WO2007006085A1 - Techniques et étiquette d’identification radiofréquence (rfid) - Google Patents
Techniques et étiquette d’identification radiofréquence (rfid) Download PDFInfo
- Publication number
- WO2007006085A1 WO2007006085A1 PCT/AU2006/000964 AU2006000964W WO2007006085A1 WO 2007006085 A1 WO2007006085 A1 WO 2007006085A1 AU 2006000964 W AU2006000964 W AU 2006000964W WO 2007006085 A1 WO2007006085 A1 WO 2007006085A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- signal
- rfid
- tag
- node
- rfid tag
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10019—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
- G06K7/10079—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. the collision being resolved in the spatial domain, e.g. temporary shields for blindfolding the interrogator in specific directions
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19634—Electrical details of the system, e.g. component blocks for carrying out specific functions
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19665—Details related to the storage of video surveillance data
- G08B13/19671—Addition of non-video data, i.e. metadata, to video stream
- G08B13/19673—Addition of time stamp, i.e. time metadata, to video stream
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19697—Arrangements wherein non-video detectors generate an alarm themselves
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2405—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used
- G08B13/2414—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags
- G08B13/2417—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting characterised by the tag technology used using inductive tags having a radio frequency identification chip
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2454—Checking of authorisation of a person accessing tagged items in an EAS system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2462—Asset location systems combined with EAS
-
- G—PHYSICS
- G01—MEASURING; TESTING
- G01S—RADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
- G01S1/00—Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmitters; Receivers co-operating therewith
- G01S1/02—Beacons or beacon systems transmitting signals having a characteristic or characteristics capable of being detected by non-directional receivers and defining directions, positions, or position lines fixed relatively to the beacon transmitters; Receivers co-operating therewith using radio waves
- G01S1/68—Marker, boundary, call-sign, or like beacons transmitting signals not carrying directional information
Definitions
- the present invention relates to radio frequency identification (RFlD) tags and techniques relating thereto.
- RFID radio frequency identification
- Radio frequency identification (RFID) tags are commonly used in electronic article surveillance (EAS) systems for detecting the shoplifting of products from stores.
- EAS systems commonly include a RFID reader which, in turn, includes a transmitter gate for transmitting a probe signal to a tag, and a receiver gate for receiving a response signal from a tag.
- a tag passes between the gates, the tag receives the probe signal and then transmits a response to the transmitter gate which generates an alarm.
- the distance between the gates is typically of the order of a couple of metres and the operating frequencies for EAS systems generally range from 2 to 15 MHz.
- the tags are small in size so that they can be effectively hidden in the products which they protect.
- Conventional RFID tags generally have a very limited range of operation owing to the relatively small amount of power derived from the probe signal they receive.
- the applicant perceives a need for a RFID tag and associated system having an alternative design to those commonly used at present.
- the present invention relates to such an RFID tag and system, and various techniques associated with the tag and system.
- a radio frequency identification (RFID) network for locating a RFID tag, the network including: one or more nodes each including a RF transponder for relaying a signal whether from another node or the RFID tag, the relayed signal including information from which the location of the RFID tag can be determined; and a locator for receiving the relayed signal from the nodes and for determining the location of the RFID tag using the information.
- RFID radio frequency identification
- the network may include a plurality of the nodes with each node being configured to determine whether to relay the signal.
- the determination of whether to relay the signal may be made using a count of the number of nodes through which the signal has already been relayed, the count being included in the signal.
- the determination of whether to relay the signal can be made using the time elapsed since the creation of the signal, a time-stamp being included in the signal at creation of the signal.
- the RFID network may further include a detector for detecting whether the RFID tag has been removed from a zone using the determined location of the RFID tag.
- the RFID network may further include an alarm generator which, upon detection of the removal of the RFID tag from the zone, transmits an alarm signal to the first one of the nodes to relay the signal.
- Each node may further include an alarm which is activated upon the node receiving an RF alarm signal.
- the locator may be configured to generate an alarm signal when the relayed signal is not received within a predetermined time period.
- the information may include an identifier corresponding to a node which reads the RFID tag.
- the information can be included with the signal by either the RFID tag or the node which reads the RFL tag.
- the locator may correspond the identifier with a stored identifier associated with the location.
- Each transponder receives the signal and relays the signal at the same UHF frequency.
- the network may include the RFID tag.
- Each node may be configured to periodically transmit a probe signal.
- the RFID tag may be configured to create the signal to be relayed upon receipt of the probe signal.
- Each node may further include a RFID reader for reading the information from the RFID tag.
- the reader may include a transmitter for transmitting a probe signal to the RFID tag and a receiver for receiving a response signal including the information from the RFID tag.
- the reader can include a scheduler for periodically transmitting the probe signal.
- a node for a radio frequency identification (RFID) network including: a RF transponder for relaying a signal whether from another node or a RFID tag.
- RFID radio frequency identification
- a power supply for a radio frequency identification (RFID) tag including: a storage capacitor for storing charge; a first diode through which a received signal can be supplied to the storage capacitor; and a second diode through which charge is supplied to the storage capacitor from a battery.
- RFID radio frequency identification
- the power supply may further include a voltage limiter for limiting the voltage level of the received signal supplied to the storage capacitor.
- the voltage limiter may include a zener diode.
- an alarm system for detecting the removal of an radio frequency identification (RFID) tag from a zone; the system including: at least one reader for reading the tag located within the zone; a detector for detecting when the tag has been removed from the zone; and an alarm for generating an alarm signal when the tag has been removed from the zone.
- RFID radio frequency identification
- the alarm system further includes an audible siren which sounds responsive to the generation of the alarm signal.
- the tag is periodically read by the reader.
- an alarm system for detecting the removal of an radio frequency identification (RFID) tag from a first zone; the system including: a first set of readers for reading the tag located in the first zone; a second set of readers for reading the tag located in a second zone, the second zone being adjacent to the first zone; and a detector for detecting when the tag has moved from the first to the second zones.
- RFID radio frequency identification
- the first set of readers may be a singleton set including a sole reader.
- the system further includes an alarm for generating an alarm signal when the tag has been moved from the first to the second zones.
- the alarm signal may be generated by a reader in the second zone and transmitted to a reader in the first zone.
- the alarm system may further include an audible alarm which sounds responsive to the generation of the alarm signal.
- the audible alarm may be located in the first zone.
- a method for calculating backoff in a radio frequency identification (RFID) tag including the steps of: dividing a dividend stored in the RFID tag by a prime number; and obtaining the remainder of the division to thereby calculate the backoff.
- RFID radio frequency identification
- a radio frequency identification (RFID) tag programmed with software instructions for calculating the backoff.
- the backoff could be calculated using hardware (e.g. an ASIC).
- a method for calculating the back off period in a radio frequency identification (RFID) tag including the steps of: dividing a dividend stored in the RFID tag by a prime number; and obtaining the remainder of the division; multiplying the remainder by a time period to thereby calculate the backoff period.
- RFID radio frequency identification
- the dividend is a unique to a particular RFID tag. Even more preferably, the dividend is a serial number of the RFID tag. The serial number is a suitable dividend as each RFID tag in the network has a unique serial number.
- a checkout system for determining the price of one or more products to which respective radio frequency identification (RFID) tags are attached, the system including: a RFID reader for reading each RFID tag to thereby determine the identity of each product; and a calculator for calculating the price of the products by corresponding the determined identity of each product with a corresponding price and summing the prices of the products.
- RFID radio frequency identification
- the system includes an immobilise, .or immobilising each RFID tag.
- an alarm system including: a radio frequency identification (RFID) reader; and a camera for capturing one or more images when the reader reads a RFID tag.
- RFID radio frequency identification
- a method for locating a radio frequency identification (RFID) tag in a RFID network including the steps of: relaying a RF signal from the RFID tag using one or more nodes each including a RF transponder, the relayed signal including information from which the location of the RFID tag can be determined; receiving the relayed signal from the nodes; and determining the location of the RFID tag using the information included in the received signal.
- RFID radio frequency identification
- FIG. 1 is a block diagram of a radio frequency identification (RFID) network in accordance with a first embodiment of the present invention.
- RFID radio frequency identification
- Figure 2 is a plan view of a RFID network in accordance with the first embodiment installed within a shopping complex.
- Figure 3 is a functional block diagram of a node for a RFID network in accordance with the first embodiment.
- FIG 4 is a time-domain diagram of a transmitted amplitude shift keying (ASK) signal waveform.
- Figure 5 is a schematic diagram of a RFID tag in accordance with the first embodiment.
- ASK transmitted amplitude shift keying
- FIG. 6 is a circuit diagram of a receiver and power supply for a RFID tad in accordance with another embodiment.
- FIG. 7 is a block diagram of a controller of the RFID tag in accordance with the first embodiment.
- Figure 8 is a structural diagram of a response signal transmitted by a RFID tag in accordance with the first embodiment.
- FIG. 9 is a structural block diagram of a RFID node in accordance with the first embodiment.
- Figure 10a is a schematic diagram of an automatic checkout including a RFID network in accordance with the first embodiment.
- Figure 10b is a structural block diagram of the structure of a response signal transmitted by a RFID tag when implementing the automatic checkout.
- Figure 10c is a schematic diagram of a display of the automatic checkout for displaying items being purchased.
- Figure 11 is a block diagram of a silent alarm system in accordance with a second embodiment of the present invention.
- FIG. 1 is a block diagram showing a conventional RFID system 4, and a RFID network 5 in accordance with a first embodiment of the present invention.
- the RFID network has been retrofitted so as to interface with the RFID system 4.
- a detailed description of the operation of the RFID system 4 and network 5 is provided below.
- the RFID system 4 includes a base station 6 which interfaces to a pair of security gates and one or more passive RFID tags 8.
- the base station 6 periodically transmits an 8.2MHz probe signal 10 which is received by and powers a passive RFID tag 8.
- the passive RFID tag 8 transmits a tag response signal 12a which is of relatively low power. Accordingly, the base station 6 only receives the response signal 12a when the passive RFID tag 8 is in close proximity (e.g. 1 metre) to the base station 6.
- the RFID network 5 includes one or more active RFID tags 13 each having a stored unique identifier (e.g. serial number), a RFID node 14 having a stored unique identifier which includes a RFID reader for reading the RFID tags 13, and a central station 16 which is in RF communication with the RFID reader 16.
- Each tag 13 also receives the 8.2MHz probe signal 10 transmitted from the base station 6.
- Each tag 13 includes an internal battery which powers an internal UHF transmitter that transmits a tag response signal 12b over a relatively high range (e.g. 50 metres).
- the tag response signal 12b is transmitted at 433MHz, however in alternative embodiments, other UHF frequencies including 315 MHz, 868 MHz and 915MHz, 2.4GHz and 5.8GHz may be used.
- the base station 6 is not adapted to receive the tag response signal 12b.
- the RFID node 14 includes a transponder which receives the tag response signal 12b and relays a (boosted) corresponding node response signal 12c to the central station 16 for processing.
- the tag response signal 12b and node response signal 12c may not be .
- ⁇ antical e.g. in frequency or information content
- each response signal 12b, 12c can be any RF indicator (including, for example, a carrier frequency only) which forms part of the collective response signal 12 sent from the tag 13 to the central station 16.
- the response signals 12b, 12c are both transmitted at 433MHz and the node response signal 12c is transmitted after the tag response signal 12b is received so as to prevent the interference of the two signals.
- the network 5 would operate according to a channel arrangement whereby concurrent transmission of response signals 12 by two respective nodes 14 of the network 5 can be performed.
- the RFID node 14 includes sufficiently sensitive receiver circuitry to effectively detect the tag response signal 12b when an active RFID tag 13 is located within 50 metres of the RFID node 14.
- the node 14 is generally powered by a mains power supply. Accordingly, the node response signal 12c is of higher power than the tag response signal and therefore the central station 16 and the RFID node 14 can be located further than 50 metres apart, and typically up to several hundred metres apart.
- the range of both response signals 12b, 12c are power limited to an extent so that a license to operate the network 5 in the UHF range is not required.
- the node 14 may be powered by a low voltage supply or battery.
- FIG. 2 is a block diagram showing a RFID network 5 installed within a shopping complex 18 in accordance with the first embodiment for the purpose of preventing the shoplifting of products from stores 20 of the complex 18.
- Active RFID tags 13 each having a unique stored identifier are attached to respective products.
- the shopping complex 18 includes four stores 20a-20d interconnected by a common hallway 22. Respective RFID nodes 14a-14d are located within each store 20, and a further pair of RFID nodes 14e, 14f and a central station 16 is located within the hallway 2.
- each RFID node 14 functionally includes a RFID reader 30 for reading RFID tags 13; and a RF tr&.,c.ponder 32 for receiving a response signal 12 from either another transponder 32 or a RFID tag 13 and re-transmitting (i.e. relaying) the response signal 12.
- the RFID reader 30 and RF transponder 32 may include a common transceiver.
- response signal 12 is relayed via nodes 14a, 14e and 14f to central station 16.
- RFID node 14a relays tag response signal 12a to node 14e in the form of node response signal 12b
- RFID node 14e relays node response signal 12b to node 14f in the form of node response signal 12c
- RFID node 14f relays node response signal 12c to central station 16 in the form of node response signal 12d.
- signals can be relayed from the central station 16 to RFID tags 13 via one or more nodes 14.
- active RFID tag 13a transmits a response signal 12 to the central station 16 via RFID nodes 14a, 14e, and 14f respectively.
- the reader 30 of node 14a reads tag 13a (i.e. transmits probe signal 10 and receives and processes tag response signal 12a) and relays the response signal 12a to node 14e.
- the transponders 32 in node 14e and node 14f relay the response signal 12 to a RF receiver of central station 16.
- the response signal 12 includes a node counter parameter which is incremented by a node 14 each time response signal 12 is relayed through a respective RFID node 14.
- the value of the node counter parameter for respective stages in the network 5 is as follows: “0" for tag response signal 12a, "1" for node response signal 12b, "2" for node response signal 12c and "3" for node response signal 12d.
- a determination arrangement of each node 14 compares the value of the node counter parameter received with a predetermined threshold and, if the value of the node counter parameter exceeds the predetermined threshold, the response signal 1 ⁇ ⁇ .J not be relayed. If the value of the node counter parameter does not exceed the predetermined threshold, the node counter parameter is incremented by the node 14 and the response signal 12 is re-transmitted. In this manner, the response signal will not be indefinitely relayed throughout the network 5.
- the tag 13a includes a timestamp with response signal 12a upon its creation. The determination arrangement of each node 14 which receives the response signal 12 checks the timestamp.
- the response signal 12 is not retransmitted. That is, each node will only relay the response signal 12 in the event that the time elapsed is less than or equal to the predetermined threshold.
- Each node 14 stores a unique node identifier.
- the node 14a transmits its node identifier to the tag 13a along with probe signal 10.
- the tag 13a then retransmits this node identifier along with the response signal 12 which is received by the central station 16.
- Each RFID node 14 includes a scheduler which periodically transmits a probe signal 10 and the tag 13a periodically sends the node identifier, corresponding to node 14a, to the central station 16.
- the node identifier sent with response signals 12 transmitted from the tag 13a change responsive to the RFID reader which presently reads the tag 13a. In this case, the node identifier would change between nodes 14a, 14e, 14f and 14d respectively.
- This node identifier for tag 13a is periodically updated in a location register which is managed by central station 16.
- the central station 16 also manages a lookup table which stores the general location of each respective node in the shopping complex 18 (i.e. store location or hallway) and a corresponding node identifier. In this manner, a locator in the central station 16 can locate the general whereabouts of the RFID tag 13a within the shopping complex 18 at any time by corresponding the node identifie. ... the location register with a corresponding general location stored in the lookup table.
- the tag 13a is fastened to a product for sale in store 20a.
- the tag 13a may be removed from the product and retained in the store.
- the node identifier stored in the location register will change (to the node identifier of node 14e).
- Central station 16 includes a detector for detecting this change when the tag 13a has been removed from the store 14e. Accordingly, the central station includes an alarm which generates and transmits an alarm signal to node 14a via nodes 14f and 14e respectively.
- Node 14a includes an audible siren which sounds responsive to the generation and reception of the alarm signal.
- a response signal 12 is no longer periodically received by the central station 16 from the tag 13a, it can be deduced by the central station 16 that the tag 13a is no longer within the shopping complex 18. That is, if the tag 13a is not read by a node 14, the tag 13a will not transmit a response signal 12 and a response signal 12 will not be received by the central station 16.
- each store 20 would include a plurality of active RFID tags 13 attached to respective products and respective storekeepers could be alerted of any unauthorized removal of a product from the store 20.
- the RFID system
- the nodes 14 collectively form the RFID network 5 which can be readily expanded by including a further node 14 within communication distance of an existing node 14 in the network
- Each node 14 and RFID tag 13 includes a RF transmitter (as described in detail below) for transmitting a response signal 12 having an Amplitude Shift Keying (ASK) waveform as shown in Figure 4.
- the response signal 12 includes a series of pulsed sinusoids with a logical "1" having a longer pulse duration than a logical "0".
- FIG. 5 schematically shows an active RFID tag 13 in accordance with the first embodiment.
- the RFID tag 13 includes a receiver block 50, an address detection block 64, a power supply block 70, a data storage block 68, a controller block 66 and an UHF transmitter block 72. Each block is described in detail below.
- the receiver block 50 includes a magnetic loop antenna 52 which is coupled in parallel to a tuning capacitor 54 to form a tuned circuit having a Q-factor greater than fifty.
- the tuned circuit is tuned to the frequency of the probe signal 10 which may be, for example, 8.2MHz or 13.56 MHz.
- a half wave rectifier is coupled to the tuned circuit and is formed by the diode 56 and capacitor 58.
- the output of the rectifier is coupled to a comparator 60. In use, the received probe signal passes through the rectifier and comparator 60 to generate an activation signal which then passes to a wake-up circuit 62 which wakes up the sleeping controller 66.
- the output of comparator 60 is also coupled to the address detection block 64 which receives the activation signal.
- the address detection block 64 evaluates whether an address of a node 14 or the base station 6 is contained in the activation signal. If the address of the base station 6 is detected, an identifier of the tag 13 is included in the transmitted response signal 12. If the address of a node 5 is detected, identifier of both the tag 13 and the node 5 are included in the transmitted response signal 12.
- the command is passed on to the controller 66 for processing.
- the command may be, for 6 ⁇ c,mple, a product identifier command for updating the product identifier of the tag 13.
- a power supply block 70 is provided for selectively providing power to the wake-up circuit 62, address detection block 64, and data storage block 68.
- the power supply block 70 includes and auxiliary battery for powering the wake-up circuit 62, address detection block 64, and data storage block 68 when the signal strength of the received probe signal 10 is insufficient to power these blocks.
- a low power switch (operating in the nano-ampere range) is provided to selectively connect the battery to the aforementioned blocks 62, 64, 68 when power supply block 70 detects that the probe signal strength is below a predetermined threshold. If the power supply block 70 detects that the probe signal strength is above the predetermined threshold, the switch connects rectified signal 74 to the blocks 62, 64, 68 instead of the battery.
- the circuit arrangement shown in Figure 6 may be used to prolong the life of the battery 76 (typically beyond 10 years).
- the rectified signal 74 is clamped by a voltage limiter in the form of zener diode 78. Subsequently the signal passes through diode 80 and supplies power to storage capacitor 84.
- Storage capacitor 84 stores electrical charge and supplies power to the blocks 62, 64, 68 of the RFID tag 13 through power feed line 86. Charge is supplied from the battery to the storage capacitor 82 via diode 82 and therefore, even in the absence of a rectified signal 74, power is still maintained on power feed line 86.
- power can be supplied by the battery 76 and rectified signal 74 concurrently so that the battery 76 effectively only provides any difference between the load power required and the rectified signal power 74 supplied, thereby prolonging the life of the battery 76.
- the data storage block 68 is coupled to the controller 66 and includes an EEPROM.
- the EEPROM stores various information which may include the tag identifier (i.e. serial number), a customer identifier, a product identifier, an article code, the price of the product and the store in which the item is located.
- the serial number of a tag 13 has a length of 32 bits which allows for 4294967295 combinations.
- the product identifier is effectively the name of the product and can be of up to 31 characters long.
- the customer identification number is 16 bits long.
- the additional information stored in the EEPROM is encrypted and can only be decrypted by users having the appropriate decryption key.
- the controller 66 includes a backoff calculator 90 for calculating the backoff period in the event of a collision between transmitted response signals 12 from two or more tags 13, and a data coding block 98 for encoding data (i.e. information) transmitted with the response signal 12.
- the backoff calculator 90 in each tag will wait for a respective "backoff" period before attempting to retransmit the response signal 12.
- a different backoff in each tag 13 minimises the probability that the response signals 12 will collide again.
- the backoff calculator in each tag 13 calculates a backoff period using the same algorithm in each tag 13 as described below.
- Each tag 13 within range of a node 14 receives the probe signal 10 from that node 14 at approximately the same instant.
- the probe signal 10 is received by the receiver block 50 and the controller proceeds to process the information contained in the probe signal 10.
- the backoff period is divided up into an integral number of slot times in which a tag 13 c «.. transmit a response signal 12.
- the slot time is 5 milliseconds and the nodes 14 transmit a probe signal 10 every 0.5 seconds. Therefore, up to 100 respective tags 13 can transmit a response signal 12 over a maximum backoff period of 0.5 seconds between successive probe signal 10 transmissions from a node 14.
- Each RFID tag 13 stores the same array of prime numbers in the data storage block 68.
- An example of an array of prime numbers stored in each tag 13 is as follows:
- Each tag has a unique serial number stored in the data storage block 68.
- An example of serial numbers for five tags 13 designated A to E is shown in the following table:
- each of tags A to E are serviced by the same node 14 and their transmitted response signals 12 collide, the node 14 will send a collision signal advising each tag 13 that there has been a collision.
- the collision signal will include the slot time in which the collision occurred.
- each tag 13 receives the collision signal and therefore the collision slot time.
- Each tag 13 which caused the collision i.e. which transmitted a response signal 12 in the collision slot time
- the backoff for each tag 13 is the remainder whicn results from dividing the serial number (i.e. dividend) by the first prime number in the prime number array (i.e. at location 0). This operation is known as a modulus operation.
- the backoff for each tag 13 is then multiplied by the slot time (i.e. 5ms) to yield a different backoff period for each tag A to E as shown in the foregoing table.
- two or more of tags 13 may calculate the same backoff period (e.g. say tags F and G). In this event, the response signals 12 re-transmitted by tags F, G will once again collide and, accordingly, the node 14 once again sends a collision signal.
- Tags F 1 G then calculate another backoff and backoff period as previously described, however, by using the second prime number in the prime number array (i.e. at location 1) instead of the first prime number. In the rare event that there is yet another collision, the third prime number in the array (i.e. at location 2) is then used and so on.
- the foregoing algorithm advantageously provides a random backoff calculation which quickly and effectively minimises the probability that consecutive retransmissions for the same nodes will collide, even although the same backoff algorithm is used.
- the data coding block 98 prepares data for transmission by the L)HF transmitter 72 and includes a convolutional encoder 92, manchester encoder 94, and frame assembler 96 which are connected together in series. Data is read from the EEPROM of the data storage block 68 by the convolutional encoder 92 which, in turn, performs forward error correction (FEC) on the data to correct any errors introduced into data received by the receiver 50.
- FEC forward error correction
- the size of data transmitted with the probe and response signals 10,12 is increased by about 50% using a 2/3 coding scheme.
- the convolutionally encoded data then passes to the manchester encoder 94 which effectively breaks up any continuous strings of logical "1s" or "0s" in the data to be transmitted (i.e. removes any net DC offset).
- the manchester encoded data passes to the frame assembler 96 which appends a synchronisation pattern to the be o ...ning of the data so as to enable the receiver of the node 14 to synchronise the received response signal 12.
- the node 14 performs complementary operations to those of the data coding block 98 in order to extract the transmitted data as described further below.
- the UHF transmitter 72 is initially activated one slot time prior to transmitting the response signal 12 to allow the transmitter to stabilise prior to transmission.
- the transmitter 72 is an ASK transmitter, however, frequency shift keying (FSK) could be alternatively used.
- FSK frequency shift keying
- the data structure of the response signal 12 is shown in Figure 8.
- the response signal 12 includes a synchronisation pattern 102 of '1', 1 O', '1', 1 O', '1', 1 O', T, '1' which is first sent to enable the receiver in the node 14 to synchronise the response signal 12.
- the response signal 12 further includes the following parameters: the tag identifier 104, the node identifier 106 and the node counter (initialised) 108.
- FIG. 9 is a block diagram showing a node 14 in accordance with the first embodiment.
- the reader 30 and transponder 32 of the node 14 shown in Figure 3 are implemented using the hardware shown in Figure 9.
- the node 14 includes a receiver 120, a FEC and manchester decoder 122, a data processor 124, a node protocol expansion block 126, and a UHF transmitter 128 which are serially connected together.
- the node 14 further includes a time reference block 130.
- the node further includes a collision detector 132 and a collision prime index calculator 134.
- the collision detector 132 detects when there has been a collision between response signals 12 transmitted by two or more tags 13 in which case, the node 14 transmits a collision signal to the tags , ⁇ which includes the slot time in which the collision occurred.
- the collision signal is received by the receiver block 50 of any RFID tags 13 within range of the node 14.
- the automatic checkout 140 includes a single node 14 that is mounted at a location on the ceiling 14 of the shopping complex 18 which is proximal to a checkout desk 146.
- the transmit power of the node 14 is sufficient to read tags 13 located within a zone immediately surrounding the checkout desk 146, and insufficient so that tags 13 located in other zones (i.e. controlled by other nodes 14) of the shopping complex 18 are not read.
- the checkout desk 146 is located at the exit of the shopping complex 18.
- a trolley 148 can be used to transport products to which tags 13 are fastened past the checkout desk 146. Typically, the trolley 148 is transported directly beneath the node 14.
- the node 14 interfaces to the central station 16 which, in turn, interfaces with one or more displays 142. Each display serves to display details relating to the items in the trolley 148.
- the structure of a response signal 12 for implementing the automatic checkout 140 is shown in Figure 10b.
- the response signal 12 includes the following parameters: synchronisation information 102, a tag identifier (e.g. serial number) 104, a node identifier 106 and a node counter 108.
- the response signal 12 further includes parameters of a product identifier 103 which identifies the product to which the tag is attached, a customer identifier 105 which identifies the store from which the product was procured, and other information 107 which is typically encrypted.
- the other information 107 includes information peculiar to a particular user (i.e. store) which is stored in an encrypted format in the data storage block 68. Other information 107 may include, for example, store location and warehouse information.
- the shopping trolley 148 is positioned beneath the node 14 at the checkout desk 146.
- a checkout operator 150 (or the customer) presses a button to initiate the node 14 sending out a proL ⁇ signal 10 which is received by each of the tags 13 located in the trolley 148.
- each tag 13 transmits a first response signal 12 in accordance with a calculated backoff period to avoid the collision of initial response signals 12 which would otherwise occur.
- Each tag 13 transmits the response signal 12 which is relayed via the node 14 to the central station 16.
- the central station 16 extracts the customer identifier 105 and product identifier 103 from each response signal 12.
- the central station 16 includes a price database which, in turn, includes a list of product identifiers of available products for sale, and a list of prices of the products which each correspond to a product identifier.
- the central station 16 calculates the total price of the products in the trolley 148 which each correspond to an item in the list of product identifiers.
- the product identifier
- the central station 16 sends a notice to a server for each store 20 from which a purchased product was procured advising the store server of the sale.
- the storekeepers of each store can access the price database of the central station 16, and modify the prices of products available for sale at that store using the store server.
- the store servers are connected to a central station server of the central station 16 via a network (e.g. Ethernet).
- the central station 16 further includes an immobiliser for removing the tag identifier (e.g. serial number) of the tags 13 attached to purchased products from the list of tag identifiers of products for sale.
- the tags 13 attached to the purchased products are effectively immobilized whereby, if a tag 13 is returned to the automatic checkout 140, the product to which the tag 13 is attached cannot be purchased again as the tag 13 cannot be corresponded to an item in the list. If a produc. .3 returned to the store, the serial number of the corresponding tag 13 can be added to the list to thereby re-activate the tag 13.
- the automated checkout 140 has the benefit of greatly increasing the speed at which products can be scanned by an operator.
- a silent alarm system 162 shown in Figure 11.
- the alarm system 162 includes a RFID reader 30 which is located proximal to an exit of a store, and a digital camera 160 for taking a photograph of the exit when a response signal 12 is received by the reader 30 from a tag 13.
- the RFID reader 30 periodically transmits a probe signal 10 about the exit. In the event that a shoplifter carries a product bearing a tag 13 through the exit, the reader will read the tag 13 and instruct the camera 160 to take a photograph of the exit (and the shoplifter).
- the silent alarm system 162 stores the photograph of the shoplifter exiting the store along with the product identifier 103 of the response signal 12 in a database.
- the date and time may also be stored in the database by the system 162, and may be either stored in an electronic file or as a caption on the stored photograph.
- the silent alarm system 162 transmits the foregoing information to a security guard station so that a security guard can then apprehend the shoplifter.
- the node identifier parameter in the response signal 12d received by central station 16 was included in response signal 12 by a tag 13.
- the node identifier parameter may instead be included in the response signal by node 14a.
- the central station 16 detected when tag 13a was removed from a store 20a and generated an alarm signal accordingly.
- the removal of the product from store 20a could ins id be detected by node 14e which, in turn, generates the alarm signal and sends it to node 14a. That is, a reader (i.e. detector) in the second node 14e detects when the tag enters the hallway 22 (i.e. from a first zone in store 20a to a second zone in hallway 22).
- the node 14e may further include an audible siren which sounds responsive to the generation of the alarm signal.
- two or more nodes 14 may regulate a single zone.
- the tags 13 sent a response signal 12 to the central station 16 upon purchase of the products to which the tags 13 were attached.
- the central station 16 included an immobilizer which removed the tag identifier (e.g. serial number) of the tags 13 attached to purchased products from the list of tag identifiers of products for sale, thereby immobilizing the tags 13.
- the central station 16 (or node 14) includes an immobilizer which sends a de-activation command to the tags 13 upon purchase of the products.
- a special code would need to be entered by the checkout operator 150 and verified by the central station 16, before the de-activation command can be sent.
- the tags 13 receiving the de-activation command may set a de-activation flag, in which case the tags 13 will not transmit a response signal 12 when the de-activation flag is set, thereby immobilizing the tags 13.
- a tag 13 may be re-activated (i.e. when a product is returned) if required.
- the checkout operator 150 would instruct the central station 16 (or node 14) to send an activation command to the tag 13 which would reset the de-activation flag.
- the tag 13 would therefore transmit a response signal 12 upon receipt of a probe signal 10, provided the de-activation flag is not set.
- the silent alarm system 162 of the third embodiment included a digital camera 160 for capturing single images as a shoplifter leaves a store.
- the digital camera can be substituted with a video camera that records multiple images whilst the reader 30 reads a RFID tag 13.
- a video camera would be provided which continuously records multiple images and information (e.g. ..Ae, time, product identifier) can be added to any images which are captured whilst the reader 30 reads a RFID tag 13.
- the silent alarm system may include a camera orientation means for orienting and/or focusing the camera prior to capturing images.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Automation & Control Theory (AREA)
- Electromagnetism (AREA)
- Multimedia (AREA)
- Toxicology (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Theoretical Computer Science (AREA)
- Library & Information Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Burglar Alarm Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006800287984A CN101238384B (zh) | 2005-07-08 | 2006-07-07 | 射频识别(rfid)标签及技术 |
AU2006269814A AU2006269814B2 (en) | 2005-07-08 | 2006-07-07 | Radio frequency identification (RFID) tags and techniques |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2005903632 | 2005-07-08 | ||
AU2005903632A AU2005903632A0 (en) | 2005-07-08 | Radio Frequency Identification (RFID) Tags and Techniques |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007006085A1 true WO2007006085A1 (fr) | 2007-01-18 |
Family
ID=37636661
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2006/000964 WO2007006085A1 (fr) | 2005-07-08 | 2006-07-07 | Techniques et étiquette d’identification radiofréquence (rfid) |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN101238384B (fr) |
WO (1) | WO2007006085A1 (fr) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009061259A1 (fr) * | 2007-10-09 | 2009-05-14 | Thomas Malm | Procédé et système de localisation d'objets dans des réseaux spontanés sans fil |
JP2010529659A (ja) * | 2007-05-30 | 2010-08-26 | ケーエルエー−テンカー・コーポレーション | 応力ならびにオーバーレイのフィードフォーワード、及び/または、フィードバック・リソグラフィック・プロセス制御 |
US8207820B2 (en) | 2008-06-24 | 2012-06-26 | International Business Machines Corporation | Location localization method and system |
US8228171B2 (en) | 2008-06-20 | 2012-07-24 | International Business Machines Corporation | Methods and systems for RFID tag geographical location using beacon tags and listening tags |
US8289129B2 (en) | 2007-12-20 | 2012-10-16 | International Business Machines Corporation | Locating RFID tags |
US8289167B2 (en) | 2006-06-30 | 2012-10-16 | International Business Machines Corporation | Apparatus for securing a land surveyor'S mark based on the use of a radio frequency identifier tag |
US8634851B2 (en) | 2009-02-16 | 2014-01-21 | Airbus Operations Gmbh | Sensors for an aircraft for locating devices |
EP2532175A4 (fr) * | 2010-02-04 | 2015-03-11 | Carefusion 303 Inc | Dispositif de gestion de stock |
EP2889634A1 (fr) * | 2013-12-24 | 2015-07-01 | Televic Healthcare NV | Système de localisation |
US9588441B2 (en) | 2012-05-18 | 2017-03-07 | Kla-Tencor Corporation | Method and device for using substrate geometry to determine optimum substrate analysis sampling |
US9651943B2 (en) | 2007-04-23 | 2017-05-16 | Kla-Tencor Corp. | Methods and systems for creating or performing a dynamic sampling scheme for a process during which measurements are performed on wafers |
US9659194B2 (en) | 2007-12-20 | 2017-05-23 | International Business Machines Corporation | Dividing tagged items into subsets |
US9709661B2 (en) | 2013-12-24 | 2017-07-18 | Televic Healthcare Nv | Localisation system |
CN107786255A (zh) * | 2016-08-30 | 2018-03-09 | 华为技术有限公司 | 一种与射频设备通信的方法、装置及系统 |
US10539673B2 (en) | 2016-12-30 | 2020-01-21 | Televic Healthcare Nv | False alarm avoidance system |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
CN114363832A (zh) * | 2021-12-16 | 2022-04-15 | 无锡大华锐频科技有限公司 | 一种信息发送的方法、射频标签、射频系统及存储介质 |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101387699B (zh) * | 2008-10-28 | 2011-03-02 | 华南理工大学 | 一种基于rfid和gnss的联合定位方法 |
CN102548033B (zh) * | 2011-10-17 | 2015-09-02 | 杭州仟桥科技有限公司 | 一种可靠性物联网组网布局方法 |
CN102540143B (zh) * | 2011-12-31 | 2013-12-11 | 深圳市高斯贝尔家居智能电子有限公司 | 目标物精确定位方法及系统 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU712986B2 (en) * | 1996-08-26 | 1999-11-18 | Hid Corporation | Electronic anti-shoplifting system employing an RFID tag |
US6177861B1 (en) * | 1998-07-17 | 2001-01-23 | Lucent Technologies, Inc | System for short range wireless data communication to inexpensive endpoints |
US20020177490A1 (en) * | 2001-05-24 | 2002-11-28 | Yook-Kong Yong | Radio frequency identification system for identifying and locating golf balls in driving ranges and golf courses |
US20030214387A1 (en) * | 2002-05-20 | 2003-11-20 | Giaccherini Thomas Nello | Inventory & location system |
US20040143505A1 (en) * | 2002-10-16 | 2004-07-22 | Aram Kovach | Method for tracking and disposition of articles |
GB2408414A (en) * | 2003-11-18 | 2005-05-25 | System 7 Computing Ltd | Vehicle position monitoring system |
-
2006
- 2006-07-07 CN CN2006800287984A patent/CN101238384B/zh not_active Expired - Fee Related
- 2006-07-07 WO PCT/AU2006/000964 patent/WO2007006085A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU712986B2 (en) * | 1996-08-26 | 1999-11-18 | Hid Corporation | Electronic anti-shoplifting system employing an RFID tag |
US6177861B1 (en) * | 1998-07-17 | 2001-01-23 | Lucent Technologies, Inc | System for short range wireless data communication to inexpensive endpoints |
US20020177490A1 (en) * | 2001-05-24 | 2002-11-28 | Yook-Kong Yong | Radio frequency identification system for identifying and locating golf balls in driving ranges and golf courses |
US20030214387A1 (en) * | 2002-05-20 | 2003-11-20 | Giaccherini Thomas Nello | Inventory & location system |
US20040143505A1 (en) * | 2002-10-16 | 2004-07-22 | Aram Kovach | Method for tracking and disposition of articles |
GB2408414A (en) * | 2003-11-18 | 2005-05-25 | System 7 Computing Ltd | Vehicle position monitoring system |
Cited By (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8289167B2 (en) | 2006-06-30 | 2012-10-16 | International Business Machines Corporation | Apparatus for securing a land surveyor'S mark based on the use of a radio frequency identifier tag |
US8610581B2 (en) | 2006-06-30 | 2013-12-17 | International Business Machines Corporation | Securing a land surveyor's mark based on use of a radio frequency identifier tag |
US9651943B2 (en) | 2007-04-23 | 2017-05-16 | Kla-Tencor Corp. | Methods and systems for creating or performing a dynamic sampling scheme for a process during which measurements are performed on wafers |
US9116442B2 (en) | 2007-05-30 | 2015-08-25 | Kla-Tencor Corporation | Feedforward/feedback litho process control of stress and overlay |
JP2010529659A (ja) * | 2007-05-30 | 2010-08-26 | ケーエルエー−テンカー・コーポレーション | 応力ならびにオーバーレイのフィードフォーワード、及び/または、フィードバック・リソグラフィック・プロセス制御 |
WO2009061259A1 (fr) * | 2007-10-09 | 2009-05-14 | Thomas Malm | Procédé et système de localisation d'objets dans des réseaux spontanés sans fil |
US9946900B2 (en) | 2007-12-20 | 2018-04-17 | International Business Machines Corporation | Dividing tagged items into subsets |
US8289129B2 (en) | 2007-12-20 | 2012-10-16 | International Business Machines Corporation | Locating RFID tags |
US9659194B2 (en) | 2007-12-20 | 2017-05-23 | International Business Machines Corporation | Dividing tagged items into subsets |
US8228171B2 (en) | 2008-06-20 | 2012-07-24 | International Business Machines Corporation | Methods and systems for RFID tag geographical location using beacon tags and listening tags |
US8362877B2 (en) | 2008-06-24 | 2013-01-29 | International Business Machines Corporation | Location localization |
US8207820B2 (en) | 2008-06-24 | 2012-06-26 | International Business Machines Corporation | Location localization method and system |
US8634851B2 (en) | 2009-02-16 | 2014-01-21 | Airbus Operations Gmbh | Sensors for an aircraft for locating devices |
RU2590898C2 (ru) * | 2010-02-04 | 2016-07-10 | КЭЭФЬЮЖЭН 303, Инк. | Устройство управления запасами |
EP2532175A4 (fr) * | 2010-02-04 | 2015-03-11 | Carefusion 303 Inc | Dispositif de gestion de stock |
AU2011213153B2 (en) * | 2010-02-04 | 2015-12-03 | Carefusion 303, Inc. | Inventory control device |
US9588441B2 (en) | 2012-05-18 | 2017-03-07 | Kla-Tencor Corporation | Method and device for using substrate geometry to determine optimum substrate analysis sampling |
WO2015097314A1 (fr) * | 2013-12-24 | 2015-07-02 | Televic Healthcare Nv | Système de localisation |
US9709661B2 (en) | 2013-12-24 | 2017-07-18 | Televic Healthcare Nv | Localisation system |
US9746543B2 (en) | 2013-12-24 | 2017-08-29 | Televic Healthcare Nv | Localisation system |
EP2889634A1 (fr) * | 2013-12-24 | 2015-07-01 | Televic Healthcare NV | Système de localisation |
CN107786255A (zh) * | 2016-08-30 | 2018-03-09 | 华为技术有限公司 | 一种与射频设备通信的方法、装置及系统 |
US10539673B2 (en) | 2016-12-30 | 2020-01-21 | Televic Healthcare Nv | False alarm avoidance system |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
CN114363832A (zh) * | 2021-12-16 | 2022-04-15 | 无锡大华锐频科技有限公司 | 一种信息发送的方法、射频标签、射频系统及存储介质 |
CN114363832B (zh) * | 2021-12-16 | 2023-05-23 | 江苏华锐频科技有限公司 | 一种信息发送的方法、射频标签、射频系统及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN101238384B (zh) | 2012-01-18 |
CN101238384A (zh) | 2008-08-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2007006085A1 (fr) | Techniques et étiquette d’identification radiofréquence (rfid) | |
CA2909618C (fr) | Systemes et procedes pour la verification de la separation d'etiquettes de securite | |
US7755485B2 (en) | System and method for electronic article surveillance | |
US5099226A (en) | Intelligent security system | |
US20130201337A1 (en) | Rfid-based asset security and tracking system, apparatus and method | |
US20080284593A1 (en) | Method and system for power management of electronic article surveillance systems | |
CN112041900B (zh) | 用于标签管理和盗窃检测的系统和方法 | |
US11676462B2 (en) | Validating radio frequency identification (RFID) alarm event tags | |
US11721201B2 (en) | Decreasing false alarms in RFID exit portals | |
US11423751B2 (en) | Validating radio frequency identification (RFID) tag alarm events | |
US20220254236A1 (en) | Radio frequency identification (rfid) tag location verification using acousto-magnetic detection | |
US11308780B2 (en) | Radio frequency identification (RFID) tag location verification using acousto-magnetic detection | |
US20220254237A1 (en) | Radio frequency identification (rfid) tag location verification using image data | |
AU2006269814B2 (en) | Radio frequency identification (RFID) tags and techniques | |
JP2001006061A (ja) | 無線タグの電源回路 | |
US11809941B1 (en) | Variable RFID transmit power adjustment based on surrounding environment to enhance tag detection field | |
CN217543947U (zh) | 一种基于地埋式的商品防盗系统 | |
US20210073484A1 (en) | Increased power tag read cycle | |
WO2013077788A1 (fr) | Procédé d'amorçage d'une unité de commande dans un système de surveillance d'article électronique et unité de commande formant une partie d'un tel système |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2006269814 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200680028798.4 Country of ref document: CN |
|
ENP | Entry into the national phase |
Ref document number: 2006269814 Country of ref document: AU Date of ref document: 20060707 Kind code of ref document: A |
|
WWP | Wipo information: published in national office |
Ref document number: 2006269814 Country of ref document: AU |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06752686 Country of ref document: EP Kind code of ref document: A1 |