WO2006116084A2 - Systeme et procede pour la mise en oeuvre d'etiquettes rfid virtuelles - Google Patents

Systeme et procede pour la mise en oeuvre d'etiquettes rfid virtuelles Download PDF

Info

Publication number
WO2006116084A2
WO2006116084A2 PCT/US2006/015092 US2006015092W WO2006116084A2 WO 2006116084 A2 WO2006116084 A2 WO 2006116084A2 US 2006015092 W US2006015092 W US 2006015092W WO 2006116084 A2 WO2006116084 A2 WO 2006116084A2
Authority
WO
WIPO (PCT)
Prior art keywords
tag
cache
data
commands
command
Prior art date
Application number
PCT/US2006/015092
Other languages
English (en)
Other versions
WO2006116084A3 (fr
Inventor
Sayan Chakraborty
Brian Mckinney
Original Assignee
Skyetek, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/301,587 external-priority patent/US20060238304A1/en
Priority claimed from US11/301,423 external-priority patent/US20060238303A1/en
Priority claimed from US11/301,396 external-priority patent/US20060238302A1/en
Priority claimed from US11/301,770 external-priority patent/US20060238305A1/en
Priority claimed from US11/323,214 external-priority patent/US7570164B2/en
Priority claimed from US11/328,209 external-priority patent/US20060253415A1/en
Priority claimed from US11/387,422 external-priority patent/US20070046431A1/en
Priority claimed from US11/387,421 external-priority patent/US7659819B2/en
Application filed by Skyetek, Inc. filed Critical Skyetek, Inc.
Priority to EP06758469A priority Critical patent/EP1872602A2/fr
Publication of WO2006116084A2 publication Critical patent/WO2006116084A2/fr
Publication of WO2006116084A3 publication Critical patent/WO2006116084A3/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management

Definitions

  • the antenna is packaged with the transceiver and decoder to become a reader (an 'interrogator'), which can be configured either as a handheld or a fixed- mount device.
  • the reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used.
  • an RFID tag passes through the electromagnetic zone (its 'field') created by the reader, it detects the reader's activation signal.
  • the reader decodes the data encoded in the tag's integrated circuit and the data is often passed to a device (e.g., a computer) for processing.
  • Two methods distinguish and categorize RFID systems, one based upon close proximity electromagnetic or inductive coupling, and one based upon propagating electromagnetic waves. Coupling is via 'antenna' structures forming an integral feature in both tags and readers. While the term antenna is generally considered more appropriate for propagating systems it is also loosely applied to inductive systems.
  • TRANSmitter/resPONDER reveals the function of a tag.
  • a tag responds to a transmitted or communicated request for the data it carries, the communication between the reader and the tag being wireless across the space between the two.
  • the essential components that form an RFID system are one or more tags and a reader or interrogator.
  • the basic components of a transponder are, generally speaking, fabricated as low power integrated circuit suitable for interfacing to an external coil, or utilizing 'coil-on-chip' technology, for data transfer and power generation, where the coil acts as an antenna matched to the frequency supported.
  • the transponder includes memory which may comprise read-only (ROM), random access (RAM) or non-volatile programmable memory for data storage, depending upon the type of the device.
  • ROM-based memory is used to accommodate security data and the transponder operating system instructions which, in conjunction with the processor or processing logic, deals with the internal 'house-keeping' functions such as response delay timing, data flow control and power supply switching.
  • RAM-based memory is used to facilitate temporary data storage during transponder interrogation and response.
  • Non-volatile programmable memory may take various forms, electrically erasable programmable read only memory (EEPROM) being typical. This type of memory is used to store the transponder data and needs to be non-volatile to ensure that the tag data is retained when the device is in its quiescent or power-saving 'sleep' state or when the tag is not powered on.
  • Data buffers are further components of memory, used to temporarily hold incoming data following demodulation and outgoing data for modulation and interface with the transponder antenna. Interface circuitry provides the facility to direct and accommodate the interrogation field energy for powering purposes in passive transponders and triggering of the transponder response.
  • the transponder antenna is the mechanism by which the device senses the interrogating field and also serves to transmit the transponder response to interrogation.
  • RFID tags come in a wide variety of shapes and sizes. Animal tracking tags, inserted beneath the skin, can be as small as a pencil lead in diameter and 10 millimeters in length. Tags can be manufactured in many different shapes, including credit-card form factors for use in access applications.
  • the anti-theft hard plastic tags attached to merchandise in stores are RFID tags.
  • heavy-duty transponders are used to track intermodal containers, heavy machinery, trucks, and railroad cars for maintenance and other applications.
  • RFID tags require power to work, even though the power levels required for operation are invariably very small (microwatts to milliwatts).
  • RFID tags are categorized as active, passive, or semi-active/semi-passive, the designation being determined by the manner in which the device derives its power.
  • Active RFID tags are powered by an internal battery and are typically read/write devices, i.e., tag data can be rewritten and/or modified.
  • An active tag's memory size varies according to application requirements; some systems operate with up to 1 MB of memory.
  • a tag might give a machine a set of instructions, and the machine would then report its performance to the tag. This encoded data then becomes part of the tagged part's history.
  • the battery-supplied power of an active tag generally gives it a longer read range. The trade-off is greater size, greater cost, and a limited operational life (which may yield a lifetime of 10 years, depending upon operating temperatures and battery type).
  • active transponders allow greater communication range than can be expected for passive devices, better noise immunity and higher data transmissions rates when used to power a higher frequency response mode.
  • Passive tags operate without an internal battery source, deriving the power to operate from the field generated by the reader. Passive tags are consequently much lighter than active tags, less expensive, and offer a virtually unlimited operational lifetime. The trade-off is that they have shorter read ranges than active tags and require a higher-powered reader. Passive tags are also constrained in their capacity to store data (which is directly related to tag size and not power) and the ability to perform well in electromagnetically noisy environments. However, a passive tag must be powered without interruption, and storing a lot of data on a tag is subject to difficulty in reliably reading that data from the tag. Sensitivity and orientation performance may also be constrained by the limitation on available power. Despite these limitations passive transponders offer advantages in terms of cost and longevity. They have an almost infinite lifetime and are generally less expensive than active transponders.
  • a tag contains the data carried may be read-only, write once read many (WORM) or read/write.
  • Read- only tags are invariably low capacity devices programmed at source, usually with an identification number.
  • WORM devices are user programmable devices.
  • Read/write devices are also user-programmable but allow the user to change data stored in a tag.
  • Portable programmers may be recognized that also allow in-field programming of the tag while attached to the item being identified or accompanied.
  • 'Hands Up Polling' An alternative, more secure, but slower tag polling technique is called 'Hands Up Polling', which involves the interrogator looking for tags with specific identities, and interrogating them in turn.
  • This technique requires contention management, and a variety of techniques have been developed to improve the process of batch reading, including anti-collision techniques.
  • RFID tag reading system data is read from the memory of an RFID tag and stored in tag cache memory.
  • Commands intended for the tag are queued in the tag cache, and the commands queued in the tag cache are executed in response to occurrence of an event.
  • An entry is maintained, in the tag cache, of all the tags read by a reader within a given period of time, including all of the tag data and any pending tag commands. Interaction with the entry takes place using information in the tag cache rather than in the tag itself.
  • Figure 1 B is a diagram of an exemplary embodiment of cache memory used by the present system
  • Figure 2 is a flowchart showing an exemplary set of steps performed in operation of one embodiment of the present system
  • the present RFID tag reading system maintains a cache entry including data for all of the tags it has read in a given period, as well as any pending tag commands.
  • the system allows upstream readers or users to interact with the cache entries rather than the tag themselves. This process optimizes power use for the tag and the tag reader, allowing 'lazy' (delayed) reads and writes, commits on request, commits on changes and other optimized command sets. The process also facilitates simulation of tags for test purposes.
  • FIG. 1 A is a diagram of an exemplary embodiment of the present system for reading RFID tags.
  • the system comprises one or more receiver/interrogators 102 (hereinafter simply called 'readers') for reading tags 101 , one or more cache memories 103 for storing data associated with various tags, and at least one tag processing system 104.
  • the system may also include one or more intermediate servers 105 to provide for communication between readers 102 and between readers and the tag processing system 104.
  • Each reader 102 includes code 109 which implements the functions performed by the reader, as described herein.
  • Code 109 may comprise software (executed by a processor), firmware, or a combination of both.
  • Tag cache memory 103 is associated with each reader 102, and may be either local to a reader [e.g., tag cache 103(L)], or located remotely with respect to a reader [e.g., tag cache 103(R)] and connected to the reader via any suitable communications link 131.
  • Tag cache memory 103 may also be co-located with server(s) 105 and/or tag processing system 104. Individual per-reader tag caches can together be considered one large tag cache 103 with potentially duplicate entries.
  • Tag cache 103 can be any kind of memory for storing tag information.
  • cache 103 comprises a basic in- memory data structure (hash table, tree, or other structure) indexed by the tag ID.
  • the particular structure of a particular tag cache 103 is a function of the format (and other properties) of the tag IDs being used.
  • Figure 1 B is a diagram of an exemplary embodiment of tag cache memory 103 used by the present system.
  • tag cache memory 103 contains data structures including a tag index 111 , a cache entry buffer 133, commit buffers 110(1) / 110(2), a command/script queue 140, and lists 112 / 135 which are used to determine least- recently- used (LRU) tag data, for cache management purposes.
  • LRU least- recently- used
  • FIG. 2 is a flowchart showing an exemplary set of steps performed in operation of one embodiment of the present system.
  • a reader 102 reads a tag 101 , and stores the tag data in an intermediate buffer (not shown). Data from the memory of one or more tags of different tag types may be read and then stored in tag cache 103 along with additional tag state information.
  • tag cache 103 if the tag data is compressed, then the data is decompressed, and if the tag data is encrypted, then the data is decrypted. Re-compression and/or re-encryption is performed on appropriate data, if necessary, prior to the data being sent (back) to a tag in step 225 (described below). If tag data is to be encrypted, tag cache 103 also includes encryption key storage.
  • step 210 additional data may be added to, or associated with, a tag, as described in detail below with respect to Figure 4.
  • the data for the tag 101 is stored in cache memory 103, as described below with respect to Figure 3. The remaining steps shown in Figure 2 are described further below.
  • the tag is not immediately available, it is kept in the committed list 110. Any non-ACK'd transmissions are copied to a 'next' section of the committed list 110(2), so that there are two lists/buffers used for storing for committed transactions: the 'current' list 110(1) and the 'next' list 110(2).
  • the 'next' list 110(2) is generally empty, but it can be used in the event that data is being changed in cache 103 while a transmission is occurring. If a tag does not respond with an 'ACK' within a predetermined time, it is treated as non-existent, and stored for possible later use.
  • a pointer 142 to each entry 122/123 is stored in the current LRU chunk 143 for this generation, in LRU list 112, at step 325.
  • the number of entries in the generation is stored in a master LRU list 135 along with a pointer 137 to the chunk, at step 330.
  • garbage collection (described in detail below) is needed, starting at the lowest non-zero count entry in the LRU master list 135, each remaining (non-zero) pointer in the chunk is checked to see if it has the generation number of the current lowest generation (as it is possible that none of the entries in the chunk will have it). If so, that entry is erased from cache 103 and LRU lists 112 and 135.
  • the entry must be in the same 'chunk' as the one in which it was written when it first entered the reader. If the pointer to the slot in the LRU list for the starting point for that particular generation is kept with each generation index (that has the count), then the start pointer is no longer required. Instead, the system starts at the beginning of the generation 'chunk' which is stored in the generation count list.
  • the generation count list now contains both a count and a pointer to where in memory the chunk is located - this also means that the chunks themselves need not be contiguous.
  • the generation count is zero, the associated chunk can be deallocated. As an optimization, below a certain threshold, those remaining entries can be copied to their currently marked generation. The chunk block is then re-allocated, and the original entries plus these leftover entries are copied into one contiguous block.
  • the cache entry 122/123 is sent to one or more intended (target) systems potentially including other readers 102 and/or processing system 104.
  • the present system provides the capability to allow user interactions with a given tag to be routed to the correct reader 102. Results are then stored and/or sent to a user and/or to tag processing system 104, at step 230.
  • a reader 102 may issue a command and flag it such that if the command is not executed against the tag within a given period of time, then the command fails.
  • a reader requests one or more tag entries (such as when a new tag enters its field) from other readers or a central repository.
  • IP multicast carrying the requested tag ID and an optional maximum age. All entities with an entry for that tag ID (potentially filtered by the maximum age of the entry) respond with an ACK, a count of pending global or group operations against the tag, and a time value representing the last interaction with the tag.
  • the pulling reader then makes a specific request to the reader or readers that it wants to get data from in the order in which it wants to receive the entries (writing each one in succession so that it ends up with a composite entry). Other readers can listen and update themselves simultaneously.
  • Tags 101 are not always powered on and connected to a tag-reading system - passive tags are only on and connected when an interrogator is powering them, and active tags 'sleep' to conserve their battery when not being accessed.
  • the Internet and enterprise infrastructure are most commonly connected and 'always on' (such as in the case of internal and external IP networks), with connected devices able to be located easily.
  • the present system allows the tag cache to act like an always-on device and connected proxy for the tag itself, allowing existing networks to seamlessly work with what appears to each as the tag itself. In this way, a chair, for example, could be connected to the internet simply via a tag placed on it.

Landscapes

  • Business, Economics & Management (AREA)
  • Economics (AREA)
  • Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Near-Field Transmission Systems (AREA)
  • Memory System Of A Hierarchy Structure (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention se rapporte à un procédé pour la mise en oeuvre d'une étiquette virtuelle dans un système de lecture d'étiquettes RFID. Dans un mode de réalisation, les données sont lues dans la mémoire d'une étiquette RFID et enregistrées dans une antémémoire d'étiquette. Les commandes destinées à l'étiquette sont mises en file d'attente dans l'antémémoire d'étiquette, et les commandes mises en file d'attente dans l'antémémoire d'étiquette sont exécutées en réponse à la survenue d'un événement. Un résultat est délivré comme si la commande avait été appliquée à l'étiquette au moment d'une demande initiale d'envoi de commandes à l'étiquette.
PCT/US2006/015092 2005-04-21 2006-04-21 Systeme et procede pour la mise en oeuvre d'etiquettes rfid virtuelles WO2006116084A2 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP06758469A EP1872602A2 (fr) 2005-04-21 2006-04-21 Systeme et procede pour la mise en oeuvre d'etiquettes rfid virtuelles

Applications Claiming Priority (20)

Application Number Priority Date Filing Date Title
US67369205P 2005-04-21 2005-04-21
US60/673,692 2005-04-21
US71295705P 2005-08-31 2005-08-31
US60/712,957 2005-08-31
US11/301,423 2005-12-13
US11/301,587 US20060238304A1 (en) 2005-04-21 2005-12-13 System and method for adapting an FRID tag reader to its environment
US11/301,396 2005-12-13
US11/301,770 2005-12-13
US11/301,423 US20060238303A1 (en) 2005-04-21 2005-12-13 Adaptable RFID reader
US11/301,396 US20060238302A1 (en) 2005-04-21 2005-12-13 System and method for configuring an RFID reader
US11/301,770 US20060238305A1 (en) 2005-04-21 2005-12-13 Configurable RFID reader
US11/301,587 2005-12-13
US11/323,214 2005-12-30
US11/323,214 US7570164B2 (en) 2005-12-30 2005-12-30 System and method for implementing virtual RFID tags
US11/328,209 US20060253415A1 (en) 2005-04-21 2006-01-09 Data-defined communication device
US11/328,209 2006-01-09
US11/387,422 US20070046431A1 (en) 2005-08-31 2006-03-23 System and method for combining RFID tag memory
US11/387,421 US7659819B2 (en) 2005-04-21 2006-03-23 RFID reader operating system and associated architecture
US11/387,421 2006-03-23
US11/387,422 2006-03-23

Publications (2)

Publication Number Publication Date
WO2006116084A2 true WO2006116084A2 (fr) 2006-11-02
WO2006116084A3 WO2006116084A3 (fr) 2007-10-18

Family

ID=37215302

Family Applications (6)

Application Number Title Priority Date Filing Date
PCT/US2006/015342 WO2006116235A2 (fr) 2005-04-21 2006-04-21 Lecteur rfid adaptatif
PCT/US2006/015343 WO2006116236A2 (fr) 2005-04-21 2006-04-21 Procede et systeme de configuration d'un lecteur rfid
PCT/US2006/015092 WO2006116084A2 (fr) 2005-04-21 2006-04-21 Systeme et procede pour la mise en oeuvre d'etiquettes rfid virtuelles
PCT/US2006/015344 WO2006116237A2 (fr) 2005-04-21 2006-04-21 Lecteur rfid configurable
PCT/US2006/015093 WO2006116085A2 (fr) 2005-04-21 2006-04-21 Systeme et procede permettant de combiner une memoire d'etiquette rfid
PCT/US2006/015347 WO2006116238A2 (fr) 2005-04-21 2006-04-21 Systeme et procede permettant d'adapter un lecteur de marqueurs rfid a son environnement

Family Applications Before (2)

Application Number Title Priority Date Filing Date
PCT/US2006/015342 WO2006116235A2 (fr) 2005-04-21 2006-04-21 Lecteur rfid adaptatif
PCT/US2006/015343 WO2006116236A2 (fr) 2005-04-21 2006-04-21 Procede et systeme de configuration d'un lecteur rfid

Family Applications After (3)

Application Number Title Priority Date Filing Date
PCT/US2006/015344 WO2006116237A2 (fr) 2005-04-21 2006-04-21 Lecteur rfid configurable
PCT/US2006/015093 WO2006116085A2 (fr) 2005-04-21 2006-04-21 Systeme et procede permettant de combiner une memoire d'etiquette rfid
PCT/US2006/015347 WO2006116238A2 (fr) 2005-04-21 2006-04-21 Systeme et procede permettant d'adapter un lecteur de marqueurs rfid a son environnement

Country Status (2)

Country Link
EP (6) EP1872594A4 (fr)
WO (6) WO2006116235A2 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2932735A1 (fr) * 2012-12-14 2015-10-21 Schneider Electric Industries SAS Systeme pour echanger des donnees a distance avec une radio-etiquette nfc
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110148570A1 (en) 2009-12-21 2011-06-23 Christian Weidinger Configuration RFID Circuit

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6259367B1 (en) * 1999-09-28 2001-07-10 Elliot S. Klein Lost and found system and method
US20040087273A1 (en) * 2002-10-31 2004-05-06 Nokia Corporation Method and system for selecting data items for service requests
US20040176032A1 (en) * 2002-03-26 2004-09-09 Sakari Kotola Radio frequency identification (RF-ID) based discovery for short range radio communication with reader device having transponder functionality

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2197107B (en) * 1986-11-03 1990-12-12 Mars Inc Data-storing devices
US4924210A (en) * 1987-03-17 1990-05-08 Omron Tateisi Electronics Company Method of controlling communication in an ID system
CA2103288C (fr) * 1992-11-18 2004-08-17 Michael John Camille Marsh Detection d'une multiplicite d'articles
US5777561A (en) * 1996-09-30 1998-07-07 International Business Machines Corporation Method of grouping RF transponders
WO1998052168A2 (fr) * 1997-05-14 1998-11-19 Avid Identification Systems, Inc. Lecteur pour systeme d'identification de radio-frequences
US6420961B1 (en) * 1998-05-14 2002-07-16 Micron Technology, Inc. Wireless communication systems, interfacing devices, communication methods, methods of interfacing with an interrogator, and methods of operating an interrogator
US6509828B2 (en) * 1998-07-30 2003-01-21 Prc Inc. Interrogating tags on multiple frequencies and synchronizing databases using transferable agents
DE29814988U1 (de) * 1998-08-20 1998-10-22 Moba Mobile Automation Gmbh Vorrichtung zum Auslesen und Beschreiben von mindestens zwei Transpondertypen
US6192222B1 (en) * 1998-09-03 2001-02-20 Micron Technology, Inc. Backscatter communication systems, interrogators, methods of communicating in a backscatter system, and backscatter communication methods
US6317027B1 (en) * 1999-01-12 2001-11-13 Randy Watkins Auto-tunning scanning proximity reader
US6677852B1 (en) * 1999-09-22 2004-01-13 Intermec Ip Corp. System and method for automatically controlling or configuring a device, such as an RFID reader
US6617962B1 (en) * 2000-01-06 2003-09-09 Samsys Technologies Inc. System for multi-standard RFID tags
JP2004501417A (ja) * 2000-02-23 2004-01-15 ズガンバロ、フラヴィオ 情報システムおよびその方法
JP4588963B2 (ja) * 2000-04-26 2010-12-01 センサーマチック・エレクトロニックス・コーポレーション Rfidリーダ出力制御装置及び方法
US6307517B1 (en) * 2000-06-13 2001-10-23 Applied Wireless Identifications Group, Inc. Metal compensated radio frequency identification reader
JP3674525B2 (ja) * 2001-03-23 2005-07-20 オムロン株式会社 非接触id装置
US7009496B2 (en) * 2002-04-01 2006-03-07 Symbol Technologies, Inc. Method and system for optimizing an interrogation of a tag population
US7066388B2 (en) * 2002-12-18 2006-06-27 Symbol Technologies, Inc. System and method for verifying RFID reads
US7023341B2 (en) * 2003-02-03 2006-04-04 Ingrid, Inc. RFID reader for a security network
US20060066443A1 (en) * 2004-09-15 2006-03-30 Tagsys Sa Self-adjusting RF assembly

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6259367B1 (en) * 1999-09-28 2001-07-10 Elliot S. Klein Lost and found system and method
US20040176032A1 (en) * 2002-03-26 2004-09-09 Sakari Kotola Radio frequency identification (RF-ID) based discovery for short range radio communication with reader device having transponder functionality
US20040087273A1 (en) * 2002-10-31 2004-05-06 Nokia Corporation Method and system for selecting data items for service requests

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2932735A1 (fr) * 2012-12-14 2015-10-21 Schneider Electric Industries SAS Systeme pour echanger des donnees a distance avec une radio-etiquette nfc
EP2932735B1 (fr) * 2012-12-14 2024-03-06 Schneider Electric Industries SAS Systeme pour echanger des donnees a distance avec une radio-etiquette nfc
US11213773B2 (en) 2017-03-06 2022-01-04 Cummins Filtration Ip, Inc. Genuine filter recognition with filter monitoring system

Also Published As

Publication number Publication date
EP1872601A4 (fr) 2009-03-04
WO2006116238A2 (fr) 2006-11-02
EP1872599A2 (fr) 2008-01-02
WO2006116236A2 (fr) 2006-11-02
EP1872594A2 (fr) 2008-01-02
EP1872602A2 (fr) 2008-01-02
EP1872600A4 (fr) 2009-02-25
EP1872599A4 (fr) 2009-01-14
WO2006116237A2 (fr) 2006-11-02
WO2006116085A3 (fr) 2007-04-26
EP1872308A2 (fr) 2008-01-02
WO2006116237A3 (fr) 2007-03-22
WO2006116085A2 (fr) 2006-11-02
EP1872601A2 (fr) 2008-01-02
WO2006116235A2 (fr) 2006-11-02
EP1872600A2 (fr) 2008-01-02
WO2006116236A3 (fr) 2007-01-18
WO2006116235A3 (fr) 2007-08-23
WO2006116238A3 (fr) 2007-03-22
EP1872594A4 (fr) 2009-03-04
WO2006116084A3 (fr) 2007-10-18

Similar Documents

Publication Publication Date Title
US7570164B2 (en) System and method for implementing virtual RFID tags
US20080042830A1 (en) Virtual rfid-based tag sensor
US6509828B2 (en) Interrogating tags on multiple frequencies and synchronizing databases using transferable agents
EP1342204B1 (fr) Systeme, procede, logiciel de communication de donnees pour des objets transportes
US7267262B1 (en) Method and apparatus confirming return and/or pick-up valuable items
US6925471B2 (en) Detecting interactions via intelligent gateway
US7800499B2 (en) RFID and sensor signing algorithm
Aggarwal et al. A survey of RFID data processing
US20070208680A1 (en) Method and Apparatus For Complex RFID Event Processing
US8042737B2 (en) RFID key rotation system
CN101681486A (zh) 信息技术资产的rfid发现、跟踪和预配
CN111066040A (zh) 清单管理系统
US20070046431A1 (en) System and method for combining RFID tag memory
CN101515333A (zh) 具有存储体状况的电子标签系统及其控制方法
US20090096608A1 (en) Industrial identify encoding and decoding language
WO2006116084A2 (fr) Systeme et procede pour la mise en oeuvre d'etiquettes rfid virtuelles
US20090309734A1 (en) Intelligent system and method to monitor object movement
WO1999005659A1 (fr) Protocole de memorisation et de recuperation de donnees dans des etiquettes d'identification radio frequence faisant appel a des objets
Ajana et al. FlexRFID: A flexible middleware for RFID applications development
CN102034068A (zh) 对射频识别标签进行访问控制的方法及系统
O'Halloran et al. RFID patient tagging and database system
CN101004796B (zh) 记录方法、记录装置和ic卡
Panagiotis et al. Radio frequency identification (RFID) in a hospital environment
NagaLakshmi et al. A Security Mechanism for library management system using low cost RFID tags
JP2000285212A (ja) 移動体通信システムの応答器

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2006758469

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: RU

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 06758469

Country of ref document: EP

Kind code of ref document: A2