antenna element 1205 .
  • Frequency discriminator 1115 of FIG. 11 is preferably of Foster-Seeley design, and in the preferred embodiment consists of capacitor 1235 , capacitor 1240 , capacitor 1250 , capacitor 1256 , inductive element 1245 , center tapped inductor 1248 , detector diode 1252 and detector diode 1254 .
  • center tapped inductor 1248 has a first end, a second end and a center tap.
  • Capacitor 1235 is connected between the cathode of diode 1210 and the first end of inductor 1248 .
  • Capacitor 1240 is connected between the anode of diode 1210 , a first end of inductive element 1245 and a DC bias point provided by the series combination of resistors 1259 and 1261 which series pair is connected between battery (power supply) 1258 and ground. The second end of inductive element 1245 is connected to the center tap of inductor 1248 .
  • Capacitors 1235 and 1240 provide impedance matching and DC blocking between the discriminator and the antenna formed by elements 1200 and 1205 .
  • Capacitor 1250 is connected between each end of inductor 1248 and resonates with inductor 1248 to set the center frequency of the frequency discriminator.
  • the series combination of diode 1252 and diode 1254 are also connected between each end of inductor 1248 , with the cathode of diode 1252 connected to the first end of inductor 1248 , the anode of diode 1252 connected to the cathode of diode 1254 and the cathode of diode 1254 connected to the second end of inductor 1248 .
  • the point which connects the anode of diode 1252 and the cathode of diode 1254 serves as the output of the discriminator.
  • Capacitor 1256 is connected between the output of the discriminator and the DC bias point generated by resistors 1259 and 1261 , and provides a short to RF frequencies present at the output while allowing the data demodulated by the discriminator to pass through to the next stage.
  • Resistor 1260 provides a DC return for the discriminator's center frequency reference voltage (i.e., the DC bias voltage).
  • Bandpass quantizer 1120 of FIG. 11 is implemented in FIG. 12 by the combination of a first conventional RC low pass filter formed by resistor 1262 and capacitor 1268 which has a cutoff frequency selected to pass the received data but attenuates higher frequency noise outside the data bandwidth, a second conventional RC low pass filter formed by resistor 1264 and capacitor 1266 which has a cutoff frequency selected to pass only the DC component of the demodulated data, and a comparator which receives as a first input the output of the first low pass filter and as a second input the output of the second low pass filter.
  • the combination of the two low pass filters and comparator 1270 operate as a bandpass one bit quantizer.
  • Lowpass filter 1125 of FIG. 11 is preferably a conventional RC low pass filter and in FIG. 12 consists of the combination of resistor 1272 and capacitor 1274 . This low pass filter provides a final anti-alias low pass filtering of the received signal prior to being provided to logic array 1276 .
  • the antenna for transponder 150 is required to possess a wide bandwidth, be nominally omnidirectional and be physically small.
  • the antenna is required to function efficiently as a receive antenna, while also providing a suitable controllable reflector in the “transmit” mode.
  • an antenna structure meeting these requirements consists of an array of two resonant antennas elements (element 1300 and element 1305 corresponding to antenna element 1100 and antenna element 1105 , respectively, in FIG. 11 and to antenna element 1200 and antenna element 1205 , respectively, in FIG. 12), one which is 1 ⁇ 4 ⁇ (one quarter wavelength) (element 1305 ), and one which is 3 ⁇ 4 long (element 1300 ).
  • the result is a resonant line 1 k (one wave length) long, which efficiently reflects incident RF energy.
  • the structure When isolated with a suitable load impedance, the structure acts as an offset fed dipole antenna, also resonant, but which now delivers energy to a load. This latter mode is used in receive mode and also as one of the two states (absorptive, as opposed to reflective) in transmit mode.
  • the antenna is preferably mounted on a small card, with dimensions substantially the same as a conventional credit card.
  • the length of the full size antenna i.e., the straight length
  • the antenna folding is done in a manner that does not narrow the bandwidth.
  • a conventional method to achieve this is to use antenna shapes which have a resonant behavior based on angles rather than length.
  • the antenna of the present invention utilizes a geometric spiral to reduce the size of the 3 ⁇ 4 ⁇ element.
  • element 1320 and element 1315 combine for the 1 ⁇ 4 ⁇ (one quarter wavelength) portion 1305 of the antenna.
  • the 3 ⁇ 4 ⁇ (three quarter wavelength) spiral portion 1300 is comprised of elements 1325 , 1330 , 1335 , 1340 , 1345 , 1350 , 1355 , and 1360 .
  • the defining relationships between these lengths are as follows:
  • the ⁇ fraction ( 1 / 4 ) ⁇ ⁇ element 1305 in the presently preferred embodiment employs a short segment of increased linewidth (not shown) at the end of element G to achieve optimal tuning.
  • FIGS. 14 and 15 in an additional aspect of the present invention, when the area in which the tagged articles are to be located is much larger than the spatial range of a single interrogator, a plurality of interrogators 190 are installed in a hexagonal pattern 1400 within such area, all linked to host computer 100 (the interconnection between the host computer 100 and a plurality of interrogators 190 is shown in FIG. 1).
  • each hexagonal area represents a separate interrogator 190 and the plurality of interrogators are divided into groups.
  • interrogators 190 are assigned to one of three groups (marked as 1, 2 or 3 in FIG.
  • next-nearest neighbor format In operation, only one group of the three groups of interrogators is active at a time, e.g., only the interrogators in group 1 (e.g., interrogator 1410 ) transmit at the same time.
  • Interrogators in groups 2 and 3 are inactive while the group 1 interrogators are active. After the group 1 interrogators have completed their operations, the interrogators in group 2 become active (e.g., interrogator 1420 ), while the group 1 and 3 interrogators become inactive. Finally, the interrogators in group 3 become active (e.g., interrogator 1430 ), while the group 1 and 2 interrogators become inactive. In this manner, it is possible to greatly reduce the amount of time required to read all tagged articles over the prior art method, which requires that only a single interrogator be active at a time.
  • the number of interrogators 190 transmitting simultaneously may be decreased substantially by grouping interrogators 190 on the basis of higher orders of nearest neighbors. For example, if interrogators 190 are grouped on a second order basis, as shown in array 1500 in FIG. 15, then the ratio of active to inactive interrogators is 1:9.
  • the group 1 interrogators 190 are active (e.g., interrogator 1510 )
  • the remaining groups 2-9 interrogators e.g., interrogators 1520 - 1590
  • each group sequentially becomes active, with the remaining groups inactive, until all nine groups have completed their operation.

Abstract

An RFID system and method for communicating between a host computer, one or more interrogators connected to the host computer, and a large body of transponders distributed within an area covered by the interrogators. Each transponder originally has a common identification code, and upon initialization by the host computer internally generates a unique identification code based upon an internally generated random number. The host, through the interrogators, reads each of the identification codes associated with each transponder by iteratively transmitting a read identification code command along with a controlled variable. Each transponder compares the received controlled variable to an internally generated random number, and selectively transmits its identification code based upon the outcome of this comparison. After the completion of each read identification code iteration, the host adjusts the controlled variable based upon the responses received in the previous iteration. Preferably, communications between the interrogators and the transponders are DSSS signals in TDMA format, and the transponders use the random number generator to assign a time slot for transmission of their response. Each interrogator includes an antenna system utilizing a switch matrix to connect multiple antennas having different polarizations, which ensures that all transponders within the range of the interrogator receive the signals from the interrogator. In a further aspect, the interrogators are arranged in groups, each group in nearest neighbor format, to reduce the time for reading the transponders and the emissions generated when more than one interrogator is active at the same time.

Description

    FIELD OF THE INVENTION
  • The invention relates generally to a system and method for communicating between a host computer and a plurality of RFID transponders (sometimes called tags) through one or more interrogator units, and more specifically to a system and method which greatly reduces the interference caused by transmissions from RFID transponders to those interrogator units, which increases the spatial area available between an interrogator and an RFID transponder and which allows communication between an interrogator and a large body of RFID transponders, among various other advantages. In addition, the invention also relates to a system and method for tracking a large body of RFID transponders in the case where more than one interrogator unit is employed. [0001]
  • BACKGROUND OF THE INVENTION
  • As fully described in U.S. Pat. No. 5,530,702 to Palmer et al., a significant difficulty in establishing a multipoint communications system using transponders is how to prevent the transponders from attempting to communicate with the host at the same time. Such common transmissions usually cause a “collision” among the various transmissions and thereby corrupts the transmitted messages and renders them unintelligible to the host system. In the '702 Patent, upon receipt of a “begin” signal transmitted by the host computer (through an interrogator), each transponder generates a random number and initiates an internal counter. When the count of the internal counter matches the random number, the transponder transmits a “request to transmit” signal to the host computer. Upon receipt of such “request to transmit” signal, the host computer transmits a first acknowledgment signal to all of the transponders. If the transponder which has transmitted the “request to transmit” signal receives this first acknowledgment signal within a predetermined period of time, it concludes that it has been given permission to transmit, and transmits an information-based signal to the host computer. If the transponder does not receive the first acknowledgment signal within the predetermined period of time, it generates a new random number and initiates the counter again. In this manner, a large body of transponders may communicate with a host computer. A problem with this approach, as with any approach utilizing random response delays, is that there must be a good estimate of the total transponder population. If there are fewer transponders than expected in the field, this approach will spend an unduly long time waiting for responses, while if the population is too great, this method will be contending with large numbers of collisions for long periods of time. [0002]
  • Other systems for establishing communications between a host computer and a plurality of transponders are disclosed in U.S. Pat. Nos. 5,519,381, 5,550,547, 5,986,570 and 6,034,603. However, as discussed briefly below, each of these systems possesses certain drawbacks in operation that prevent optimum performance. The '381 Patent discloses an identification system having an interrogator and a plurality of transponders, but requires that the interrogator sequentially transmit two different signals to the transponders using two different antennas, to ensure that all transponders are identified, necessitating additional expense and complexity in the design and construction of the interrogator. The '547 Patent discloses a “treesplitting” algorithm for determining which transponder should transmit wherein the interrogator first transmits a read command and then transmits a failure notice upon the detection of a collision. Approximately half of the transponders will not transmit thereafter, based upon certain internal operations keyed to an internally-generated random number. This operation continues until no failures (collisions) are detected, and then the transponders begin to communicate. This filtering process, during which no data is recovered by the interrogator, is time intensive when communication is with a large body of transponders. It is also time intensive because it is limited to only a single transponder response per one or more interrogator commands. Similarly, the '570 Patent discloses a system wherein the interrogator signals the transponders when a collision is detected, and the transponders cease communicating for a period of time established by a random number generated within the transponder. As such, the system of the '570 Patent also provides satisfactory results, but also is time intensive when random wait periods exceed the minimal statistical requirements of the transponder population, and therefore is not optimal. Finally, the '603 Patent discloses a system in which each transponder includes circuitry which is able to detect transmissions by other transponders, and each transponder only transmits when it detects no other transmissions. If a transmission by another transponder is detected, each transponder waits a predetermined time before listening for competing transmissions again. Although the '603 Patent provides adequate operation, it requires transponders having additional complexity (and therefore additional cost) for the circuitry required to receive transmissions from the other transponders and is also time intensive when faced with a large body of transponders, and thereby presents certain drawbacks. [0003]
  • Another drawback of conventional RFID systems relates to the spatial range between the interrogator and each transponder. Conventional RFID systems have been designed for a variety of categories of operation, all of which must be approved or licensed by regulatory agencies, e.g., the U.S. Federal Communications Commission (FCC) for systems intended for use in the United States. The FCC has approved conventional RFID systems, without requiring an operator's license, at various frequency bands and with maximum RF power levels specified for each frequency band. In approving such systems, the FCC has placed strict limitations on the carrier modulation and on the mode of signal returned from the RFID transponder. For example, most unlicensed systems may not include any form of RF amplification within the transponder of signals returned by the transponder to the interrogator. [0004]
  • One class of conventional RFID systems, disclosed in U.S. Pat. No. 5,053,774, has focused on reading a single transponder at close range. These systems are commonly known as proximity systems and have been designed to operate at carrier frequencies below 30 MHZ. In systems of this type, the transponder can receive its electrical power from the RF signal of the interrogator and no battery is required in the transponder. There are currently several such systems on the market, including the TIRIS™ system from Texas Instruments, Inc. These systems currently are marketed for security cards, money cards, animal identification, etc. The drawbacks of this type of system are that only a single transponder may be addressed at one time and that the spatial distance between the interrogator and the transponder is very small. [0005]
  • Another class of conventional RFID systems, disclosed in U.S. Pat. No. 5,030,807, has focused on reading a single transponder on moving objects, e.g., for vehicle identification and automatic toll collection. These systems operate at ranges up to 6 meters, but are not designed to read more than one transponder. [0006]
  • A further class of conventional RFID systems, disclosed in U.S. Pat. Nos. 5,640,683, 5,649,295 and 5,649,296 focused on communicating with a plurality of transponders by frequency shift keying (FSK) the backscatter (i.e., re-radiated) signal from a particular transponder. A precision (e.g., crystal) oscillator is located on the transponder, and the backscatter antenna of the transponder is voltage controlled by a signal at a frequency derived from that precision oscillator. The resulting reflected signal contains a subcarrier that is offset in frequency from the signal originating from the interrogator. The offset frequency subcarrier signal is itself modulated according to the data being transmitted by the transponder. Although this type of system increases the spatial range between the interrogator and the transponders and allows the background hum due to residual reflection by non-communicating transponders of the signal originating from the interrogator to be filtered away, the data communication rate is quite low (e.g., 1 kbps) because it is necessarily at a low frequency in comparison with the subcarrier. [0007]
  • Yet another class of conventional RFID systems, disclosed in U.S. Pat. No. 5,828,693, has focused on batch reading of transponders using frequency hopping as a spread-spectrum communication means. These systems operate at UHF frequencies (915 MHZ) or microwave frequencies (2.45 GHz or 5.8 GHz) but require complicated frequency hopping circuitry. [0008]
  • Yet a further class of conventional RFID systems, disclosed in U.S. Pat. Nos. 5,539,775, 5,825,806 and 5,974,078, has focused on batch reading of very small transponders at ranges under 2 meters. These systems operate by amplitude modulating and phase modulating a microwave carrier (2.45 GHz or 5.8 GHz), in order to minimize the size of the antennas. However, because each antenna (there could be more than one) is smaller than resonant antennas at lower frequencies, the power received by the antenna is less and the read/write ranges are less than for similar systems operating at lower frequencies. In order to compensate for the weaker signal strength, the RF signal detection and demodulation of the RFID transponder of these systems is considerably more complex than that of the present invention. [0009]
  • The use of a direct sequence spread spectrum (DSSS) signal transmitted from the interrogator to the transponder in RFID systems has been complicated by the need for complex and power intensive demodulation strategies in the transponder. The system disclosed in U.S. Pat. No. 5,974,278 first creates an amplitude modulated signal with the modulation being a direct sequence waveform. The transponder demodulates the received signal in two steps. First, the amplitude modulated waveform is detected by an AM Detector, and the presence of detected signal energy is used to turn on a data correlator, which then processes the baseband direct sequence signal. The system of the '278 Patent is deficient in that it is susceptible to jamming from other on channel carriers, including frequency hopped spread spectrum (FHSS) signals, has long acquisition times (see Column 5, line 60: “ . . . several hundred data bit periods.”), and requires a high speed onboard clock to clock the onboard PN generators. The system described in the '278 Patent also uses carrier regeneration to return signals to the interrogator and is thus not a reflective transponder. [0010]
  • An alternative to the DSSS system of the '278 Patent is to use the DSSS system and method disclosed in U.S. Pat. No. 5,559,828, which sends a pseudo-noise (PN) code reference together with PN coded data on the in-phase and quadrature phases of the same carrier frequency. With this method, sometimes referred to as a Quadrature Fast Acquisition Spread Spectrum Technology (QFAST®) system, there is no need for the transponder to have an on-board code generator to recorrelate the coded signal to the original data bandwidth. These QFAST® systems demodulate with a simple delay-and-multiply strategy, which may be implemented with passive analog delay components. However, until now the DSSS system and method of the '828 Patent has not been adapted for use in an RFID system. [0011]
  • One problem facing conventional RFID systems is interrogator receiver desensitization caused by the interrogator transmitter itself. Methods to mitigate the deleterious effects of this local strong signal have been described in the field of RADAR and involve a technique called range gating. The first range gating system was implemented on pulsed RADAR. The RADAR illuminator system clamped off the receiver, and sent out a very short burst of high power RF. After the transmitter was shut off, the receiver input was reactivated, and used to listen for the returned pulse. A refinement on this technique opened the receiver for a specific period, beginning after a controllable delay. Then anything received could only have come from an object a known distance away, inside the “range gate”. A problem with the pulsed RADAR system was that the power in the transmitted pulse had to be quite high in order for the received signal to have a reasonable signal to noise ratio. The combination of wide receiver bandwidth to accommodate the short pulse, and the brief integration time for a single pulse, ultimately limited the range of early pulsed RADAR systems. [0012]
  • A second range gating system utilized a continuous RF signal whose center frequency was changed continuously. A returned signal even from a stationary object, would have a different frequency than the current transmitted frequency or receiver Local Oscillator. This frequency offset resulted in a synthetic Doppler component in the demodulator output, with the range to the object being “encoded” in the amount of frequency offset. This type of system is referred to as a “chirp” system. While this system overcame the need for high peak power, and provided long integration times, it was easily jammed by the presence of other emitters in the band. Placing a secondary phase modulation on the transmitted signal, which could be checked, reduced the jamming problem. Subsequently, the use of a special digital pattern, called a Barker Sequence, improved the ranging resolution on the signal through its unique auto-correlation properties. Later, with the advent of high speed digital circuitry, it became possible to generate long “pseudo-noise” codes which were deterministic, but which would not repeat on a timescale similar to the expected returning signal. Such systems provided range gating through digital direct sequence modulation. The receiver in such a system utilized both the knowledge of the transmitter center frequency and the displacement of the code phase to provide range gating and Doppler rate determination. [0013]
  • A further problem facing conventional RFID systems is that, in order to read RFID transponders that may be distributed over an area that is considerably larger than the spatial range of a single interrogator antenna assembly, either an interrogator must roam the area or fixed-position interrogators must be positioned in an array located within the area. The latter configuration is preferred in most automated applications. However, if adjacent interrogators in such an array are used simultaneously to read data from transponders in the area, their signals might possibly interfere with each other. Therefore, it is usually necessary to operate the multiple interrogators one at time in a sequential manner. In some applications, a typical floor space may require 500 or more interrogators. If only one interrogator were to be operated at a time, and if each interrogator required several minutes to complete the reading from, or writing to, the RFID transponders within its range, then the entire operation could take several hours to complete. In many situations, it is important to complete this operation as fast as possible so that other tasks can be permitted to resume. [0014]
  • Various objects, advantages and features of the present invention will become readily apparent from the ensuing detailed description and the novel features will be particularly pointed out in the appended claims. [0015]
  • SUMMARY
  • The present invention is directed to an RFID system comprising a plurality of RFID transponders which each have a unique identification code and which each receive a signal and generate a response signal based on the received signal. Each RFID transponder further includes a random number generator used for determining whether to respond to a received message addressed to all of the RFID transponders. The RFID system further includes a host computer for generating a message for transmission to the RFID transponders and one or more interrogators connected to the host computer which include an interrogator transmitter and an interrogator receiver that operate in half-duplex mode. The interrogator transmitter transmits messages received from the host computer to the RFID transponders during a first part of the half-duplex mode and provides an illumination signal to the RFID transponders during a second part of the half-duplex mode. The interrogator receiver receives signals reflected by the RFID transponders and provides the received signals to the host computer. In operation, the host computer identifies each of the unique identification codes associated with each of the plurality of RFID transponders by iteratively transmitting a message including a variable having a predetermined initial value to each of the RFID transponders. Only the RFID transponders which generate a random number greater than the variable respond to the message by transmitting identification codes associated with the respective RFID transponders. In a preferred embodiment, each of the signals sent between the interrogator and the RFID transponders is transmitted in spread spectrum format. Further, communications between the interrogator and each of the RFID transponders is preferably in TDMA format whereby a predetermined number of time slots are available for transmission. Still further, each of the RFID transponders also use the random number generator to assign a time slot to use for transmission of the response signal. Also, the host computer preferably intelligently adjusts the variable after receipt of each response signal to ensure that an adequate number of responses are received during a next iteration. Finally, the random number generator is also used to generate a unique identification code for each of the plurality of RFID transponders. [0016]
  • A particular aspect of the present invention is a method for a host to read an identification code from RFID transponders each having unique identification codes. First, the host iteratively transmits a read identification code command and a variable having a predetermined initial value to the RFID transponders. Each of the RFID transponders receive the read identification code command and the variable, generate a random number, and compare the variable with the generated random number. If the generated random number is greater than the variable in a particular RFID transponder, that transponder transmits an identification code associated therewith and then becomes inactive such that each RFID transponder does not respond to further read identification code commands during the current read identification code command iteration. If the generated random number is greater than the variable in a particular RFID transponder, that transponder waits for a next transmission of the read identification code command and the variable. Upon receipt of one or more identification codes during a current iteration, the host intelligently adjusts the value of the variable for the next iteration of the transmission of the read identification code command and the variable. The host also examines the variable and ceases the iterative transmission of the read identification code command when no RFID transponders respond by transmitting their identification code in response to a final value of the variable. In a preferred embodiment, the predetermined value for the variable is set as a high value, the step of intelligently adjusting the value of the variable reduces the value of the variable, and the final value is zero. As a related aspect, the host system may have more than one antenna for transmission to the RFID transponders, and the read identification code command is sent on each of the antennas. Upon receipt of a response including an identification code from a particular RFID transponder, the identification code is stored in memory along with information about which antenna was used to transmit the read identification code command. Thereafter, all direct communications to the RFID transponder are made using the associated antenna information. [0017]
  • Another aspect of the present invention is a method for re-selecting an identification code for each of a group of RFID transponders. First, the host transmits a re-select identification code command to each of the RFID transponders. In response, each of the RFID transponders generates a first random number and calculates a new identification code based upon the first random number. Once this is complete, the identification codes are read as described above. As a further enhancement of this aspect, all of the RFID transponders are first received in a state where each has a common identification code, which is useful in testing, batch programming, etc. Upon introduction of a group of RFID transponders to an area, the re-select identification code mode is used to establish a unique identification code for each RFID transponder. [0018]
  • The system of the present invention includes an interrogator which is connected to a host computer for communicating with the RFID transponders. The interrogator comprises one or more antennas, a transmitter connected to one of the antennas for transmitting an FSK modulated spread spectrum signal on that antenna during a transmitting mode and a BPSK modulated spread spectrum signal during a receiving mode, a receiver connected to one of the antennas for receiving a spread spectrum signal in PSK format, and a controller connected to the transmitter and the receiver for controlling the transmitter and the receiver and communicating with a host computer. In an additional aspect, there are two antennas, a first antenna having a first polarization and a second antenna having a second polarization which is orthogonal to the first polarization, and an antenna switch matrix for selecting one of the two antennas for connection to the transmitter and a second of the two antennas for connection to the receiver. In a further aspect, there is a third antenna having a third polarization which is orthogonal to the first polarization and to the second polarization, and the antenna switch selects one of three antennas for connection to the transmitter and a second of the three antennas for connection to the receiver. The transmitter of the interrogator comprises an FSK transmitter section for generating a message for transmission as a spread spectrum output signal in FSK format, a BPSK transmitter section for generating an illumination signal for transmission as a spread spectrum signal in BPSK format, an output amplifier, and a switch which selectively connects the FSK transmitter section or the BPSK transmitter section to the output amplifier. The FSK transmitter section consists of a Manchester encoder connected to the controller, a PN generator connected to the controller, and an FSK modulation generator connected to the Manchester encoder and the PN generator. The BPSK transmitter section consists of a PN generator, a low noise oscillator, and a balanced modulator connected to the PN generator and the low noise oscillator. The receiver comprises a band pass filter having an input connected to the at least one antenna for receiving a signal, a first mixer and a second mixer each having a first input connected in parallel to an output of the band pass filter and a second input connected to a signal derived from a transmitted signal, a first bandpass filter connected to an output of the first mixer, a first data and clock recovery circuit connected to an output of the first bandpass filter for recovering an in-phase version of the received signal, a second bandpass filter connected to an output of the second mixer, and a second data and clock recovery circuit connected to an output of the second bandpass filter for recovering an quadrature-phase version of the received signal. [0019]
  • As a further aspect of the present invention, an antenna assembly for an RFID interrogator is disclosed which comprises a first antenna having a first polarization, a second antenna having a second polarization which is orthogonal to the first polarization, and an antenna switch network connected to the first and second antennas for selectively selecting one of the first and the second antennas for connection to a transmitter. In a preferred embodiment, the antenna assembly further comprises a third antenna having a third polarization which is orthogonal to both the first polarization and the second polarization. [0020]
  • An additional aspect of the present invention is a transponder for communicating with an interrogator in an RFID system, which includes a first antenna element having a first predetermined dimensional configuration, a second antenna element having a second predetermined dimensional configuration, an impedance modulator connected between the first antenna element and the second antenna element which causes the first antenna element to be electrically connected to the second element in a first state and to be electrically isolated from the second element in a second state, a receiver for receiving a message within an FSK modulated spread spectrum signal connected to the first antenna element, the second antenna element and the impedance modulator, and a controller connected to the receiver which receives the message and selectively responds to the message in BPSK format by reflecting an illumination signal transmitted by the interrogator by selectively switching the impedance modulator between the first state and the second state. Preferably, the transponder receiver comprises a frequency discriminator having an input connected to the first and second antenna elements, a bandpass quantizer having an input connected to an output of the frequency discriminator, and a low pass filter connected to an output of the bandpass quantizer. Further, the first predetermined dimensional configuration is preferably a length of one-quarter wavelength and the second predetermined dimensional configuration is preferably a length of three-quarter wavelength. In addition, the first antenna element preferably consists of two first sub-elements connected by a ninety degree angle and have a predetermined length relationship to each other. Also, the second antenna element preferably consists of a plurality of second sub-elements connected by ninety degree angles in a geometrically folding configuration and each of the second sub-elements have a predetermined length relationship to each other. Finally, the first antenna element and the second antenna element together preferably form a dipole configuration. [0021]
  • In yet an additional aspect, a method and apparatus for generating a random number in an RFID transponder is disclosed. In the method, a random seed first is calculated based upon the difference between a local clock signal and a clock signal derived from either a received signal or random noise. Next, the random seed is loaded into a random number generator. Finally a random number is generated based upon the random seed. The apparatus includes a first clock input derived from a local clock oscillator, a second clock input derived from a received signal or random noise, and means connected to the first clock input and the second clock input for generating a random number based upon the timing difference between the first clock input and the second clock input. [0022]
  • In yet a further aspect of the present invention, a method for controlling a plurality of groups of interrogators in an RFID system is disclosed. Each interrogator within a group of interrogators is arranged in nearest neighbor format. Thereafter, only corresponding interrogators within each group of interrogators are activated for transmission of signals to at least one RFID transponder within a zone of covered by the respective activated interrogators. [0023]
  • One particular embodiment of the present invention is an RFID system for tracking election ballots. A plurality of RFID transponders are included in this application. Each of the plurality of RFID transponders has a unique identification code and is connected to a separate ballot. The RFID transponders receive a signal and generate a response signal based thereon. Each of the RFID transponders includes a random number generator used for determining whether to respond to a received message addressed to all of the plurality of RFID transponders and a memory for storing election data. This embodiment further includes a host computer for generating a message for transmission to at least one of the RFID transponders and for controlling the storage of election data within each of the ballots, e.g., during an election. Finally, this embodiment includes at least one interrogator connected to the host computer having an interrogator transmitter and an interrogator receiver which operate in half-duplex mode. The interrogator transmitter transmits messages received from the host computer to the plurality of RFID transponders during a first part of the half-duplex mode and provides an illumination signal to the plurality of RFID transponders during a second part of the half-duplex mode. The interrogator receiver receives signals reflected by the at least one RFID transponders and provides the received signals to the host computer. In this embodiment, the host computer identifies each of the unique identification codes associated with each of the plurality of RFID transponders by iteratively transmitting a message including a variable having a predetermined initial value to each of the RFID transponders, and only the RFID transponders which generate a random number greater than the variable respond to the message by transmitting identification codes associated with the RFID transponders. In an additional aspect of this invention, all of the ballots within one voting group, e.g., a precinct, may be initialized using a main host-interrogator combination prior to an election, and a separate host-interrogator combination may later be used as a separate voting booth.[0024]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The above and related objects, features and advantages of the present invention will be more fully understood by reference to the following detailed description of the presently preferred, albeit illustrative, embodiments of the present invention when taken in conjunction with the accompanying drawing wherein: [0025]
  • FIG. 1 is a block diagram of the system of the present invention; [0026]
  • FIG. 2 is a flow chart detailing the six modes of operation of the system; [0027]
  • FIG. 3 is a chart of the message structure of the six modes of operation; [0028]
  • FIG. 4 is a flowchart of the Security Alarm mode of operation; [0029]
  • FIGS. 5, 5A and [0030] 5B comprise a flowchart of the READ Tag_ID mode of operation;
  • FIG. 6 is a flowchart of the Re-select Tag_ID mode of operation; [0031]
  • FIG. 7 is a flowchart of the Replace Tag_ID mode of operation; [0032]
  • FIG. 8 is a flowchart of the Read Tag_Data mode of operation; [0033]
  • FIG. 9 is a flowchart of the Write Tag_Data mode of operation; [0034]
  • FIG. 10A is a high level block diagram of the interrogator system; [0035]
  • FIG. 10B is a detailed block diagram of the interrogator system; [0036]
  • FIG. 11 is a block diagram of the transponder system; [0037]
  • FIG. 12 is a partial schematic diagram of the transponder system; [0038]
  • FIG. 13 is diagram showing the physical layout of the transponder antenna; [0039]
  • FIG. 14 is a block diagram showing a first embodiment of an interrogator array configuration; [0040]
  • FIG. 15 is a block diagram showing a second embodiment of an interrogator array configuration; and [0041]
  • FIG. 16 is a block diagram of the random number generator used in the present invention.[0042]
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
  • The present invention is a system and method by which information is written to or read from as many as several thousand arbitrarily located transponders in a spatial range extending to 20 feet or more from each of a plurality of interrogators using radio communications. The present invention provides for the efficient and reliable location and control of very large numbers of transponders, based upon a particular communication protocol and utilizes radar direct sequence range gating and Time Division Multiple Access (TDMA) communications methods. The use of TDMA provides an improvement over the prior art in several ways, including but not limited to: (1) TDMA separates the timing of all responding transponders into discrete intervals (i.e., time slots) such that partial collisions are avoided; and (2) TDMA permits a multiplicity of transponders to be read in each interrogator frame (the collection of time slots comprising the interrogator command time slot and the plurality of transponder response time slots) thus improving the time efficiency of data collection. The invention can be utilized to track articles in manufacturing, shipping, warehousing, security, retailing industries and the like. Specifically, the invention can be utilized to perform check-in, check-out, inventory, and security surveillance for various types of retail stores such as supermarkets, department stores, warehouse stores, specialty stores, etc. More specifically, the present system can be utilized to perform automatic inventory of articles located on tables or shelves, or hanging from racks, using an array of antennas located in the ceiling of the area in which such articles are located. Other possible applications of the invention include, for example, retail sales in general, delivery control, tracking of in-process goods or manufactured items, electronic article surveillance in general, medical and other records for animals and people, prisoner identification, counterfeit goods detection, etc. Still other possible applications of the invention are in fields where any plurality of low cost tokens are used to represent substantial sums of money, and where it is desired to keep track of said tokens, whether they are by themselves, grouped with similar tokens, e.g., surgical sponges, gaming pieces such as poker chips and election ballots, or attached to other articles in an extended environment, such as a room or building, e.g., postal and shipping labels. For example, in the case of placing a transponder on an election ballot, a memory within the transponder could be used to store election data, thereby simplifying the tabulation of election results. [0043]
  • Referring now to the drawings, and in particular, FIG. 1, the RFID system of the present invention consists of a [0044] host computer 100 which is connected to a plurality of interrogators 190 (e.g., interrogators 115, 120 and 125) by a communications link 110, e.g., a LAN. Host computer 100 includes a connection 105 for establishing connection to other host computers (not shown) for the management of areas which are larger than may be handled by a single host computer 100, e.g., spread out over a plurality of floors or buildings. Each interrogator 190 generates RF signals used to communicate with a plurality of transponders 150 through an antenna array 130, 135 or 140 controlled by the associated interrogator 115, 120 or 125. Each interrogator 115, 120 and 125 has a predetermined spatial area (shown by the three enclosed regions 160, 170 and 180) in which communications with transponders 150 may occur. Therefore, an array of interrogators 190 may be set up to cover areas wider than that covered by a single interrogator 190, as shown by overlapping regions 160, 170 and 180, (e.g., interrogator 115 only communicates with transponders 150 within enclosure 160) and as discussed in further detail with respect to FIGS. 14 and 15. When a plurality of interrogators 190, e.g., interrogators 115 and 120, are used in the system of the present invention, neighboring interrogators 190 are positioned close enough to each other so that the spatial area defining the regions in which each interrogator 190 may communicate with transponders 150 (e.g., the area defined by enclosures 160 and 170, respectively) intentionally overlap, to prevent possible gaps or voids where transponders 150 could be out of communication range with any interrogator 190. Although there are three interrogators 115, 120 and 125 shown in FIG. 1, in the preferred embodiment, as one of ordinary skill will readily recognize, the number of interrogators 190 for a particular installation is selected based upon the size of the area in which the transponders 150 may be present, taking into account the necessary overlap required to prevent communication voids from occurring.
  • The [0045] host computer 100 executes a high level program which provides an interface that allows a user to cause each of the one or more interrogators 190 to perform sequences of simple communications tasks that, when taken together, comprise a complex communications task which either requests information from a transponder 150 or causes a transponder 150 to perform a task. Each interrogator 190 receives commands from host computer 100 over a communications link, e.g., a cable connected to the parallel port of host computer 100, and responds thereto, performing each command in order, and signaling host computer 100 when the command has been performed, whereupon host computer 100 may then issue a next command to interrogators 190. In the present invention, transponders 150 are identified by their transponder identification code (“Tag_ID”). Initially, the Tag_ID is generated internally and automatically by each transponder 150 (FIG. 1) upon receipt of a communication command (i.e., the Reselect Tag_ID Command discussed with respect to FIGS. 2 and 6) from an interrogator 190. As discussed in detail below, to generate a Tag_ID, a random number is generated at each transponder 150 using the clock skew between the associated interrogator 190 and each transponder 150 as a random variable. As discussed in further detail below with respect to FIG. 11, the internally-generated random number in each transponder 150 is also used to select a TDMA time slot for transmission and, in conjunction with the Read Tag_ID mode discussed with respect to FIGS. 2 and 5, to determine when to transmit. After the Tag_IDs are generated for each transponder 150 and stored in memory in host computer 100, communications may be made directly with each transponder 150 using the associated Tag_ID as an address for the particular transponder 150.
  • Referring now to FIG. 2, in the preferred embodiment of the present invention, six modes of operation are used to accomplish all of the needed communications with [0046] transponders 150. As one of ordinary skill in the art will readily recognize, additional modes are easily added to provide increased functionality. In the preferred embodiment, as shown in the flowchart of FIG. 2, the modes which each interrogator 190 (FIG. 1) can perform at the request of an operator (user) (step 205) include: (1) Security Alarm 210; (2) Re-Select Tag_ID 220; (3) Replace Tag_ID 270; (4) Read Tag_ID 230; (5) Read Tag_Data 240; and (6) Write Tag_Data 250. In operation, the user (operator) selects the mode in step 205, and the system carries out the operations needed to perform the selected mode (i.e., one of steps 210, 220, 270, 230, 240 or 250) and then returns to a waiting loop for the selection of the next mode at step 260.
  • Each mode of operation consists of a series of steps, usually iterative, involving communications between [0047] host computer 100, one or more interrogators 190 and a plurality of transponders 150. Each mode of operation includes an associated command that is transmitted from host computer 100 to transponders 150, through interrogators 190. One or more transponders 150, depending on the mode of operation, respond to the received command by transmitting a response that is received by an interrogator 190 and passed to host computer 100. The flowcharts in FIGS. 4-9 have been simplified to merely show the interaction between host computer 100 and transponders 150, but as specifically described above and as understood by one of ordinary skill in the art, each communication from host computer 100 to one or more transponders 150 is first passed to one or more interrogators 190 for transmission to transponders 150, and each communication from a transponder 150 to host computer 150 first is received by an interrogator 190 and then passed to host computer 100. Further, as one of ordinary skill in the art will readily recognize, the flow charts are highly simplified representations intended to outline each mode, and the specifics of each mode are discussed in greater detail herein.
  • Referring now to FIGS. 3 and 4, the Security Alarm mode is used to assist in electronic article surveillance. In a typical application for an RFID system, [0048] transponders 150 are connected to an article, e.g., goods in a store (“a tagged article”). Areas where tagged articles are not allowed, e.g., a restroom or an exit doorway, are designated security areas and each such security area has a dedicated interrogator 190 mounted therein that constantly transmits the Strobe command. The Strobe command is used for different purposes in the present invention, upon receipt of the Strobe command, a transponder 150 will transmit its Tag_ID, latch the previous command and clear its deselected status. When a tagged article enters a security area, the associated transponder 150 receives the Strobe command and responds by transmitting its Tag_ID (among other actions taken by transponder 150), which causes host computer 100 to trigger an alarm which, as one of ordinary skill in the art will readily recognize, may be either audible or silent.
  • In operation, [0049] host computer 100 sends the Strobe command to an interrogator 190 associated with a security area and the interrogator 190 transmits the Strobe command to any transponder 190 in the security area (step 410 in FIG. 4). The format of the Strobe command is shown in line 300 of FIG. 3, and includes a preamble field 305, a break field 310, a synch field 315 and a header field 320. The header field 320 carries the information designating the particular command being transmitted, in this case the Strobe command. Upon receipt of the Strobe command from host computer 100, an interrogator 190 transmits the Strobe command within the security area (i.e., the interrogator illuminates the security area) (step 410). If present, any transponder 150 within the security area receives the Strobe command and, in response, transmits a message including its Tag_ID to host computer 100 (step 420). Host computer 100 determines whether any responses have been received from any transponders 150 within the security area (step 430). If a response has been received, host computer 100 reports an alarm (step 440), and reverts to the start, to continue looking for additional transponders 150 which might appear within the security area. If no response was received, host computer 100 also reverts to the start, but without setting the alarm.
  • As discussed in further detail below with respect to FIGS. 10A and 10B, [0050] transponders 150 of the present invention do not actively generate a transmission signal, but rather reflect a signal being transmitted by an interrogator 190. Therefore, whenever interrogator 190 transmits a command that requires a response by one or more transponders 150, it then transmits an illumination signal during which it listens for a response from a transponder 150, e.g., step 420 in FIG. 4.
  • Preferably, each [0051] transponder 150 that receives a Strobe command transmits its Tag_ID to an interrogator 190 in each of a predetermined number of successive TDMA time slots (i.e., slots 1 (350), 2 (355), to N (360) in transponder response field 300 in FIG. 3). Thereafter, if the same Tag_ID is read in a predetermined number of successive time slots 350 to 360, then the Tag_ID is logged and an alarm is triggered (step 440). For example, in the presently preferred embodiment, each transponder 150 that receives a Strobe command returns its Tag_ID to the interrogator 190 sixteen times over a period of sixty milliseconds (i.e., N is equal to 16 in transponder response field 300 in FIG. 3). In a further aspect of the preferred embodiment, if colliding signals are received in each of the predetermined number of successive time slots (a result of more than one transponder 150 in the security area), then an alarm may be triggered without logging any Tag IDs.
  • Referring now to FIGS. 3 and 5, the Read Tag_ID mode of operation allows the [0052] host computer 100 to communicate with a large plurality of transponders 150 efficiently and with a greatly reduced incidence of communications collisions. In overview, this is accomplished through the use of a controlled variable (“Opp_Cost”), which is set to a predetermined value initially and varied in operation by host computer 100 and which is transmitted to each transponder 150 along with the Read Tag_ID command. When each transponder 150 receives the Read Tag_ID command and the associated Opp_Cost, it generates a random number and compares it to the received Opp_Cost. Based upon the results of such comparison, a transponder 150 either transmits its Tag_ID to an interrogator 190 or it waits for the next transmission of the Read Tag_ID command (where the associated Opp_Cost value may be adjusted slightly and a new random number is generated in any event). In one embodiment, the initial Opp_Cost is set to a high value by host computer 100 and each transponder 150 only transmits its Tag_ID when its value is greater than that of the received Opp_Cost. Before the transmission of the next Read Tag_ID command, the Opp_Cost may be adjusted slightly downward, if the number of Tag_IDs received in the immediately prior step falls below a predetermined threshold. As one of ordinary skill in the art will readily recognize, numerous other schemes may be used to determine which of the plurality of transponders 150 respond to each transmission of the Read Tag_ID command, e.g., if the Opp_Cost is set initially to a low value only transponders having a Tag_ID less than the Opp_Cost would initially transmit or if the Opp_Cost were set to a median value, only transponders having a Tag_ID within a predetermined range of the Op_Cost would initially transmit.
  • Referring specifically to the data format for the Read Tag_ID command in line [0053] 310 of FIG. 3, there are two added data fields over the Strobe command format in line 300, the Opp_Cost field 330 and the response field 325. The response field 325 is used to signal a transponder 150 that its previous transmission of its Tag_ID was properly received. As discussed in further detail below, the use of a TDMA format allows a predetermined maximum number of transponders 150, sixteen in the preferred embodiment, to respond in a single frame (i.e., to a single transmission of the Read Tag_ID command). Therefore, response field 325 must be able to signal each of the predetermined number of transmitting transponders 150 that it received its previous signal. Preferably, each transponder 150 transmits its Tag_ID two times and, upon verification that its second transmission was received by interrogator 190, it becomes inactive (deselected).
  • In the preferred embodiment, the Opp_Cost value is initially set high and is decremented as more and [0054] more transponders 150 are read successfully, based upon the number of transponders 150 responding in each previously successive iteration. When transponders 150 receive a Read Tag_ID command including an Opp_Cost value, each transponder 150 compares the received Opp_Cost with a locally-generated random number. Each transponder 150 sends its Tag_ID only if its random number is larger than the Opp_Cost value, otherwise it waits for the next transmission from host computer 100. Consequently, the number of responses of a large population of transponders 150 is greatly reduced by the comparison with the Opp_Cost value. In this approach, host computer 100 monitors the number of transponder 150 responses to each Read TAG_ID transmission (since communication is in TDMA format, there will be a plurality of responses to each such transmission), and when the number of responses drops below a predetermined number (preferably four when, as in the preferred embodiment, there are sixteen TDMA time slots), the Opp_Cost is decremented to allow the number of responses to increase in the next transmission. As one of ordinary skill will readily recognize and as discussed briefly above, there are various different methodologies in which the Opp_Cost value may be used to maximize the number of transponders 150 read in each TDMA frame, while reducing the probability of collision. In one additional alternative embodiment, a measure of collisions, coupled with a binary search, is used to set the Opp_Cost to optimally fill the TDMA time slots available. In a further additional alternative embodiment, an independent measure of the population of transponders 150 is generated, e.g., when the system is re-inventorying a group of articles having transponders 150 attached thereto, and the Op_Cost is varied based upon that independent measure.
  • All of the foregoing methodologies are dependent on distinguishing between collisions and non-responses in each TDMA time slot. Since the [0055] interrogator 190 is in control of the timing of responses from the transponders 150, it knows when the transponders 150 are permitted to respond and when they are not responding. The technique for determining if collisions have occurred consists of sampling the relative power in the analog baseband channel of the interrogator's 190 receiver separately for each time slot and also at a time outside the time slot. The sample measured outside the response time slot is representative of the “no response” background reference power level. Next the ratio of the relative power in each time slot to the reference value is computed. If the ratio is unity (approximately) the time slot is declared vacant. If the ratio exceeds one by a preset threshold amount, the time slot is declared occupied. Using this information, together with the knowledge of which time slots produced an accepted response message, the following decisions can be made:
  • 1. If a time slot is declared occupied, and the response message in that time slot is not accepted, a collision is inferred. [0056]
  • 2. If a time slot is declared vacant and no response message is accepted, a non response is inferred. [0057]
  • 3. The other two cases represent message acceptance. [0058]
  • The collection of these three measures on a frame by frame basis provides the necessary and sufficient input for optimally determining what Opp_Cost setting to use in the next frame transmitted by [0059] host 100. As one of ordinary skill in the art would readily recognize, various additional methodologies for setting and varying the Opp_Cost may likewise be implemented.
  • As a further aspect of the present invention, for the Tag_ID of a [0060] particular transponder 150 to be accepted as read successfully, it must be read twice (i.e., each transponder 150 must transmit its Tag_ID during two different message transmissions). In the message field received by a transponder 150 during the next transmission of the Read_ID command after transponder 150 has sent its Tag_ID, i.e., response field 325 in Read Tag_ID message 310, transponder 150 looks for a response bit in the response field that corresponds to the time slot in which that particular transponder 150 transmitted its Tag_ID. If that response bit is affirmative, i.e., an acknowledgment or ACK, transponder 150 increments an internal counter. As soon as transponder 150 receives two such acknowledgments, it becomes inactive (deselected).
  • Referring now to the flowchart of FIGS. 5, 5A and [0061] 5B, the particular steps performed in the preferred embodiment in carrying out the Read Tag_ID mode are disclosed. Upon initiation, host computer 100 passes a Strobe command to each transponder 150 (step 501). Upon receipt of a Strobe command, each transponder 150 executes any pending operations awaiting a Strobe command (i.e., causes the previously received command operation to be completed, if necessary), and clears transponder 150 from its deselected status, meaning it is no longer deselected (step 503). Each transponder 150 also transmits its Tag_ID immediately in response to the Strobe command, as discussed above, but in this case this transmission is ignored. In this mode of operation, once a transponder 150 transmits its Tag_ID twice, and has twice received acknowledgment, it becomes deselected and no longer responds to received Read Tag_ID commands. Host computer 100 next sets the initial Opp_Cost value (step 505), and passes the Read Tag_ID command (which is in the format shown as field 310 in FIG. 3 and which includes the current Opp_Cost 330 and the response field 325, i.e., the acknowledgment (ACK) or non-acknowledgment (NAK) of previous reception for each of the TDMA time slots) to transponders 150 (step 507). Each transponder 150 within a predetermined distance from a transmitting interrogator 190 receives the Read Tag_ID command (step 509) and, in response, each transponder 150 generates a random variable K (step 510). If a transponder 150 determines that this is the first Read Tag_ID command since the last Strobe command, then processing skips down to step 515, otherwise processing proceeds to step 512. In step 512, each transponder 150 which transmitted its Tag_ID in response to the immediately prior Read Tag_ID command examines response field 325 to determine if the transmission was successful, and if so, updates its response counter. If the count on a response counter within a transponder 150 equals two (step 513), that transponder 150 sets its status as deselected (step 514). Each transponder 150 next determines, in the preferred embodiment, if the Opp_Cost is less than the internally generated random variable K (step 515). If it is not, then that transponder 150 simply awaits the next transmission from the host computer 100 (step 516). If the Opp_Cost is less than K, each transponder 150 then, based upon the value of K, determines the appropriate TDMA time slot and transmits its Tag_ID in one of the time slots 1 (350) to N (360) shown in FIG. 3 for the Read Tag_ID response field (step 519). Host computer 100 receives and logs the Tag_IDs (up to a maximum equal to the number of available TDMA time slots, i.e., N in FIG. 3), incrementing the count for each received Tag_ID (step 521). Host computer 100 next updates the Opp_Cost value by identifying the number of Tag_IDs received in the current iteration and comparing that number to predetermined conditions, e.g., a minimum number, and if less than the predetermined number, adjusting the Opp_Cost downwards appropriately (step 523). After adjusting the Opp_Cost, host computer 100 compares the updated Opp_Cost to a predetermined number, zero in the preferred embodiment (step 525). Of course, as one of ordinary skill in the art will readily recognize, the predetermined number depends on the initial value and variation methodology of the Opp_Cost value. In the preferred embodiment, while the Opp_Cost remains greater than zero, there may be transponders 150 which have not yet successfully communicated their Tag_ID twice. Therefore the processing loops back to step 507 to begin another Read Tag_ID iteration. If the Opp_Cost equals zero, all transponders 150 have either successfully communicated their Tag_ID twice or they have encountered some type of communication lapse. Therefore, host computer 100 next identifies each transponder 150 which successfully communicated its Tag_ID only a single time (step 527), and for each identified transponder 150, the host computer passes a Read Tag Data command, which, as discussed below with respect to FIG. 8, is specifically addressed to a particular transponder 150 (step 531). If the transponder 150 succeeds in providing the appropriate response, including its Tag_ID, the counter associated with that transponder 150 in host computer 100 is incremented, indicating that the Tag ID is valid (step 533). If there is no valid response to the Read Tag_Data command, the Tag_ID is considered invalid, and is deleted from the list (step 533).
  • It is important to note, as discussed in detail below, that each [0062] transponder 150 of the present invention is manufactured identical to each other transponder 150, and does not require preprogramming of any sort. Each transponder 150 has a common default Tag_ID and common default Tag_Data as manufactured, which are available immediately upon power-up of the transponder 150. As understood by one of ordinary skill in the art, this feature allows batch testing and programming of the transponders 150, before they acquire a unique Tag_ID after completion of the Reselect Tag_ID mode. In order to achieve uniqueness, each transponder 150 generates a random Tag_ID number based upon an internally generated random number in response to an initial Re-select Tag_ID command (FIG. 6). As demonstrated above, once generated, this random number-based Tag_ID is communicated to host computer 100 during a Read Tag_ID process, and thereafter permits host 100 to subsequently address only that specific transponder using the associated Tag_ID. If, in the course of time, an article arrives having a transponder 150 possessing the same Tag_ID as another transponder 150 currently within the population of transponders 150, host computer 100 can cause groups or individual transponders 150 to select a new Tag ID. This is achieved by performing a Re-select Tag ID command (FIG. 6) (which includes part of the Read Tag ID processing of FIG. 5). In particular, as shown by the flowchart of FIG. 6, host computer 100 transmits the Re-Select Tag ID command to transponders 150 (step 600). Each transponder 150 which receives the Re-Select Tag ID command generates a new candidate Tag_ID, which is based upon a random number, and stores it in temporary memory (step 620). Shortly afterwards, host computer 100 transmits a Strobe command (step 640) and each transponder stores the candidate Tag_ID as its new Tag_ID (step 660). At this point, there exists a population of transponders 150 having separate Tag_IDs, based upon the use of internally generated random numbers in each transponder 150 to generate the Tag_ID. Processing next proceeds to point A in FIG. 5, where the Read Tag_ID processing essentially begins, so that the Tag_ID of each transponder 150 within the population is identified and stored in memory within host computer 100, in the manner discussed above.
  • In the event that it is found that the Tag_ID of a [0063] particular transponder 150 is identical to an existing Tag_ID stored in memory in host computer 100, the Replace Tag_ID command may be used to replace the duplicate Tag_ID with a separate and distinct Tag_ID (FIG. 7). The identification of a duplicate Tag_ID must be made prior to allowing the tagged article having a duplicate Tag_ID to join the population of tagged articles containing its duplicate, e.g., there must be a staging area having a dedicated interrogator 190 which is used to identify the Tag_IDs (using the Read Tag_ID command) of tagged articles that are to be added to the general population of tagged articles. The duplicate Tag_ID must be replaced prior to allowing the associated article to join the population containing its duplicate, or else it will be necessary to enter the Replace Tag_ID mode, since there is no provision for a single interrogator 190 to address only one of two transponders 150 having the same Tag_ID to replace the Tag_ID in only one of the transponders 150. In particular, referring now to the flowchart of FIG. 7, the particular steps performed in the Replace Tag_ID mode are shown. First, host computer transmits a Replace Tag_ID command, including the old Tag_ID and the new Tag_ID, to the particular transponder 150 (step 700), in the format shown in field 330 in FIG. 3, wherein the new Tag_ID is transmitted as data in field 340 and the old Tag_ID is used to address the transponder 150 in field 335. Transponder 150 receives the Replace Tag_ID command, along with the old Tag_ID and the new Tag_ID, in step 720 and stores the new Tag_ID in a temporary register therein (step 730). Transponder 150 then transmits the new Tag_ID to the host computer 100 (step 740). Host computer 100 receives the new Tag_ID from the transponder and compares it to the transmitted new Tag_ID (step 760). If host computer 100 determines that the transmitted new Tag_ID is not the same as the received new Tag_ID (indicating that an error occurred at some point), processing reverts to step 700 and the new Tag_ID is resent in a new Replace Tag_ID command. Otherwise, when the received new Tag_ID matches the transmitted new Tag_ID, processing moves to step 770, where an acknowledge signal (ACK) is transmitted to transponder 150. Upon receipt of the acknowledge signal, transponder 150 sets the stored Tag_ID as its new Tag_ID, completing the Replace Tag_ID process.
  • Referring now to the flowchart of FIG. 8, the Read Tag_Data process, i.e., the steps required to read data (“Tag_Data”) from a [0064] transponder 150, is shown in detail. As discussed above, in order to read Tag_Data from a transponder 150, the Tag_ID of the transponder 150 must be stored in memory within host computer 100. As one of ordinary skill will readily recognize, host computer 100 may obtain knowledge of the Tag_IDs from a variety of sources, such as prior Read Tag_ID commands, e-mail from a larger (external) database, scanned barcodes, etc. The message structure of the Read Tag_Data command is illustrated in FIG. 3 as command 320, and includes a preamble field 305, a break field 310, a sync field 315, a header field 320 and a Tag_ID field 325. The addressed transponder 150 responds with its Tag_ID 370, followed by Tag_Data 380, preferably in 16-bit increments. In particular, to perform the Read Tag_Data process, host computer 100 first transmits a Read Tag_Data command addressed to a particular transponder 150 (step 800). All transponders 150 receive the Read Tag_Data command, including the addressed Tag_ID, (step 820) and compare the received Tag_ID to their own Tag_ID (step 830). If the received Tag_ID does not compare to the Tag_ID of the transponder 150, that transponder simply awaits the next command from host computer 100 (step 800). If the received Tag_ID is the same as the Tag_ID of the transponder 150, processing proceeds to step 840, where the addressed transponder 150 transmits its Tag_ID and its Tag_Data to the host computer 100. Host computer 100 receives the Tag_ID and Tag_Data and determines if the Tag_Data has been received intact using conventional error detection techniques (step 870). If no portion of the Tag_Data has been received intact, processing reverts to step 800 where the Read Tag_Data command is re-transmitted by host computer 100. If some portion of the Tag_Data has been received intact, processing proceeds to step 880, where the intact portion of the Tag_Data is stored. Next, host computer determines if all of the Tag_Data has been received intact (step 890). If it has not been received intact, processing also reverts to step 800 where the Read Tag Data command is retransmitted by host computer 100. If all of the Tag Data has been received intact, then processing is complete for this Read Tag Data process.
  • Referring now to the flowchart of FIG. 9, the Write Tag Data process is shown in particular detail. In the present embodiment, Tag Data is written to a [0065] specific transponder 150 in 12-bit increments. The message structure 330 of the Write Tag_Data command is illustrated in FIG. 3, and includes a preamble field 305, a break field 310, a sync field 315, a header field 320, a Tag_ID field 325 and a Tag_Data field 340. In the present embodiment, the upper 8-bits of header field 320 contain the memory location in transponder 150 to which the received Tag_Data is to be written. Each transponder 150 includes N 12-bit memory locations (N is equal to four in the preferred embodiment) that are used to store Tag_Data. Once the addressed transponder 150 has stored the current 12-bit increment, it transmits the full contents thereof back to host computer 100 for confirmation. After N successful exchanges between host computer 100 and transponder 150, all N×12 data bits will have been successfully transferred to transponder 150.
  • To perform the Write Tag_Data process, host computer first transmits the Write Tag_Data command, which includes the Tag_ID for the [0066] particular transponder 150 and the Tag_Data, to all transponders 150 (step 900). Each transponder 150 receives the Write Tag_Data command (step 915), and compares the received Tag_ID to its Tag_ID (step 920). If there is no match, the transponder 150 waits for the next command from host computer 100 (step 900). If there is a match, transponder 150 stores the received Tag_Data (step 925) and transmits its Tag_ID and the stored Tag_Data back to host computer 100 (step 930) for verification. Host computer 100 receives the Tag_ID and Tag_Data and determines if a portion of the received Tag_Data was received intact (step 945). If no portion was received intact, processing reverts to step 900 where the last Write Tag_Data command is retransmitted to transponders 150. If a portion of the received Tag_Data was received intact, processing continues to step 950, where it is determined if all of the received Tag_Data was received intact. If not, again, processing reverts to step 900 where the last Write Tag_Data command is re-transmitted to transponders 150. If the all of the currently received Tag_Data was received intact, processing continues to step 955, where host computer 100 determines if there is additional Tag_Data for transmission to the currently addressed transponder 150. If so, an appropriate index is incremented to signal that the next portion of Tag_Data is to be transmitted, and processing reverts to step 900 where the Write Tag_Data command is transmitted (with the next portion of Tag_Data) to transponders 150. Otherwise, if there is no additional Tag_Data for transmission, processing ends.
  • The present invention employs half-duplex Direct Sequence Spread Spectrum (DSSS) radio communication between each interrogator [0067] 190 (FIG. 1) and one or more transponders 150. This is performed by spreading the spectrum of radio signals transmitted from interrogator 190, using Manchester-encoded frequency-modulation of the transmission from interrogator 190 to transponders 150, and amplitude/phase shift keying of re-radiated signal transmission from transponders 150 to an interrogator 190. Batch reading of transponders 150 is provided through the use of a TDMA communications protocol. The TDMA protocol provides an interrogator message time slot and N transponder response time slots for a total of N+1 time slots per TDMA frame. In the preferred embodiment, N=16, so up to 16 transponders 190 can communicate with an interrogator 190 in response to a single interrogator 190 transmission.
  • Referring now to the block diagram of FIG. 10A, in the preferred embodiment, an [0068] interrogator 190 includes a processor/controller 1000 connected to a spread spectrum transmitter 1001, a spread spectrum receiver 1002 and an antenna switch matrix 1003. A delay line 1017 is connected from transmitter 1001 to receiver 1002. In the preferred embodiment, three antennas 1004, 1005 and 1006 are connected to switch matrix 1003, in a manner discussed in further detail below, although, as will be clear to one of ordinary skill in the art, two antennas may be used in one alternative embodiment, and in some cases a single antenna will suffice. As discussed with respect to FIG. 1 above, processor/controller 1000 communicates with host computer 100 via a full-duplex communications channel. Interrogator 190 provides modulated signals to transmit messages to one or more transponders 150 (transmit mode), and also provides an illumination signal (receive mode) that is used by transponders 150 for use in reflecting a response message to interrogator 190 as backscatter modulated with amplitude/phase shift keying.
  • In particular, the modulation mode of transmitter [0069] 1001 is switched between FSK modulated spread spectrum when transmitting data to transponders 150, and BPSK modulated spread spectrum when receiving data from transponders 150. Interrogator 190 sends Manchester-encoded data on an FSK Direct Sequence Spread Spectrum (DSSS) signal and recovers differentially encoded Manchester data from transponders 150 when illuminating (i.e., transmitting) with a BPSK DSSS signal. The use of a DSSS illumination signal provides a range gating effect and provides a measure of multipath immunity. The use of differential encoding for the response from transponders 150 eliminates the need for complex decision circuitry in interrogator 190, since the phase range to individual transponders 150 could result in arbitrary data inversions. As understood by one of ordinary skill, differential encoding provides data polarity decisions based on a bit to bit phase comparison, wherein, for example, a data one is encoded as a change in phase between one bit and the next, while a data zero is encoded as no change.
  • In the system of the present invention, receiver [0070] 1002 is able to operate in the presence of transmissions by transmitter 1001, because even though the system operates in a half-duplex mode, the signals received by receiver 1002 are based upon the BSPK DSSS signals transmitted by transmitter 1001. The isolation between transmitter 1001 and receiver 1002, and the effective range for communication with a transponder 150 is governed by the physical separation between the transmit and receive antennas and the range gating provided through digital Direct Sequence modulation of the spreading code.
  • In operation, transmitter [0071] 1001 sends a replica of the signal fed to antennas 1004-1006 through delay line 1017 to receiver 1002, as a coherent local reference signal that is used to optimally demodulate a return signal having the same net delay, thus improving both transponder discrimination and reducing the effect of direct illumination of the receiver antenna by the transmitted signal.
  • Referring now to the functional block diagram of [0072] interrogator 190 illustrated in FIG. 10B, data for transmission from processor/controller 1000 is first Manchester encoded by encoder 1019, and then spread by a pseudo-random code generator 1020 in combination with FSK modulated generator 1018. The FSK modulated generator 1018 generates a DSSS signal which predominantly is in one half of the band (upper or lower) when the input from Manchester encoder 1019 is a logic one, and conversely occupies the other half of the band when the input is a logic zero. Since the data from Manchester encoder 1019 is balanced (occupies as much time as a logic one as a logic zero on a bit by bit basis), the resultant emission spectrum occupies the entire bandwidth when averaged over one or more bit times. Alternatively, the emission spectrum could be generated using a Frequency Hopped Spread Spectrum (FHSS) system which hops randomly in one half of the band (upper or lower) when the input from Manchester encoder 1019 is a logic one, and conversely which hops randomly in the other half of the band when the input is a logic zero.
  • In the Transmit mode, the output of the FSK modulated generator is directed via switch [0073] 1014 to the Transmit Power Amplifier 1015. The output of the Transmit Power Amplifier 1015 is routed, via the Power Divider 1016 to the Delay Line 1017 and to the Transmit port of Antenna Switch Matrix 1003. The Antenna Switch Matrix 1003, under command of processor/controller 1000 selects one of the preferably three antennas 1004-1006 to be used for transmission.
  • In the Receive mode, the DSSS illumination signal is generated in a balanced Modulator [0074] 1013 by convolving a stable, low phase noise carrier (915 MHz, in the preferred embodiment) generated by oscillator 1012 with the output of Pseudo Noise (PN) generator 1020. The resultant BPSK-DSSS signal is amplified by Power Amplifier 1015 and then transmitted by a selected one of interrogator antennas 1004-1006, under the control of antenna switch matrix 1003.
  • A signal received from a [0075] transponder 150 is routed from a selected one of three interrogator antennas 1004-1006 (different from the antenna chosen for transmission) to low noise amplifier 1022, filtered by band pass filter 1023, split into I and Q baseband components and by mixing with delayed quadrature phase components of the transmitted signal by circuit 1050, (comprised of quadrature power divider 1021, in-phase mixer 1024 and quadrature-phase mixer 1025). The signals out of the in-phase mixer 1024 and quad-phase mixer 1025 are deconvolved to baseband as an I/Q representation of the received signal. Each output contains a DC component representative of the static clutter in the field being illuminated, plus a smaller AC component representative of the modulated return from each transponder 150. Other AC components (which are undesired) are: low frequency noise, predominately from the transmitter; and high frequency noise from external interference sources along with residual code lines from the transmitted DSSS signal. Since Manchester coding is employed for the modulated return, it is amenable to bandpass filtering for separation of the baseband data from undesired noise. This is accomplished in the baseband processor section 1033 consisting predominately of I and Q amplifiers 1027 and 1029, respectively, and I and Q bandpass filters 1028 and 1030, respectively. The amplified and filtered I and Q outputs of baseband processor 1033 are routed to identical clock and data recovery circuits, circuits 1031 for the RxI signal and circuits 1032 for the RxQ signal. The clock and data recovery is accomplished in a fully digital implementation which first samples the baseband input at a rate N times the incoming data rate (N=8 in the present embodiment). These samples are routed for processing in two separate channels; data recovery and clock recovery. The data recovery channel performs a one bit integration to recover NRZ from the Manchester data, and then performs a modulo-2 addition of the current bit with the prior bit, to achieve the differential decoding, thus recovering the original unencoded NRZ data. In the clock recovery channel, data transitions are extracted from the incoming data stream, filtered and compared in phase to a digital discrete phase lock loop (DDPLL). Once locked, the DDPLL tracks the frequency and phase of the incoming data stream, and is thereafter used for the synchronous transfer of the recovered data into the processor 1000. Processor/controller 1000 processes both the RxI and RxQ data inputs looking for a valid Preamble, Break, and Synch message header. (See FIG. 3). The processor then determines which channel (i.e., RxI or RxQ) data it will use for the duration of the message. The decision is made simply based on which channel accepts the Synch portion of the message header first. This strategy exploits a characteristic of the DDPLL in which the DDPLL in the channel with the poorer signal to noise ratio (SNR) will lag the DDPLL in the channel with the higher SNR. The processor/controller 1000 then processes the Header and the remainder of the message using data from the selected channel. Preferably, a state machine handles the receive and transmit messaging as discussed with respect to FIGS. 2-9, above, although as one of ordinary skill in the art will readily recognize, alternatives such as a microprocessor may be substituted.
  • Referring again to FIG. 10A, in the preferred embodiment, [0076] interrogator 190 consists of a low noise RF signal source (preferably a SAW resonator oscillator), modulators and amplifiers and an application specific integrated circuit (ASIC) including a digital processor. The digital processor receives commands from processor/controller 1000, formats the appropriate outgoing message, generates the pseudo-noise code, and creates a spread spectrum signal which is broadcast to the transponders 150. Receiver 1002 in interrogator 190 samples the transmitted signal, delays it in time by an amount equal to the round trip propagation time between interrogator 190 and a transponder 150, and utilizes this delayed signal as the receiver local oscillator. Signals reflected by the antennas and from nearby objects do not correlate as well as signals whose range is being matched by the receiver delay. In the preferred embodiment, the “optimum” range is 18 feet, and the correlation window is approximately 36 feet, null to null. In operation, ranges in excess of 30 feet have been observed. The output of receiver 1002 is fed back to processor/controller 1000, where data clock and data are extracted from the received signal.
  • The antennas [0077] 1004 and 1006 used in the preferred embodiment are planar arrays, which are constructed using an excited slot in a conducting sheet and which are linearly polarized. In operation, an array of antennas (two or more with differing polarization) must be utilized to provide unambiguous coverage of the possible transponder 150 antenna orientations that might be present during a read cycle. A third antenna 1005 having polarization complementing antennas 1004 and 1006 is included in the antenna array. Switching matrix 1003 permits selection of any one of the six possible transmit/receive combinations available from the three antennas 1004-1006, which selection is under the control of host computer 100. During the Read Tag_ID mode shown in the flowchart of FIGS. 5, 5A and 5B, these combinations are cycled to ensure all transponders 150 within range are accessed. When each Tag_ID is logged into the host computer 100, the antenna combination(s) associated with successful communication is (are) also logged. During any subsequent host command which addresses a specific transponder 150 by its Tag_ID, the logged antenna combination(s) is used first. If the communication fails, then other combinations are used. This procedure is used to minimize the read time.
  • Referring now to the block diagram of [0078] transponder 150 in FIG. 11, an antenna comprised of elements 1100 and 1105 receives RF transmission from an interrogator 190 and an RF switch acting as an impedance modulator 1110 at the antenna feed point is operated by controller 1155 via the Rx/Tx control line for either directing signals to the receiver portion of transponder 150 or modulating the re-radiation (reflection) of RF illumination from interrogator 190 back to interrogator 190. The modulation effect produced by the Impedance Modulator 1110 appears to an observer near transponder 150 as Amplitude Shift Keying (ASK). This is due to the fact that the switch alternately shorts the antenna terminals causing the antenna to be a reflector, or it passes the signal to a load (Frequency Discriminator 1115), which causes the antenna to be absorptive. The modulated signal received at the interrogator, however, is no longer simple ASK. The weak return signal is summed with a much larger unmodulated component with arbitrary phase. The vector sum composite, as received by the interrogator can be either pure AM, pure PM, or any combination in between, referred to elsewhere as “amplitude/phase shift keying”. It is for this reason that interrogator 190 employs I and Q demodulation. Signals received by transponder 150 pass through impedance modulator 1110, with minimal attenuation, and through a passive frequency selective network, i.e., frequency discriminator 1115, that demodulates the frequency-modulated signal component of the received signal. Signal detection is provided by, in the preferred embodiment, a conventional Foster-Seeley discriminator, or as one of ordinary skill in the art will readily recognize, other frequency selective differential diode detection and voltage comparison circuits. The received signal passes though bandpass quantizer 1120 (a conventional comparator based data slicer) and an anti-aliasing lowpass filter 1125 (a conventional RC Low Pass Filter). The signal at the output of lowpass filter 1125 is a recovered amplitude limited analog baseband signal, which is split into two channels, a first channel in which the signal first digitally sampled in Rx data recovery circuit 1130, which provides data bandpass filtering and conditioning, conversion of the received Manchester data to NRZ, and reclocking of the recovered data (i.e., a digital baseband replica of the Interrogator transmitted NRZ Data (RxD)), and a second channel in which the signal is first digitally sampled in Rx clock recovery circuit 1135 to extract data transitions for filtering by a digital phase locked loop which creates a local replica of the transmit data clock in both phase and frequency (i.e., a digital baseband replica of the Interrogator transmitted Manchester encoded Clock (RxD CLK)) that is provided to state machine 1155 and to Rx data recovery circuit 1130. As one of ordinary skill in the art will readily recognize, the various functions performed by transponder 150 may be implemented in hardware, software, and/or firmware. The resulting demodulated NRZ data from Rx data recovery circuit 1130 is fed to state machine 1155 which processes and responds to the received signal as discussed with respect to FIGS. 2-9 above.
  • State machine [0079] 1155 consists of clock crystal 1170, clock generator 1165, tag memory 1160, random number generator 1175, and tag Rx/Tx control 1180. Clock generator 1165 consists of an oscillator stabilized by crystal 1170 and a cascade of frequency dividers. Crystal 1170, in the presently preferred embodiment, is a 32,678 Hz crystal of a type normally used in quartz wristwatches. The crystal frequency is used for sampling in the Rx data recovery 1130 and Rx clock recovery 1135, with eight times over sampling in the present embodiment, setting the Rx data rate at 4096 Hz. Clock generators 1165 are used to set the transmit data rate of transponder 190 (16,384 Hz in the present embodiment) and to provide clocks for other blocks within the state machine 1155. As one of normal skill in the art would readily recognize, the choice of these frequencies is not critical and that other choices of data rates and clock frequencies would also provide adequate performance. Further, one of ordinary skill in the art would understand that the control of the clock frequencies can be accomplished by other methods.
  • Random number generator [0080] 1175 is used by state machine 1155 for a variety of operations, as discussed with respect to FIGS. 2-9, above. It is important that the number generated be non-deterministic (i.e., truly random) to uphold the statistical validity of the ability of the present invention to process large numbers of transponders 150 in one field at one time. In order to achieve the required randomness while maintaining the desired economy in terms of current drain and gate count, the presently preferred embodiment combines a short pseudo random noise generator (PNG) (known alternatively in the literature as a shift register generator (SRG) or as a Linear Feedback Shift Register Generator (LFSR)) with a process controlled by thermal noise which generates randomly occurring pulses.
  • Referring now to FIGS. 11 and 16, the present invention uses a conventional 16 bit SRG 1605 (shown within the dotted box in FIG. 16). A conventional stall detector [0081] 1610 is included within 16 bit SRG 1605 to exclude the “all zeroes” state. Taps are included at the outputs of stages 1, 3, 12 and 16 of SRG 1605 which are exclusive OR'd and fed back to the input of stage 1. In response to the aforementioned randomly occurring pulses, the state of 16 bit SRG 1605 is modified by applying the output(s) from a toggle flip-flop and select mask contained within invert register 1625. The input at 1615 is a random pulse source derived from clock skew information provided by Rx clock recovery circuit 1135. The SRG 1605 is clocked, in the preferred embodiment, by the highest frequency clock available from clock generator 1165. When no signal is being received by transponder 150, the clock skew pulses are as random as the noise provided by bandpass quantizer 1120. When a signal is being received, the skew pulses occur at a rate proportional to the frequency offset between the baud rate master clock 1011 (FIG. 10B) in interrogator 190 and crystal 1170 in transponder 150, which is a second random variable. Random number generator 1175 runs continuously and the contents of 16 bit SRG 1605 are latched into other registers when a random number is needed. When a random number larger than 16 bits is required, the output is latched twice in succession to provide the additional bits. As apparent to one of ordinary skill in the art, the number of stages in 16 bit SRG 1605 could be greater than or less than 16. For each length there are tables available which provide choices of feedback tap locations which guarantee the sequence produced by the generator will be maximal.
  • Tag Rx/Tx control [0082] 1180 implements the state machine steps and processes for proper transponder operation, as discussed with respect to FIGS. 2-9 above. Tag memory 1160 holds the transponder data which is written into transponder 150 with the Write Tag_Data command or the Replace Tag Data command as described with respect to FIGS. 3 and 9 above. In addition, tag memory 1160 is accessed whenever a Read Tag Data command is accepted by transponder 150 as described with respect to FIGS. 3 and 8 above.
  • Finally, a battery [0083] 1140 is provided within transponder 150 shown in FIG. 11 as a power source therefor. In the present embodiment, the battery is preferably a coin cell of the 3 Volt Lithium type. In an alternative embodiment, by using a fully custom IC, it is possible to eliminate the battery altogether and power the transponder from detected RF signal voltage, since interrogator 150 is transmitting continuously with a constant envelope signal during the entire cycle of issuing commands to transponders 150 and then providing an illumination signal for receiving reflected signals from transponders 150.
  • Referring now to the simplified schematic of [0084] transponder 150 in FIG. 12, antenna elements 1200 and 1205 (which correspond to antenna elements 1100 and 1105 in FIG. 11 and which are described in detail with respect to FIG. 13 below) receive signals from and modulate reflected signals to a corresponding interrogator 190. Diode 1210 is a PIN diode in the presently preferred embodiment that is connected between antenna elements 1200 and 1205 as shown in FIG. 12 with the anode of diode 1210 connected to antenna element 1200 and the cathode of diode 1210 connected to antenna element 1205. Diode 1210 acts as an impedance modulator (i.e., a transmit/receive switch) under the control of logic array 1276 via resistor 1215, resistor 1220 and inductive element 1230. Resistor 1215 is connected between the anode of diode 1210 and logic array 1276 and the series combination of resistor 1220 and inductive element 1230 is connected between the cathode of diode 1210 and logic array 1276. Logic array 1276 sets the bias on diode 1220 though the loop formed by resistor 1220, inductive element 1230, diode 1210 and resistor 1215. Resistors 1215 and 1220 also provide isolation to logic array 1276 from RF signals present at the terminals of diode 1210. Bypass capacitor 1225 connected between the junction of resistor 1220 and inductive element 1230 and ground and provides further isolation from RF signals to logic array 1276. I nductive element 1230 provides a low inductance connection from bypass capacitor 1225 to antenna element 1205.
  • Frequency discriminator [0085] 1115 of FIG. 11 is preferably of Foster-Seeley design, and in the preferred embodiment consists of capacitor 1235, capacitor 1240, capacitor 1250, capacitor 1256, inductive element 1245, center tapped inductor 1248, detector diode 1252 and detector diode 1254. As understood by one of ordinary skill in the art, center tapped inductor 1248 has a first end, a second end and a center tap. Capacitor 1235 is connected between the cathode of diode 1210 and the first end of inductor 1248. Capacitor 1240 is connected between the anode of diode 1210, a first end of inductive element 1245 and a DC bias point provided by the series combination of resistors 1259 and 1261 which series pair is connected between battery (power supply) 1258 and ground. The second end of inductive element 1245 is connected to the center tap of inductor 1248. Capacitors 1235 and 1240 provide impedance matching and DC blocking between the discriminator and the antenna formed by elements 1200 and 1205. Capacitor 1250 is connected between each end of inductor 1248 and resonates with inductor 1248 to set the center frequency of the frequency discriminator. The series combination of diode 1252 and diode 1254 are also connected between each end of inductor 1248, with the cathode of diode 1252 connected to the first end of inductor 1248, the anode of diode 1252 connected to the cathode of diode 1254 and the cathode of diode 1254 connected to the second end of inductor 1248. The point which connects the anode of diode 1252 and the cathode of diode 1254 serves as the output of the discriminator. Capacitor 1256 is connected between the output of the discriminator and the DC bias point generated by resistors 1259 and 1261, and provides a short to RF frequencies present at the output while allowing the data demodulated by the discriminator to pass through to the next stage. Resistor 1260 provides a DC return for the discriminator's center frequency reference voltage (i.e., the DC bias voltage).
  • Bandpass quantizer [0086] 1120 of FIG. 11 is implemented in FIG. 12 by the combination of a first conventional RC low pass filter formed by resistor 1262 and capacitor 1268 which has a cutoff frequency selected to pass the received data but attenuates higher frequency noise outside the data bandwidth, a second conventional RC low pass filter formed by resistor 1264 and capacitor 1266 which has a cutoff frequency selected to pass only the DC component of the demodulated data, and a comparator which receives as a first input the output of the first low pass filter and as a second input the output of the second low pass filter. In operation, the combination of the two low pass filters and comparator 1270 operate as a bandpass one bit quantizer.
  • Lowpass filter [0087] 1125 of FIG. 11 is preferably a conventional RC low pass filter and in FIG. 12 consists of the combination of resistor 1272 and capacitor 1274. This low pass filter provides a final anti-alias low pass filtering of the received signal prior to being provided to logic array 1276.
  • The remaining functions shown in FIG. 11, including Rx data recovery [0088] 1130, Rx clock recovery 1135, Manchester encoder 1145, differential encoder 1150 and state machine 1155 are performed by digital circuitry within logic array 1276 of FIG. 12. In addition, crystal 1290 is used to drive a crystal oscillator which has an output that is used for timing within logic array 1276. Finally, in the presently preferred embodiment, battery 1258 acts as the power supply for the active components, including comparator 1270 and logic array 1276.
  • As one of ordinary skill in the art would readily recognize, in an alternative embodiment all of the circuitry shown in FIG. 12 could be integrated into a single monolithic integrated circuit, with the exception of battery (if as discussed above, it is needed at all), the antenna and crystal [0089] 1290.
  • Referring now to FIG. 13, the antenna for [0090] transponder 150 is required to possess a wide bandwidth, be nominally omnidirectional and be physically small. In addition, the antenna is required to function efficiently as a receive antenna, while also providing a suitable controllable reflector in the “transmit” mode. In the present invention, an antenna structure meeting these requirements consists of an array of two resonant antennas elements (element 1300 and element 1305 corresponding to antenna element 1100 and antenna element 1105, respectively, in FIG. 11 and to antenna element 1200 and antenna element 1205, respectively, in FIG. 12), one which is ¼ λ (one quarter wavelength) (element 1305), and one which is ¾ long (element 1300). When electrically joined, the result is a resonant line 1 k (one wave length) long, which efficiently reflects incident RF energy. When isolated with a suitable load impedance, the structure acts as an offset fed dipole antenna, also resonant, but which now delivers energy to a load. This latter mode is used in receive mode and also as one of the two states (absorptive, as opposed to reflective) in transmit mode.
  • The antenna is preferably mounted on a small card, with dimensions substantially the same as a conventional credit card. The length of the full size antenna (i.e., the straight length) is nearly 12 inches (i.e., at a full wavelength at 915 MHZ) is too long for this type of card, necessitating a folding configuration for the antenna. The antenna folding is done in a manner that does not narrow the bandwidth. A conventional method to achieve this is to use antenna shapes which have a resonant behavior based on angles rather than length. The antenna of the present invention utilizes a geometric spiral to reduce the size of the ¾ λ element. In the present embodiment, element [0091] 1320 and element 1315 combine for the ¼ λ (one quarter wavelength) portion 1305 of the antenna. The ¾ λ (three quarter wavelength) spiral portion 1300 is comprised of elements 1325, 1330, 1335, 1340, 1345, 1350, 1355, and 1360. With respect to the lengths shown in FIG. 13, the defining relationships between these lengths are as follows:
  • B=A [0092]
  • C=2A [0093]
  • D=2A [0094]
  • E=4A [0095]
  • F=3A [0096]
  • G=6A [0097]
  • H=5A [0098]
  • I=2A [0099]
  • As known to those of ordinary skill in the art, some minor adjustments may be needed to account for bordering (edge) discontinuities, effective dielectric constants, fringing effects, etc. In particular, the {fraction ([0100] 1/4)} λ element 1305 in the presently preferred embodiment employs a short segment of increased linewidth (not shown) at the end of element G to achieve optimal tuning.
  • Referring now to FIGS. 14 and 15, in an additional aspect of the present invention, when the area in which the tagged articles are to be located is much larger than the spatial range of a single interrogator, a plurality of [0101] interrogators 190 are installed in a hexagonal pattern 1400 within such area, all linked to host computer 100 (the interconnection between the host computer 100 and a plurality of interrogators 190 is shown in FIG. 1). In FIGS. 14 and 15, each hexagonal area represents a separate interrogator 190 and the plurality of interrogators are divided into groups. In a first alternative of this aspect of the present invention, specifically shown in FIG. 14, interrogators 190 are assigned to one of three groups (marked as 1, 2 or 3 in FIG. 14), arranged in next-nearest neighbor format. In operation, only one group of the three groups of interrogators is active at a time, e.g., only the interrogators in group 1 (e.g., interrogator 1410) transmit at the same time.
  • Interrogators in [0102] groups 2 and 3 are inactive while the group 1 interrogators are active. After the group 1 interrogators have completed their operations, the interrogators in group 2 become active (e.g., interrogator 1420), while the group 1 and 3 interrogators become inactive. Finally, the interrogators in group 3 become active (e.g., interrogator 1430), while the group 1 and 2 interrogators become inactive. In this manner, it is possible to greatly reduce the amount of time required to read all tagged articles over the prior art method, which requires that only a single interrogator be active at a time.
  • If the area in which the tagged articles are located is very large, the total radio-frequency (RF) power generated by the [0103] many interrogators 190 operating simultaneously may produce too much RF interference in other nearby RF systems operating in the same radio band. Furthermore, the combined RF background interference that is picked up by some of interrogators 190 may result in diminished performance of those interrogators 190. In such cases, in a second alternative of this additional aspect of the present invention shown in FIG. 15, the number of interrogators 190 transmitting simultaneously may be decreased substantially by grouping interrogators 190 on the basis of higher orders of nearest neighbors. For example, if interrogators 190 are grouped on a second order basis, as shown in array 1500 in FIG. 15, then the ratio of active to inactive interrogators is 1:9. In FIG. 15, when the group 1 interrogators 190 are active (e.g., interrogator 1510), the remaining groups 2-9 interrogators (e.g., interrogators 1520-1590) are inactive. As above, each group sequentially becomes active, with the remaining groups inactive, until all nine groups have completed their operation.
  • In the event that a further reduction in the radiated RF interference is required, as one of ordinary skill in the art will readily recognize, higher order nearest neighbor groupings can be established, e.g., for third-order nearest neighbors, only 1 in 27 interrogators will be active simultaneously, but with a consequent increase in the time required to communicate with the tagged articles. [0104]
  • While the present invention has been particularly shown and described with reference to the preferred embodiments and various aspects thereof, it will be appreciated by those of ordinary skill in the art that various changes and modifications may be made without departing from the spirit and scope of the invention. It is intended that the appended claims be interpreted as including the embodiments described herein, the alternatives mentioned above, and all equivalents thereto. [0105]

Claims (38)

What is claimed is:
1. An RFID system comprising:
(A) a plurality of RFID transponders, each of said plurality of RFID transponders having a unique identification code, for receiving a signal and for generating a response signal based thereon, each of said RFID transponders having a random number generator used for determining whether to respond to a received message addressed to all of said plurality of RFID transponders;
(B) a host computer for generating a message for transmission to at least one of said RFID transponders; and
(C) at least one interrogator connected to said host computer having an interrogator transmitter and an interrogator receiver which operate in half-duplex mode, wherein said interrogator transmitter transmits messages received from said host computer to said plurality of RFID transponders during a first part of said half-duplex mode and which provides an illumination signal to said plurality of RFID transponders during a second part of said half-duplex mode and said interrogator receiver receives signals reflected by said at least one RFID transponders and provides said received signals to said host computer;
wherein said host computer identifies each of said unique identification codes associated with each of said plurality of RFID transponders by iteratively transmitting a message including a variable having a predetermined initial value to each of said RFID transponders, and only said RFID transponders which generate a random number greater than said variable respond to said message by transmitting identification codes associated with said respective RFID transponders.
2. The RFID system of claim 1, wherein each of said signals is transmitted in spread spectrum format.
3. The RFID system of claim 1, wherein communications between said at least one interrogator and each of said plurality of RFID transponders is in TDMA format whereby a predetermined number of time slots are available for transmission.
4. The RFID system of claim 3, wherein each of said RFID transponders which generate a random number greater than said variable also use said generated random variable to determine which time slot to use for transmission of said response signal.
5. The RFID system of claim 1, wherein said host computer intelligently adjusts said variable after receipt of each response signal to ensure that an adequate number of responses are received during a next iteration.
6. The RFID system of claim 1, wherein said random number generator is also used for generating a unique identification code for each of said plurality of RFID transponders.
7. A method for a host to read an identification code from a plurality of RFID transponders each having unique identification codes, comprising the steps of:
(A) iteratively transmitting a read identification code command and a variable having a predetermined initial value from said host to said plurality of RFID transponders;
(B) receiving, at each of said plurality of RFID transponders, said read identification code command and said variable;
(C) generating, at each of said plurality of RFID transponders, a random number upon receipt of said read identification code and said variable;
(D) comparing, at each of said plurality of RFID transponders, said variable with said generated random number;
(E) transmitting, by each of said RFID transponders where said generated random number is greater than said variable, an identification code associated with each RFID transponder and then becoming inactive such that each RFID transponder does not respond to further read identification code commands during a current read identification code command iteration;
(F) waiting, by each of said RFID transponders where said generated random number is not greater than said variable, for a next transmission of said read identification code command and said variable;
(G) intelligently adjusting, by said host, the value of said variable for the next transmission of said read identification code command and said variable; and
(H) examining said variable at said host and ceasing the iterative transmission of said read identification code command when no RFID transponders respond by transmitting their identification code in response to a final value of said variable.
8. The method of claim 7, wherein said predetermined value for said variable is set as a high value, said step of intelligently adjusting the value of said variable reduces the value of said variable, and wherein said final value is zero.
9. A method for re-selecting an identification code for each of a plurality of RFID transponders, comprising the steps of:
(A) transmitting a re-select identification code command to each of a plurality of RFID transponders;
(B) generating, at each of said plurality of RFID transponders, a first random number and calculating a new identification code based upon said random number;
(C) iteratively transmitting a read identification code command and a variable having a predetermined initial value from said host to said plurality of RFID transponders;
(D) receiving, at each of said plurality of RFID transponders, said read identification code command and said variable;
(E) generating, at each of said plurality of RFID transponders, a random number upon receipt of said read identification command and said variable;
(F) comparing, at each of said plurality of RFID transponders, said variable with said generated random number;
(G) transmitting, by each of said RFID transponders where said generated random number is greater than said variable, an identification code associated with each RFID transponder and then becoming inactive such that each RFID transponder does not respond to further read identification code commands during a current read identification code command iteration;
(H) waiting, by each of said RFID transponders where said generated random number is not greater than said variable, for a next transmission of said read identification code command and said variable;
(I) intelligently adjusting, by said host, the value of said variable for the next transmission of said read identification code command and said variable; and
(J) examining said variable at said host and ceasing the iterative transmission of said read identification code command when no RFID transponders respond by transmitting their identification code in response to a final value of said variable.
10. The method of claim 9, wherein said predetermined value for said variable is set as a high value, said step of intelligently adjusting the value of said variable reduces the value of said variable, and wherein said final value is zero.
11. An interrogator for communicating with an RFID transponder in an RFID system which is connected to a host computer, comprising:
(A) at least one antenna;
(B) a transmitter connected to said at least one antenna for transmitting an FSK modulated spread spectrum signal on said at least one antenna during a transmitting mode and a BPSK modulated spread spectrum signal during a receiving mode;
(C) a receiver connected to said at least one antenna for receiving a spread spectrum signal in PSK format, and
(D) a controller connected to said transmitter and said receiver for controlling said transmitter and said receiver and communicating with a host computer.
12. The interrogator of claim 11, wherein said at least one antenna comprises a first antenna having a first polarization and a second antenna having a second polarization which is orthogonal to said first polarization, and further comprising an antenna switch matrix for selecting one of said first antenna and second antenna for connection to said transmitter and a second of said first antenna and said second antenna for connection to said receiver.
13. The interrogator of claim 12, wherein said at least one antenna further comprises a third antenna having a third polarization which is orthogonal to said first polarization and to said second polarization, and said antenna switch selects one of said first antenna, second antenna and third antenna for connection to said transmitter and a second of said first antenna, second antenna and third antenna for connection to said receiver.
14. The interrogator of claim 11, wherein said transmitter comprises:
an FSK transmitter section for generating a message for transmission as a spread spectrum output signal in FSK format;
a BPSK transmitter section for generating an illumination signal for transmission as a spread spectrum signal in BPSK format;
an output amplifier; and
a switch which selectively connects said FSK transmitter section or said BPSK transmitter section to said output amplifier.
15. The interrogator of claim 14, wherein said FSK transmitter section consists of:
a Manchester encoder connected to said controller;
a PN generator connected to said controller; and
an FSK modulation generator connected to said Manchester encoder and said PN generator.
16. The interrogator of claim 14, wherein said BPSK transmitter section consists of:
a PN generator;
a low noise oscillator; and
a balanced modulator connected to said PN generator and said low noise oscillator.
17. The interrogator of claim 11, wherein said receiver comprises:
a band pass filter having an input connected to said at least one antenna for receiving a signal;
a first mixer and a second mixer each having a first input connected in parallel to an output of said band pass filter and a second input connected to a signal derived from a transmitted signal;
a first bandpass filter connected to an output of said first mixer;
a first data and clock recovery circuit connected to an output of said first bandpass filter for recovering an in-phase version of said received signal;
a second bandpass filter connected to an output of said second mixer; and
a second data and clock recovery circuit connected to an output of said second bandpass filter for recovering an quadrature-phase version of said received signal.
18. An antenna assembly for an RFID interrogator comprising:
(A) a first antenna having a first polarization;
(B) a second antenna having a second polarization which is orthogonal to said first polarization; and
(C) an antenna switch network connected to said first and second antennas for selectively selecting one of said first and said second antennas for connection to a transmitter.
19. The antenna assembly of claim 18, further comprising a third antenna having a third polarization which is orthogonal to both said first polarization and said second polarization.
20. A transponder for communicating with an interrogator in an RFID system, comprising:
(A) a first antenna element having a first predetermined dimensional configuration;
(B) a second antenna element having a second predetermined dimensional configuration;
(C) an impedance modulator connected between said first antenna element and said second antenna element which causes said first antenna element to be electrically connected to said second element in a first state and to be electrically isolated from said second element in a second state;
(D) a receiver for receiving a message within an FSK modulated spread spectrum signal connected to said first antenna element, said second antenna element and said impedance modulator; and
(E) a controller connected to said receiver which receives said message and selectively responds to said message in PSK format by reflecting an illumination signal transmitted by said interrogator by selectively switching said impedance modulator between said first state and said second state.
21. The transponder of claim 20, wherein said receiver comprises:
(A) a frequency discriminator having an input connected to said first and second antenna elements;
(B) a bandpass quantizer having an input connected to an output of said frequency discriminator; and
(C) a low pass filter connected to an output of said bandpass quantizer.
22. The transponder of claim 20, wherein said first predetermined dimensional configuration is a length of one-quarter wavelength and said second predetermined dimensional configuration is a length of three-quarter wavelength.
23. The transponder of claim 22, wherein said first antenna element consists of two first sub-elements connected by a ninety degree angle.
24. The transponder of claim 23, wherein each of said first sub-elements have a predetermined length relationship to each other.
25. The transponder of claim 22, wherein said second antenna element consists of a plurality of second sub-elements connected by ninety degree angles in a geometrically folding configuration.
26. The transponder of claim 25, wherein each of said second sub-elements have a predetermined length relationship to each other.
27. The transponder of claim 20, wherein said first antenna element and said second antenna element together form a dipole configuration.
28. A method of generating a random number in an RFID transponder, comprising the steps of:
(A) calculating a random seed based upon the difference between a local clock signal and a clock signal derived from either a received signal or random noise;
(B) supplying said random seed to a random number generator; and
(C) generating a random number based upon said random seed.
29. An apparatus for generating a random number, comprising:
(A) a first clock input derived from a local clock oscillator;
(B) a second clock input derived from a received signal or random noise;
(C) means connected to said first clock input and said second clock input for generating a random number based upon the timing difference between said first clock input and said second clock input.
30. A method for controlling a plurality of groups of interrogators in an RFID system, comprising the steps of:
arranging each interrogator within a group of interrogators in nearest neighbor format having a predetermined order; and
activating only corresponding interrogators within each group of interrogators for transmission of signals to at least one RFID transponder within a zone covered by said respective activated interrogators.
31. A method for generating a unique identification code for each of a plurality of RFID transponders originally having a common default identification code, comprising the steps of:
(A) transmitting a re-select identification code command to each of a plurality of RFID transponders;
(B) generating, at each of said plurality of RFID transponders, a first random number and calculating a new identification code based upon said random number;
(C) iteratively transmitting a read identification code command and a variable having a predetermined initial value from said host to said plurality of RFID transponders;
(D) receiving, at each of said plurality of RFID transponders, said read identification code command and said variable;
(E) generating, at each of said plurality of RFID transponders, a random number upon receipt of said read identification code and said variable;
(F) comparing, at each of said plurality of RFID transponders, said variable with said generated random number;
(G) transmitting, by each of said RFID transponders where said generated random number is greater than said variable, an identification code associated with each RFID transponder and then becoming inactive such that each RFID transponder does not respond to further read identification code commands during a current read identification code command iteration;
(H) waiting, by each of said RFID transponders where said generated random number is not greater than said variable, for a next transmission of said read identification code command and said variable;
(I) intelligently adjusting, by said host, the value of said variable for the next transmission of said read identification code command and said variable; and
(J) examining said variable at said host and ceasing the iterative transmission of said read identification code command when no RFID transponders respond by transmitting their identification code in response to a final value of said variable.
32. The method of claim 31, wherein said predetermined value for said variable is set as a high value, said step of intelligently adjusting the value of said variable reduces the value of said variable, and wherein said final value is zero.
33. A method for a host having a plurality of transmitting antennas to read an identification code from a plurality of RFID transponders each having unique identification codes, comprising the steps of:
(A) iteratively transmitting a read identification code command and a variable having a predetermined initial value from said host to said plurality of RFID transponders on each of said plurality of transmitters;
(B) receiving, at each of said plurality of RFID transponders, said read identification code command and said variable;
(C) generating, at each of said plurality of RFID transponders, a random number upon receipt of said read identification code and said variable;
(D) comparing, at each of said plurality of RFID transponders, said variable with said generated random number;
(E) transmitting, by each of said RFID transponders where said generated random number is greater than said variable, an identification code associated with each RFID transponder and then becoming inactive such that each RFID transponder does not respond to further read identification code commands during a current read identification code command iteration;
(F) waiting, by each of said RFID transponders where said generated random number is not greater than said variable, for a next transmission of said read identification code command and said variable;
(G) receiving at said host said transmitted identification codes associated with particular RFID transponders and storing said identification codes and associated antenna information in memory so that further communication with a particular one of said plurality of transponders is performed by using said identification code and said antennal information;
(H) intelligently adjusting, by said host, the value of said variable for the next transmission of said read identification code command and said variable; and
(I) examining said variable at said host and ceasing the iterative transmission of said read identification code command when no RFID transponders respond by transmitting their identification code in response to a final value of said variable.
34. An RFID system for tracking election ballots comprising:
(A) a plurality of RFID transponders, each of said plurality of RFID transponders having a unique identification code and connected to a separate ballot, for receiving a signal and for generating a response signal based thereon, each of said RFID transponders having a random number generator used for determining whether to respond to a received message addressed to all of said plurality of RFID transponders and a memory for storing election data;
(B) a host computer for generating a message for transmission to at least one of said RFID transponders and for controlling the storage of election data within each of said ballots; and
(C) at least one interrogator connected to said host computer having an interrogator transmitter and an interrogator receiver which operate in half-duplex mode, wherein said interrogator transmitter transmits messages received from said host computer to said plurality of RFID transponders during a first part of said half-duplex mode and which provides an illumination signal to said plurality of RFID transponders during a second part of said half-duplex mode and said interrogator receiver receives signals reflected by said at least one RFID transponders and provides said received signals to said host computer;
wherein said host computer identifies each of said unique identification codes associated with each of said plurality of RFID transponders by iteratively transmitting a message including a variable having a predetermined initial value to each of said RFID transponders, and only said RFID transponders which generate a random number greater than said variable respond to said message by transmitting identification codes associated with said respective RFID transponders.
35. The RFID system of claim 1, wherein said host computer selectively transmits a predetermined message which causes each RFID transponder receiving said predetermined message to transmit its identification code to said host computer.
36. The RFID system of claim 35, wherein said predetermined message is continuously transmitted by said host computer and whereby receipt of said identification code by said host signals an alarm event.
37. In a communications system having a first device having a transmitter and a receiver and a plurality of second devices, each of said second devices having a transmitter and a receiver, where communications between said first device and said plurality of second devices is in TDMA format having a plurality of time slots for transmission, a method for determining if more than one second device has transmitted a signal to said first device at the same time during a current TDMA communications period, comprising the steps of:
(A) sampling the relative power in an analog baseband channel of said receiver in said first device during each of said time slots;
(B) sampling the relative power in an analog baseband channel of said receiver in said first device during a period of no communications;
(C) comparing said sampled relative power in each of said time slots to said sampled relative power in said period of no communications;
(D) setting, if said comparison for a particular one of said time slots produces a value of greater than unity by a predetermined amount, said particular time slot to be occupied;
(E) determining which of said time slots did not have an accepted message;
(F) comparing said time slots which did not have an accepted message to said occupied time slots;
(G) determining that each of said time slots which did not have an accepted message and which is occupied represents a time slot in which more than one second device transmitted a message at the same time.
38. The interrogator of claim 17, wherein said first data and clock recovery circuit comprises a first digital discrete phase lock loop circuit that synchronizes to first signals input to said first data and clock recovery circuit, said second data and clock recovery circuit comprises a second digital discrete phase lock loop circuit that synchronizes to second signals input to said first data and clock recovery circuit, and said controller chooses between said in-phase version of said received signal and said quadrature-phase version of said received signal based upon which of said first and second digital discrete phase lock loop circuit first synchronizes to said first and second input signals, respectively.
US09/726,136 2000-11-29 2000-11-29 Method and system for communicating with and tracking RFID transponders Expired - Lifetime US7253717B2 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
US09/726,136 US7253717B2 (en) 2000-11-29 2000-11-29 Method and system for communicating with and tracking RFID transponders
EP07075598A EP1857960B1 (en) 2000-11-29 2001-10-15 RFID communication method and transponder
EP04024167A EP1505531B1 (en) 2000-11-29 2001-10-15 Method and apparatus for RFID communicating
DE60139037T DE60139037D1 (en) 2000-11-29 2001-10-15 RFID communication method and device
EP01308754A EP1211630B1 (en) 2000-11-29 2001-10-15 RFID communication method and system
DE60107922T DE60107922T2 (en) 2000-11-29 2001-10-15 RFID communication method and system
US11/469,477 US7626488B2 (en) 2000-11-29 2006-08-31 Method and system for communicating with and tracking RFID transponders

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US09/726,136 US7253717B2 (en) 2000-11-29 2000-11-29 Method and system for communicating with and tracking RFID transponders

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US11/469,477 Continuation US7626488B2 (en) 2000-11-29 2006-08-31 Method and system for communicating with and tracking RFID transponders

Publications (3)

Publication Number Publication Date
US20020063622A1 true US20020063622A1 (en) 2002-05-30
US20020175805A9 US20020175805A9 (en) 2002-11-28
US7253717B2 US7253717B2 (en) 2007-08-07

Family

ID=24917391

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/726,136 Expired - Lifetime US7253717B2 (en) 2000-11-29 2000-11-29 Method and system for communicating with and tracking RFID transponders
US11/469,477 Expired - Fee Related US7626488B2 (en) 2000-11-29 2006-08-31 Method and system for communicating with and tracking RFID transponders

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11/469,477 Expired - Fee Related US7626488B2 (en) 2000-11-29 2006-08-31 Method and system for communicating with and tracking RFID transponders

Country Status (3)

Country Link
US (2) US7253717B2 (en)
EP (3) EP1211630B1 (en)
DE (2) DE60107922T2 (en)

Cited By (123)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030034390A1 (en) * 2000-10-20 2003-02-20 Linton William A. Radio frequency identification method and system of distributing products
US20030060212A1 (en) * 2000-02-28 2003-03-27 Invention Depot, Inc. Method and system for location tracking
US6577266B1 (en) * 2001-10-15 2003-06-10 Sandia Corporation Transponder data processing methods and systems
US20030117281A1 (en) * 2001-12-21 2003-06-26 Timur Sriharto Dynamic control containment unit
US20030181229A1 (en) * 2001-11-21 2003-09-25 Forster Ian J. Wireless communication device interconnectivity
US20030209601A1 (en) * 2000-10-11 2003-11-13 Chung Kevin Kwong-Tai Article tracking system and method
US20040008114A1 (en) * 2002-07-09 2004-01-15 Fred Sawyer Method and apparatus for tracking objects and people
US20040036623A1 (en) * 2000-10-11 2004-02-26 Chung Kevin Kwong-Tai Tracking system and method employing plural smart tags
US20040116074A1 (en) * 2002-12-17 2004-06-17 Sony Corporation Communication apparatus and communication method
WO2004064506A1 (en) * 2003-01-24 2004-08-05 Aleis Trakit Pty Ltd Identifying apparatus
US20040192386A1 (en) * 2003-03-26 2004-09-30 Naveen Aerrabotu Method and apparatus for multiple subscriber identities in a mobile communication device
US20040210380A1 (en) * 2003-01-16 2004-10-21 Tadashi Morita Traveling machine management system
US20040251302A1 (en) * 2003-03-20 2004-12-16 Seiko Epson Corporation Contactless data communication system, position information management system, contactless identification tag, data communication system, contactless indentification tag control program, and data communication system control program
US20050020354A1 (en) * 2002-02-27 2005-01-27 Igt Methods and devices for gaming account management
US20050040952A1 (en) * 2000-10-20 2005-02-24 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US6861974B1 (en) * 2003-10-16 2005-03-01 Lockheed Martin Corporation Clutter normalization by adaptation of transmit waveform
US20050121526A1 (en) * 2003-12-09 2005-06-09 Intelleflex Corporation Battery activation circuit
EP1575183A1 (en) * 2002-12-17 2005-09-14 Sony Corporation Communication system, communication method, and data processing apparatus
US20050205659A1 (en) * 1999-05-17 2005-09-22 Yuji Murayama Information processing apparatus and method, information processing system, and medium
US20060033608A1 (en) * 2004-07-29 2006-02-16 Ari Juels Proxy device for enhanced privacy in an RFID system
US20060043177A1 (en) * 2004-08-25 2006-03-02 Nycz Jeffrey H Automated pass-through surgical instrument tray reader
US20060044181A1 (en) * 2002-12-11 2006-03-02 Wilcox Martin S Method and apparatus for measuring distance
US20060057977A1 (en) * 2004-09-15 2006-03-16 Aviation Communication & Surveillance Systems Llc Pulse transmitters having multiple outputs in phase relationship and methods of operation
US20060071757A1 (en) * 2004-09-24 2006-04-06 Burghard Brion J Communication methods, systems, apparatus, and devices involving RF tag registration
US20060076401A1 (en) * 2004-10-12 2006-04-13 Aristocrat Technologies Australia Pty, Ltd. Method and apparatus for synchronization of proximate RFID readers in a gaming environment
US20060109105A1 (en) * 2004-11-22 2006-05-25 Sdgi Holdings, Inc Surgical instrument tray shipping tote identification system and methods of using same
US20060113302A1 (en) * 2004-09-09 2006-06-01 Inteligistics, Inc. Modular shipping unit and system
US20060119481A1 (en) * 2004-12-08 2006-06-08 Sdgi Holdings, Inc Workstation RFID reader for surgical instruments and surgical instrument trays and methods of using same
US20060145856A1 (en) * 2004-11-22 2006-07-06 Sdgi Holdings, Inc. Systems and methods for processing surgical instrument tray shipping totes
US20060192652A1 (en) * 2005-02-14 2006-08-31 Inteligistics, Inc. Identification system
US20060244599A1 (en) * 2003-10-22 2006-11-02 Mobile Aspects, Inc. Identification apparatus
US20060244652A1 (en) * 2005-04-28 2006-11-02 Sdgi Holdings, Inc. Method and apparatus for surgical instrument identification
US20060244593A1 (en) * 2005-04-28 2006-11-02 Sdgi Holdings, Inc. Smart instrument tray RFID reader
US20060255131A1 (en) * 2005-05-11 2006-11-16 Intelleflex Corporation Smart tag activation
US20060289650A1 (en) * 2005-06-27 2006-12-28 Mobile Aspects, Inc. Networked monitoring system
US20070001839A1 (en) * 2004-11-22 2007-01-04 Cambre Christopher D Control system for an rfid-based system for assembling and verifying outbound surgical equipment corresponding to a particular surgery
US20070018794A1 (en) * 2005-07-20 2007-01-25 Intelleflex Corporation Selective RF device activation
WO2007018566A2 (en) * 2005-08-03 2007-02-15 Feher, Kamilo Multiuse location finder, communication, medical, control system
US20070094721A1 (en) * 2002-02-27 2007-04-26 Igt Token authentication
WO2007056644A2 (en) * 2005-11-02 2007-05-18 Texas Instruments Incorporated Random number generator using jitter sampled rf carrier
US20070120679A1 (en) * 2005-11-29 2007-05-31 Chan-Soo Shin Method and apparatus for sharing portable terminal in CDMA system and mobile RFID system
WO2007066981A1 (en) * 2005-12-07 2007-06-14 Electronics And Telecommunications Research Institute Rfid tag apparatus and authentication method thereof
US20070141983A1 (en) * 2005-12-15 2007-06-21 Intelleflex Corporation Clock-free activation circuit
US7260369B2 (en) 2005-08-03 2007-08-21 Kamilo Feher Location finder, tracker, communication and remote control system
US20070210158A1 (en) * 2006-03-09 2007-09-13 Miller David P Combined radio frequency identification and optical imaging module
US20070210157A1 (en) * 2006-03-09 2007-09-13 Jadak Technologies, Inc. Infusion Pump Having Radiofrequency Identification and Optical Imaging Capabilities
US7280810B2 (en) 2005-08-03 2007-10-09 Kamilo Feher Multimode communication system
US20070248180A1 (en) * 2006-04-19 2007-10-25 Wherenet Corp., Corporation Of The State Of California Receiver for object locating and tracking systems and related methods
US20070257832A1 (en) * 2006-04-12 2007-11-08 Lommen Layne D Reference beacon identification using transmission sequence characteristics
JP2007317174A (en) * 2006-04-28 2007-12-06 Semiconductor Energy Lab Co Ltd Identification system and identification method
US20080001719A1 (en) * 2006-06-29 2008-01-03 Samsung Electronics Co., Ltd. Data recovery method and apparatus for radio frequency identification
US20080021645A1 (en) * 2000-02-28 2008-01-24 Chung Lau Methods and apparatus to analyze and present location information
US20080043868A1 (en) * 2005-08-03 2008-02-21 Kamilo Feher Internet GSM, CDMA, OFDM, Wi-Fi wireless and wired multimode systems
US20080074238A1 (en) * 2006-09-27 2008-03-27 Kodialam Muralidharan S Anonymous tracking using a set of wireless devices
US20080079557A1 (en) * 2006-09-29 2008-04-03 Sensormatic Electronics Corporation Radio frequency identification fast tag response method and system
US20080079601A1 (en) * 2006-09-29 2008-04-03 Osamu Ishihara Electronic device having identifier
US20080094176A1 (en) * 2004-07-29 2008-04-24 Mitsubishi Electric Corporation Radio-Communication Control Apparatus And Radio Communication System
US20080100527A1 (en) * 2005-03-22 2008-05-01 Mobile Aspects, Inc. Antenna arrangement
US7376180B2 (en) 1998-08-10 2008-05-20 Kamilo Feher Adaptive receivers for bit rate agile (BRA) and modulation demodulation (modem) format selectable (MFS) signals
US20080165059A1 (en) * 2005-03-14 2008-07-10 Alfred E. Mann Foundatiion For Scientific Research System and Method for Locating Objects and Communicating With the Same
US20080219385A1 (en) * 1998-08-10 2008-09-11 Wi-Lan, Inc. Methods and systems for transmission of multiple modulated signals over wireless networks
US20080218354A1 (en) * 2007-03-09 2008-09-11 Lorentz Robert D Non-networked rfid system
US20080231425A1 (en) * 2006-03-15 2008-09-25 Toshiba Tec Kabushiki Kaisha Quadrature demodulation device, quadrature demodulation method, and quadrature demodulation program
US20080261636A1 (en) * 2002-04-24 2008-10-23 Chung Lau Method and system for enhanced messaging
US20080266055A1 (en) * 2004-02-06 2008-10-30 Christopher Gordon Gervase Turner Method and System for Controlling RFID Transponder Response Waiting Periods
US20080272891A1 (en) * 2005-10-25 2008-11-06 Nxp B.V. Method of Reading Data From Transponders Through a Reader, a Transponder, and a Reader
US20080297323A1 (en) * 2007-05-30 2008-12-04 Edward Barkan Item finding using radio frequency and optical signaling
US20090040047A1 (en) * 2007-08-09 2009-02-12 Intel Corporation RFID System and Method of Communication Therein
US20090135713A1 (en) * 2005-11-07 2009-05-28 Sung Hyun Hwang Method for using flexible bandwidth in ofdma-based cognitive radio system, base station and subscriber station using the same
US20100019039A1 (en) * 2006-09-20 2010-01-28 Ipico South Africa (Pty) Limited RFID Transponder Transmitting Concatenation of Pages
US20100033379A1 (en) * 2008-08-11 2010-02-11 Lommen Layne D Reference beacon identification using transmission sequence characteristics
US7693229B2 (en) 2004-12-28 2010-04-06 Kamilo Feher Transmission of signals in cellular systems and in mobile networks
US7710275B2 (en) 2007-03-16 2010-05-04 Promega Corporation RFID reader enclosure and man-o-war RFID reader system
US7738608B2 (en) 1999-08-09 2010-06-15 Kamilo Feher Equalized modulation demodulation (modem) format selectable multi antenna system
US20100176926A1 (en) * 2007-09-21 2010-07-15 Inha-Industry Partnership Institute Time slot allocation apparatus and method for preventing collisions between time slots in tdma-based rfid network
US20100191049A1 (en) * 2008-10-28 2010-07-29 Mobile Aspects, Inc. Endoscope Storage Cabinet, Tracking System, and Signal Emitting Member
US7809377B1 (en) 2000-02-28 2010-10-05 Ipventure, Inc Method and system for providing shipment tracking and notifications
US20100295659A1 (en) * 2009-05-21 2010-11-25 Alcatel-Lucent Usa Inc. Identifying rfid categories
US20110044692A1 (en) * 2006-08-14 2011-02-24 The Regents Of The University Of California All-Optical AM-To-FM Up-Conversion for Radio-Over-Fiber
US8285484B1 (en) 2002-04-24 2012-10-09 Ipventure, Inc. Method and apparatus for intelligent acquisition of position information
USRE43740E1 (en) 2006-02-21 2012-10-16 RoundTrip, LLC Reverse locator
US20130076500A1 (en) * 2011-09-28 2013-03-28 Hung-Chih Yu Collision avoidance method for transmitting data from multiple wireless tire condition sensors
US20130162460A1 (en) * 2011-12-27 2013-06-27 Rambus Inc. High-accuracy detection in collaborative tracking systems
CN101589559B (en) * 2006-09-29 2013-07-31 传感电子公司 Radio frequency identification fast tag response method and system
US20130234831A1 (en) * 2010-04-26 2013-09-12 Sithamparanathan Sabesan Rfid tag interrogation systems
USRE44526E1 (en) 2006-02-21 2013-10-08 RoundTrip, LLC Electronic fence mode alert system and method
CN103400093A (en) * 2013-07-22 2013-11-20 无锡儒安科技有限公司 Radio-frequency tag number estimation method and device based on unstable channel
CN103400168A (en) * 2013-08-19 2013-11-20 广东电网公司东莞供电局 RFID reader-writer supporting SIMO antennas, and data sending and receiving method
US8620343B1 (en) 2002-04-24 2013-12-31 Ipventure, Inc. Inexpensive position sensing device
US8648699B2 (en) 2010-07-19 2014-02-11 Mobile Aspects, Inc. Item tracking system and arrangement
US20140320910A1 (en) * 2013-04-26 2014-10-30 Canon Kabushiki Kaisha Communicating apparatus, communication method, and storage medium storing program
US20140347167A1 (en) * 2005-05-26 2014-11-27 Amtech Systems, LLC Intermodulation mitigation technique in an rfid system
US20150002268A1 (en) * 2013-06-26 2015-01-01 International Business Machines Corporation Apparatus for indicating the location of a signal emitting tag
US20150048966A1 (en) * 2013-08-16 2015-02-19 Tag-Comm Inc. Method and system for identifying and finding a range of an object
US9049571B2 (en) 2002-04-24 2015-06-02 Ipventure, Inc. Method and system for enhanced messaging
EP2137710A4 (en) * 2007-03-23 2015-08-26 Mojix Inc Rfid systems using distributed exciter network
US9182238B2 (en) 2002-04-24 2015-11-10 Ipventure, Inc. Method and apparatus for intelligent acquisition of position information
US9224124B2 (en) 2013-10-29 2015-12-29 Mobile Aspects, Inc. Item storage and tracking cabinet and arrangement
US20150379216A1 (en) * 2013-02-05 2015-12-31 Ingegneria Biomedica Santa Lucia S.P.A. Method for tracking sanitary materials and goods with rfid identification system; containment area and/or structure actuating said method
CN105225087A (en) * 2015-09-29 2016-01-06 杭州紫钺科技有限公司 A kind of based on bluetooth location and the warehouse stock counting method of RFID video superimpose
US20160063289A1 (en) * 2014-08-27 2016-03-03 Siemens Aktiengesellschaft Method and read/write device for selecting a wireless data medium
US9307407B1 (en) 1999-08-09 2016-04-05 Kamilo Feher DNA and fingerprint authentication of mobile devices
US9348013B2 (en) 2013-09-18 2016-05-24 Mobile Aspects, Inc. Item hanger arrangement, system, and method
US20160162776A1 (en) * 2006-06-21 2016-06-09 Neology, Inc. Systems and methods for synchronizing a plurality of rfid interrogators in a theatre of operation
US9373251B2 (en) 1999-08-09 2016-06-21 Kamilo Feher Base station devices and automobile wireless communication systems
US20160307087A1 (en) * 2013-12-13 2016-10-20 3M Innovative Properties Company Mitigating Adjacent RFID Reader Interference
US9756671B2 (en) 2013-04-26 2017-09-05 Canon Kabushiki Kaisha Communicating apparatus, communication method, and storage medium storing program
US9813270B2 (en) 1999-08-09 2017-11-07 Kamilo Feher Heart rate sensor and medical diagnostics wireless devices
US9883337B2 (en) 2015-04-24 2018-01-30 Mijix, Inc. Location based services for RFID and sensor networks
US9892618B2 (en) 2013-08-09 2018-02-13 Mobile Aspects, Inc. Signal emitting member attachment system and arrangement
US9958533B2 (en) 2013-09-06 2018-05-01 Drnc Holdings, Inc. Method and system for locating wireless devices within a local region
US10009956B1 (en) 2017-09-02 2018-06-26 Kamilo Feher OFDM, 3G and 4G cellular multimode systems and wireless mobile networks
US10025960B1 (en) * 2016-06-29 2018-07-17 The United States of America, as represented by the Administrator of the National Aeronautics and Space Administraion Frequency multiplexed radio frequency identification
US10034400B2 (en) 2013-12-04 2018-07-24 Mobile Aspects, Inc. Item storage arrangement system and method
US10038579B1 (en) * 2017-03-15 2018-07-31 Texas Instruments Incorporated Integrated circuits and transponder circuitry with shared modulation capacitor for 3D transponder uplink modulation
US10079704B2 (en) 2014-09-22 2018-09-18 Drnc Holdings, Inc. Transmission apparatus for a wireless device using delta-sigma modulation
US10224757B2 (en) 2016-12-28 2019-03-05 Texas Instruments Incorporated Methods and apparatus for antenna signal limiter for radio frequency identification transponder
USRE47599E1 (en) 2000-10-20 2019-09-10 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US10585159B2 (en) 2008-04-14 2020-03-10 Mojix, Inc. Radio frequency identification tag location estimation and tracking system and method
CN111165006A (en) * 2017-09-15 2020-05-15 梅蒂瑞奥尼克有限公司 Method for radio measurement applications
US10904917B2 (en) * 2015-07-13 2021-01-26 Isolynx, Llc System and method for dynamically scheduling wireless transmissions without collision
US10992584B2 (en) * 2016-12-26 2021-04-27 New H3C Technologies Co., Ltd. Processing packet
US11922247B2 (en) 2021-05-19 2024-03-05 Neology, Inc. Mitigating adjacent RFID reader interference

Families Citing this family (229)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6998541B2 (en) 1994-08-05 2006-02-14 Clearcount Medical Solutions, Inc. Automatic surgical sponge counter and blood loss determination system
US6470055B1 (en) * 1998-08-10 2002-10-22 Kamilo Feher Spectrally efficient FQPSK, FGMSK, and FQAM for enhanced performance CDMA, TDMA, GSM, OFDN, and other systems
US7889052B2 (en) 2001-07-10 2011-02-15 Xatra Fund Mx, Llc Authorizing payment subsequent to RF transactions
US8050625B2 (en) * 2000-12-22 2011-11-01 Terahop Networks, Inc. Wireless reader tags (WRTs) with sensor components in asset monitoring and tracking systems
US7725427B2 (en) 2001-05-25 2010-05-25 Fred Bishop Recurrent billing maintenance with radio frequency payment devices
US6988667B2 (en) * 2001-05-31 2006-01-24 Alien Technology Corporation Methods and apparatuses to identify devices
US7107430B2 (en) * 2001-06-19 2006-09-12 Massachusetts Institute Of Technology Mechanism to reduce the cost of forwarding pointer aliasing
US20040236699A1 (en) 2001-07-10 2004-11-25 American Express Travel Related Services Company, Inc. Method and system for hand geometry recognition biometrics on a fob
US9024719B1 (en) 2001-07-10 2015-05-05 Xatra Fund Mx, Llc RF transaction system and method for storing user personal data
US8279042B2 (en) 2001-07-10 2012-10-02 Xatra Fund Mx, Llc Iris scan biometrics on a payment device
US9454752B2 (en) 2001-07-10 2016-09-27 Chartoleaux Kg Limited Liability Company Reload protocol at a transaction processing entity
US7249112B2 (en) 2002-07-09 2007-07-24 American Express Travel Related Services Company, Inc. System and method for assigning a funding source for a radio frequency identification device
US7668750B2 (en) 2001-07-10 2010-02-23 David S Bonalle Securing RF transactions using a transactions counter
US7705732B2 (en) 2001-07-10 2010-04-27 Fred Bishop Authenticating an RF transaction using a transaction counter
US7303120B2 (en) 2001-07-10 2007-12-04 American Express Travel Related Services Company, Inc. System for biometric security using a FOB
US8294552B2 (en) 2001-07-10 2012-10-23 Xatra Fund Mx, Llc Facial scan biometrics on a payment device
US8001054B1 (en) 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm
US9031880B2 (en) 2001-07-10 2015-05-12 Iii Holdings 1, Llc Systems and methods for non-traditional payment using biometric data
US7735725B1 (en) 2001-07-10 2010-06-15 Fred Bishop Processing an RF transaction using a routing number
US7360689B2 (en) 2001-07-10 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for proffering multiple biometrics for use with a FOB
US8548927B2 (en) 2001-07-10 2013-10-01 Xatra Fund Mx, Llc Biometric registration for facilitating an RF transaction
US20030020595A1 (en) * 2001-07-12 2003-01-30 Philips Electronics North America Corp. System and method for configuration of wireless networks using position information
US7062001B2 (en) * 2001-08-31 2006-06-13 Her Majesty The Queen In Right Of Canada, As Represented By The Minister Of National Defence Of Her Majesty's Canadian Government Adaptive multi-channel, multi-function
US7193504B2 (en) * 2001-10-09 2007-03-20 Alien Technology Corporation Methods and apparatuses for identification
FR2835997B1 (en) * 2002-02-11 2004-11-26 Somfy METHOD FOR DEFINING A GROUP AMONG BIDIRECTIONAL OBJECTS
USRE49644E1 (en) * 2002-03-14 2023-09-05 Odyssey Wireless, Inc. Systems and/or methods of data acquisition from a transceiver
US7183922B2 (en) * 2002-03-18 2007-02-27 Paratek Microwave, Inc. Tracking apparatus, system and method
US20050113138A1 (en) * 2002-03-18 2005-05-26 Greg Mendolia RF ID tag reader utlizing a scanning antenna system and method
TW561697B (en) * 2002-03-25 2003-11-11 Holtek Semiconductor Inc Transmission method of identification data and circuit device
US7224712B2 (en) * 2002-03-28 2007-05-29 Brother Kogyo Kabushiki Kaisha Interrogator and tag of wireless communication system
US6841981B2 (en) * 2002-04-09 2005-01-11 Mstar Semiconductor, Inc. Radio frequency data communication device in CMOS process
DE60329999D1 (en) * 2002-04-23 2009-12-24 Nxp Bv METHOD FOR INVENTING A MULTIPLE OF DATA CARRIES
US7938722B2 (en) * 2005-09-12 2011-05-10 Igt Enhanced gaming chips and table game security
US7084739B2 (en) * 2002-06-28 2006-08-01 Brother Kogyo Kabushiki Kaisha Communication system, and interrogator and transponder for the system
CN100357954C (en) * 2002-07-25 2007-12-26 Nxp股份有限公司 Anticollision method that marks the time slots
AU2003266171A1 (en) * 2002-08-08 2004-02-25 Supersensor (Pty) Ltd Rf identification system with multiple readers
US7044387B2 (en) * 2002-09-05 2006-05-16 Honeywell International Inc. RFID tag and communication protocol for long range tag communications and power efficiency
US6726099B2 (en) * 2002-09-05 2004-04-27 Honeywell International Inc. RFID tag having multiple transceivers
US6805287B2 (en) 2002-09-12 2004-10-19 American Express Travel Related Services Company, Inc. System and method for converting a stored value card to a credit card
US7009526B2 (en) * 2002-10-02 2006-03-07 Battelle Memorial Institute RFID system and method including tag ID compression
CN1706206A (en) * 2002-10-18 2005-12-07 赛宝技术公司 Method for the efficient reading of a population of radio frequency identification tags with unique identification numbers over a noisy air channel
JP3565217B2 (en) * 2002-10-29 2004-09-15 オムロン株式会社 Article management system, non-contact electronic tag, and article management program
DE10254151A1 (en) * 2002-11-20 2004-06-17 Siemens Ag Method for collision-free data transmission between read / write devices (SLG) and a mobile data memory (MDS) as well as read / write devices (SLG), mobile data memory (MDS) and identification system for such a method
KR20030004215A (en) * 2002-11-26 2003-01-14 전경호 System for searching the lost children or man
GB0229763D0 (en) * 2002-12-23 2003-01-29 Renishaw Plc Signal transmission system for a trigger probe
US7686229B2 (en) 2003-01-30 2010-03-30 Hewlett-Packard Development Company, L.P. RFID reader device having closely packed antennas
US7873723B2 (en) * 2003-01-30 2011-01-18 Hewlett-Packard Development Company, L.P. Device data
FR2853982B1 (en) * 2003-04-17 2009-05-22 Alcea METHOD AND DEVICE FOR DETECTION AND IDENTIFICATION OF OBJECTS, SECURE CONTAINERS AND SYSTEMS HAVING SUCH DEVICE, AND OBJECTS ADAPTED FOR THIS METHOD
CA2521873A1 (en) * 2003-04-21 2004-11-04 Symbol Technologies, Inc. Method for optimizing the design and implementation of rfid tags
US20090057399A1 (en) * 2003-06-17 2009-03-05 United Security Applications Id, Inc. Electronic security system for monitoring and recording activity and data relating to institutions and clients thereof
US7486172B2 (en) * 2003-08-07 2009-02-03 Intermec Ip Corp. Enhanced identification protocol for RFID systems
US8102244B2 (en) * 2003-08-09 2012-01-24 Alien Technology Corporation Methods and apparatuses to identify devices
GB0322684D0 (en) * 2003-09-27 2003-10-29 Koninkl Philips Electronics Nv Network for locating a wireless tag
US7049965B2 (en) * 2003-10-02 2006-05-23 General Electric Company Surveillance systems and methods
DE10349647B4 (en) * 2003-10-21 2006-08-10 Atmel Germany Gmbh Method for selecting one or more transponders
US7716160B2 (en) 2003-11-07 2010-05-11 Alien Technology Corporation Methods and apparatuses to identify devices
US7372364B2 (en) * 2003-11-10 2008-05-13 3M Innovative Properties Company Algorithm for RFID security
US7119692B2 (en) * 2003-11-10 2006-10-10 3M Innovative Properties Company System for detecting radio-frequency identification tags
JP4457727B2 (en) * 2003-11-27 2010-04-28 セイコーエプソン株式会社 Non-contact identification tag, data communication system, and non-contact identification tag control program
KR100576714B1 (en) * 2003-12-23 2006-05-03 한국전자통신연구원 Apparatus and method for generating random number using digital logic
US7385476B2 (en) 2004-03-11 2008-06-10 Symbol Technologies, Inc. Method and system for communicating data to a wireless access point
DE102004014563B4 (en) * 2004-03-25 2011-01-13 Atmel Automotive Gmbh Method and device for improved wireless data transmission
US7667589B2 (en) 2004-03-29 2010-02-23 Impinj, Inc. RFID tag uncoupling one of its antenna ports and methods
US7423539B2 (en) 2004-03-31 2008-09-09 Impinj, Inc. RFID tags combining signals received from multiple RF ports
DE102004018540A1 (en) * 2004-04-14 2005-11-03 Atmel Germany Gmbh Method for selecting one or more transponders
JP4633382B2 (en) * 2004-05-10 2011-02-16 東芝テック株式会社 Electronic equipment with RF tag communication function
GB0412260D0 (en) * 2004-06-02 2004-07-07 Ubisense Ltd Tag frequency control
US7510117B2 (en) * 2004-06-04 2009-03-31 Impinj Inc Decoding with memory in RFID system
US7314165B2 (en) * 2004-07-01 2008-01-01 American Express Travel Related Services Company, Inc. Method and system for smellprint recognition biometrics on a smartcard
US7318550B2 (en) 2004-07-01 2008-01-15 American Express Travel Related Services Company, Inc. Biometric safeguard method for use with a smartcard
US7341181B2 (en) * 2004-07-01 2008-03-11 American Express Travel Related Services Company, Inc. Method for biometric security using a smartcard
US7325724B2 (en) * 2004-07-01 2008-02-05 American Express Travel Related Services Company, Inc. Method for registering a biometric for use with a smartcard
US7548153B2 (en) 2004-07-09 2009-06-16 Tc License Ltd. Multi-protocol or multi-command RFID system
JP2008507043A (en) * 2004-07-15 2008-03-06 マスターカード インターナシヨナル インコーポレーテツド Contactless payment card reader with frustoconical operating volume
WO2006015349A2 (en) * 2004-07-30 2006-02-09 Reva Systems Corporation Rfid tag data acquisition system
US7643536B2 (en) * 2004-08-10 2010-01-05 Mayo Foundation For Medical Education And Research Asynchronus communication system for remote monitoring of objects or an environment
US20060036838A1 (en) * 2004-08-10 2006-02-16 Salcedo David M Security system network interface and security system incorporating the same
US8419542B2 (en) 2004-08-20 2013-04-16 Igt Wide area bonusing systems
EP1800235A2 (en) * 2004-09-13 2007-06-27 Sandlinks Systems Ltd. Communication and distance measurement in an addressed wide band rfid system
WO2006035430A2 (en) * 2004-09-27 2006-04-06 Menta Networks Ltd A system and a method for improving the performance of rfid systems
WO2006035600A1 (en) * 2004-09-30 2006-04-06 Brother Kogyo Kabushiki Kaisha Wireless tag communication apparatus, wireless tag, wireless communication system and wireless communication method
WO2006047701A2 (en) * 2004-10-26 2006-05-04 Wj Communications, Inc. Distributed rfid interrogation system and method of operating the same
US7614556B2 (en) * 2004-11-05 2009-11-10 Goliath Solutions, Llc Distributed RFID antenna array utilizing circular polarized helical antennas
JP2006146460A (en) 2004-11-18 2006-06-08 Sony Corp Communication system, storage device and controller
US20070071131A1 (en) * 2004-11-18 2007-03-29 Pyne John W Switched phase receiver for a long range RFID system
US7366465B2 (en) * 2004-11-19 2008-04-29 Sirit Technologies Inc. Homodyne RFID receiver and method
WO2006064651A1 (en) * 2004-12-15 2006-06-22 Brother Kogyo Kabushiki Kaisha Radio tag communication device and radio tag communication system
US7864052B2 (en) * 2005-02-07 2011-01-04 Lyngsoe Systems Ltd. Mail delivery tracking system and apparatus
US7545272B2 (en) 2005-02-08 2009-06-09 Therasense, Inc. RF tag on test strips, test strip vials and boxes
US7689195B2 (en) * 2005-02-22 2010-03-30 Broadcom Corporation Multi-protocol radio frequency identification transponder tranceiver
US7515051B2 (en) * 2005-02-25 2009-04-07 Datalogic Mobile, Inc. RFID antenna system having reduced orientation sensitivity
US7265675B1 (en) * 2005-03-01 2007-09-04 Alien Technology Corporation Multistatic antenna configuration for radio frequency identification (RFID) systems
DE102005009765B3 (en) * 2005-03-03 2006-06-14 Atmel Germany Gmbh Selection of transponder in response area of base station, for use in radio frequency identification applications, transmits arbitration symbol with carrier signal used to allocate time slots
US20090322490A1 (en) * 2005-03-07 2009-12-31 Compal Electronics, Inc. Radio frequency identification monitoring system and method
TWI322384B (en) * 2005-03-07 2010-03-21 Compal Electronics Inc Radio frequency identification monitor system and method
TWI247449B (en) * 2005-03-10 2006-01-11 Li Shing Comm Science And Tech RF antenna with distant identification function
JP4602808B2 (en) * 2005-03-18 2010-12-22 富士通株式会社 Antenna selector
US20070180009A1 (en) * 2005-03-30 2007-08-02 Impinj, Inc. RFID tag with random number generator having a noise-based input
US20060224647A1 (en) * 2005-03-30 2006-10-05 Impinj, Inc. RFID tag using updatable seed values for generating a random number
JP4387323B2 (en) 2005-04-08 2009-12-16 富士通株式会社 RFID transceiver
CA2605852C (en) 2005-04-25 2012-06-19 Lg Electronics Inc. Reader control system
US7714726B2 (en) * 2005-05-06 2010-05-11 Dominic M. Kotab Semi-transparent RFID tags
US20060280181A1 (en) * 2005-05-17 2006-12-14 Ripcord Technologies, Inc. (A Delaware Corporation) Systems and methods for operating and management of RFID network devices
US7257504B2 (en) * 2005-06-03 2007-08-14 Tagent Corporation Production of radio frequency ID tags
US7501932B2 (en) * 2005-06-06 2009-03-10 Intermec Ip Corp. System and method of reading from and/or writing to an RF transponder
US20070001851A1 (en) * 2005-07-01 2007-01-04 Thingmagic, Inc. Configurable, calibrated radio frequency identification tag system
US7898391B2 (en) * 2005-07-01 2011-03-01 Trimble Navigation Limited Multi-reader coordination in RFID system
KR100657327B1 (en) * 2005-07-25 2006-12-14 삼성전자주식회사 Common using printer managing system using rfid and method for the same
US8786439B2 (en) * 2005-09-02 2014-07-22 Wg Security Products Active antenna
DE102005042532A1 (en) * 2005-09-07 2007-03-08 Siemens Ag System for detecting a local utilization status of a technical system
EP1763136A1 (en) * 2005-09-07 2007-03-14 Stmicroelectronics Sa Method for generating random numbers
US7997981B2 (en) 2005-09-12 2011-08-16 Igt Universal casino bonusing systems and methods
JP2007087032A (en) * 2005-09-21 2007-04-05 Toshiba Tec Corp Wireless tag reader
WO2007034543A1 (en) * 2005-09-21 2007-03-29 Matsushita Electric Industrial Co., Ltd. Tag reading device
KR100583631B1 (en) * 2005-09-23 2006-05-26 주식회사 아나패스 Display, timing controller and column driver ic using clock embedded multi-level signaling
US8540579B2 (en) * 2005-10-21 2013-09-24 Christian Richard Method and apparatus for the identification and position measurement of chips on a gaming surface
US8154386B2 (en) * 2005-11-03 2012-04-10 Lg Innotek Co., Ltd. RFID reader and RFID system
KR100726596B1 (en) * 2005-11-03 2007-06-11 엘지이노텍 주식회사 Radio Frequency IDentification reader
US8480484B2 (en) 2005-11-09 2013-07-09 Igt Secure identification devices and methods for detecting and monitoring access thereof
DE102005057546B4 (en) * 2005-12-01 2007-08-16 Kathrein-Austria Ges.M.B.H. Method and device for contactless transmission of data from a plurality of data carriers, preferably in the form of RFID tags
FI122463B (en) * 2005-12-02 2012-01-31 Teknologian Tutkimuskeskus Vtt Method and apparatus for remote reading of an energy meter
JP4771068B2 (en) * 2005-12-02 2011-09-14 日本電気株式会社 Estimation method, estimation system, and program
US20070126585A1 (en) * 2005-12-06 2007-06-07 Symbol Technologies, Inc. System integration of RFID and MIMO technologies
US7456743B2 (en) * 2005-12-07 2008-11-25 Datamars S.A. Combined low and high frequency RFID system
TWI307038B (en) * 2005-12-27 2009-03-01 Ind Tech Res Inst Random number generator for radio frequency identifciation tag and seed number generator for generating a seed number for operation of the random number generator
KR100641380B1 (en) * 2006-01-12 2006-11-02 주식회사 디앤에스 테크놀로지 Anti-collision method between readers of rfid system
CA2678423A1 (en) * 2006-02-14 2007-08-23 Ronald N. Miller Rfid sensor system for lateral discrimination
JP4961766B2 (en) * 2006-02-15 2012-06-27 ミツミ電機株式会社 Electronic shelf label system and electronic shelf label
CA2642038C (en) * 2006-02-15 2016-08-02 Sensormatic Electronics Corporation Rf switched rfid multiplexer
JP2007243291A (en) * 2006-03-06 2007-09-20 Fujitsu Ltd Tag communication apparatus, control apparatus, and tag communication method
JP2007241392A (en) * 2006-03-06 2007-09-20 Fujitsu Ltd Tag communication device and tag communication method
EP1850267B1 (en) * 2006-04-28 2011-11-30 Semiconductor Energy Laboratory Co., Ltd. Semiconductor device and position detecting method using the semiconductor device
US20070257775A1 (en) * 2006-04-28 2007-11-08 Tatsuji Nishijima Identification system and identification method
KR100718096B1 (en) 2006-05-16 2007-05-16 삼성전자주식회사 Communication method between a host and a rfid reader, a host device , a rfid reader and rfid communication system
EP1881338B1 (en) * 2006-07-20 2011-09-07 Semiconductor Energy Laboratory Co., Ltd. Position information detection system and position information detection method
US20080061940A1 (en) * 2006-08-03 2008-03-13 Kimberly-Clark Worldwide, Inc. Smart antenna system for reading data tags
US20080042846A1 (en) * 2006-08-08 2008-02-21 M/A-Com, Inc. Antenna for radio frequency identification systems
DE102006039345A1 (en) * 2006-08-22 2008-03-06 Biotronik Crm Patent Ag Electro-medical implant
WO2008023817A1 (en) * 2006-08-25 2008-02-28 Brother Kogyo Kabushiki Kaisha Operation processing device
US7755505B2 (en) * 2006-09-06 2010-07-13 Lutron Electronics Co., Inc. Procedure for addressing remotely-located radio frequency components of a control system
US7768422B2 (en) * 2006-09-06 2010-08-03 Carmen Jr Lawrence R Method of restoring a remote wireless control device to a known state
US7880639B2 (en) * 2006-09-06 2011-02-01 Lutron Electronics Co., Inc. Method of establishing communication with wireless control devices
US8181860B2 (en) 2006-09-13 2012-05-22 Clearcount Medical Solutions, Inc. Apparatus and methods for monitoring objects in a surgical field
JP4762093B2 (en) * 2006-09-14 2011-08-31 富士通株式会社 RFID interrogator and RFID interrogator control method
US8120462B2 (en) * 2006-09-25 2012-02-21 Sensomatic Electronics, LLC Method and system for standing wave detection for radio frequency identification marker readers
US20080079542A1 (en) * 2006-09-26 2008-04-03 Broadcom Corporation, A California Corporation Radio frequency identification (RFID) carrier and system
US8274390B2 (en) 2006-11-20 2012-09-25 Metrologic Instruments, Inc. Radio frequency identification antenna switching in a conveyor system
WO2008062331A2 (en) * 2006-11-23 2008-05-29 International Business Machines Corporation Privacy method, device and computer program
US20080122583A1 (en) * 2006-11-27 2008-05-29 Benjamin Bekritsky System and method for RFID tag communication
TWI325122B (en) * 2006-12-04 2010-05-21 Ind Tech Res Inst Method and system for reading and identifying rfid tag
US8149094B2 (en) * 2006-12-06 2012-04-03 Hewlett-Packard Development Company, L.P. Clustering methods for radio-frequency-identifier networks
JP2008146184A (en) * 2006-12-06 2008-06-26 Fujitsu Ltd Reader/writer apparatus, reader/writer control program, data access system, and data access control method
US20080157934A1 (en) * 2006-12-27 2008-07-03 Joshua Posamentier High priority RFID tags system and method
US10063515B2 (en) * 2007-01-26 2018-08-28 Allen Hollister Method of communicating in a radio frequency identification system using aloha networks
US10817679B2 (en) 2007-01-26 2020-10-27 Allen Hollister Multidimensional sieving for high density low collision RFID tag fields
CN101246538A (en) * 2007-02-14 2008-08-20 日电(中国)有限公司 Radio frequency recognition system and method
US8771060B2 (en) 2007-03-23 2014-07-08 Igt Providing progressive games for gaming environments
DE102007026320B4 (en) 2007-06-06 2009-07-09 Siemens Enterprise Communications Gmbh & Co. Kg Method for operating a navigation system and navigation system for a motor vehicle
NL1033982C2 (en) 2007-06-13 2008-12-16 Nedap Nv System for recognizing animals.
AU2013273731B2 (en) * 2007-06-13 2016-04-14 Nedap Agri B.V. System for recognizing animals
US20080315999A1 (en) * 2007-06-25 2008-12-25 Parelec Israel Ltd. Wireless communication system for tracking assets with affixed electronic smart tags and methods thereof
KR101377580B1 (en) * 2007-06-27 2014-03-25 톰슨 라이센싱 Apparatus and method for controlling a signal
US8330579B2 (en) * 2007-07-05 2012-12-11 Baxter International Inc. Radio-frequency auto-identification system for dialysis systems
KR101355626B1 (en) * 2007-07-20 2014-01-27 삼성전자주식회사 Apparatus for network control
WO2009032263A1 (en) * 2007-08-31 2009-03-12 Vue Technology, Inc. A large scale folded dipole antenna for near-field rfid applications
KR100922530B1 (en) * 2007-09-18 2009-10-21 주식회사 이엠따블유안테나 System and method for allowing mutiple rfid reader devices to read rfid tags without collision
ES2342521B1 (en) * 2007-09-21 2011-05-23 Alfonso Perez Madrazo PERFECTED DEVICE FOR THE IDENTIFICATION, LOCATION AND CONTROL OF GOODS CONTAINERS AND SHOPPING CARTS OF LARGE SURFACES.
US8471684B2 (en) * 2007-09-25 2013-06-25 Bce Inc. System and method for tracking items associated with read/writable tags
KR20090037797A (en) * 2007-10-12 2009-04-16 한국전자통신연구원 Tdma control method of mobile rfid reader via mobile phone base station
WO2009048308A2 (en) * 2007-10-12 2009-04-16 Electronics And Telecommunications Research Institute Tdma control method used by rfid reader via mobile phone base station and mobile rfid reader
US7789306B2 (en) * 2007-11-09 2010-09-07 International Business Machines Corporation Voting method
US8381977B2 (en) * 2007-11-09 2013-02-26 International Business Machines Corporation Voting system and ballot paper
US20090160610A1 (en) * 2007-12-19 2009-06-25 Doddamane Krishna S Pseudorandom number generator
KR101478144B1 (en) * 2007-12-27 2015-01-02 삼성전자주식회사 Rfid communication method
US8063738B2 (en) * 2008-02-04 2011-11-22 Hewlett-Packard Development Company, L.P. RFID system with a mobile RFID reader
WO2009106672A1 (en) * 2008-02-29 2009-09-03 Nokia Corporation Interrogation of rfid communication units
US20090231136A1 (en) * 2008-03-12 2009-09-17 Binay Sugla Tags and tag-based systems and methods for locating and tracking objects
US20090243813A1 (en) * 2008-03-25 2009-10-01 Smith Joshua R Wireless programming of non-volatile memory with near-field uhf coupling
US8717144B2 (en) * 2008-04-29 2014-05-06 Intelleflex Corporation RFID system with distributed readers
DE102008021490A1 (en) 2008-04-29 2009-11-05 Fachhochschule Münster Sterilization process monitoring method for e.g. medical instrument, involves transferring identification data of articles that are sterilized, and storing time and temperature measurement for sterilization
US8947207B2 (en) 2008-04-29 2015-02-03 Quake Global, Inc. Method and apparatus for a deployable radio-frequency identification portal system
WO2009156879A1 (en) * 2008-06-27 2009-12-30 Nxp B.V. Method of and system for tuning an antenna
JP4569787B2 (en) * 2008-09-30 2010-10-27 ブラザー工業株式会社 Radio tag communication apparatus and radio tag communication method
US9805222B2 (en) * 2009-01-08 2017-10-31 Zest Labs, Inc. RFID reader discipline
US8705523B2 (en) 2009-02-05 2014-04-22 Google Inc. Conjoined class-based networking
JP4752931B2 (en) * 2009-02-18 2011-08-17 ブラザー工業株式会社 Wireless tag communication device
JP4866456B2 (en) * 2009-09-15 2012-02-01 東芝テック株式会社 RF tag reader / writer
US8395508B2 (en) * 2009-09-23 2013-03-12 Wistron Neweb Corporation RFID tag monitoring system
SE538207C2 (en) * 2009-09-23 2016-04-05 Abb Technology Ltd security arrangements
US8299920B2 (en) 2009-09-25 2012-10-30 Fedex Corporate Services, Inc. Sensor based logistics system
US9633327B2 (en) 2009-09-25 2017-04-25 Fedex Corporate Services, Inc. Sensor zone management
US8239169B2 (en) 2009-09-25 2012-08-07 Gregory Timothy L Portable computing device and method for asset management in a logistics system
EP2367021A1 (en) * 2010-03-17 2011-09-21 The Swatch Group Research and Development Ltd. Method and system for locating objects
US9508213B2 (en) 2010-03-22 2016-11-29 Dominic M. Kotab Systems and methods of reading gaming chips and other stacked items
US8441391B2 (en) * 2010-05-05 2013-05-14 Roundtrip Llc Ultra-secure communication methods and apparatus
US8766775B2 (en) * 2010-06-11 2014-07-01 Intelleflex Corporation Devices employing delay matching to mitigate local oscillator noise and methods thereof
US8576045B2 (en) * 2010-10-15 2013-11-05 Tyco Fire & Security Gmbh Synchronization of electronic article surveillance systems having metal detection
RU2455692C1 (en) * 2010-12-15 2012-07-10 Федеральное государственное унитарное предприятие федеральный научно-производственный центр "Производственное объединение "Старт" им. М.В. Проценко" (ФГУП ФНПЦ ПО "Старт" им. М.В. Проценко") Method of detecting intruder in controlled zone
EP2686839A4 (en) * 2011-03-17 2014-10-01 Assa Abloy Ab Method for upgrading rfid readers in situ
US8928462B2 (en) * 2011-05-06 2015-01-06 Amtech Systems, LLC RFID system with time slot interleaving
WO2012154968A2 (en) * 2011-05-10 2012-11-15 Omni-Id Limited Visual rfid tags and interactive visual rfid networks
US8890684B2 (en) * 2011-06-17 2014-11-18 Checkpoint Systems, Inc. Background object sensor
EP2573970B1 (en) * 2011-09-20 2020-05-20 Sony Corporation Near field communication reader device, near field communication tag device, near field communication system and near field communication method
KR101307491B1 (en) * 2011-10-18 2013-09-11 성균관대학교산학협력단 Anti-collision system and method with moving tags in rfid systems
US9070026B2 (en) 2011-10-29 2015-06-30 International Business Machines Corporation Coordination of transmission of data from wireless identification tags
US9070028B2 (en) 2011-10-29 2015-06-30 International Business Machines Corporation Control of wireless identification tag activation
US8779902B2 (en) 2011-10-29 2014-07-15 International Business Machines Corporation Identifier sequencing of wireless identification tags
US8976030B2 (en) 2012-04-24 2015-03-10 Metrologic Instruments, Inc. Point of sale (POS) based checkout system supporting a customer-transparent two-factor authentication process during product checkout operations
US9756036B2 (en) * 2012-06-15 2017-09-05 Nokia Technologies Oy Mechanisms for certificate revocation status verification on constrained devices
CN103902940A (en) 2012-11-08 2014-07-02 冀京秋 Self tester for integrated circuit sign
US9239941B1 (en) 2012-11-08 2016-01-19 Impinj, Inc. RFID integrated circuit identifier self-check
TWI467936B (en) 2012-11-22 2015-01-01 Ind Tech Res Inst Method and apparatus for interference suppression in radio-over-fiber communication systems
DE102012221728A1 (en) 2012-11-28 2014-05-28 Schaeffler Technologies Gmbh & Co. Kg Method for determining code for encoding and decoding of data for wireless transmission of data over radio channel, involves outputting sender polynomial and receiver polynomial as respective encode data and decode data
US9841492B2 (en) 2013-02-25 2017-12-12 Quake Global, Inc. Ceiling-mounted RFID-enabled tracking
EP2962254A1 (en) 2013-02-26 2016-01-06 Quake Global, Inc. Methods and apparatus for automatic identification wristband
US9094113B2 (en) * 2013-03-15 2015-07-28 Qualcomm Incorporated Apparatus and method for reducing phase noise in near field communication device signaling
US9227641B2 (en) 2013-05-03 2016-01-05 Thales Canada Inc Vehicle position determining system and method of using the same
US9112790B2 (en) 2013-06-25 2015-08-18 Google Inc. Fabric network
CN104062930B (en) * 2013-11-29 2017-05-10 中国空间技术研究院 Universal touch-type switch matrix control card for liquid crystal display and application method thereof
US9729201B2 (en) * 2014-04-24 2017-08-08 Empire Technology Development Llc Broadcasting a message using modulated power
EP2993008A1 (en) * 2014-09-08 2016-03-09 HILTI Aktiengesellschaft Device system with a radio connection
US10591592B2 (en) 2015-06-15 2020-03-17 Humatics Corporation High-precision time of flight measurement systems
US10422870B2 (en) 2015-06-15 2019-09-24 Humatics Corporation High precision time of flight measurement system for industrial automation
AU2016371057A1 (en) 2015-12-17 2018-07-19 Humatics Corporation Radio-frequency localization techniques and associated systems, devices, and methods
US10296768B2 (en) * 2016-05-18 2019-05-21 International Business Machines Corporation Tracking objects in a two dimensional space
RU2661753C1 (en) * 2017-03-20 2018-07-19 Акционерное общество "Федеральный научно-производственный центр "Производственное объединение "Старт" им. М.В. Проценко" (АО "ФНПЦ ПО "Старт" им. М.В. Проценко") Method of detecting intruder (options)
CN108694421B (en) * 2017-04-11 2021-10-08 汉朔科技股份有限公司 Electronic price tag system and working method
CN111667613B (en) * 2020-05-14 2021-11-16 北京时代艾特智能科技有限公司 Wireless intelligent lock safety management method
TWI821119B (en) * 2023-02-15 2023-11-01 研華股份有限公司 Communication channel switching method and system

Citations (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3689885A (en) * 1970-09-15 1972-09-05 Transitag Corp Inductively coupled passive responder and interrogator unit having multidimension electromagnetic field capabilities
US3750167A (en) * 1971-07-22 1973-07-31 Gen Dynamics Corp Postal tracking system
US4355366A (en) * 1980-11-28 1982-10-19 Ncr Corporation Circuitry for minimizing auto-correlation and bias in a random number generator
US4479194A (en) * 1982-08-10 1984-10-23 Computer Election Systems System and method for reading marks on a document
US4799259A (en) * 1986-04-10 1989-01-17 Rockwell International Corporation Monolithic random digital noise generator
US4800590A (en) * 1985-01-14 1989-01-24 Willis E. Higgins Computer key and computer lock system
US4956864A (en) * 1987-01-27 1990-09-11 Brockman Milton H Receiver for communications satellite down-link reception
US5030807A (en) * 1990-01-16 1991-07-09 Amtech Corporation System for reading and writing data from and into remote tags
US5053774A (en) * 1987-07-31 1991-10-01 Texas Instruments Deutschland Gmbh Transponder arrangement
US5119099A (en) * 1989-06-02 1992-06-02 Yamatake-Honeywell Co., Ltd. Microwave responder
US5231273A (en) * 1991-04-09 1993-07-27 Comtec Industries Inventory management system
US5239167A (en) * 1991-04-30 1993-08-24 Ludwig Kipp Checkout system
US5247699A (en) * 1990-04-12 1993-09-21 Telefonaktiebolaget L M Ericsson Cellular frequency reuse cell plan
US5258766A (en) * 1987-12-10 1993-11-02 Uniscan Ltd. Antenna structure for providing a uniform field
US5307349A (en) * 1992-04-07 1994-04-26 Hughes Aircraft Company TDMA network and protocol for reader-transponder communications and method
US5455575A (en) * 1992-11-06 1995-10-03 Texas Instruments Deutschland Gmbh Multi-interrogator, datacom and transponder arrangement
US5485463A (en) * 1994-09-09 1996-01-16 Glenayre Electronics, Inc. System for transmitting paging signals using time-division-multiplexing
US5519381A (en) * 1992-11-18 1996-05-21 British Technology Group Limited Detection of multiple articles
US5521601A (en) * 1995-04-21 1996-05-28 International Business Machines Corporation Power-efficient technique for multiple tag discrimination
US5530702A (en) * 1994-05-31 1996-06-25 Ludwig Kipp System for storage and communication of information
US5539775A (en) * 1993-03-17 1996-07-23 Micron Technology, Inc. Modulated spread spectrum in RF identification systems method
US5539394A (en) * 1994-03-16 1996-07-23 International Business Machines Corporation Time division multiplexed batch mode item identification system
US5550547A (en) * 1994-09-12 1996-08-27 International Business Machines Corporation Multiple item radio frequency tag identification protocol
US5559828A (en) * 1994-05-16 1996-09-24 Armstrong; John T. Transmitted reference spread spectrum communication using a single carrier with two mutually orthogonal modulated basis vectors
US5604486A (en) * 1993-05-27 1997-02-18 Motorola, Inc. RF tagging system with multiple decoding modalities
US5606323A (en) * 1995-08-31 1997-02-25 International Business Machines Corporation Diode modulator for radio frequency transponder
US5640683A (en) * 1994-03-04 1997-06-17 Ncr Corporation Modulated backscatter wireless communication system having an extended range
US5649296A (en) * 1995-06-19 1997-07-15 Lucent Technologies Inc. Full duplex modulated backscatter system
US5649295A (en) * 1995-06-19 1997-07-15 Lucent Technologies Inc. Dual mode modulated backscatter system
US5686902A (en) * 1990-06-15 1997-11-11 Texas Instruments Incorporated Communication system for communicating with tags
US5699066A (en) * 1992-08-26 1997-12-16 British Technology Group Limited Synchronized electronic identification system
US5706218A (en) * 1996-05-15 1998-01-06 Intel Corporation Random number generator
US5745037A (en) * 1996-06-13 1998-04-28 Northrop Grumman Corporation Personnel monitoring tag
US5784686A (en) * 1996-12-31 1998-07-21 Lucent Technologies Inc. IQ combiner technology in modulated backscatter system
US5809142A (en) * 1996-08-14 1998-09-15 Texas Instruments Incorporated Method and system for calculating a user account balance in a recognition system
US5828693A (en) * 1996-03-21 1998-10-27 Amtech Corporation Spread spectrum frequency hopping reader system
US5841770A (en) * 1992-12-15 1998-11-24 Micron Technology, Inc. Data communication system using indentification protocol
US5940006A (en) * 1995-12-12 1999-08-17 Lucent Technologies Inc. Enhanced uplink modulated backscatter system
US5952922A (en) * 1996-12-31 1999-09-14 Lucent Technologies Inc. In-building modulated backscatter system
US5963104A (en) * 1996-04-15 1999-10-05 Vlsi Technology, Inc. Standard cell ring oscillator of a non-deterministic randomizer circuit
US5986570A (en) * 1997-09-03 1999-11-16 Micron Communications, Inc. Method for resolving signal collisions between multiple RFID transponders in a field
US5995017A (en) * 1991-01-04 1999-11-30 Btg International Limited Electronic identification system confirming valid code
US5995048A (en) * 1996-05-31 1999-11-30 Lucent Technologies Inc. Quarter wave patch antenna
US6034603A (en) * 1997-01-24 2000-03-07 Axcess, Inc. Radio tag system and method with improved tag interference avoidance
US6046683A (en) * 1996-12-31 2000-04-04 Lucent Technologies Inc. Modulated backscatter location system
US6072421A (en) * 1998-05-29 2000-06-06 Mitsubishi Denki Kabushiki Kaisha Moving object high-accuracy position locating method and system
US6130602A (en) * 1996-05-13 2000-10-10 Micron Technology, Inc. Radio frequency data communications device
US6313737B1 (en) * 1998-06-23 2001-11-06 Marconi Commerce Systems Inc. Centralized transponder arbitration
US6321982B1 (en) * 1998-03-16 2001-11-27 Stmicroelectronics S.A. Method for the identification of electronic cards
US6456668B1 (en) * 1996-12-31 2002-09-24 Lucent Technologies Inc. QPSK modulated backscatter system
US6646543B1 (en) * 1997-03-03 2003-11-11 Regie Autonome Des Transports Parisiens Method for managing collisions in a contactless data exchanging system

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2073550B (en) 1980-04-03 1984-06-27 Standard Telephones Cables Ltd Article sorting
US4471345A (en) * 1982-03-05 1984-09-11 Sensormatic Electronics Corporation Randomized tag to portal communication system
FR2593324B1 (en) 1986-01-17 1988-03-25 Thomson Cgr ROTATING ANODE WITH GRAPHITE FOR RADIOGENIC TUBE
EP0561062A1 (en) * 1992-03-17 1993-09-22 Moisei Samuel Granovsky Method and electromagnetic security system for detection of protected objects in a surveillance zone
US5752164A (en) 1992-04-27 1998-05-12 American Pcs L.P. Autonomous remote measurement unit for a personal communications service system
IL105476A0 (en) 1992-08-13 1993-08-18 Utics Corp System and method for collecting data from a number of remote sensors
US5521602A (en) 1994-02-10 1996-05-28 Racom Systems, Inc. Communications system utilizing FSK/PSK modulation techniques
AU3893695A (en) 1994-10-31 1996-05-23 Airnet Communications Corporation Cellular telephone system maintaining channel frequency at hand-off
US6078663A (en) 1995-06-30 2000-06-20 Canon Kabushiki Kaisha Communication apparatus and a communication system
JP3370825B2 (en) 1995-07-27 2003-01-27 株式会社山武 Non-contact transponder recognition method and device
GB2305074A (en) 1995-08-31 1997-03-26 Id Systems Ltd Apparatus for Remotely Reading Data Storage Devices
FR2741979B1 (en) 1995-12-01 1998-01-23 Raimbault Pierre METHOD FOR REMOTE QUERYING STATION LABELS AND LABEL FOR IMPLEMENTING SAME
DE19652324A1 (en) 1996-12-16 1998-06-25 Siemens Ag Transponder with a microwave receiving antenna
US6084513A (en) * 1997-09-26 2000-07-04 Innovative Control Systems Method and apparatus for tracking a patient
US6002344A (en) * 1997-11-21 1999-12-14 Bandy; William R. System and method for electronic inventory
US5999819A (en) 1998-03-26 1999-12-07 Lucent Technologies, Inc. Wireless telecommunications system and method for designing same
CA2265313A1 (en) 1998-04-15 1999-10-15 Lucent Technologies Inc. Method and apparatus enabling multiple access on a broadband communication network
US6411199B1 (en) 1998-08-21 2002-06-25 Keri Systems, Inc. Radio frequency identification system
US6963270B1 (en) * 1999-10-27 2005-11-08 Checkpoint Systems, Inc. Anticollision protocol with fast read request and additional schemes for reading multiple transponders in an RFID system
ATE374479T1 (en) 1999-11-02 2007-10-15 Broadcom Corp METHOD AND DEVICE FOR DETECTING AND CLASSIFICATION OF COLLISIONS IN A SHARED ACCESS RF NETWORK
DE60023561T2 (en) 1999-12-03 2006-07-27 Tagsys S.A. ELECTRONIC LABEL READING SYSTEM

Patent Citations (54)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3689885A (en) * 1970-09-15 1972-09-05 Transitag Corp Inductively coupled passive responder and interrogator unit having multidimension electromagnetic field capabilities
US3750167A (en) * 1971-07-22 1973-07-31 Gen Dynamics Corp Postal tracking system
US4355366A (en) * 1980-11-28 1982-10-19 Ncr Corporation Circuitry for minimizing auto-correlation and bias in a random number generator
US4479194A (en) * 1982-08-10 1984-10-23 Computer Election Systems System and method for reading marks on a document
US4800590A (en) * 1985-01-14 1989-01-24 Willis E. Higgins Computer key and computer lock system
US4799259A (en) * 1986-04-10 1989-01-17 Rockwell International Corporation Monolithic random digital noise generator
US4956864A (en) * 1987-01-27 1990-09-11 Brockman Milton H Receiver for communications satellite down-link reception
US5053774A (en) * 1987-07-31 1991-10-01 Texas Instruments Deutschland Gmbh Transponder arrangement
US5258766A (en) * 1987-12-10 1993-11-02 Uniscan Ltd. Antenna structure for providing a uniform field
US5119099A (en) * 1989-06-02 1992-06-02 Yamatake-Honeywell Co., Ltd. Microwave responder
US5030807A (en) * 1990-01-16 1991-07-09 Amtech Corporation System for reading and writing data from and into remote tags
US5247699A (en) * 1990-04-12 1993-09-21 Telefonaktiebolaget L M Ericsson Cellular frequency reuse cell plan
US5686902A (en) * 1990-06-15 1997-11-11 Texas Instruments Incorporated Communication system for communicating with tags
US5995017A (en) * 1991-01-04 1999-11-30 Btg International Limited Electronic identification system confirming valid code
US5231273A (en) * 1991-04-09 1993-07-27 Comtec Industries Inventory management system
US5239167A (en) * 1991-04-30 1993-08-24 Ludwig Kipp Checkout system
US5307349A (en) * 1992-04-07 1994-04-26 Hughes Aircraft Company TDMA network and protocol for reader-transponder communications and method
US5699066A (en) * 1992-08-26 1997-12-16 British Technology Group Limited Synchronized electronic identification system
US5455575A (en) * 1992-11-06 1995-10-03 Texas Instruments Deutschland Gmbh Multi-interrogator, datacom and transponder arrangement
US5519381A (en) * 1992-11-18 1996-05-21 British Technology Group Limited Detection of multiple articles
US5726630A (en) * 1992-11-18 1998-03-10 British Technology Group Limited Detection of multiple articles
US5841770A (en) * 1992-12-15 1998-11-24 Micron Technology, Inc. Data communication system using indentification protocol
US5539775A (en) * 1993-03-17 1996-07-23 Micron Technology, Inc. Modulated spread spectrum in RF identification systems method
US5974078A (en) * 1993-03-17 1999-10-26 Micron Technology, Inc. Modulated spread spectrum in RF identification systems method
US5825806A (en) * 1993-03-17 1998-10-20 Micron Technology, Inc. Modulated spread spectrum in RF identification systems method
US5604486A (en) * 1993-05-27 1997-02-18 Motorola, Inc. RF tagging system with multiple decoding modalities
US5640683A (en) * 1994-03-04 1997-06-17 Ncr Corporation Modulated backscatter wireless communication system having an extended range
US5539394A (en) * 1994-03-16 1996-07-23 International Business Machines Corporation Time division multiplexed batch mode item identification system
US5559828A (en) * 1994-05-16 1996-09-24 Armstrong; John T. Transmitted reference spread spectrum communication using a single carrier with two mutually orthogonal modulated basis vectors
US5530702A (en) * 1994-05-31 1996-06-25 Ludwig Kipp System for storage and communication of information
US5485463A (en) * 1994-09-09 1996-01-16 Glenayre Electronics, Inc. System for transmitting paging signals using time-division-multiplexing
US5550547A (en) * 1994-09-12 1996-08-27 International Business Machines Corporation Multiple item radio frequency tag identification protocol
US5521601A (en) * 1995-04-21 1996-05-28 International Business Machines Corporation Power-efficient technique for multiple tag discrimination
US5649296A (en) * 1995-06-19 1997-07-15 Lucent Technologies Inc. Full duplex modulated backscatter system
US5649295A (en) * 1995-06-19 1997-07-15 Lucent Technologies Inc. Dual mode modulated backscatter system
US5606323A (en) * 1995-08-31 1997-02-25 International Business Machines Corporation Diode modulator for radio frequency transponder
US5940006A (en) * 1995-12-12 1999-08-17 Lucent Technologies Inc. Enhanced uplink modulated backscatter system
US5828693A (en) * 1996-03-21 1998-10-27 Amtech Corporation Spread spectrum frequency hopping reader system
US5963104A (en) * 1996-04-15 1999-10-05 Vlsi Technology, Inc. Standard cell ring oscillator of a non-deterministic randomizer circuit
US6130602A (en) * 1996-05-13 2000-10-10 Micron Technology, Inc. Radio frequency data communications device
US5706218A (en) * 1996-05-15 1998-01-06 Intel Corporation Random number generator
US5995048A (en) * 1996-05-31 1999-11-30 Lucent Technologies Inc. Quarter wave patch antenna
US5745037A (en) * 1996-06-13 1998-04-28 Northrop Grumman Corporation Personnel monitoring tag
US5809142A (en) * 1996-08-14 1998-09-15 Texas Instruments Incorporated Method and system for calculating a user account balance in a recognition system
US5784686A (en) * 1996-12-31 1998-07-21 Lucent Technologies Inc. IQ combiner technology in modulated backscatter system
US6456668B1 (en) * 1996-12-31 2002-09-24 Lucent Technologies Inc. QPSK modulated backscatter system
US5952922A (en) * 1996-12-31 1999-09-14 Lucent Technologies Inc. In-building modulated backscatter system
US6046683A (en) * 1996-12-31 2000-04-04 Lucent Technologies Inc. Modulated backscatter location system
US6034603A (en) * 1997-01-24 2000-03-07 Axcess, Inc. Radio tag system and method with improved tag interference avoidance
US6646543B1 (en) * 1997-03-03 2003-11-11 Regie Autonome Des Transports Parisiens Method for managing collisions in a contactless data exchanging system
US5986570A (en) * 1997-09-03 1999-11-16 Micron Communications, Inc. Method for resolving signal collisions between multiple RFID transponders in a field
US6321982B1 (en) * 1998-03-16 2001-11-27 Stmicroelectronics S.A. Method for the identification of electronic cards
US6072421A (en) * 1998-05-29 2000-06-06 Mitsubishi Denki Kabushiki Kaisha Moving object high-accuracy position locating method and system
US6313737B1 (en) * 1998-06-23 2001-11-06 Marconi Commerce Systems Inc. Centralized transponder arbitration

Cited By (387)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7961815B2 (en) 1998-08-10 2011-06-14 Wi-Lan, Inc. Methods and systems for transmission of multiple modulated signals over wireless networks
US7376180B2 (en) 1998-08-10 2008-05-20 Kamilo Feher Adaptive receivers for bit rate agile (BRA) and modulation demodulation (modem) format selectable (MFS) signals
US20080219385A1 (en) * 1998-08-10 2008-09-11 Wi-Lan, Inc. Methods and systems for transmission of multiple modulated signals over wireless networks
US20090141829A1 (en) * 1998-08-10 2009-06-04 Wi-Lan, Inc. Methods and systems for transmission of multiple modulated signals over wirelss networks
US8693523B2 (en) 1998-08-10 2014-04-08 Kamilo Feher QAM CDMA and TDMA communication methods
US7204410B2 (en) * 1999-05-17 2007-04-17 Sony Corporation Information processing apparatus and method, information processing system, and medium
US6966490B1 (en) * 1999-05-17 2005-11-22 Sony Corporation Information processing apparatus and method, information processing system and medium
US20050205659A1 (en) * 1999-05-17 2005-09-22 Yuji Murayama Information processing apparatus and method, information processing system, and medium
US9307407B1 (en) 1999-08-09 2016-04-05 Kamilo Feher DNA and fingerprint authentication of mobile devices
US9571626B1 (en) 1999-08-09 2017-02-14 Kamilo Feher Automobile cellular, WLAN and satellite communications
US9049985B2 (en) 1999-08-09 2015-06-09 Kamilo Feher Satellite, cellular and Wi-Fi mobile multimode transmission and reception methods
US9173566B2 (en) 1999-08-09 2015-11-03 Kamilo Feher DNA, blood, heart, glucose, body temperature, skin and other medical diagnostic communications
US9264877B2 (en) 1999-08-09 2016-02-16 Kamilo Feher Modems for mobile internet and cellular systems
US9319212B2 (en) 1999-08-09 2016-04-19 Kamilo Feher Fingerprint authenticated touchsceeen contolled cascaded 3G-OFDM mobile systems
US7738608B2 (en) 1999-08-09 2010-06-15 Kamilo Feher Equalized modulation demodulation (modem) format selectable multi antenna system
US9373251B2 (en) 1999-08-09 2016-06-21 Kamilo Feher Base station devices and automobile wireless communication systems
US9397724B1 (en) 1999-08-09 2016-07-19 Kamilo Feher Transceivers digital mobile communications
US9432152B2 (en) 1999-08-09 2016-08-30 Kamilo Feher Video multimode multimedia data communication systems
US9813270B2 (en) 1999-08-09 2017-11-07 Kamilo Feher Heart rate sensor and medical diagnostics wireless devices
US8050345B1 (en) 1999-08-09 2011-11-01 Kamilo Feher QAM and GMSK systems
US9755693B2 (en) 1999-08-09 2017-09-05 Kamilo Feher Remote controlled (RC) air based communication
US9755874B2 (en) 1999-08-09 2017-09-05 Kamilo Feher Digital mobile communication
US9537700B2 (en) 1999-08-09 2017-01-03 Kamilo Feher Mobile networks and mobile repeaters
US8259832B2 (en) 1999-08-09 2012-09-04 Kamilo Feher QAM and GMSK modulation methods
US9742605B2 (en) 1999-08-09 2017-08-22 Kamilo Feher OFDM mobile networks
US8611920B2 (en) 2000-02-28 2013-12-17 Ipventure, Inc. Method and apparatus for location identification
US10873828B2 (en) 2000-02-28 2020-12-22 Ipventure, Inc. Method and apparatus identifying and presenting location and location-related information
US8301158B1 (en) 2000-02-28 2012-10-30 Ipventure, Inc. Method and system for location tracking
US8700050B1 (en) 2000-02-28 2014-04-15 Ipventure, Inc. Method and system for authorizing location monitoring
US10609516B2 (en) 2000-02-28 2020-03-31 Ipventure, Inc. Authorized location monitoring and notifications therefor
US9723442B2 (en) 2000-02-28 2017-08-01 Ipventure, Inc. Method and apparatus for identifying and presenting location and location-related information
US7809377B1 (en) 2000-02-28 2010-10-05 Ipventure, Inc Method and system for providing shipment tracking and notifications
US20030060212A1 (en) * 2000-02-28 2003-03-27 Invention Depot, Inc. Method and system for location tracking
US10827298B2 (en) 2000-02-28 2020-11-03 Ipventure, Inc. Method and apparatus for location identification and presentation
US11330419B2 (en) 2000-02-28 2022-05-10 Ipventure, Inc. Method and system for authorized location monitoring
US20080021645A1 (en) * 2000-02-28 2008-01-24 Chung Lau Methods and apparatus to analyze and present location information
US9219988B2 (en) 2000-02-28 2015-12-22 Ipventure, Inc. Method and apparatus for location identification and presentation
US10628783B2 (en) 2000-02-28 2020-04-21 Ipventure, Inc. Method and system for providing shipment tracking and notifications
US10652690B2 (en) 2000-02-28 2020-05-12 Ipventure, Inc. Method and apparatus for identifying and presenting location and location-related information
US8886220B2 (en) 2000-02-28 2014-11-11 Ipventure, Inc. Method and apparatus for location identification
US8868103B2 (en) 2000-02-28 2014-10-21 Ipventure, Inc. Method and system for authorized location monitoring
US8725165B2 (en) 2000-02-28 2014-05-13 Ipventure, Inc. Method and system for providing shipment tracking and notifications
US6883710B2 (en) * 2000-10-11 2005-04-26 Amerasia International Technology, Inc. Article tracking system and method
US7098793B2 (en) 2000-10-11 2006-08-29 Avante International Technology, Inc. Tracking system and method employing plural smart tags
US20030209601A1 (en) * 2000-10-11 2003-11-13 Chung Kevin Kwong-Tai Article tracking system and method
US20040036623A1 (en) * 2000-10-11 2004-02-26 Chung Kevin Kwong-Tai Tracking system and method employing plural smart tags
US20050125312A1 (en) * 2000-10-20 2005-06-09 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US7661591B2 (en) 2000-10-20 2010-02-16 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US7735732B2 (en) 2000-10-20 2010-06-15 Promega Corporation Radio frequency identification method and system of distributing products
US20050040952A1 (en) * 2000-10-20 2005-02-24 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US7784689B2 (en) 2000-10-20 2010-08-31 Promega Corporation Radio frequency identification method and system of distributing products
US7791479B2 (en) 2000-10-20 2010-09-07 Promega Corporation RFID point of sale and delivery method and system
USRE47599E1 (en) 2000-10-20 2019-09-10 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
USRE46326E1 (en) 2000-10-20 2017-02-28 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US8231053B2 (en) 2000-10-20 2012-07-31 Promega Corporation Radio frequency identification method and system of distributing products
US20030034390A1 (en) * 2000-10-20 2003-02-20 Linton William A. Radio frequency identification method and system of distributing products
US8113425B2 (en) 2000-10-20 2012-02-14 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US20050127177A1 (en) * 2000-10-20 2005-06-16 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US8025228B2 (en) 2000-10-20 2011-09-27 Promega Corporation RF point of sale and delivery method and system using communication with remote computer and having features to read a large number of RF tags
US7967199B2 (en) 2000-10-20 2011-06-28 Promega Corporation Radio frequency identification method and system of distributing products
US7942321B2 (en) 2000-10-20 2011-05-17 Promega Corporation Radio frequency identification method and system of disturbing products
US6577266B1 (en) * 2001-10-15 2003-06-10 Sandia Corporation Transponder data processing methods and systems
US20070001843A1 (en) * 2001-11-21 2007-01-04 Marconi Communications, Inc. Wireless communication device interconnectivity
US20060290474A1 (en) * 2001-11-21 2006-12-28 Mineral Lassen Llc Wireless communication device interconnectivity
US20060290469A1 (en) * 2001-11-21 2006-12-28 Forster Ian J Wireless communication device interconnectivity
US7623831B2 (en) 2001-11-21 2009-11-24 Ian J Forster Wireless communication device interconnectivity
US20030181229A1 (en) * 2001-11-21 2003-09-25 Forster Ian J. Wireless communication device interconnectivity
US7536155B2 (en) 2001-11-21 2009-05-19 Ian J Forster Wireless communication device interconnectivity
US7366466B2 (en) * 2001-11-21 2008-04-29 Mineral Lassen Llc Wireless communication device interconnectivity
US8547203B2 (en) 2001-12-21 2013-10-01 Mobile Aspects Dynamic control containment unit
US20030117281A1 (en) * 2001-12-21 2003-06-26 Timur Sriharto Dynamic control containment unit
US20070094721A1 (en) * 2002-02-27 2007-04-26 Igt Token authentication
US7950996B2 (en) 2002-02-27 2011-05-31 Igt Methods and devices for gaming account management
US8645685B2 (en) 2002-02-27 2014-02-04 Igt Token authentication
US20050020354A1 (en) * 2002-02-27 2005-01-27 Igt Methods and devices for gaming account management
US8176135B2 (en) 2002-04-24 2012-05-08 Ipventure, Inc. Method and system for enhanced messaging
US9759817B2 (en) 2002-04-24 2017-09-12 Ipventure, Inc. Method and apparatus for intelligent acquisition of position information
US11915186B2 (en) 2002-04-24 2024-02-27 Ipventure, Inc. Personalized medical monitoring and notifications therefor
US11418905B2 (en) 2002-04-24 2022-08-16 Ipventure, Inc. Method and apparatus for identifying and presenting location and location-related information
US8285484B1 (en) 2002-04-24 2012-10-09 Ipventure, Inc. Method and apparatus for intelligent acquisition of position information
US8447822B2 (en) 2002-04-24 2013-05-21 Ipventure, Inc. Method and system for enhanced messaging
US11368808B2 (en) 2002-04-24 2022-06-21 Ipventure, Inc. Method and apparatus for identifying and presenting location and location-related information
US8620343B1 (en) 2002-04-24 2013-12-31 Ipventure, Inc. Inexpensive position sensing device
US8753273B1 (en) 2002-04-24 2014-06-17 Ipventure, Inc. Method and system for personalized medical monitoring and notifications therefor
US7953809B2 (en) 2002-04-24 2011-05-31 Ipventure, Inc. Method and system for enhanced messaging
US11308441B2 (en) 2002-04-24 2022-04-19 Ipventure, Inc. Method and system for tracking and monitoring assets
US9049571B2 (en) 2002-04-24 2015-06-02 Ipventure, Inc. Method and system for enhanced messaging
US9074903B1 (en) 2002-04-24 2015-07-07 Ipventure, Inc. Method and apparatus for intelligent acquisition of position information
US11249196B2 (en) 2002-04-24 2022-02-15 Ipventure, Inc. Method and apparatus for intelligent acquisition of position information
US7905832B1 (en) 2002-04-24 2011-03-15 Ipventure, Inc. Method and system for personalized medical monitoring and notifications therefor
US9182238B2 (en) 2002-04-24 2015-11-10 Ipventure, Inc. Method and apparatus for intelligent acquisition of position information
US9456350B2 (en) 2002-04-24 2016-09-27 Ipventure, Inc. Method and system for enhanced messaging
US11238398B2 (en) 2002-04-24 2022-02-01 Ipventure, Inc. Tracking movement of objects and notifications therefor
US11218848B2 (en) 2002-04-24 2022-01-04 Ipventure, Inc. Messaging enhancement with location information
US11067704B2 (en) 2002-04-24 2021-07-20 Ipventure, Inc. Method and apparatus for intelligent acquisition of position information
US11054527B2 (en) 2002-04-24 2021-07-06 Ipventure, Inc. Method and apparatus for intelligent acquisition of position information
US11041960B2 (en) 2002-04-24 2021-06-22 Ipventure, Inc. Method and apparatus for intelligent acquisition of position information
US11032677B2 (en) 2002-04-24 2021-06-08 Ipventure, Inc. Method and system for enhanced messaging using sensor input
US20080261636A1 (en) * 2002-04-24 2008-10-23 Chung Lau Method and system for enhanced messaging
US9596579B2 (en) 2002-04-24 2017-03-14 Ipventure, Inc. Method and system for enhanced messaging
US9706374B2 (en) 2002-04-24 2017-07-11 Ipventure, Inc. Method and system for enhanced messaging using temperature information
US10848932B2 (en) 2002-04-24 2020-11-24 Ipventure, Inc. Enhanced electronic messaging using location related data
US9769630B2 (en) 2002-04-24 2017-09-19 Ipventure, Inc. Method and system for enhanced messaging using emotional information
US10761214B2 (en) 2002-04-24 2020-09-01 Ipventure, Inc. Method and apparatus for intelligent acquisition of position information
US9930503B2 (en) 2002-04-24 2018-03-27 Ipventure, Inc. Method and system for enhanced messaging using movement information
US9998886B2 (en) 2002-04-24 2018-06-12 Ipventure, Inc. Method and system for enhanced messaging using emotional and locational information
US10715970B2 (en) 2002-04-24 2020-07-14 Ipventure, Inc. Method and system for enhanced messaging using direction of travel
US10664789B2 (en) 2002-04-24 2020-05-26 Ipventure, Inc. Method and system for personalized medical monitoring and notifications therefor
US10034150B2 (en) 2002-04-24 2018-07-24 Ipventure, Inc. Audio enhanced messaging
US10327115B2 (en) 2002-04-24 2019-06-18 Ipventure, Inc. Method and system for enhanced messaging using movement information
US10356568B2 (en) 2002-04-24 2019-07-16 Ipventure, Inc. Method and system for enhanced messaging using presentation information
US10516975B2 (en) 2002-04-24 2019-12-24 Ipventure, Inc. Enhanced messaging using environmental information
US10614408B2 (en) 2002-04-24 2020-04-07 Ipventure, Inc. Method and system for providing shipment tracking and notifications
US7834766B2 (en) 2002-07-09 2010-11-16 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US20090278686A1 (en) * 2002-07-09 2009-11-12 Frederick Sawyer Method and apparatus for tracking objects and people
US6933849B2 (en) 2002-07-09 2005-08-23 Fred Sawyer Method and apparatus for tracking objects and people
US20040008114A1 (en) * 2002-07-09 2004-01-15 Fred Sawyer Method and apparatus for tracking objects and people
US9619679B2 (en) 2002-07-09 2017-04-11 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US10496859B2 (en) 2002-07-09 2019-12-03 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US20090295582A1 (en) * 2002-07-09 2009-12-03 Frederick Sawyer Method and apparatus for tracking objects and people
US8842013B2 (en) 2002-07-09 2014-09-23 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US7551089B2 (en) 2002-07-09 2009-06-23 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US8279069B2 (en) 2002-07-09 2012-10-02 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US8896449B2 (en) 2002-07-09 2014-11-25 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US20070085681A1 (en) * 2002-07-09 2007-04-19 Fred Sawyer Method and apparatus for tracking objects and people
US8866615B2 (en) 2002-07-09 2014-10-21 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US7834765B2 (en) 2002-07-09 2010-11-16 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US20110175734A1 (en) * 2002-07-09 2011-07-21 Frederick Sawyer Method and apparatus for tracking objects and people
US8742929B2 (en) 2002-07-09 2014-06-03 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US10152620B2 (en) 2002-07-09 2018-12-11 Automated Tracking Solutions, Llc Method and apparatus for tracking objects and people
US7808424B2 (en) 2002-12-11 2010-10-05 Koninklijke Philips Electronics N.V. Method and apparatus for measuring distance
US20060044181A1 (en) * 2002-12-11 2006-03-02 Wilcox Martin S Method and apparatus for measuring distance
US7629919B2 (en) 2002-12-11 2009-12-08 Koninklijke Philips Electronics N.V. Method and apparatus for measuring distance using dual-component radar
US20100026557A1 (en) * 2002-12-11 2010-02-04 Koninklijke Philips Electronics N.V. Method and apparatus for measuring distance
EP1575183A1 (en) * 2002-12-17 2005-09-14 Sony Corporation Communication system, communication method, and data processing apparatus
US9497588B2 (en) 2002-12-17 2016-11-15 Sony Corporation Communication system, communication method, and data processing apparatus
US9106273B2 (en) 2002-12-17 2015-08-11 Sony Corporation Communication system, communication method, and data processing apparatus
US8224243B2 (en) 2002-12-17 2012-07-17 Sony Corporation Communication system, communication method, and data processing apparatus
US9831923B2 (en) 2002-12-17 2017-11-28 Sony Corporation Communication system, communication method, and data processing apparatus
US20080126560A1 (en) * 2002-12-17 2008-05-29 Sony Corporation Communication system, communication method, and data processing apparatus
US8942629B2 (en) 2002-12-17 2015-01-27 Sony Corporation Communication system, communication method, and data processing apparatus
US8417184B2 (en) 2002-12-17 2013-04-09 Sony Corporation Communication system, communication method, and data processing apparatus
US20040116074A1 (en) * 2002-12-17 2004-06-17 Sony Corporation Communication apparatus and communication method
US7209706B2 (en) 2002-12-17 2007-04-24 Sony Corporation Communication apparatus and communication method
EP1575183A4 (en) * 2002-12-17 2008-07-30 Sony Corp Communication system, communication method, and data processing apparatus
US20040210380A1 (en) * 2003-01-16 2004-10-21 Tadashi Morita Traveling machine management system
US7679517B2 (en) 2003-01-24 2010-03-16 Aleis Trakit Pty Ltd Identifying apparatus
US20060145875A1 (en) * 2003-01-24 2006-07-06 John Finlayson Identifying apparatus
WO2004064506A1 (en) * 2003-01-24 2004-08-05 Aleis Trakit Pty Ltd Identifying apparatus
US7175082B2 (en) * 2003-03-20 2007-02-13 Seiko Epson Corporation Contactless data communication system, position information management system, contactless identification tag, data communication system, contactless identification tag control program, and data communication system control program
US20040251302A1 (en) * 2003-03-20 2004-12-16 Seiko Epson Corporation Contactless data communication system, position information management system, contactless identification tag, data communication system, contactless indentification tag control program, and data communication system control program
US20040192386A1 (en) * 2003-03-26 2004-09-30 Naveen Aerrabotu Method and apparatus for multiple subscriber identities in a mobile communication device
US6861974B1 (en) * 2003-10-16 2005-03-01 Lockheed Martin Corporation Clutter normalization by adaptation of transmit waveform
US20060244599A1 (en) * 2003-10-22 2006-11-02 Mobile Aspects, Inc. Identification apparatus
US20050121526A1 (en) * 2003-12-09 2005-06-09 Intelleflex Corporation Battery activation circuit
US7612652B2 (en) 2003-12-09 2009-11-03 Intelleflex Corporation Battery activation circuit
US8928461B2 (en) * 2004-02-06 2015-01-06 Zih Corp Method and system for controlling RFID transponder response waiting periods
US20080266055A1 (en) * 2004-02-06 2008-10-30 Christopher Gordon Gervase Turner Method and System for Controlling RFID Transponder Response Waiting Periods
US7920050B2 (en) * 2004-07-29 2011-04-05 Emc Corporation Proxy device for enhanced privacy in an RFID system
US20060033608A1 (en) * 2004-07-29 2006-02-16 Ari Juels Proxy device for enhanced privacy in an RFID system
US20080094176A1 (en) * 2004-07-29 2008-04-24 Mitsubishi Electric Corporation Radio-Communication Control Apparatus And Radio Communication System
US20060043177A1 (en) * 2004-08-25 2006-03-02 Nycz Jeffrey H Automated pass-through surgical instrument tray reader
US8082192B2 (en) 2004-08-25 2011-12-20 Warsaw Orthopedic, Inc. Automated pass-through surgical instrument tray reader
US7644016B2 (en) 2004-08-25 2010-01-05 Warsaw Orthopedic, Inc. Automated pass-through surgical instrument tray reader
US20100108761A1 (en) * 2004-08-25 2010-05-06 Warsaw Orthopedic, Inc. Automated Pass-Through Surgical Instrument Tray Reader
US20060113302A1 (en) * 2004-09-09 2006-06-01 Inteligistics, Inc. Modular shipping unit and system
US7515097B2 (en) * 2004-09-15 2009-04-07 Aviation Communication & Surveillance Systems Pulse transmitters having multiple outputs in phase relationship and methods of operation
US20080159437A1 (en) * 2004-09-15 2008-07-03 Smith Mark D Pulse transmitters having multiple outputs in phase relationship and methods of operation
US20060057977A1 (en) * 2004-09-15 2006-03-16 Aviation Communication & Surveillance Systems Llc Pulse transmitters having multiple outputs in phase relationship and methods of operation
US7345626B2 (en) * 2004-09-15 2008-03-18 Aviation Communication & Sureillance Systems, Llc Pulse transmitters having multiple outputs in phase relationship and methods of operation
US7362212B2 (en) 2004-09-24 2008-04-22 Battelle Memorial Institute Communication methods, systems, apparatus, and devices involving RF tag registration
US20060071757A1 (en) * 2004-09-24 2006-04-06 Burghard Brion J Communication methods, systems, apparatus, and devices involving RF tag registration
US8306525B2 (en) 2004-10-05 2012-11-06 Kamilo Feher UMTS wired and wireless mobile 2G, 3G, 4G, 5G and other new generations of cellular, mobile
US8185069B1 (en) 2004-10-05 2012-05-22 Kamilo Feher Wired and wireless 4G and 3G cellular, mobile and RFID systems
US20080143485A1 (en) * 2004-10-12 2008-06-19 Aristocrat Technologies, Inc. Method and Apparatus for Synchronization of Proximate RFID Readers in a Gaming Environment
US8403204B2 (en) 2004-10-12 2013-03-26 Aristocrat Technologies Inc. Method and apparatus for synchronization of proximate RFID readers in a gaming environment
US20060076401A1 (en) * 2004-10-12 2006-04-13 Aristocrat Technologies Australia Pty, Ltd. Method and apparatus for synchronization of proximate RFID readers in a gaming environment
US8733630B2 (en) 2004-10-12 2014-05-27 Aristocrat Technologies, Inc. Method and apparatus for synchronization of proximate RFID readers in a gaming environment
US7357299B2 (en) * 2004-10-12 2008-04-15 Aristocrat Technologies, Inc. Method and apparatus for synchronization of proximate RFID readers in a gaming environment
US20060109105A1 (en) * 2004-11-22 2006-05-25 Sdgi Holdings, Inc Surgical instrument tray shipping tote identification system and methods of using same
US20060145856A1 (en) * 2004-11-22 2006-07-06 Sdgi Holdings, Inc. Systems and methods for processing surgical instrument tray shipping totes
US7492261B2 (en) 2004-11-22 2009-02-17 Warsaw Orthopedic, Inc. Control system for an RFID-based system for assembling and verifying outbound surgical equipment corresponding to a particular surgery
US20070001839A1 (en) * 2004-11-22 2007-01-04 Cambre Christopher D Control system for an rfid-based system for assembling and verifying outbound surgical equipment corresponding to a particular surgery
US7492257B2 (en) 2004-11-22 2009-02-17 Warsaw Orthopedic, Inc. Systems and methods for processing surgical instrument tray shipping totes
US7227469B2 (en) 2004-11-22 2007-06-05 Sdgi Holdings, Inc. Surgical instrument tray shipping tote identification system and methods of using same
US20060119481A1 (en) * 2004-12-08 2006-06-08 Sdgi Holdings, Inc Workstation RFID reader for surgical instruments and surgical instrument trays and methods of using same
US7268684B2 (en) 2004-12-08 2007-09-11 Sdgi Holdings, Inc. Workstation RFID reader for surgical instruments and surgical instrument trays and methods of using same
US8055269B2 (en) 2004-12-28 2011-11-08 Kamilo Feher Time constrained signal MIMO wireless and wired communication method
US7885650B2 (en) 2004-12-28 2011-02-08 Kamilo Feher Adaptive coding and modulation with MIMO wireless and wired communication
US20110150496A1 (en) * 2004-12-28 2011-06-23 Kamilo Feher Time Constrained Signal MIMO Wireless and Wired Communication Method
US7693229B2 (en) 2004-12-28 2010-04-06 Kamilo Feher Transmission of signals in cellular systems and in mobile networks
US20060192652A1 (en) * 2005-02-14 2006-08-31 Inteligistics, Inc. Identification system
US7978060B2 (en) 2005-02-14 2011-07-12 Inteligistics, Inc. Identification system
US20080165059A1 (en) * 2005-03-14 2008-07-10 Alfred E. Mann Foundatiion For Scientific Research System and Method for Locating Objects and Communicating With the Same
USRE45061E1 (en) * 2005-03-14 2014-08-05 Santa Monica Semiconductor, Llc System and method for locating objects and communicating with the same
US7646330B2 (en) * 2005-03-14 2010-01-12 Alfred E. Mann Foundation For Scientific Research System and method for locating objects and communicating with the same
US20080100527A1 (en) * 2005-03-22 2008-05-01 Mobile Aspects, Inc. Antenna arrangement
US7837694B2 (en) 2005-04-28 2010-11-23 Warsaw Orthopedic, Inc. Method and apparatus for surgical instrument identification
US20100176925A1 (en) * 2005-04-28 2010-07-15 Warsaw Orthopedic, Inc. Method and Apparatus for Surgical Instrument Identification
US20060244652A1 (en) * 2005-04-28 2006-11-02 Sdgi Holdings, Inc. Method and apparatus for surgical instrument identification
US8454613B2 (en) 2005-04-28 2013-06-04 Warsaw Orthopedic, Inc. Method and apparatus for surgical instrument identification
US20060244593A1 (en) * 2005-04-28 2006-11-02 Sdgi Holdings, Inc. Smart instrument tray RFID reader
US7362228B2 (en) 2005-04-28 2008-04-22 Warsaw Orthepedic, Inc. Smart instrument tray RFID reader
US20060255131A1 (en) * 2005-05-11 2006-11-16 Intelleflex Corporation Smart tag activation
US7604178B2 (en) 2005-05-11 2009-10-20 Intelleflex Corporation Smart tag activation
US9558383B2 (en) * 2005-05-26 2017-01-31 Amtech Systems, LLC Intermodulation mitigation technique in an RFID system
US20140347167A1 (en) * 2005-05-26 2014-11-27 Amtech Systems, LLC Intermodulation mitigation technique in an rfid system
US20170213056A1 (en) * 2005-05-26 2017-07-27 Robert W. Tiernay Intermodulation mitigation technique in an rfid system
US20060289650A1 (en) * 2005-06-27 2006-12-28 Mobile Aspects, Inc. Networked monitoring system
US8248211B2 (en) 2005-07-20 2012-08-21 Intelleflex Corporation Selective RF device activation
US8674809B2 (en) 2005-07-20 2014-03-18 Intelleflex Corporation Selective RF device activation
US20070018794A1 (en) * 2005-07-20 2007-01-25 Intelleflex Corporation Selective RF device activation
US8098753B2 (en) 2005-08-03 2012-01-17 Kamilo Feher Infrared, touch screen, W-CDMA, GSM, GPS camera phone
US7917103B2 (en) 2005-08-03 2011-03-29 Kamilo Feher WLAN and wired mobile communication and location finding system
US8311140B2 (en) 2005-08-03 2012-11-13 Kamilo Feher Infrared, CDMA and OFDM signal transmission methods
US20080043868A1 (en) * 2005-08-03 2008-02-21 Kamilo Feher Internet GSM, CDMA, OFDM, Wi-Fi wireless and wired multimode systems
US8351925B2 (en) 2005-08-03 2013-01-08 Kamilo Feher Digital television (TV), ship and other water based interactive communication methods
US8112110B2 (en) 2005-08-03 2012-02-07 Kamilo Feher Phone video mobile internet television (TV) and cellular system
US7356343B2 (en) 2005-08-03 2008-04-08 Kamilo Feher Emergency location transceivers (ELT)
US20090061852A1 (en) * 2005-08-03 2009-03-05 Kamilo Feher Automobile wireless door opener and ignition starter by cellular device
US11722342B2 (en) 2005-08-03 2023-08-08 Kamilo Feher Mobile to mobile direct communication between subscribers, broadcasting, teleinformatics and telemetry methods and systems
US20090066667A1 (en) * 2005-08-03 2009-03-12 Kamilo Feher Touch Screen Multiple Input Multiple Output (MIMO) Multimode Wireless Communication
US8150453B2 (en) 2005-08-03 2012-04-03 Kamilo Feher Cellular and TV interactive mobile wired and wireless systems
US11677596B2 (en) 2005-08-03 2023-06-13 Kamilo Feher Automobile to automobile, automobile to subscriber and automobile to base station cellular communications
US7877110B2 (en) 2005-08-03 2011-01-25 Kamilo Feher Cascaded 4G, 3G, 2G and other systems
US7725114B2 (en) 2005-08-03 2010-05-25 Kamilo Feher Wi-Fi, GPS and MIMO systems
US7894810B2 (en) 2005-08-03 2011-02-22 Kamilo Feher Automobile wireless door opener and ignition starter by cellular device
US10575368B2 (en) 2005-08-03 2020-02-25 Kamilo Feher Automobile sensor monitor, communications and control
US8542715B2 (en) 2005-08-03 2013-09-24 Kamilo Feher Ship based cellular and satellite communication
US10588174B2 (en) 2005-08-03 2020-03-10 Kamilo Feher Digital communications cellular multimode systems and wireless networks
US7280810B2 (en) 2005-08-03 2007-10-09 Kamilo Feher Multimode communication system
US7711368B2 (en) 2005-08-03 2010-05-04 Kamilo Feher VoIP multimode WLAN, Wi-Fi, GSM, EDGE, TDMA, spread spectrum, CDMA systems
US10873485B2 (en) 2005-08-03 2020-12-22 Kamilo Feher Automobile digital cellular communication
US7720488B2 (en) 2005-08-03 2010-05-18 Kamilo Feher RFID wireless 2G, 3G, 4G internet systems including Wi-Fi, Wi-Max, OFDM, CDMA, TDMA, GSM
US8200243B1 (en) 2005-08-03 2012-06-12 Kamilo Feher Mobile television (TV), internet, cellular systems and Wi-Fi networks
WO2007018566A2 (en) * 2005-08-03 2007-02-15 Feher, Kamilo Multiuse location finder, communication, medical, control system
US8085705B2 (en) 2005-08-03 2011-12-27 Kamilo Feher Web mobile systems
US20080253353A1 (en) * 2005-08-03 2008-10-16 Kamilo Feher MIMO Polar, Non-Quadrature, Cross-Correlated Quadrature GSM, TDMA, Spread Spectrum, CDMA, OFDM, OFDMA and Bluetooth Systems
US20090247187A1 (en) * 2005-08-03 2009-10-01 Kamilo Feher Infrared, touch screen, w-cdma, gsm, gps camera phone
US8190193B2 (en) 2005-08-03 2012-05-29 Kamilo Feher Bluetooth, Wi-Fi, 3G quadrature and non-quadrature modulation methods
US8688142B2 (en) 2005-08-03 2014-04-01 Kamilo Feher Cellular video, Wi-Fi and spread spectrum system and method
US8190143B1 (en) 2005-08-03 2012-05-29 Kamilo Feher TV internet and cellular mobile communication
US10616014B2 (en) 2005-08-03 2020-04-07 Kamilo Feher Pacemaker heart diagnostics implantable cardiac stimulation
US10277437B2 (en) 2005-08-03 2019-04-30 Kamilo Feher Telematics 5G and multimode 4G and 3G mobile modulation format selectable (MFS) communications
US10659262B2 (en) 2005-08-03 2020-05-19 Kamilo Feher Automobile mobile communication networks and remote controlled devices
US7769386B2 (en) 2005-08-03 2010-08-03 Kamilo Feher MIMO polar, non-quadrature, cross-correlated quadrature GSM, TDMA, spread spectrum, CDMA, OFDM, OFDMA and bluetooth systems
US7983678B2 (en) 2005-08-03 2011-07-19 Kamilo Feher 3G and Wi-Fi connected mobile systems
US7978774B2 (en) 2005-08-03 2011-07-12 Kamilo Feher Internet GSM, CDMA, OFDM, Wi-Fi wireless and wired multimode systems
US8259822B1 (en) 2005-08-03 2012-09-04 Kamilo Feher Polar and quadrature modulated cellular, WiFi, WiLAN, satellite, mobile, communication and position finder systems
US7260369B2 (en) 2005-08-03 2007-08-21 Kamilo Feher Location finder, tracker, communication and remote control system
US8849313B2 (en) 2005-08-03 2014-09-30 Kamilo Feher Cable connected mobile video, cellular and Wi-Fi communications
US20080057886A1 (en) * 2005-08-03 2008-03-06 Kamilo Feher Remote control, cellular, WiFi, WiLAN, mobile communication and position finder systems
US20090092114A1 (en) * 2005-08-03 2009-04-09 Kamilo Feher Wlan and wired mobile communication and location finding system
US20100208852A1 (en) * 2005-08-03 2010-08-19 Kamilo Feher Cascaded 4G, 3G, 2G and other systems
US7809374B2 (en) 2005-08-03 2010-10-05 Kamilo Feher Video mobile communication system
US10271378B2 (en) 2005-08-03 2019-04-23 Kamilo Feher Mobile peer to peer direct communications
US7949405B2 (en) 2005-08-03 2011-05-24 Kamilo Feher Cardiac stimulation control and communication system
US11063796B2 (en) 2005-08-03 2021-07-13 Kamilo Feher Data communications, processing of camera, sensor and other digital signals, in 5G, 4G, 3G and 2G wireless and wired systems-networks
US11233682B2 (en) 2005-08-03 2022-01-25 Kamilo Feher Digital automobile multimedia, Wi-Fi, cellular communication, photo and video camera, remote control, navigation, GPS location
US20080205535A1 (en) * 2005-08-03 2008-08-28 Kamilo Feher Touch screen, location finder, GSM, EDGE, CDMA cellular and OFDM, Wi-Fi system
US7783291B2 (en) 2005-08-03 2010-08-24 Kamilo Feher Touch screen multiple input multiple output (MIMO) multimode wireless communication
US7937094B2 (en) 2005-08-03 2011-05-03 Kamilo Feher Wired and mobile wi-fi networks, cellular, GPS and other position finding systems
US11146431B2 (en) 2005-08-03 2021-10-12 Kamilo Feher Computer 5G, 4G, 3G and 2G cellular and wi-fi communications
US7787882B2 (en) 2005-08-03 2010-08-31 Kamilo Feher Touch screen generated processed signals in multiple communication systems and networks
US7937093B2 (en) 2005-08-03 2011-05-03 Kamilo Feher Cellular and internet mobile systems and networks
WO2007018566A3 (en) * 2005-08-03 2007-05-31 Feher Kamilo Multiuse location finder, communication, medical, control system
US7899491B2 (en) 2005-08-03 2011-03-01 Kamilo Feher Cross-correlated quadrature modulated spread spectrum, OFDM and position finder system
US11070408B2 (en) 2005-08-03 2021-07-20 Kamilo Feher Air based unmanned vehicle communications and control
US8311509B2 (en) 2005-08-03 2012-11-13 Kamilo Feher Detection, communication and control in multimode cellular, TDMA, GSM, spread spectrum, CDMA, OFDM WiLAN and WiFi systems
US8189703B2 (en) 2005-08-03 2012-05-29 Kamilo Feher Television mobile internet system
US7805143B2 (en) 2005-08-03 2010-09-28 Kamilo Feher Mobile video internet, cellular and location finder system
US7904041B2 (en) 2005-08-03 2011-03-08 Kamilo Feher Remote control, cellular, WiFi, WiLAN, mobile communication and position finder systems
US20080272891A1 (en) * 2005-10-25 2008-11-06 Nxp B.V. Method of Reading Data From Transponders Through a Reader, a Transponder, and a Reader
US8253540B2 (en) * 2005-10-25 2012-08-28 Nxp B.V. Method of reading data from transponders through a reader, a transponder, and a reader
WO2007056644A3 (en) * 2005-11-02 2007-12-06 Texas Instruments Inc Random number generator using jitter sampled rf carrier
WO2007056644A2 (en) * 2005-11-02 2007-05-18 Texas Instruments Incorporated Random number generator using jitter sampled rf carrier
US8095584B2 (en) 2005-11-02 2012-01-10 Texas Instruments Incorporated Random number generator using jitter sampled RF carrier
US20090135713A1 (en) * 2005-11-07 2009-05-28 Sung Hyun Hwang Method for using flexible bandwidth in ofdma-based cognitive radio system, base station and subscriber station using the same
US8477799B2 (en) 2005-11-07 2013-07-02 Electronics And Telecommunications Research Institute Method for using flexible bandwidth in OFDMA-based cognitive radio system, base station and subscriber station using the same
US7933577B2 (en) * 2005-11-29 2011-04-26 Electronics And Telecommunications Research Institute Method and apparatus for sharing portable terminal in CDMA system and mobile RFID system
US20070120679A1 (en) * 2005-11-29 2007-05-31 Chan-Soo Shin Method and apparatus for sharing portable terminal in CDMA system and mobile RFID system
WO2007066981A1 (en) * 2005-12-07 2007-06-14 Electronics And Telecommunications Research Institute Rfid tag apparatus and authentication method thereof
US20100289625A1 (en) * 2005-12-07 2010-11-18 Electronics & Telecommunucations Research Institute Rfid tag apparatus and authentication method thereof
US20070141983A1 (en) * 2005-12-15 2007-06-21 Intelleflex Corporation Clock-free activation circuit
US8548098B2 (en) 2005-12-15 2013-10-01 Intelleflex Corporation Clock-free activation circuit
USRE44526E1 (en) 2006-02-21 2013-10-08 RoundTrip, LLC Electronic fence mode alert system and method
USRE43740E1 (en) 2006-02-21 2012-10-16 RoundTrip, LLC Reverse locator
US7743975B2 (en) * 2006-03-09 2010-06-29 Jadak, Llc Infusion pump having radiofrequency identification and optical imaging capabilities
US20070210158A1 (en) * 2006-03-09 2007-09-13 Miller David P Combined radio frequency identification and optical imaging module
US20070210157A1 (en) * 2006-03-09 2007-09-13 Jadak Technologies, Inc. Infusion Pump Having Radiofrequency Identification and Optical Imaging Capabilities
US7766235B2 (en) * 2006-03-09 2010-08-03 Jadak Technologies, Inc. Combined radio frequency identification and optical imaging module
US8023579B2 (en) 2006-03-15 2011-09-20 Toshiba Tec Kabushiki Kaisha Quadrature demodulation device, quadrature demodulation method, and quadrature demodulation program
EP1995925A1 (en) * 2006-03-15 2008-11-26 Toshiba TEC Kabushiki Kaisha Orthogonal demodulation device, orthogonal demodulation method, and program orthogonal demodulation
US20080231425A1 (en) * 2006-03-15 2008-09-25 Toshiba Tec Kabushiki Kaisha Quadrature demodulation device, quadrature demodulation method, and quadrature demodulation program
EP1995925A4 (en) * 2006-03-15 2011-03-16 Toshiba Tec Kk Orthogonal demodulation device, orthogonal demodulation method, and program orthogonal demodulation
US20070257832A1 (en) * 2006-04-12 2007-11-08 Lommen Layne D Reference beacon identification using transmission sequence characteristics
US7411548B2 (en) * 2006-04-12 2008-08-12 The Boeing Company Reference beacon identification using transmission sequence characteristics
US20070248180A1 (en) * 2006-04-19 2007-10-25 Wherenet Corp., Corporation Of The State Of California Receiver for object locating and tracking systems and related methods
US8265191B2 (en) 2006-04-19 2012-09-11 Zebra Enterprise Solutions Corp. Receiver for object locating and tracking systems and related methods
JP2007317174A (en) * 2006-04-28 2007-12-06 Semiconductor Energy Lab Co Ltd Identification system and identification method
US9626619B2 (en) * 2006-06-21 2017-04-18 Neology, Inc. Systems and methods for synchronizing a plurality of RFID interrogators in a theatre of operation
US9805235B2 (en) * 2006-06-21 2017-10-31 Neology, Inc. Systems and methods for synchronizing a plurality of RFID interrogators in a theatre of operation
US20160162776A1 (en) * 2006-06-21 2016-06-09 Neology, Inc. Systems and methods for synchronizing a plurality of rfid interrogators in a theatre of operation
US10235545B2 (en) 2006-06-21 2019-03-19 Smartrac Technology Fletcher, Inc. Systems and methods for synchronizing a plurality of RFID interrogators in a theatre of operation
US20080001719A1 (en) * 2006-06-29 2008-01-03 Samsung Electronics Co., Ltd. Data recovery method and apparatus for radio frequency identification
US8542101B2 (en) * 2006-06-29 2013-09-24 Samsung Electronics Co., Ltd. Data recovery method and apparatus for radio frequency identification
US8861969B2 (en) * 2006-08-14 2014-10-14 The Regents Of The University Of California All-optical AM-to-FM up-conversion for radio-over-fiber
US20110044692A1 (en) * 2006-08-14 2011-02-24 The Regents Of The University Of California All-Optical AM-To-FM Up-Conversion for Radio-Over-Fiber
US20100019039A1 (en) * 2006-09-20 2010-01-28 Ipico South Africa (Pty) Limited RFID Transponder Transmitting Concatenation of Pages
US8087586B2 (en) * 2006-09-20 2012-01-03 IPICO South Africia (Pty) Limited RFID transponder transmitting concatenation of pages
US8299900B2 (en) * 2006-09-27 2012-10-30 Alcatel Lucent Anonymous tracking using a set of wireless devices
WO2008039404A1 (en) * 2006-09-27 2008-04-03 Lucent Technologies Inc. Anonymous tracking using a set of wireles devices
US20080074238A1 (en) * 2006-09-27 2008-03-27 Kodialam Muralidharan S Anonymous tracking using a set of wireless devices
WO2008042380A2 (en) * 2006-09-29 2008-04-10 Sensormatic Electronics Corporation Radio frequency identification fast tag response method and system
CN101589559B (en) * 2006-09-29 2013-07-31 传感电子公司 Radio frequency identification fast tag response method and system
US20080079601A1 (en) * 2006-09-29 2008-04-03 Osamu Ishihara Electronic device having identifier
WO2008042380A3 (en) * 2006-09-29 2008-06-19 Sensormatic Electronics Corp Radio frequency identification fast tag response method and system
US20080079557A1 (en) * 2006-09-29 2008-04-03 Sensormatic Electronics Corporation Radio frequency identification fast tag response method and system
US20080218354A1 (en) * 2007-03-09 2008-09-11 Lorentz Robert D Non-networked rfid system
US8031072B2 (en) 2007-03-16 2011-10-04 Promega Corporation RFID reader enclosure and man-o-war RFID reader system
US7710275B2 (en) 2007-03-16 2010-05-04 Promega Corporation RFID reader enclosure and man-o-war RFID reader system
US8258961B2 (en) 2007-03-16 2012-09-04 Promega Corporation RFID reader enclosure and man-o-war RFID reader system
US9690957B2 (en) 2007-03-23 2017-06-27 Mojix, Inc. RFID systems using distributed exciter network
EP2137710A4 (en) * 2007-03-23 2015-08-26 Mojix Inc Rfid systems using distributed exciter network
US20080297323A1 (en) * 2007-05-30 2008-12-04 Edward Barkan Item finding using radio frequency and optical signaling
US8552834B2 (en) * 2007-05-30 2013-10-08 Symbol Technologies, Inc. Item finding using radio frequency and optical signaling
US20090040047A1 (en) * 2007-08-09 2009-02-12 Intel Corporation RFID System and Method of Communication Therein
US8325017B2 (en) * 2007-09-21 2012-12-04 Inha-Industry Partnership Institute Time slot allocation apparatus and method for preventing collisions between time slots in TDMA-based RFID network
US20100176926A1 (en) * 2007-09-21 2010-07-15 Inha-Industry Partnership Institute Time slot allocation apparatus and method for preventing collisions between time slots in tdma-based rfid network
US10585159B2 (en) 2008-04-14 2020-03-10 Mojix, Inc. Radio frequency identification tag location estimation and tracking system and method
US20100033379A1 (en) * 2008-08-11 2010-02-11 Lommen Layne D Reference beacon identification using transmission sequence characteristics
US8414471B2 (en) 2008-10-28 2013-04-09 Mobile Aspects, Inc. Endoscope storage cabinet, tracking system, and signal emitting member
US20100191049A1 (en) * 2008-10-28 2010-07-29 Mobile Aspects, Inc. Endoscope Storage Cabinet, Tracking System, and Signal Emitting Member
US8992416B2 (en) 2008-10-28 2015-03-31 Mobile Aspects, Inc. Endoscope storage cabinet, tracking system, and signal emitting member
US9081996B2 (en) 2009-05-21 2015-07-14 Alcatel Lucent Identifying RFID categories
US20100295659A1 (en) * 2009-05-21 2010-11-25 Alcatel-Lucent Usa Inc. Identifying rfid categories
US20130234831A1 (en) * 2010-04-26 2013-09-12 Sithamparanathan Sabesan Rfid tag interrogation systems
US9384376B2 (en) * 2010-04-26 2016-07-05 Cambridge Enterprise Limited RFID tag interrogation systems
US8648699B2 (en) 2010-07-19 2014-02-11 Mobile Aspects, Inc. Item tracking system and arrangement
US20130076500A1 (en) * 2011-09-28 2013-03-28 Hung-Chih Yu Collision avoidance method for transmitting data from multiple wireless tire condition sensors
US8810386B2 (en) * 2011-09-28 2014-08-19 Orange Electronic Co., Ltd. Collision avoidance method for transmitting data from multiple wireless tire condition sensors
US9285457B2 (en) * 2011-12-27 2016-03-15 Lattice Semiconductor Corporation High-accuracy detection in collaborative tracking systems
US20130162460A1 (en) * 2011-12-27 2013-06-27 Rambus Inc. High-accuracy detection in collaborative tracking systems
US20150379216A1 (en) * 2013-02-05 2015-12-31 Ingegneria Biomedica Santa Lucia S.P.A. Method for tracking sanitary materials and goods with rfid identification system; containment area and/or structure actuating said method
US9959387B2 (en) * 2013-02-05 2018-05-01 Santa Lucia Pharma Apps S.R.L. Method for tracking sanitary materials and goods with RFID identification system; containment area and/or structure actuating said method
US9692934B2 (en) 2013-04-26 2017-06-27 Canon Kabushiki Kaisha Communicating apparatus, communication method, and storage medium storing program
US20140320910A1 (en) * 2013-04-26 2014-10-30 Canon Kabushiki Kaisha Communicating apparatus, communication method, and storage medium storing program
US9448753B2 (en) * 2013-04-26 2016-09-20 Canon Kabushiki Kaisha Communicating apparatus, communication method, and storage medium storing program
US9756671B2 (en) 2013-04-26 2017-09-05 Canon Kabushiki Kaisha Communicating apparatus, communication method, and storage medium storing program
US20150002268A1 (en) * 2013-06-26 2015-01-01 International Business Machines Corporation Apparatus for indicating the location of a signal emitting tag
US9291702B2 (en) * 2013-06-26 2016-03-22 Globalfoundries Inc. Apparatus for indicating the location of a signal emitting tag
US20150002269A1 (en) * 2013-06-26 2015-01-01 International Business Machines Corporation Apparatus for indicating the location of a signal emitting tag
US9285458B2 (en) * 2013-06-26 2016-03-15 Globalfoundries Inc. Apparatus for indicating the location of a signal emitting tag
CN103400093A (en) * 2013-07-22 2013-11-20 无锡儒安科技有限公司 Radio-frequency tag number estimation method and device based on unstable channel
US9892618B2 (en) 2013-08-09 2018-02-13 Mobile Aspects, Inc. Signal emitting member attachment system and arrangement
JP2016530512A (en) * 2013-08-16 2016-09-29 タグ−コム インコーポレイテッド Method and system for identifying and finding a range of an object
US20150048966A1 (en) * 2013-08-16 2015-02-19 Tag-Comm Inc. Method and system for identifying and finding a range of an object
US9709672B2 (en) * 2013-08-16 2017-07-18 Drnc Holdings, Inc. Method and system for identifying and finding a range of an object
CN103400168A (en) * 2013-08-19 2013-11-20 广东电网公司东莞供电局 RFID reader-writer supporting SIMO antennas, and data sending and receiving method
US9958533B2 (en) 2013-09-06 2018-05-01 Drnc Holdings, Inc. Method and system for locating wireless devices within a local region
US9348013B2 (en) 2013-09-18 2016-05-24 Mobile Aspects, Inc. Item hanger arrangement, system, and method
US9224124B2 (en) 2013-10-29 2015-12-29 Mobile Aspects, Inc. Item storage and tracking cabinet and arrangement
US10034400B2 (en) 2013-12-04 2018-07-24 Mobile Aspects, Inc. Item storage arrangement system and method
US10482366B2 (en) 2013-12-13 2019-11-19 Neology, Inc. Mitigating adjacent RFID reader interference
US10235616B2 (en) 2013-12-13 2019-03-19 Neology, Inc. Mitigating adjacent RFID reader interference
US20160307087A1 (en) * 2013-12-13 2016-10-20 3M Innovative Properties Company Mitigating Adjacent RFID Reader Interference
US11023799B2 (en) 2013-12-13 2021-06-01 Neology, Inc. Mitigating adjacent RFID reader interference
US9824309B2 (en) * 2013-12-13 2017-11-21 Neology, Inc. Mitigating adjacent RFID reader interference
US20160063289A1 (en) * 2014-08-27 2016-03-03 Siemens Aktiengesellschaft Method and read/write device for selecting a wireless data medium
US9754140B2 (en) * 2014-08-27 2017-09-05 Siemens Aktiengesellschaft Method and read/write device for selecting a wireless data medium
US10079704B2 (en) 2014-09-22 2018-09-18 Drnc Holdings, Inc. Transmission apparatus for a wireless device using delta-sigma modulation
US10419254B2 (en) 2014-09-22 2019-09-17 Drnc Holdings, Inc. Transmission apparatus for a wireless device using delta-sigma modulation
US9883337B2 (en) 2015-04-24 2018-01-30 Mijix, Inc. Location based services for RFID and sensor networks
US11553520B2 (en) 2015-07-13 2023-01-10 Isolynx, Llc System and method for dynamically scheduling wireless transmissions without collision
US10904917B2 (en) * 2015-07-13 2021-01-26 Isolynx, Llc System and method for dynamically scheduling wireless transmissions without collision
CN105225087A (en) * 2015-09-29 2016-01-06 杭州紫钺科技有限公司 A kind of based on bluetooth location and the warehouse stock counting method of RFID video superimpose
US10025960B1 (en) * 2016-06-29 2018-07-17 The United States of America, as represented by the Administrator of the National Aeronautics and Space Administraion Frequency multiplexed radio frequency identification
US10992584B2 (en) * 2016-12-26 2021-04-27 New H3C Technologies Co., Ltd. Processing packet
US11316374B2 (en) 2016-12-28 2022-04-26 Texas Instruments Incorporated Methods and apparatus for antenna signal limiter for radio frequency identification transponder
US10720796B2 (en) 2016-12-28 2020-07-21 Texas Instruments Incorporated Methods and apparatus for antenna signal limiter for radio frequency identification transponder
US10224757B2 (en) 2016-12-28 2019-03-05 Texas Instruments Incorporated Methods and apparatus for antenna signal limiter for radio frequency identification transponder
US20180316528A1 (en) * 2017-03-15 2018-11-01 Texas Instruments Incorporated Integrated circuits and transponder circuitry with shared modulation capacitor for 3d transponder uplink modulation
US10652058B2 (en) * 2017-03-15 2020-05-12 Texas Instruments Incorporated Integrated circuits and transponder circuitry with shared modulation capacitor for 3D transponder uplink modulation
US10038579B1 (en) * 2017-03-15 2018-07-31 Texas Instruments Incorporated Integrated circuits and transponder circuitry with shared modulation capacitor for 3D transponder uplink modulation
US10009956B1 (en) 2017-09-02 2018-06-26 Kamilo Feher OFDM, 3G and 4G cellular multimode systems and wireless mobile networks
CN111165006A (en) * 2017-09-15 2020-05-15 梅蒂瑞奥尼克有限公司 Method for radio measurement applications
US11922247B2 (en) 2021-05-19 2024-03-05 Neology, Inc. Mitigating adjacent RFID reader interference

Also Published As

Publication number Publication date
EP1211630A2 (en) 2002-06-05
US20020175805A9 (en) 2002-11-28
EP1211630A3 (en) 2002-07-31
EP1505531A1 (en) 2005-02-09
DE60139037D1 (en) 2009-07-30
US7626488B2 (en) 2009-12-01
DE60107922T2 (en) 2005-12-08
EP1857960A2 (en) 2007-11-21
EP1857960B1 (en) 2011-12-14
EP1505531B1 (en) 2009-06-17
DE60107922D1 (en) 2005-01-27
EP1211630B1 (en) 2004-12-22
US20070075834A1 (en) 2007-04-05
US7253717B2 (en) 2007-08-07
EP1857960A3 (en) 2008-04-30

Similar Documents

Publication Publication Date Title
US7253717B2 (en) Method and system for communicating with and tracking RFID transponders
US6265963B1 (en) Methods of processing wireless communication, methods of processing radio frequency communication, and related systems
US6483427B1 (en) Article tracking system
US6693511B1 (en) System and method for communicating with dormant radio frequency identification tags
US6396438B1 (en) System and method for locating radio frequency identification tags using three-phase antenna
US6661335B1 (en) System and method for locating radio frequency identification tags
EP0950288B1 (en) Wireless communication system including a plurality of selectable antennas and wireless communications methods
US7193504B2 (en) Methods and apparatuses for identification
US6169474B1 (en) Method of communications in a backscatter system, interrogator, and backscatter communications system
EP2202704B1 (en) Radio frequency data communications device
US20150091700A1 (en) Backscatter interrogators, communication systems and backscatter communication methods
US6104279A (en) Method of communication between a plurality of remote units and a control unit
US20060145853A1 (en) System and method for detecting objects and communicating information
US20060192655A1 (en) Radio frequency identification of tagged articles
US6452504B1 (en) System and method for communication with radio frequency identification tags using tow message DFM protocol
EP1226455A2 (en) System and method for locating radio frequency identification tags using three-phase antenna
WO2000046771A1 (en) Technique for filtering signals in a local positioning system
CN100541527C (en) The method and apparatus that is used for identification equipment
WO1999008402A1 (en) Wireless communication system including a plurality of selectable antennas and wireless communications method
JPH0793500A (en) Information card and system for discriminating its information

Legal Events

Date Code Title Description
AS Assignment

Owner name: LUDWIG KIPP, FLORIDA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ARMSTRONG, JOHN T.;RICHERT, JOHN D.;PALMER, JOHN P.;REEL/FRAME:011730/0309;SIGNING DATES FROM 20010319 TO 20010327

Owner name: LUDWIG KIPP, FLORIDA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ARMSTRONG, JOHN T.;RICHERT, JOHN D.;PALMER, JOHN P.;SIGNING DATES FROM 20010319 TO 20010327;REEL/FRAME:011730/0309

AS Assignment

Owner name: MOBILE TECHNICS LLC, NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ESTATE OF E. LUDWIG KIPP;REEL/FRAME:016369/0938

Effective date: 20050526

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
FPAY Fee payment

Year of fee payment: 4

FPAY Fee payment

Year of fee payment: 8

AS Assignment

Owner name: XYLON LLC, NEVADA

Free format text: MERGER;ASSIGNOR:MOBILE TECHNICS LLC;REEL/FRAME:037011/0022

Effective date: 20150813

AS Assignment

Owner name: INTELLECTUAL VENTURES ASSETS 101 LLC, DELAWARE

Free format text: NUNC PRO TUNC ASSIGNMENT;ASSIGNOR:XYLON LLC;REEL/FRAME:047835/0063

Effective date: 20181210

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

FEPP Fee payment procedure

Free format text: 11.5 YR SURCHARGE- LATE PMT W/IN 6 MO, LARGE ENTITY (ORIGINAL EVENT CODE: M1556); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12

AS Assignment

Owner name: TERRESTRIAL COMMS LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 101 LLC;REEL/FRAME:050712/0244

Effective date: 20181214