US20070252687A1 - Method and apparatus for improving the efficiency and accuracy of rfid systems - Google Patents

Method and apparatus for improving the efficiency and accuracy of rfid systems Download PDF

Info

Publication number
US20070252687A1
US20070252687A1 US11/758,086 US75808607A US2007252687A1 US 20070252687 A1 US20070252687 A1 US 20070252687A1 US 75808607 A US75808607 A US 75808607A US 2007252687 A1 US2007252687 A1 US 2007252687A1
Authority
US
United States
Prior art keywords
scramble
reader
signal
array
rfid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/758,086
Inventor
Thorkild Hansen
Michael Oristaglio
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Seknion Inc
Original Assignee
Seknion Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Seknion Inc filed Critical Seknion Inc
Priority to US11/758,086 priority Critical patent/US20070252687A1/en
Assigned to SEKNION, INC. reassignment SEKNION, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: HANSEN, THORKILD, ORISTAGLIO, MICHAEL L.
Publication of US20070252687A1 publication Critical patent/US20070252687A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/10009Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
    • G06K7/10019Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
    • G06K7/10079Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. the collision being resolved in the spatial domain, e.g. temporary shields for blindfolding the interrogator in specific directions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/40Jamming having variable characteristics
    • H04K3/43Jamming having variable characteristics characterized by the control of the jamming power, signal-to-noise ratio or geographic coverage area
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K3/00Jamming of communication; Counter-measures
    • H04K3/80Jamming or countermeasure characterized by its function
    • H04K3/82Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
    • H04K3/825Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/10Jamming or countermeasure used for a particular application
    • H04K2203/20Jamming or countermeasure used for a particular application for contactless carriers, e.g. RFID carriers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K2203/00Jamming of communication; Countermeasures
    • H04K2203/30Jamming or countermeasure characterized by the infrastructure components
    • H04K2203/32Jamming or countermeasure characterized by the infrastructure components including a particular configuration of antennas

Definitions

  • Radio Frequency Identification is a generic term for technologies that use radio waves to automatically identify individual items. Objects can be identified using RFID by storing a serial number that identifies the object on a chip that is attached to an antenna. The chip and the antenna together are called an RFID tag. An RFID reader sends out electromagnetic waves that are received by the antenna on the RFID tag. Passive RFID tags draw power from this electromagnetic field to power the chip. Active tags use their own batteries to power the chip. The tag responds to the reader by transmitting a bit stream to the reader that contains information about the tag (serial number, etc.). The current state of RFID technology is described by [1] K. Finkenzeller in “RFID Handbook” (John Wiley & Sons, 2003).
  • RFID systems operate at many different frequencies. The most common are low frequencies around 135 KHz, high frequencies around 13.56 MHz, ultra-high frequencies around 900 MHz, and microwave frequencies around 2.45 GHz and 5.8 GHz.
  • the RFID reader's efficiency is related to its coverage or “accuracy,” which is measured by the percentage of tags within range that are read correctly.
  • accuracy is not acceptable for many applications, which require 100 percent accuracy.
  • the main cause of low reader accuracy is the inability of readers to transmit enough power to activate tags that are surrounded by other objects such as tags affixed to items stored in the middle of a pallet.
  • the article reports that ad hoc repositioning of the RFID tags or increasing reader power can often fix this problem.
  • the problems of reader collision and low reader accuracy are related: if one attempts to solve the problem of low reader accuracy by increasing the reader power, then the interrogation zones grow and reader collisions become more frequent.
  • the data and scramble signals are transmitted with different beams that are adjusted such that the scramble signals overshadow the data signals in all but selected regions.
  • a tag will respond only if it is located in one of the selected regions, called the interrogation zones.
  • Provisional patent application [2] describes methods for using sum and difference patterns of array antennas to transmit data into selected narrow angular regions.
  • the data signal is shielded by a scramble signal that makes the total transmitted signal unintelligible everywhere except in the narrow angular region.
  • the scramble signal is also allowed to contain its own data that is different from the data carried by the data signal.
  • Provisional patent application [2] further describes how the precise angular positions of RFID tags can be determined.
  • Provisional patent application [4] describes how the width of the interrogation zone can be reduced and how the absolute location of a tag can be obtained from triangulation.
  • Provisional patent application [5] describes how the interrogation zone can be visualized with optical sources.
  • Provisional patent application [6] describes how the efficiency of RFID readers and reader networks can be improved through measurements, modeling, and inversion.
  • the present invention is directed to a method for interrogating RFID tags comprising transmitting a data beam that causes the tags to respond, transmitting one or more scramble beams that do not cause the tags to respond, and adjusting the data beam and the scramble beams such that the scramble beams overshadow the data beam in all but selected regions.
  • a tag can respond to the data signal either by broadcasting or changing its stored information.
  • a scramble beam can contain a separate intelligible data stream and can charge tags that are not being interrogated.
  • the data signal bits are divided into two or more parts. For each part of the data signal, a corresponding scramble-beam direction is defined that is slightly away from the direction of the data beam. Each part of the data signal is then transmitted while the scramble beam has its central null steered towards a corresponding scramble-beam direction.
  • the division of the data signal must be such that a tag responds only if it receives all the data bits.
  • the scramble signal is a sine wave.
  • the scramble beams have approximately constant amplitudes away from their central null, so that the total radiated power from the reader is approximately omni-directional. Constant-amplitude scramble beams are achieved by moving zeros far off the Schelkunoff unit circle or by iterative methods.
  • the method further comprises employing two or more array readers that scan an area with data and scramble beams to determine the angular positions of each tag within range.
  • the angular positions obtained with two or more readers determine the absolute position of the tags through triangulation.
  • anti-collision methods are employed when more than one tag responds at any given scan angle.
  • the reader and tags are inductively coupled and the reader employs two or more loops to transmit data and scramble signals.
  • the loop configuration of the reader is optimized with iterative techniques to ensure that the magnetic field of the data signal is overshadowed by the magnetic field of the scramble signal except in selected regions.
  • the security measures described in [2] and [3] are employed to enhance the security of the RFID system.
  • the present invention is further directed to a method for optically displaying the interrogation zone of an RFID reader that includes the steps of attaching an optical source to an RFID reader and transmitting one or more light beams with said optical source to visualize the interrogation zone.
  • the light beam is pointed in the direction of the center of the interrogation zone.
  • two or more light beams are transmitted such that each light beam coincides with a boundary of the interrogation zone.
  • a light beam is scanned back and forth between the boundaries of the interrogation zone.
  • the light beams are transmitted with lasers.
  • the optical source is built into the housing of the RFID reader. In another embodiment of the present invention, the optical source is attached to the housing of the RFID reader.
  • the present invention is additionally directed to methods for improving the efficiency of RFID systems.
  • the reader employs two antennas that broadcast both data and scramble signals.
  • the antennas are patch antennas.
  • the reader employs three antenna elements where two of them transmit the scramble signal and one interrogates the tags.
  • the reader employs one standard commercially available reader and two additional antennas that broadcast a scramble signal.
  • the array excitation coefficients for the data and scramble signals are adjusted to create an interrogation beam that precisely fits an opening in a container.
  • the reader employs an antenna that transmits two or more interrogation beams designed such that any tag in the interrogation zone receives sufficient power to operate from at least one of the interrogation beams.
  • the reader employs two or more scramble beams to prevent leakage of the data signal.
  • two sets of scramble-beam coefficients are mirror images.
  • a network of readers transmits both data and scramble beams adjusted to create closely spaced independent interrogation zones.
  • the positions of the readers is determined from the solution of an inverse source problem.
  • the excitation coefficients are determined from the solution to an inverse source problem.
  • the inverse source problem is solved with an iterative optimization scheme.
  • the tags are placed at locations where the tag antenna creates maximum disruption of the field distribution.
  • the field distribution on an object is computed with a numerical method.
  • an RFID reader uses a bistatic mode of operation. In one embodiment of the present invention, the RFID reader uses a multistatic mode of operation. In one embodiment of the present invention, the location of the RFID reader receivers are determined by solving a scattering problem with a model for a typical tagged item.
  • FIG. 1 illustrates an 18-element linear array.
  • FIG. 5 illustrates a square planar array with 324 elements.
  • FIG. 6 illustrates a mapping of the excitation coefficients for the sum pattern of the 324-element planar array.
  • FIG. 7 illustrates a 3-D mapping of the array sum pattern corresponding to the excitation coefficients.
  • FIG. 8 illustrates a mapping of the excitation coefficients for the cosine difference pattern of the 324-element planar array.
  • FIG. 9 illustrates a 3-D mapping of the array difference pattern corresponding to the excitation coefficients.
  • FIG. 10 illustrates a circular ring array
  • FIG. 11 is a perspective view of a reflector antenna with its feed at the focal point.
  • FIG. 12 illustrates a linear array with 4 elements having element spacing equal to 10 cm.
  • the array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot.
  • the array elements are patch antennas and both sets of excitation coefficients are shown above the plot.
  • the array elements are patch antennas and both sets of excitation coefficients are shown above the plot.
  • FIG. 16 illustrates a linear array with 8 elements having element spacing equal to 6.25 cm.
  • the array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot.
  • the array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot.
  • FIG. 19 illustrates a scanning-array positioning system that employs two array-antenna readers.
  • FIG. 20 illustrates an inductive RFID reader employing two loops parallel to the x-y plane.
  • FIG. 21 illustrates the magnitudes of the z-components of the magnetic fields for the data and scramble signals transmitted by the inductive reader in FIG. 20 .
  • FIG. 22 illustrates an RFID tag reader with an optical source attached to its housing.
  • FIG. 23 illustrates the ratio of the scramble signal and data signals for a four-element array reader operating around 900 MHz.
  • the data signal dominates in the black shaded zone.
  • the two light beams mark the boundaries of the interrogation zone.
  • FIG. 24 illustrates the geometry for an array of two antenna elements that can be tilted independently with respect to the array axis.
  • FIG. 25 illustrates a schematic of RF control electronics for a two-element array.
  • Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal.
  • the beam patterns for each signal are determined by the weighting coefficients (in boxes); phase shifts (time delays) can be used to steer the total beam pattern in a specific direction.
  • FIG. 26 illustrates free-space signal strength of data beam (Left) and scramble beam (Right). Axis units are meters.
  • FIG. 27 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right).
  • FIG. 28 illustrates total signal strength of the data beam (Left) and the scramble beam (Right) when the beams are broadcast toward a concrete wall.
  • FIG. 29 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right) when the reader broadcasts toward a concrete wall.
  • FIG. 30 illustrates geometry for an array of three identical patch antennas.
  • the middle antenna broadcasts the data signal.
  • the outer antennas broadcast scramble signals.
  • the two outer elements are tilted by the angle ⁇ .
  • FIG. 31 illustrates a schematic of RF control electronics for a three-element array.
  • the middle antenna element is driven by the data signal.
  • the two outer elements are driven by the scramble signal.
  • the beam patterns for each signal are determined by the weighting coefficients (in boxes).
  • FIG. 33 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right).
  • FIG. 34 illustrates the geometry for an array of four identical antenna elements.
  • FIG. 35 illustrates a schematic of RF control electronics for a four-element array.
  • Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal.
  • the beam patterns for each signal are determined by the weighting coefficients (in boxes); phase shifts (time delays) can be used to steer the total beam pattern in a specific direction.
  • FIG. 36 illustrates the geometry of a 3D model of an RF tag reader (array), operating in front of a conveyor belt in a room with a metal wall and concrete floor and ceiling.
  • FIG. 37 illustrates interrogation zones above the conveyor belt where the data signal is more than 10 dB greater than the scramble.
  • the top plot shows the interrogation zone for a simple superposition of one data beam and one scramble beam. Because of multi-path effects, the scramble beam has nulls that cause leakage of the data signal into undesired regions.
  • the bottom plot shows the results of a more sophisticated scheme that uses two scramble beams to eliminate leakage.
  • FIG. 38 illustrates top and side views of a 3D model of a network consisting of two RF tag readers and one scramble transmitter that each uses a 2-element antenna array.
  • the readers operate in front of a concrete wall in a room with concrete floor and ceiling.
  • FIG. 39 illustrates signal strengths of the data beams of the two readers in FIG. 38 . Reflections in the wall, floor, and ceiling are included. Axis units are in meters.
  • FIG. 40 illustrates interrogation zones of the data beams of the two readers in FIG. 38 when they broadcast toward the concrete wall. Reader collision occurs near the origin. Both readers set off tags on both conveyer belts so it is not possible to determine which conveyer belt carried a given item.
  • FIG. 41 (Left) illustrates the ratio of total scramble beam (obtained with the scramble transmitter and the two readers) to data beam of the reader on the left.
  • FIG. 41 (Right) illustrates the ratio of total scramble beam to data beam of the reader on the right. Tags are interrogated only in the regions where a data beam dominates.
  • FIG. 42 illustrates two independent interrogation zones obtained with the combined data and scramble beams of the scramble transmitter and the two readers. Reader collision is avoided, and it is possible to tell which conveyer belt carries a given item.
  • FIG. 43 illustrates a 2D model of a reader that interrogates a tag placed on a high-dielectric object.
  • the field of a line source (the reader) illuminates a dielectric cylinder (bottle containing a liquid).
  • a conducting wire (the tag) is close to the surface of the cylinder.
  • FIG. 44 illustrates the total field in the vicinity of the dielectric cylinder when the wire is removed.
  • the white circle marks the surface of the cylinder.
  • FIG. 45 illustrates the total field in the vicinity of the dielectric cylinder when the wire is placed on the side of the cylinder (as seen from the reader).
  • FIG. 46 illustrates the total field in the vicinity of the dielectric cylinder when the wire is placed on the back of the cylinder (as seen from the reader).
  • FIG. 47 illustrates the difference far field for tag placed on the side of the cylinder.
  • the amplitude of the backscattered field is very low.
  • FIG. 48 illustrates the difference far field for tag placed on the back of the cylinder.
  • the amplitude of the backscattered field is large.
  • FIG. 49 illustrates a Bistatic RFID reader with a transmitter and a receiver that interrogates a collection of tags that are placed on items in a box.
  • the present invention provides (a) designs for RFID readers, (b) a method for reducing the width of the interrogation region, (c) a method for providing a user defined interrogation zone for one or more readers, (d) a method for location of transceivers in 2D and 3D using more than one information-steering transmitter, (e) a method for precise tag location that works in the induction regime where the wavelength is much longer than the physical dimensions involved, (f) a new set of security measures for RFID systems, (g) a method for optically displaying the interrogation zone, (h) a method for overcoming multipath effects, (i) a method for optimal tag placement, and (j) a bistatic RFID reader.
  • a common feature in items (a)-(f) is that two or more signals are transmitted simultaneously, including:
  • a reader is said to employ information steering when it transmits both data and scramble signals.
  • the present invention makes extensive use of antenna arrays.
  • the following references describe the theory and design of phased arrays: R. C. Hansen, “Phased Array Antennas,” John Wiley & Sons, 1998; R. J. Mailloux, “Phased Array Antenna Handbook,” Artech House, 1994; and, R. S. Elliot, “Antenna Theory and Design,” IEEE Press, 2003.
  • adaptive phased arrays also known as smart antennas, the received signals and environmental parameters are fed to powerful processors that steer the beams to optimize performance.
  • FIG. 1 is a graph of a linear array with 18 elements having element spacing of half of a wavelength.
  • the data time signal is represented by a(t), which depends on the chosen modulation and coding techniques, and on the transfer functions of the antenna elements.
  • the present invention works for any modulation and coding techniques and for any set of array elements.
  • T p ( t ) A p a ( t ⁇ p ) where A p is the excitation coefficient and ⁇ p is the time delay.
  • a p is the excitation coefficient
  • ⁇ p is the time delay.
  • each array element with time functions that have different time dependence to compensate for array imperfections, end-element effects, or array elements differences. Such adjustments would be well known and straightforward to those working in this area. Therefore, it is assumed presently that the time dependence of each input signal is the same (the amplitudes and time delays are different).
  • a typical array radiation pattern and the associated excitation coefficients are shown in FIG. 2 for the 18-element linear array shown in FIG. 1 .
  • the element spacing is equal to half a wavelength. All time delays are zero, so the array operates in broadside mode. Since all the excitation coefficients have the same sign, the array radiates a sum pattern, which is characterized by a main beam and side lobes that are below a certain level ( ⁇ 55 dB in the embodiment shown in FIG. 2 ).
  • Beam steering can be achieved by assigning nonzero values to the time delays, which results in the complex excitation coefficients A p exp(i2 ⁇ f 0 ⁇ p ) when the exp( ⁇ i2 ⁇ f 0 t) time dependence is suppressed and f 0 is the frequency at which the sum pattern is evaluated.
  • a difference pattern may be broadcast.
  • a difference pattern and the associated excitation coefficients are shown in FIG. 3 for the 18-element array shown in FIG. 1 .
  • the difference pattern has a deep null in the center that is surrounded by two steep peaks.
  • the term “difference pattern” is used because half of the excitation coefficients are positive and the other half negative.
  • the time delays in FIG. 3 are all zero. As seen for the sum pattern, beam steering can be achieved by assigning nonzero values to the time delays.
  • a narrow interrogation zone is obtained with the present invention by feeding each element with a total signal that is obtained by adding at least one scramble signal to the data signal.
  • FIGS. 2 and 3 the sum and difference patterns of FIGS. 2 and 3 are plotted together as shown in FIG. 4 .
  • the data signal a(t) is transmitted through the sum pattern, and the scramble signal is transmitted through the difference pattern.
  • An observer located at the nulls of the difference pattern will receive only the data signal.
  • an observer located at nulls of the sum pattern will receive only the scramble signal.
  • the present invention may also be used with planar arrays such as the 324-element array (18 elements by 18 elements) shown in FIG. 5 .
  • the element spacing is half a wavelength.
  • FIG. 6 shows a typical set of sum excitation coefficients
  • FIG. 7 shows the corresponding array sum pattern.
  • the array pattern is almost independent of ⁇ and has a main beam in the broadside direction. Standard methods, as previously noted, can be used to steer the beam in any desired direction.
  • the difference patterns with sharp nulls have cos( ⁇ ) or sin( ⁇ ) angular dependence.
  • the ⁇ independent difference patterns for planar arrays result in a broadening of the angular regions in which the signals are intelligible.
  • FIG. 8 shows a set of difference excitation coefficients with cos( ⁇ ) angular dependence
  • FIG. 9 shows the corresponding difference pattern.
  • the excitation coefficients for both the sum and difference patterns for the planar array may be obtained with semi-analytical methods to achieve prescribed side lobe levels and main beam widths. Alternatively, the coefficients may be obtained with nonlinear optimization techniques.
  • the coefficients as shown in FIGS. 6 and 8 are obtained with the MATLABTM function FMINUNC, which minimizes a user-defined cost function. The cost function is designed to ensure that the side lobes are below a certain level for all ⁇ .
  • the excitation coefficients and array pattern for a sin( ⁇ ) difference pattern are obtained by rotating the plots as shown in FIGS. 8 and 9 ninety degrees around the z axis.
  • T p ( t ) A p a ( t ⁇ p )+ B p b ( t ⁇ p )+ C p c ( t ⁇ p )
  • B p and C p are the excitation coefficients
  • ⁇ p and ⁇ p are time delays
  • ⁇ p (p 1, 2, . . . .
  • N are the time delays for the data signal.
  • Interrogation zones in accordance with the present invention may also be achieved with arrays that are neither linear nor planar.
  • the circular ring array shown in FIG. 10 is useful for providing 360° coverage.
  • the interrogation zones can be obtained with sum and difference patterns obtained from standard theory.
  • Similar interrogation zones can be realized with reflector antennas as shown in FIG. 11 by applying the present invention to its feed, which is typically a smaller antenna located at the focal point. More generally, one may use the present invention for any antenna type to obtain sum and difference patterns that can be combined to achieve the desired interrogation zones.
  • the examples herein are confined to sum and difference patterns because such patterns have been studied extensively in the radar literature.
  • Interrogation zones in accordance with the present invention can be achieved, however, with any combination of array patterns in which one of the patterns (the “difference pattern”) has a null in the direction of the tags of interest and is larger in magnitude than the other pattern (the “sum pattern”) in directions where other tags may be present.
  • difference patterns must be slightly broader than the sum patterns to achieve the desired interrogation zones.
  • the numerical examples presented herein demonstrate that difference patterns may be designed to have beam widths that are just slightly broader than the beam widths of the corresponding sum patterns.
  • one feeds element #p with a signal of the form: T p ( t ) A p a ( t )+ B p b ( t ) where a(t) is the data signal and b(t) is a scramble signal.
  • a p and B p are the excitation coefficients for the data and scramble signals, respectively.
  • FIG. 13 shows the far field of the reader for the case where the array elements are z-directed dipoles with array excitation coefficients given above the plot.
  • the present invention also contemplates a design for a hand-held reader that radiates little energy in the backward direction (towards the operator).
  • the array elements are made of patch antennas with sin 2 ( ⁇ ) radiation patterns in the forward direction and very low radiation pattern in the backward direction.
  • FIG. 14 shows the field of this reader for forward directions 0 ⁇ 180°. The patterns of the patch antennas ensure that the field in the backward directions 180° ⁇ 360° is low.
  • the width of the angular region of the data signal is reduced by dividing the data signal bits into two parts: the first part and the second part.
  • the first part is transmitted while the scramble beam has its central null steered slightly to one side of the direction of the data beam.
  • the second part of the data signal is transmitted while the scramble beam has its central null steered slightly to the other side of the direction of the data beam.
  • the division of the data signal must be such that a tag responds only if it receives both the first and second part of the data signal.
  • FIG. 15 shows how this method can be implemented with the four-element array in FIG. 12 , with patch antennas.
  • the excitation coefficients are provided above the plot.
  • the width of the data-signal region there is no lower limit on the width of the data-signal region obtainable with this method.
  • This method of reducing the width of the data-signal region works also for other the types of antennas described above and in [2].
  • the method works for planar arrays if the two scramble-beams nulls are steered in orthogonal directions (planar arrays require two scramble beams as explained above and in [2]).
  • Another way of reducing the width of the data-signal region is to continuously vary the direction of the scramble beam while the data signal is being transmitted.
  • Yet another way of reducing the width of the data-signal region is to increase the power of the scramble beam(s), and thereby move the scramble-beam shoulders above the peak of the data beam.
  • a reader can be designed such that its radiated power is omni-directional while its data signal stays highly directional.
  • Typical data and scramble beams for this array are shown in FIG. 17 .
  • the theory related to the Shelkunoff unit circle is described in the book “Antenna Theory and Design” by R. S. Elliot, IEEE Press, 2003.
  • the reader provides little energy to charge or communicate with the tags that are located outside this 60° angular region.
  • FIG. 18 shows a scramble beam that has all its zeros, except the central one, located on a circle in the complex plane of radius 1.46.
  • the excitation coefficients are given above the figure. All the excitation coefficients for the scramble beam in FIG. 18 are positive except the last one, which equals ⁇ 1. The sum of these coefficients equals zero.
  • the array used in this section operates at 2.4 GHz.
  • the method for creating a reader with omni-directional power pattern works for any frequency that results in electromagnetic wave propagation, and in particular for the popular RFID frequencies around 900 MHz.
  • the Schelkunoff unit circle representation instead of using the Schelkunoff unit circle representation to achieve the constant-level scramble signal, one can use the iterative array-synthesis methods discussed above and in [2] with appropriate cost functions.
  • the iterative methods can be used directly to achieve constant-level scramble beams for ring arrays and planar arrays.
  • This section describes the method of the present invention for determining the precise location of tags.
  • the method may be explained with reference to FIG. 19 where the tags are located inside a room with two array readers placed on the walls.
  • the array readers transmit narrow signal beams surrounded by scramble beams as described above.
  • the beams are scanned using standard beam steering.
  • the data signal simply causes a tag to transmit its tag identification number.
  • the data signal contains the current scan angle and a reader identification number, and the tags respond by re-transmitting that scan angle and reader identification number along with a tag identification number. If two or more tags are present in the region of the data signal at any given scan angle, prior art anti-collision methods are employed [1, Chapter 7].
  • the tag transmissions can be recorded by the readers or by other receivers.
  • a table is populated with a field for each tag that contains the scan angles for which the tag received a signal beam from each of the two readers.
  • a tag typically receives the data signal from a reader at more than one scan angle since the scan-angle increments are smaller than the width of the data-signal beam.
  • array reader # 1 and array reader # 2 To determine the position of tags located directly in the line-of-sight between array reader # 1 and array reader # 2 requires an additional array reader. For many applications, however, it is possible to place array reader # 1 and array reader # 2 such that no tag can be located directly between the readers, and all tag positions can be determined with array reader # 1 and array reader # 2 .
  • the optimal positions for the readers depend on the spatial distribution of the tags and on possible obstacles that can interfere with the transmissions. For some indoor applications, it is advantageous to hang from the ceiling ring-array readers that each can scan 360 degrees. The position of a tag could be determined from the transmission of two ring-array readers, provided the tag is not directly between those readers. A combination of ring-array, planar-array, and linear-array readers may be optimal in complicated scenarios.
  • the readers are stationary and the tags are allowed to move around.
  • a reader can be any type of active transceiver with a narrow signal beam, including planar array antennas that have pencil-like signal beams suitable for 3D location.
  • a tag can be any type of passive or active transceiver that can be placed on an object whose precise location is sought. Such tag-reader systems can replace laser and GPS positioning systems in certain applications.
  • a tag can continuously transmit the positions of the vehicle to any receiver within range.
  • Another application of such precision tag-reader systems is land surveying, where the locations in 3D are sought for surface features in the area of interest.
  • Yet another application is remote sensing where the position of receivers must be known precisely.
  • the present invention also provides a method for determining the position of a vehicle in an area where multiple tags are placed at known locations on stationary objects such as walls.
  • An RFID reader mounted on the vehicle can determine the position of the vehicle by recording the angles of at least two tags using triangulation.
  • Inductive RFID systems operate at frequencies below 50 MHz, where the wavelength is much longer than the physical dimensions involved, and the reader and tags are inductively coupled. Precise tag location and user-defined interrogation regions can be achieved with inductive RFID systems as described below.
  • the reader employs two small loops that lie in the x-y plane with their center points 10 cm apart.
  • the spatial dependence of the magnetic fields emitted by such loops can be approximated well by the spatial dependence of the magnetic fields of z-directed static magnetic dipoles, as described in the reference “Plane-wave theory of time-domain fields” by T. B. Hansen and A. D. Yaghjian, IEEE Press, 1999.
  • FIG. 21 shows the magnitudes of the z-components of the resulting magnetic fields at the tag locations obtained from the magnetic dipole approximation. Also shown in FIG. 21 is the noise floor that determines the minimum signal strength required to interrogate a tag. If the scramble signal is turned off, all tags within a 75 cm region respond to the reader (75 cm is approximately the interrogation width obtained with a reader that employs only a single loop antenna). With the scramble signal turned on, only tags within a 10 cm region respond to the reader, thereby allowing the precise location of individual tags and reducing tag collisions. The scramble signal can charge and prepare the tags for interrogation in a scenario where the reader scans along a line.
  • high-security RFID systems should have defense mechanisms against the following three types of attacks: (1) Unauthorized reading of a data carrier in order to duplicate and/or modify data. (2) The placing of a foreign data carrier within the interrogation zone of a reader with the intention of gaining access to a building or receiving services without payment. (3) Eavesdropping into radio communications and replaying the data in order to imitate a genuine data carrier (“replay and fraud”).
  • RFID systems currently use authentication and encryption methods to defend against these attacks. These defense methods have certain inherent weaknesses as described in [2] and [3]. Additional security measures can be obtained by using the secure transmission and reception techniques described in [2] and [3]. These techniques work for any wireless communication system, including systems that operate in the inductive regime as demonstrated above.
  • the scramble signals can prevent an eavesdropper located outside the interrogation zone from gaining access to the data stream that is broadcast by the RFID reader.
  • Highly directive antennas can be employed to prevent eavesdropping and unauthorized access to the network.
  • Nulls can be placed in the receiving pattern of the reader to prevent unauthorized access to the network.
  • This section describes a method for optically displaying the interrogation zone of an RFID reader.
  • the reader interrogates only tags located in the interrogation zone.
  • An optical source attached to the RFID reader sends out one or more light beams that visualize the interrogation zone.
  • the optical source can be a small laser pointer that transmits a beam in the direction of the center of the interrogation zone.
  • the user will see a laser dot on an object that is located in the center of the interrogation zone.
  • the reader can be pointed precisely toward a selected object.
  • the boundaries of the interrogation zone can be displayed, as illustrated in the following example.
  • FIG. 23 shows an optical source that sends out two light beams and is attached to a four-element hand-held tag reader that operates at frequencies around 900 MHz.
  • the element spacing is 10 cm and the total array length is 30 cm.
  • This type of tag reader is described in [4].
  • FIG. 23 shows the ratio in dB of the scramble signal and the data signal in a 20 meter by 20 meter region of space, color coded with a gray scale color map.
  • the data beam dominates in the shaded region, which therefore is the interrogation zone for the reader.
  • the optical source transmits two light beams that coincide with the boundaries of the interrogation zone, as shown in FIG. 23 and described in [5].
  • the two light beams are generated by two laser pointers that produce red dots on objects that are at the edges of the interrogation zone. Thus, the user can see which objects are in the interrogation zone.
  • FIG. 24 shows a compact RFID reader design that employs a two-element antenna array, as described in [6].
  • the antenna elements can be of any type suitable for broadcasting at the RFID frequencies.
  • the array elements can be tilted independently with respect to the array axis.
  • FIG. 25 shows the schematic of RF control electronics for the two-element array.
  • Each antenna element is driven by a linear combination of two RF signals: a data and a scramble signal.
  • the beam patterns for each signal are determined by the weighting coefficients A 1 , A 2 , B 1 , and B 2 .
  • Phase shifts time delays
  • B 1 ⁇ B 2 .
  • FIG. 26 shows the free-space field distributions in the x-y plane when the array elements are patch antennas with (1+cos(v)) patterns, where v is the angle between the element normal and the observation point in the x-y plane, displaying the strength of the data beam (Left) and the scramble beam (Right).
  • the sum pattern carries the data signal and the difference pattern carries the scramble signal.
  • the data signal ( FIG. 26 Left) has its peak in the broadside direction where the scramble signal ( FIG. 26 Right) has its null.
  • the plot on the left in FIG. 27 shows the tag interrogation zone achieved with a reader that broadcasts only the data signal. All tags at the edge of the interrogation zone receive just enough power to function. Tags outside the interrogation zone do not receive enough power.
  • FIG. 27 shows the interrogation zone obtained when the reader broadcasts both data and scramble signals.
  • a tag For a tag to function in this mode of operation, it must be in a location where two conditions are met: (1) the power of the data signal is sufficient to set off a tag and (2) the data signal overshadows the scramble signal (the data signal is at least 10 dB larger than the scramble signal in the dark shaded area of the right plot in FIG. 27 ; this 10 dB threshold is an arbitrary figure chosen for illustration purposes only, the actual threshold will depend on the particular system being used).
  • the interrogation zone obtained with information steering is much narrower than the interrogation zone achieved with a standard broadcast scheme.
  • the angular extent of the interrogation zone is independent of the power levels of the signals, provided the ratio of the scramble signal power and data signal power is kept constant.
  • the array excitation coefficients for the data and scramble signals can thus be adjusted to create an interrogation beam that precisely fits an opening of a container.
  • FIG. 28 shows the total field distributions (direct field plus reflected field) for the data and scramble signals. More specifically, FIG. 28 shows the total signal strength of the data beam (Left) and the scramble beam (Right) when the beams are broadcast toward a concrete wall. The field distributions have ripples (peaks and nulls) that result from the direct and reflected fields being in and out of phase. Close to the reader, however, the direct field dominates.
  • FIG. 29 shows the interrogation zones based on the same value for the required power level that was used in FIG. 27 . The interrogation zone of the data signal alone ( FIG. 29 Left) has widened because the reflected field from the wall can set off additional tags.
  • the interrogation zone achieved by broadcasting both data and scramble signals ( FIG. 29 Right) is much narrower and the power of the reflected scramble signal prevents additional tags from being set off.
  • This example illustrates that the two-element reader can work in a multipath environment.
  • a standard commercially available reader can be augmented to achieve a narrow well-defined interrogation zone.
  • the standard reader employs one antenna that broadcasts a single interrogation beam. From the discussion that follows, it is straightforward to augment standard readers that employ multiple antennas.
  • FIG. 30 shows the antenna array consisting of the antenna of the standard reader in the middle surrounded by two scramble-signal antennas, where the array comprises three identical patch antennas.
  • the middle antenna broadcasts the data signal.
  • the outer antennas broadcast scramble signals.
  • the two outer elements are tilted by the angle ⁇ .
  • the signals fed to the scramble antennas are 180° out of phase and generated by a scramble signal generator as shown in FIG. 31 .
  • the signal fed to the middle antenna is simply the signal from the standard reader, which need not be modified.
  • the two outer elements are driven by the scramble signal.
  • the antenna elements can be tilted to achieve the desired interrogation zone as described in [2].
  • the beam patterns for each signal are determined by the weighting coefficients, as shown in the boxes in FIG. 31 .
  • FIG. 32 shows the resulting field distribution of the data beam (Left) and scramble beam (Right).
  • FIG. 33 shows the interrogation zones (assuming that the power level is adjusted to achieve a 10 m range) for the standard reader that broadcasts only a data signal (Left) and for the augmented reader in FIG. 31 that broadcasts both scramble and data beams (Right).
  • the augmented reader has a much narrower interrogation zone.
  • the design in FIG. 31 does not require data and scramble signals to be mixed since each antenna element transmits only a data or a scramble signal. This design can therefore be a cost-effective embodiment of a reader that operates in accordance with the principles of [2].
  • FIG. 34 shows a reader that consists of four x-directed dipole antennas that operate at 900 MHz with the excitation coefficients in FIG. 35 .
  • FIG. 35 shows a schematic of RF control electronics for the four-element array shown in FIG. 34 .
  • Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal.
  • the beam patterns for each signal are determined by the weighting coefficients (in boxes). Phase shifts (time delays) can be used to steer the total beam pattern in a specific direction.
  • the reader broadcasts toward a metal wall 3 m away as shown in FIG. 36 .
  • FIG. 37 shows the interrogation zones for a simple superposition of one data beam and one scramble beam 50 cm above the conveyer belt where the data signal is at least 10 dB greater than the scramble. The data signal leaks out in several locations as indicated because multipath effects produce areas where the scramble signal is too weak.
  • This leakage can be eliminated by a modification of the broadcast scheme, which uses complementary scramble signals broadcast from the same array and creates the narrow interrogation zone shown in the bottom plot of FIG. 37 .
  • This new scheme operates as follows: Two complementary scramble patterns are created, for example, using the set of scramble array coefficients in FIG. 35 and its mirror image. These two scramble patterns can be broadcast simultaneously using two different scramble signals and additional mixing elements in the control electronics. Alternatively, the two signals can be broadcast sequentially during the same interrogation cycle.
  • the bottom plot of FIG. 37 illustrates how narrow interrogation zones can be achieved even in severe multipath environments with the additional scramble signal.
  • the data signals can also be affected by multipath making it impossible to interrogate tags at certain locations. This problem can in some cases be overcome by broadcasting the data signal with multiple sets of excitation coefficients. To avoid interference, the various data beams should be broadcast sequentially.
  • Optimal sets of excitation coefficients can be determined from modeling and/or on-site measurements with the following procedure: (1) Set all excitation coefficients equal to zero except the excitation coefficient for the first array element, which is set equal to one. (2) Compute or measure the one-element field distribution over the desired interrogation zones. (3) Repeat this procedure for all other array elements to obtain N sets of one-element field distributions for an array with N elements. (4) Use linear combinations of the one-element field distributions to compute the total field distribution when the array is driven by a particular set of excitation coefficients. (5) Select sets of excitation coefficients so that the combined beams result in correct interrogation of tags placed at arbitrary locations in the interrogation zone.
  • Step (5) of the procedure can be achieved as follows: Start with a first set of excitation coefficients that would work for free space. Determine the locations in the interrogation zones where the corresponding field distribution is too weak when the reader operates in the multipath environment of interest. Determine a second set of excitation coefficients by modifying the first set of excitation coefficients, which creates a field distribution that fills out the areas where the field distribution of the first set of excitation coefficients is too weak.
  • the modification of the first set of excitation coefficients can be achieved, for example, by slightly changing the phase and by changing the order of the excitation coefficients.
  • FIG. 38 shows two readers that are located in a room with a concrete wall, floor, and ceiling.
  • the readers interrogate tags placed on items that move on two conveyer belts.
  • Each reader uses the two-element array of patch antennas illustrated in FIGS. 24 and 25 .
  • the readers are in close proximity of each other and the concrete wall. Concrete is modeled by a homogeneous medium with a relative permittivity of 6 and a conductivity of 0.1 S/m.
  • the field distributions are computed from geometrical optics with one bounce off each surface included.
  • Polarization, reflection coefficients, and geometrical spreading are included in these calculations (this simulation and the other simulations are included simply for purposes of illustration; a different calculation of the field can be used in any given configuration to determine the fields to whatever order is needed).
  • the power levels are adjusted so that when a reader operates in free space the data signal is just strong enough to set off tags 10 m away from the reader in the main-beam direction, as shown in FIG. 27 .
  • FIG. 39 shows the total field distributions 1.5 m above the concrete floor of the data signals of the left and right reader.
  • the direct and reflected fields being in and out of phase cause the ripples of the total field.
  • FIG. 40 shows the interrogation zones of the two readers when they broadcast only data signals.
  • a tag placed near the origin will receive enough power from both readers to be powered up. However, such a tag would not function properly, even if the two readers broadcast at different frequencies, because it simultaneously receives two sets of instructions (reader collision occurs). Hence, the readers cannot operate simultaneously.
  • both readers interrogate tags on both conveyer belts, so it would not be possible to determine which belt carried a tagged item.
  • FIG. 41 shows the ratio of total scramble beam (obtained with the scramble transmitter and the two readers) to data beam of the reader on the left.
  • FIG. 41 (Right) shows the ratio of total scramble beam to data beam of the reader on the right.
  • Tags are interrogated only in the regions where a data beam dominates. The data signals dominate in the dark shaded regions.
  • the optimization can be carried out by interactive methods that minimize a user-defined cost function (see, for example, P. Venkataraman, “Applied Optimization with MATLAB Programming,” Wiley, 2001). This approach is equivalent to an inverse source problem where the task is to determine the strength and location of sources that result in a desired field distribution.
  • the array element locations are fixed and on-site measurements are carried out to determine the N one-element field distributions described above. These N data sets are subsequently used in an optimization procedure that determines array coefficients that produce the desired interrogation regions.
  • the tag antennas such that the electric field is disturbed as much as possible. For example, if the tag antenna is a linear dipole and the object is a soda bottle, the dipole should be placed at a point on the surface of the bottle where the electric field is strongest. Moreover, the tag antenna should be aligned with the electric field at that point. For soda bottles on a pallet, the optimum tag locations may vary from bottle to bottle.
  • this method works in the following way: the item to be tagged is modeled by an infinite dielectric cylinder of radius 5 cm with a relative dielectric constant of 81 and a conductivity of 0.01 S/m.
  • the field of a line source (the reader) illuminates a dielectric cylinder (bottle containing a liquid).
  • a conducting wire (the tag) is close to the surface of the cylinder.
  • the reader is modeled with an electric line source 5 m away that broadcasts at 900 MHz. Assume that the reader is monostatic: the transmitting and receiving antennas are collocated.
  • FIG. 44 shows the resulting total electric field inside and outside the dielectric cylinder, whose circumference is indicated by a distinct circle.
  • FIGS. 45 and 46 The field distributions obtained with a thin wire placed on the side and on the back of the dielectric object are shown in FIGS. 45 and 46 , respectively. As expected, the wire placed on the back ( FIG. 46 ) alters the field much more than the wire placed on the side ( FIG. 45 ).
  • a short-circuited tag antenna is a thin wire
  • an open-circuited tag antenna is an absent wire.
  • a tag placed on the side of the dielectric object communicates with the reader by changing the field distribution from the one displayed in FIG. 44 (tag antenna open-circuited) to the distribution in FIG. 45 (tag antenna short-circuited).
  • a tag placed on the back of the dielectric object communicates with the reader by changing the field distribution from the one displayed in FIG. 44 (tag antenna open-circuited) to the distribution in FIG. 46 (tag antenna short-circuited).
  • the difference fields recorded by the reader far from the dielectric cylinder are shown in FIG. 47 (tag placed on side of cylinder) and FIG. 48 (tag placed on back of cylinder).
  • the difference field is very weak when the tag is placed on the side of the cylinder, so the tag may not be read correctly.
  • a much stronger difference field results (at least 100 times stronger) and the chances that the reader accurately obtains the information stored on the tag greatly improves.
  • FIG. 49 shows a bistatic RFID reader consisting of a transmitter and a receiver that interrogates a collection of tags that are placed on items in a box.
  • the difference field in FIG. 47 attains its maximum values at locations that are approximately 90° away from the transmitting antenna of the reader.
  • the reader would more effectively interrogate the tag in this configuration where the tag is on the side of the cylinder.
  • the direct coupling is significantly reduced and the read range is no longer limited by the condition that the tag signal may be no more than 100 dB below the level of the transmitters carrier signal. (See page 145 of reference [1] cited above for a discussion of the 100 dB condition.)
  • This example illustrates two advantages of a bistatic reader over a monostatic reader: (1) a bistatic reader may be able to correctly read certain tags that cannot be read accurately by a monostatic reader because the back scattered field is much weaker than the scattered field at an optimal receiver location, and (2) the direct coupling between the transmitter and receiver is much weaker for a bistatic reader, thus making it possible to correctly interrogate tags that are further away.
  • An even more effective reader would have several receiving antennas distributed around the objects of interrogation to pick up scattered fields that peak in many different directions (multistatic reader).
  • multistatic reader For fixed geometries, such as soda bottles on a pallet, numerical simulations can determine the optimal bistatic configuration.
  • the use of numerical simulations to optimize the placement of tags and reader antennas is illustrated by the example above, which shows that a 90° bistatic configuration is optimal for a tag placed on the side of a dielectric cylinder.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Artificial Intelligence (AREA)
  • Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Signal Processing (AREA)
  • Electromagnetism (AREA)
  • General Health & Medical Sciences (AREA)
  • Radar Systems Or Details Thereof (AREA)
  • Near-Field Transmission Systems (AREA)

Abstract

The present invention relates to a method and apparatus for transmitting a narrow signal beam that allows the precise location of RFID tags to be determined and reduces tag collisions. The present invention further relates to a method and apparatus for combing an RFID reader with an optical source to visualize the interrogation zone of the reader. The present invention also relates to a method and apparatus for improving the efficiency of RFID systems.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Application No. 60/550,355, filed Mar. 5, 2004, U.S. Provisional Application No. 60/550,411, filed Mar. 5, 2004, U.S. Provisional Application No. 60/561,433, filed Apr. 12, 2004, U.S. Provisional Application No. 60/603,531, filed Aug. 20, 2004, U.S. Provisional Application No. 60/613,428, filed Sep. 27, 2004, and U.S. patent application Ser. No. 11/066,048, filed Feb. 25, 2005, each of which is hereby incorporated by reference in its entirety.
  • BACKGROUND OF THE INVENTION
  • Radio Frequency Identification (“RFID”) is a generic term for technologies that use radio waves to automatically identify individual items. Objects can be identified using RFID by storing a serial number that identifies the object on a chip that is attached to an antenna. The chip and the antenna together are called an RFID tag. An RFID reader sends out electromagnetic waves that are received by the antenna on the RFID tag. Passive RFID tags draw power from this electromagnetic field to power the chip. Active tags use their own batteries to power the chip. The tag responds to the reader by transmitting a bit stream to the reader that contains information about the tag (serial number, etc.). The current state of RFID technology is described by [1] K. Finkenzeller in “RFID Handbook” (John Wiley & Sons, 2003).
  • RFID systems operate at many different frequencies. The most common are low frequencies around 135 KHz, high frequencies around 13.56 MHz, ultra-high frequencies around 900 MHz, and microwave frequencies around 2.45 GHz and 5.8 GHz.
  • Current RFID systems are not suited for precise location of tags because readers transmit very broad beams that cause tags in a large region to respond. Moreover, when two or more tags respond simultaneously, the transmissions from the tags get scrambled and become unintelligible to the reader. This phenomenon is known as tag collision. Procedures that involve repeated transmissions of tag data have been developed to deal with tag collisions [1, Chapter 7]. However, the interrogation speed (number of tags interrogated per second) is reduced when a large number of repeated transmissions are needed, so it is desirable to reduce tag collisions as much as possible.
  • The RFID reader's efficiency is related to its coverage or “accuracy,” which is measured by the percentage of tags within range that are read correctly. The accuracy of today's readers is not acceptable for many applications, which require 100 percent accuracy. For example, a study published in the article “Smart Tags for Your Supply Chain,” McKinsey Quarterly, 2003, Number 4, found that RFID-tagged pallets failed 3 percent of the time even when double-tagged, and only 78 percent of the individually tagged pallets were read accurately.
  • According to the article “RFID will present a stiff test,” published in Supply Chain Management Review, Jan. 15, 2004, the main cause of low reader accuracy is the inability of readers to transmit enough power to activate tags that are surrounded by other objects such as tags affixed to items stored in the middle of a pallet. The article reports that ad hoc repositioning of the RFID tags or increasing reader power can often fix this problem.
  • The problem of reader collisions is another barrier to the large-scale deployment of RFID. Reader collisions can occur when the interrogation zones of two or more readers overlap. In the article “Why UHF RFID Systems Won't Scale,” RFID Journal, July 2004, H. L. van Eeden states that “The main technical problem facing end-user companies is the possibility of large-scale reader interference that could render UHF RFID installations completely inoperable and severely limit the rollout of UHF RFID systems.”
  • The problems of reader collision and low reader accuracy are related: if one attempts to solve the problem of low reader accuracy by increasing the reader power, then the interrogation zones grow and reader collisions become more frequent.
  • The following five U.S. Provisional Applications describe RFID readers that transmit data signals that cause the tags to respond and scramble signals that do not cause the tags to respond: [2] “Method and apparatus for secure transmission of data using array,” U.S. Provisional Application No. 60/550,355, filed Mar. 5, 2004, [3] “Method and apparatus for preventing unauthorized transmitters from gaining access to a wireless network,” U.S. Provisional Application No. 60/550,411, filed Mar. 5, 2004, [4] “Method and apparatus for precise location of RFID tags,” U.S. Provisional Application No. 60/561,433, filed Apr. 12, 2004, [5] “Optically guided reader of RFID tags,” U.S. Provisional Application No. 60/603,531, filed Aug. 20, 2004, and [6] “Method and apparatus for improving the efficiency of RFID systems,” U.S. Provisional Applications No. 60/613,428, filed Sep. 27, 2004. These five provisional applications are incorporated herein by reference in their entirety.
  • The data and scramble signals are transmitted with different beams that are adjusted such that the scramble signals overshadow the data signals in all but selected regions. Hence, a tag will respond only if it is located in one of the selected regions, called the interrogation zones.
  • Provisional patent application [2] describes methods for using sum and difference patterns of array antennas to transmit data into selected narrow angular regions. The data signal is shielded by a scramble signal that makes the total transmitted signal unintelligible everywhere except in the narrow angular region. The scramble signal is also allowed to contain its own data that is different from the data carried by the data signal. Provisional patent application [2] further describes how the precise angular positions of RFID tags can be determined. Provisional patent application [4] describes how the width of the interrogation zone can be reduced and how the absolute location of a tag can be obtained from triangulation. Provisional patent application [5] describes how the interrogation zone can be visualized with optical sources. Provisional patent application [6] describes how the efficiency of RFID readers and reader networks can be improved through measurements, modeling, and inversion.
  • BRIEF SUMMARY OF THE INVENTION
  • The present invention is directed to a method for interrogating RFID tags comprising transmitting a data beam that causes the tags to respond, transmitting one or more scramble beams that do not cause the tags to respond, and adjusting the data beam and the scramble beams such that the scramble beams overshadow the data beam in all but selected regions. A tag can respond to the data signal either by broadcasting or changing its stored information. A scramble beam can contain a separate intelligible data stream and can charge tags that are not being interrogated.
  • In one embodiment of the present invention, the data signal bits are divided into two or more parts. For each part of the data signal, a corresponding scramble-beam direction is defined that is slightly away from the direction of the data beam. Each part of the data signal is then transmitted while the scramble beam has its central null steered towards a corresponding scramble-beam direction. The division of the data signal must be such that a tag responds only if it receives all the data bits.
  • In one embodiment of the present invention, the scramble signal is a sine wave. In one embodiment of the present invention, the scramble beams have approximately constant amplitudes away from their central null, so that the total radiated power from the reader is approximately omni-directional. Constant-amplitude scramble beams are achieved by moving zeros far off the Schelkunoff unit circle or by iterative methods.
  • In one embodiment of the present invention, the method further comprises employing two or more array readers that scan an area with data and scramble beams to determine the angular positions of each tag within range. In one embodiment the angular positions obtained with two or more readers determine the absolute position of the tags through triangulation. In one embodiment, anti-collision methods are employed when more than one tag responds at any given scan angle.
  • In one embodiment of the present invention, the reader and tags are inductively coupled and the reader employs two or more loops to transmit data and scramble signals. In one embodiment of the present invention, the loop configuration of the reader is optimized with iterative techniques to ensure that the magnetic field of the data signal is overshadowed by the magnetic field of the scramble signal except in selected regions.
  • In one embodiment the security measures described in [2] and [3] are employed to enhance the security of the RFID system.
  • The present invention is further directed to a method for optically displaying the interrogation zone of an RFID reader that includes the steps of attaching an optical source to an RFID reader and transmitting one or more light beams with said optical source to visualize the interrogation zone. In one embodiment of the present invention, the light beam is pointed in the direction of the center of the interrogation zone. In another embodiment of the present invention, two or more light beams are transmitted such that each light beam coincides with a boundary of the interrogation zone.
  • In a further embodiment of the present invention, a light beam is scanned back and forth between the boundaries of the interrogation zone. In another embodiment of the present invention, the light beams are transmitted with lasers.
  • In one embodiment of the present invention, the optical source is built into the housing of the RFID reader. In another embodiment of the present invention, the optical source is attached to the housing of the RFID reader.
  • The present invention is additionally directed to methods for improving the efficiency of RFID systems. In one embodiment of the present invention, the reader employs two antennas that broadcast both data and scramble signals. In one embodiment of the present invention, the antennas are patch antennas. In one embodiment of the present invention, the reader employs three antenna elements where two of them transmit the scramble signal and one interrogates the tags. In one embodiment of the present invention, the reader employs one standard commercially available reader and two additional antennas that broadcast a scramble signal. In one embodiment of the present invention, the array excitation coefficients for the data and scramble signals are adjusted to create an interrogation beam that precisely fits an opening in a container.
  • In one embodiment of the present invention, the reader employs an antenna that transmits two or more interrogation beams designed such that any tag in the interrogation zone receives sufficient power to operate from at least one of the interrogation beams. In one embodiment of the present invention, the reader employs two or more scramble beams to prevent leakage of the data signal. In one embodiment of the present invention, two sets of scramble-beam coefficients are mirror images.
  • In one embodiment of the present invention, a network of readers transmits both data and scramble beams adjusted to create closely spaced independent interrogation zones. In one embodiment of the present invention, the positions of the readers is determined from the solution of an inverse source problem. In one embodiment of the present invention, the excitation coefficients are determined from the solution to an inverse source problem. In one embodiment of the present invention, the inverse source problem is solved with an iterative optimization scheme.
  • In one embodiment of the present invention, the tags are placed at locations where the tag antenna creates maximum disruption of the field distribution. In one embodiment of the present invention, the field distribution on an object is computed with a numerical method.
  • In one embodiment of the present invention, an RFID reader uses a bistatic mode of operation. In one embodiment of the present invention, the RFID reader uses a multistatic mode of operation. In one embodiment of the present invention, the location of the RFID reader receivers are determined by solving a scattering problem with a model for a typical tagged item.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates an 18-element linear array.
  • FIG. 2 illustrates a sum pattern of the 18-element array evaluated at θ=90°. The excitation coefficients are shown above the plot.
  • FIG. 3 illustrates a difference pattern of the 18-element array evaluated at θ=900. The excitation coefficients are shown above the plot.
  • FIG. 4 illustrates the sum and difference patterns of the 18-element array evaluated at θ=900. Both sets of excitation coefficients are shown above the plot.
  • FIG. 5 illustrates a square planar array with 324 elements.
  • FIG. 6 illustrates a mapping of the excitation coefficients for the sum pattern of the 324-element planar array.
  • FIG. 7 illustrates a 3-D mapping of the array sum pattern corresponding to the excitation coefficients.
  • FIG. 8 illustrates a mapping of the excitation coefficients for the cosine difference pattern of the 324-element planar array.
  • FIG. 9 illustrates a 3-D mapping of the array difference pattern corresponding to the excitation coefficients.
  • FIG. 10 illustrates a circular ring array.
  • FIG. 11 is a perspective view of a reflector antenna with its feed at the focal point.
  • FIG. 12 illustrates a linear array with 4 elements having element spacing equal to 10 cm.
  • FIG. 13 illustrates data and scramble beams of the array in FIG. 12 evaluated at θ=90°. The array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot.
  • FIG. 14 illustrates data and scramble beams of the array in FIG. 12 evaluated at θ=90°. The array elements are patch antennas and both sets of excitation coefficients are shown above the plot.
  • FIG. 15 illustrates one data beam and two scramble beams of the array in FIG. 12 evaluated at θ=90°. The array elements are patch antennas and both sets of excitation coefficients are shown above the plot.
  • FIG. 16 illustrates a linear array with 8 elements having element spacing equal to 6.25 cm.
  • FIG. 17 illustrates one set of data and scramble beams of the array in FIG. 16 evaluated at θ=90°. The array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot.
  • FIG. 18 illustrates another set of data and scramble beams of the array in FIG. 16 evaluated at θ=90°. The array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot.
  • FIG. 19 illustrates a scanning-array positioning system that employs two array-antenna readers.
  • FIG. 20 illustrates an inductive RFID reader employing two loops parallel to the x-y plane.
  • FIG. 21 illustrates the magnitudes of the z-components of the magnetic fields for the data and scramble signals transmitted by the inductive reader in FIG. 20.
  • FIG. 22 illustrates an RFID tag reader with an optical source attached to its housing.
  • FIG. 23 illustrates the ratio of the scramble signal and data signals for a four-element array reader operating around 900 MHz. The data signal dominates in the black shaded zone. The two light beams mark the boundaries of the interrogation zone.
  • FIG. 24 illustrates the geometry for an array of two antenna elements that can be tilted independently with respect to the array axis.
  • FIG. 25 illustrates a schematic of RF control electronics for a two-element array. Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal. The beam patterns for each signal are determined by the weighting coefficients (in boxes); phase shifts (time delays) can be used to steer the total beam pattern in a specific direction.
  • FIG. 26 illustrates free-space signal strength of data beam (Left) and scramble beam (Right). Axis units are meters.
  • FIG. 27 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right).
  • FIG. 28 illustrates total signal strength of the data beam (Left) and the scramble beam (Right) when the beams are broadcast toward a concrete wall.
  • FIG. 29 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right) when the reader broadcasts toward a concrete wall.
  • FIG. 30 illustrates geometry for an array of three identical patch antennas. The middle antenna broadcasts the data signal. The outer antennas broadcast scramble signals. The two outer elements are tilted by the angle α.
  • FIG. 31 illustrates a schematic of RF control electronics for a three-element array. The middle antenna element is driven by the data signal. The two outer elements are driven by the scramble signal. The beam patterns for each signal are determined by the weighting coefficients (in boxes).
  • FIG. 32 illustrates free-space signal strength of data beam (Left) and scramble beam (Right). Axis units are meters. The distance between array elements is d=17 cm, and the tilt angle is α=30°.
  • FIG. 33 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right).
  • FIG. 34 illustrates the geometry for an array of four identical antenna elements.
  • FIG. 35 illustrates a schematic of RF control electronics for a four-element array. Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal. The beam patterns for each signal are determined by the weighting coefficients (in boxes); phase shifts (time delays) can be used to steer the total beam pattern in a specific direction.
  • FIG. 36 illustrates the geometry of a 3D model of an RF tag reader (array), operating in front of a conveyor belt in a room with a metal wall and concrete floor and ceiling.
  • FIG. 37 illustrates interrogation zones above the conveyor belt where the data signal is more than 10 dB greater than the scramble. The top plot shows the interrogation zone for a simple superposition of one data beam and one scramble beam. Because of multi-path effects, the scramble beam has nulls that cause leakage of the data signal into undesired regions. The bottom plot shows the results of a more sophisticated scheme that uses two scramble beams to eliminate leakage.
  • FIG. 38 illustrates top and side views of a 3D model of a network consisting of two RF tag readers and one scramble transmitter that each uses a 2-element antenna array. The readers operate in front of a concrete wall in a room with concrete floor and ceiling.
  • FIG. 39 illustrates signal strengths of the data beams of the two readers in FIG. 38. Reflections in the wall, floor, and ceiling are included. Axis units are in meters.
  • FIG. 40 illustrates interrogation zones of the data beams of the two readers in FIG. 38 when they broadcast toward the concrete wall. Reader collision occurs near the origin. Both readers set off tags on both conveyer belts so it is not possible to determine which conveyer belt carried a given item.
  • FIG. 41 (Left) illustrates the ratio of total scramble beam (obtained with the scramble transmitter and the two readers) to data beam of the reader on the left. FIG. 41 (Right) illustrates the ratio of total scramble beam to data beam of the reader on the right. Tags are interrogated only in the regions where a data beam dominates.
  • FIG. 42 illustrates two independent interrogation zones obtained with the combined data and scramble beams of the scramble transmitter and the two readers. Reader collision is avoided, and it is possible to tell which conveyer belt carries a given item.
  • FIG. 43 illustrates a 2D model of a reader that interrogates a tag placed on a high-dielectric object. The field of a line source (the reader) illuminates a dielectric cylinder (bottle containing a liquid). A conducting wire (the tag) is close to the surface of the cylinder.
  • FIG. 44 illustrates the total field in the vicinity of the dielectric cylinder when the wire is removed. The white circle marks the surface of the cylinder.
  • FIG. 45 illustrates the total field in the vicinity of the dielectric cylinder when the wire is placed on the side of the cylinder (as seen from the reader).
  • FIG. 46 illustrates the total field in the vicinity of the dielectric cylinder when the wire is placed on the back of the cylinder (as seen from the reader).
  • FIG. 47 illustrates the difference far field for tag placed on the side of the cylinder. The amplitude of the backscattered field is very low.
  • FIG. 48 illustrates the difference far field for tag placed on the back of the cylinder. The amplitude of the backscattered field is large.
  • FIG. 49 illustrates a Bistatic RFID reader with a transmitter and a receiver that interrogates a collection of tags that are placed on items in a box.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention provides (a) designs for RFID readers, (b) a method for reducing the width of the interrogation region, (c) a method for providing a user defined interrogation zone for one or more readers, (d) a method for location of transceivers in 2D and 3D using more than one information-steering transmitter, (e) a method for precise tag location that works in the induction regime where the wavelength is much longer than the physical dimensions involved, (f) a new set of security measures for RFID systems, (g) a method for optically displaying the interrogation zone, (h) a method for overcoming multipath effects, (i) a method for optimal tag placement, and (j) a bistatic RFID reader. A common feature in items (a)-(f) is that two or more signals are transmitted simultaneously, including:
      • 1. A data signal that causes the tags to respond. The data signal may instruct the tags to broadcast or modify stored information. The data signal may contain information about scan angles that the tags can retransmit back to the reader. Also, the data signal may employ any of the methods developed to solve the problem of tag collision that occurs when two or more tags transmit simultaneously [1, Chapter 7].
      • 2. One or more scramble signals that do not cause the tags to respond. The tags neither broadcast nor modify their stored information. A pure sine wave works as a scramble signal for UHF tags. The scramble signals can be used to charge the tags and to convey a separate intelligible information stream. The scramble signal can also be referred to as a guard signal.
  • A reader is said to employ information steering when it transmits both data and scramble signals. The present invention makes extensive use of antenna arrays. The following references describe the theory and design of phased arrays: R. C. Hansen, “Phased Array Antennas,” John Wiley & Sons, 1998; R. J. Mailloux, “Phased Array Antenna Handbook,” Artech House, 1994; and, R. S. Elliot, “Antenna Theory and Design,” IEEE Press, 2003. With adaptive phased arrays, also known as smart antennas, the received signals and environmental parameters are fed to powerful processors that steer the beams to optimize performance. The technology for designing and constructing adaptive phased arrays with hundreds of elements that produce prescribed sum and difference patterns has reached a mature stage, as described in the following references: M. I. Skolnik, “Radar Handbook,” McGraw-Hill, 1990, 2nd edition; R. T. Compton, “Adaptive Antennas,” Prentice-Hall, 1998; and, G. V. Tsoulos, ed. “Adaptive Antennas for Wireless Communications,” IEEE Press, 2001.
  • Two types of array patterns widely used in radar applications are of particular interest to the present invention: (1) the sum pattern and (2) the difference pattern, the relevance of which will be seen in the context of FIG. 1.
  • Linear Arrays
  • FIG. 1 is a graph of a linear array with 18 elements having element spacing of half of a wavelength. The data time signal is represented by a(t), which depends on the chosen modulation and coding techniques, and on the transfer functions of the antenna elements. The present invention works for any modulation and coding techniques and for any set of array elements.
  • In standard operation, one would feed array element #p with a signal of the form:
    T p(t)=A p a(t−α p)
    where Ap is the excitation coefficient and αp is the time delay. Generally, one could feed each array element with time functions that have different time dependence to compensate for array imperfections, end-element effects, or array elements differences. Such adjustments would be well known and straightforward to those working in this area. Therefore, it is assumed presently that the time dependence of each input signal is the same (the amplitudes and time delays are different). The array excitation coefficients and time delays (Ap and αp, p=1, 2, . . . , N, where N is the number of elements) are determined by standard methods to achieve a desired radiation pattern of the array that adapts to its environment.
  • FIG. 2 is a graph of a sum pattern of the 18 element array in FIG. 1, evaluated at θ=90°. A typical array radiation pattern and the associated excitation coefficients are shown in FIG. 2 for the 18-element linear array shown in FIG. 1. The element spacing is equal to half a wavelength. All time delays are zero, so the array operates in broadside mode. Since all the excitation coefficients have the same sign, the array radiates a sum pattern, which is characterized by a main beam and side lobes that are below a certain level (−55 dB in the embodiment shown in FIG. 2). Beam steering can be achieved by assigning nonzero values to the time delays, which results in the complex excitation coefficients Apexp(i2πf0αp) when the exp(−i2πf0t) time dependence is suppressed and f0 is the frequency at which the sum pattern is evaluated. These issues are well known to those working in this area.
  • In addition to the sum pattern, a difference pattern may be broadcast. A difference pattern and the associated excitation coefficients are shown in FIG. 3 for the 18-element array shown in FIG. 1. The difference pattern has a deep null in the center that is surrounded by two steep peaks. The term “difference pattern” is used because half of the excitation coefficients are positive and the other half negative. The time delays in FIG. 3 are all zero. As seen for the sum pattern, beam steering can be achieved by assigning nonzero values to the time delays.
  • A narrow interrogation zone is obtained with the present invention by feeding each element with a total signal that is obtained by adding at least one scramble signal to the data signal. In the case of one scramble signal b(t), the total input signal to array element #p is:
    T p(t)=A p a(t−α p)+B p b(t−β p)
    where Bp (p=1, 2, . . . , N) are the excitation coefficients and βp (p=1, 2, . . . , N) are time delays for the scramble signal. This arrangement of signals creates a narrow interrogation zone when the data excitation coefficients Ap (p=1, 2, . . . , N) produce a sum pattern and the scramble excitation coefficients Bp (p=1, 2, . . . , N) produce a difference pattern. To steer the sum and difference beams in the same direction, one simply sets αpp.
  • To see how the narrow interrogation zone is provided, the sum and difference patterns of FIGS. 2 and 3 are plotted together as shown in FIG. 4. The data signal a(t) is transmitted through the sum pattern, and the scramble signal is transmitted through the difference pattern. An observer located at the nulls of the difference pattern will receive only the data signal. Conversely, an observer located at nulls of the sum pattern will receive only the scramble signal. In most locations, however, there are no nulls and an observer would receive a weighted sum of the data and scramble signals. The weights are simply the sum and difference patterns at that particular location.
  • As shown by way of example in FIG. 4, it is evident that everywhere outside the narrow angular region 87°<φ<93°, the difference pattern is greater in magnitude than the sum pattern. Hence, an observer located at the angle φ will receive the following signals:
      • φ=90°: the pure data signal a(t).
      • 87°<φ<93°: a weighted sum of data and scramble signals in which the weight for the data signal is greatest.
      • 0°<φ<87° or 93°<φ<180°: a weighted sum of data and scramble signals in which the weight for the scramble signal is greatest.
  • Consequently, in this example, only observers in the narrow angular region 87°<φ<93° will understand the data signal. Additionally, the angular region in which the data signal can be understood is likely even narrower due to noise.
  • Planar Arrays
  • The present invention may also be used with planar arrays such as the 324-element array (18 elements by 18 elements) shown in FIG. 5. The element spacing is half a wavelength. FIG. 6 shows a typical set of sum excitation coefficients, and FIG. 7 shows the corresponding array sum pattern. The array pattern is almost independent of φ and has a main beam in the broadside direction. Standard methods, as previously noted, can be used to steer the beam in any desired direction.
  • For planar arrays, the difference patterns with sharp nulls have cos(φ) or sin(φ) angular dependence. The φ independent difference patterns for planar arrays result in a broadening of the angular regions in which the signals are intelligible. FIG. 8 shows a set of difference excitation coefficients with cos(φ) angular dependence, and FIG. 9 shows the corresponding difference pattern.
  • The excitation coefficients for both the sum and difference patterns for the planar array may be obtained with semi-analytical methods to achieve prescribed side lobe levels and main beam widths. Alternatively, the coefficients may be obtained with nonlinear optimization techniques. The coefficients as shown in FIGS. 6 and 8 are obtained with the MATLAB™ function FMINUNC, which minimizes a user-defined cost function. The cost function is designed to ensure that the side lobes are below a certain level for all φ.
  • The difference pattern shown in FIG. 9 has a null for φ=90° and φ=270°. With only one difference beam, the data signal leaks out at observation points with φ=90° or φ=270°. Therefore, at least two difference beams are used for a planar array. The excitation coefficients and array pattern for a sin(φ) difference pattern are obtained by rotating the plots as shown in FIGS. 8 and 9 ninety degrees around the z axis. The input to array element #p is therefore a sum of the three terms:
    T p(t)=A p a(t−α p)+B p b(t−β p)+C p c(t−χ p)
    where Bp and Cp are the excitation coefficients, βp and χp are time delays, and b(t) and c(t) are the scramble signals applied to the cos(φ) and sin(φ) difference patterns, respectively (p=1, 2, . . . , N). As before, Ap (p=1, 2, . . . , N) are the excitation coefficients and αp (p=1, 2, . . . , N) are the time delays for the data signal. With at least two independent scramble signals, one achieves a narrow interrogation zone around θ=0°. To steer the sum and difference beams in the same direction, one simply sets αppp.
  • Other Antennas
  • User defined interrogation zones in accordance with the present invention may also be achieved with arrays that are neither linear nor planar. For example, the circular ring array shown in FIG. 10 is useful for providing 360° coverage. For ring arrays, the interrogation zones can be obtained with sum and difference patterns obtained from standard theory. Similar interrogation zones can be realized with reflector antennas as shown in FIG. 11 by applying the present invention to its feed, which is typically a smaller antenna located at the focal point. More generally, one may use the present invention for any antenna type to obtain sum and difference patterns that can be combined to achieve the desired interrogation zones.
  • For purposes of illustration, the examples herein are confined to sum and difference patterns because such patterns have been studied extensively in the radar literature. Interrogation zones in accordance with the present invention can be achieved, however, with any combination of array patterns in which one of the patterns (the “difference pattern”) has a null in the direction of the tags of interest and is larger in magnitude than the other pattern (the “sum pattern”) in directions where other tags may be present.
  • The difference patterns must be slightly broader than the sum patterns to achieve the desired interrogation zones. The numerical examples presented herein demonstrate that difference patterns may be designed to have beam widths that are just slightly broader than the beam widths of the corresponding sum patterns.
  • A Four-Element Reader
  • Consider a four-element tag reader operating at frequencies around 900 MHz. (RFID systems are allowed to operate at 915 MHz in the United States and at 869 MHz in Europe.) FIG. 12 shows a four-element array for a hand-held tag reader operating around 900 MHz, with element spacing=10 cm and total array length=30 cm. The tags to be interrogated are near the (θ,φ)=(90°, 90°) direction. As in [2], one feeds element #p with a signal of the form:
    T p(t)=A p a(t)+B p b(t)
    where a(t) is the data signal and b(t) is a scramble signal. Ap and Bp are the excitation coefficients for the data and scramble signals, respectively.
  • FIG. 13 shows the far field of the reader for the case where the array elements are z-directed dipoles with array excitation coefficients given above the plot. This design results in a data-signal width of about 30 degrees. Hence, only those tags that are located in a 30 degree region centered on φ=90° will respond to this reader, allowing the operator to narrow the region in which a given tag is located. Since the z-directed dipoles are omni-directional in the θ=90° plane, the array radiates equal amounts of power in the forward and backward directions.
  • The present invention also contemplates a design for a hand-held reader that radiates little energy in the backward direction (towards the operator). Assume that the array elements are made of patch antennas with sin2(φ) radiation patterns in the forward direction and very low radiation pattern in the backward direction. FIG. 14 shows the field of this reader for forward directions 0<φ<180°. The patterns of the patch antennas ensure that the field in the backward directions 180°<φ<360° is low.
  • A Method for Reducing the Width of the Data Beam
  • The width of the angular region of the data signal is reduced by dividing the data signal bits into two parts: the first part and the second part. The first part is transmitted while the scramble beam has its central null steered slightly to one side of the direction of the data beam. The second part of the data signal is transmitted while the scramble beam has its central null steered slightly to the other side of the direction of the data beam. The division of the data signal must be such that a tag responds only if it receives both the first and second part of the data signal.
  • FIG. 15 shows how this method can be implemented with the four-element array in FIG. 12, with patch antennas. Scramble beam # 1 is obtained by steering the central null to φ=99°. Scramble beam # 2 is obtained by steering the central null to φ=81°. The excitation coefficients are provided above the plot. A tag must then be located in a very narrow region (at most, 15° wide in this example) around φ=90° in order to receive both the first and second part of the data signal.
  • In principle, there is no lower limit on the width of the data-signal region obtainable with this method. One may even divide the data signal into three or more parts and employ three or more scramble beams, as long as the tags respond only if they receive all parts of the data signal. This method of reducing the width of the data-signal region works also for other the types of antennas described above and in [2]. In particular, the method works for planar arrays if the two scramble-beams nulls are steered in orthogonal directions (planar arrays require two scramble beams as explained above and in [2]). Another way of reducing the width of the data-signal region is to continuously vary the direction of the scramble beam while the data signal is being transmitted. Yet another way of reducing the width of the data-signal region is to increase the power of the scramble beam(s), and thereby move the scramble-beam shoulders above the peak of the data beam.
  • Systems that employ these highly localized data-signal beams may be used to locate tags or transceivers with such accuracy that they can replace more costly laser positioning systems. Such applications are discussed below.
  • A Constant-Level Scramble Beam
  • A reader can be designed such that its radiated power is omni-directional while its data signal stays highly directional. Consider the 8-element array in FIG. 16 that consists of z-directed dipoles and operates at 2.4 GHz, with element spacing=6.25 cm and the total array length=50 cm. The tags to be interrogated are near the (θ, φ)=(90°, 90°) direction.
  • Typical data and scramble beams for this array are shown in FIG. 17. All the zeros of the scramble beam, except the central one at φ=90°, are moved radially off the Shelkunoff unit circle to points on a circle in the complex plane of radius 1.06. (The theory related to the Shelkunoff unit circle is described in the book “Antenna Theory and Design” by R. S. Elliot, IEEE Press, 2003.) As a result, the scramble beam has only one null (the central one) and stays above the data beam everywhere else. Notice that the scramble beam “follows” the data beam closely, so that the power of the scramble beam is extremely low away from a 60° angular region centered on φ=90°. Hence, the reader provides little energy to charge or communicate with the tags that are located outside this 60° angular region.
  • FIG. 18 shows a scramble beam that has all its zeros, except the central one, located on a circle in the complex plane of radius 1.46. This scramble beam has an almost constant amplitude away from the central zero at φ=90°. Hence, it is well suited for charging and communicating with any tag located away from φ=90°. The excitation coefficients are given above the figure. All the excitation coefficients for the scramble beam in FIG. 18 are positive except the last one, which equals −1. The sum of these coefficients equals zero.
  • The array used in this section operates at 2.4 GHz. The method for creating a reader with omni-directional power pattern works for any frequency that results in electromagnetic wave propagation, and in particular for the popular RFID frequencies around 900 MHz. Instead of using the Schelkunoff unit circle representation to achieve the constant-level scramble signal, one can use the iterative array-synthesis methods discussed above and in [2] with appropriate cost functions. The iterative methods can be used directly to achieve constant-level scramble beams for ring arrays and planar arrays.
  • Scanning Array Readers that Employ Triangulation
  • This section describes the method of the present invention for determining the precise location of tags. The method may be explained with reference to FIG. 19 where the tags are located inside a room with two array readers placed on the walls. The array readers transmit narrow signal beams surrounded by scramble beams as described above. The beams are scanned using standard beam steering.
  • In one embodiment, the data signal simply causes a tag to transmit its tag identification number. In a more advanced embodiment, the data signal contains the current scan angle and a reader identification number, and the tags respond by re-transmitting that scan angle and reader identification number along with a tag identification number. If two or more tags are present in the region of the data signal at any given scan angle, prior art anti-collision methods are employed [1, Chapter 7]. The tag transmissions can be recorded by the readers or by other receivers.
  • Hence, after the two array readers have completed a scan, a table is populated with a field for each tag that contains the scan angles for which the tag received a signal beam from each of the two readers. A tag typically receives the data signal from a reader at more than one scan angle since the scan-angle increments are smaller than the width of the data-signal beam. For location purposes, one can average the angles to obtain a table for each tag that contains one scan angle for each reader. This procedure is illustrated in FIG. 19 where the scan angles for one of the tags are v1 and v2. The location of the tag is easily determined from these two angles and the positions of the readers.
  • To determine the position of tags located directly in the line-of-sight between array reader # 1 and array reader # 2 requires an additional array reader. For many applications, however, it is possible to place array reader # 1 and array reader # 2 such that no tag can be located directly between the readers, and all tag positions can be determined with array reader # 1 and array reader # 2.
  • The optimal positions for the readers depend on the spatial distribution of the tags and on possible obstacles that can interfere with the transmissions. For some indoor applications, it is advantageous to hang from the ceiling ring-array readers that each can scan 360 degrees. The position of a tag could be determined from the transmission of two ring-array readers, provided the tag is not directly between those readers. A combination of ring-array, planar-array, and linear-array readers may be optimal in complicated scenarios.
  • In the example above, the readers are stationary and the tags are allowed to move around. In certain applications, it is advantageous to permit the readers to move as well. For example, one can record the position of the inventory of a large warehouse with one or more readers that move around, provided the location and orientation of the readers are known at all times.
  • A reader can be any type of active transceiver with a narrow signal beam, including planar array antennas that have pencil-like signal beams suitable for 3D location. A tag can be any type of passive or active transceiver that can be placed on an object whose precise location is sought. Such tag-reader systems can replace laser and GPS positioning systems in certain applications.
  • For example, if a tag is placed on a moving vehicle and readers continuously scan as described above, the tag can continuously transmit the positions of the vehicle to any receiver within range. Another application of such precision tag-reader systems is land surveying, where the locations in 3D are sought for surface features in the area of interest. Yet another application is remote sensing where the position of receivers must be known precisely.
  • The present invention also provides a method for determining the position of a vehicle in an area where multiple tags are placed at known locations on stationary objects such as walls. An RFID reader mounted on the vehicle can determine the position of the vehicle by recording the angles of at least two tags using triangulation.
  • Inductive RFID Systems
  • Inductive RFID systems operate at frequencies below 50 MHz, where the wavelength is much longer than the physical dimensions involved, and the reader and tags are inductively coupled. Precise tag location and user-defined interrogation regions can be achieved with inductive RFID systems as described below.
  • Consider the tag-reader system in FIG. 20 where the reader is at the origin and the tags are placed on a line parallel to the x axis given by z=30 cm, y=0. The tag antennas are loops parallel to the x-y plane, so the tags respond only to z-directed magnetic fields.
  • The reader employs two small loops that lie in the x-y plane with their center points 10 cm apart. The spatial dependence of the magnetic fields emitted by such loops can be approximated well by the spatial dependence of the magnetic fields of z-directed static magnetic dipoles, as described in the reference “Plane-wave theory of time-domain fields” by T. B. Hansen and A. D. Yaghjian, IEEE Press, 1999.
  • The loops of the reader each transmit two signals, so that the total signal transmitted by loop #p is
    T p(t)=A p a(t)+B p b(t)
    where a(t) is the data signal and b(t) is a scramble signal. Ap and Bp (p=1, 2, . . . , N) are the excitation coefficients for the data and scramble signals, respectively. FIG. 20 shows an inductive RFID reader employing two loops parallel to the x-y plane. The center points of the loops are on the x axis at x=−5 cm and x=5 cm. The tags are located along the line z=30 cm, y=0 and respond to z-directed magnetic fields. For the reader shown in FIG. 20, the coefficients are set as follows: A 1 = 1 B 1 = 5 A 2 = 1 B 2 = - 5.
  • FIG. 21 shows the magnitudes of the z-components of the resulting magnetic fields at the tag locations obtained from the magnetic dipole approximation. Also shown in FIG. 21 is the noise floor that determines the minimum signal strength required to interrogate a tag. If the scramble signal is turned off, all tags within a 75 cm region respond to the reader (75 cm is approximately the interrogation width obtained with a reader that employs only a single loop antenna). With the scramble signal turned on, only tags within a 10 cm region respond to the reader, thereby allowing the precise location of individual tags and reducing tag collisions. The scramble signal can charge and prepare the tags for interrogation in a scenario where the reader scans along a line.
  • This example involving a reader that employs two loops demonstrates the use of data and scramble signals in inductive RFID systems. Optimization methods can be employed by those skilled in the art of coil design to obtain loop configurations for which the magnetic field of the data signal is overshadowed by the magnetic field of the scramble signal except in selected regions. See, for example, U.S. Pat. Nos. 5,157,605 and 6,557,794 and the references therein. Thus, one obtains inductive readers with user-specified interrogation zones.
  • RFID Security
  • According to [1, Chapter 8], high-security RFID systems should have defense mechanisms against the following three types of attacks: (1) Unauthorized reading of a data carrier in order to duplicate and/or modify data. (2) The placing of a foreign data carrier within the interrogation zone of a reader with the intention of gaining access to a building or receiving services without payment. (3) Eavesdropping into radio communications and replaying the data in order to imitate a genuine data carrier (“replay and fraud”).
  • As with other types of wireless communication systems, RFID systems currently use authentication and encryption methods to defend against these attacks. These defense methods have certain inherent weaknesses as described in [2] and [3]. Additional security measures can be obtained by using the secure transmission and reception techniques described in [2] and [3]. These techniques work for any wireless communication system, including systems that operate in the inductive regime as demonstrated above.
  • The scramble signals can prevent an eavesdropper located outside the interrogation zone from gaining access to the data stream that is broadcast by the RFID reader. Highly directive antennas can be employed to prevent eavesdropping and unauthorized access to the network. Nulls can be placed in the receiving pattern of the reader to prevent unauthorized access to the network.
  • Method for Optically Displaying Interrogation Zones
  • This section describes a method for optically displaying the interrogation zone of an RFID reader. The reader interrogates only tags located in the interrogation zone.
  • An optical source attached to the RFID reader, as shown in FIG. 22, sends out one or more light beams that visualize the interrogation zone. For hand-held readers, the optical source can be a small laser pointer that transmits a beam in the direction of the center of the interrogation zone. With this embodiment, the user will see a laser dot on an object that is located in the center of the interrogation zone. Hence, the reader can be pointed precisely toward a selected object. With more than one laser pointer, the boundaries of the interrogation zone can be displayed, as illustrated in the following example.
  • FIG. 23 shows an optical source that sends out two light beams and is attached to a four-element hand-held tag reader that operates at frequencies around 900 MHz. The element spacing is 10 cm and the total array length is 30 cm. This type of tag reader is described in [4]. FIG. 23 shows the ratio in dB of the scramble signal and the data signal in a 20 meter by 20 meter region of space, color coded with a gray scale color map. The data beam dominates in the shaded region, which therefore is the interrogation zone for the reader.
  • The optical source transmits two light beams that coincide with the boundaries of the interrogation zone, as shown in FIG. 23 and described in [5]. In one embodiment, the two light beams are generated by two laser pointers that produce red dots on objects that are at the edges of the interrogation zone. Thus, the user can see which objects are in the interrogation zone.
  • Multiple readers that work together can be used with triangulation to determine the absolute location of tags, as described above and in [4]. If optical sources are attached to each reader, the intersection of light beams shows the absolute position of tags.
  • A Two Element Reader
  • FIG. 24 shows a compact RFID reader design that employs a two-element antenna array, as described in [6]. The antenna elements can be of any type suitable for broadcasting at the RFID frequencies. The array elements can be tilted independently with respect to the array axis. FIG. 25 shows the schematic of RF control electronics for the two-element array. Each antenna element is driven by a linear combination of two RF signals: a data and a scramble signal. The beam patterns for each signal are determined by the weighting coefficients A1, A2, B1, and B2. Phase shifts (time delays) can be used to steer the beam patterns in a specific direction. To achieve a difference pattern for the scramble signal, one can set B1=−B2.
  • FIG. 26 shows the free-space field distributions in the x-y plane when the array elements are patch antennas with (1+cos(v)) patterns, where v is the angle between the element normal and the observation point in the x-y plane, displaying the strength of the data beam (Left) and the scramble beam (Right). (See R. J. Mailloux, “Phased Array Antenna Handbook,” Artech House, 1994, Chapter 4.) The elements are located at (x, y, z)=(2 m, 8.3 cm, 0) and (x, y, z)=(2 m, −8.3 cm, 0), with element normals pointing in the x direction. The antennas operate at 900 MHz with weighting coefficients A1=A2=B1=−B2=1. All time delays are zero so the beams point in the broadside direction.
  • The sum pattern carries the data signal and the difference pattern carries the scramble signal. The data signal (FIG. 26 Left) has its peak in the broadside direction where the scramble signal (FIG. 26 Right) has its null. Assume that the power level of the data signal is adjusted so that tags in the broadside direction at a distance of 10 m receive just enough power to function, and that the modulated scattering from these tags can be correctly understood by the reader. The plot on the left in FIG. 27 shows the tag interrogation zone achieved with a reader that broadcasts only the data signal. All tags at the edge of the interrogation zone receive just enough power to function. Tags outside the interrogation zone do not receive enough power. The right plot in FIG. 27 shows the interrogation zone obtained when the reader broadcasts both data and scramble signals. For a tag to function in this mode of operation, it must be in a location where two conditions are met: (1) the power of the data signal is sufficient to set off a tag and (2) the data signal overshadows the scramble signal (the data signal is at least 10 dB larger than the scramble signal in the dark shaded area of the right plot in FIG. 27; this 10 dB threshold is an arbitrary figure chosen for illustration purposes only, the actual threshold will depend on the particular system being used). The interrogation zone obtained with information steering is much narrower than the interrogation zone achieved with a standard broadcast scheme. Moreover, the angular extent of the interrogation zone is independent of the power levels of the signals, provided the ratio of the scramble signal power and data signal power is kept constant. For example, the interrogation zone in the right plot of FIG. 27 is achieved with A1=A2=B1=−B2=1. The same angular interrogation width can be obtained with A1=A2=B1=−B2=0.5 (since less power is transmitted, however, the interrogation range is reduced).
  • The angular extent of the interrogation zone can be adjusted by changing the ratio of the scramble signal power and data signal power. For example, A1=A2=1 and B1=−B2=0.5 would produce an interrogation zone that is wider than the one in the right plot of FIG. 27. The array excitation coefficients for the data and scramble signals can thus be adjusted to create an interrogation beam that precisely fits an opening of a container.
  • A concrete wall is now placed 4 m from the reader. FIG. 28 shows the total field distributions (direct field plus reflected field) for the data and scramble signals. More specifically, FIG. 28 shows the total signal strength of the data beam (Left) and the scramble beam (Right) when the beams are broadcast toward a concrete wall. The field distributions have ripples (peaks and nulls) that result from the direct and reflected fields being in and out of phase. Close to the reader, however, the direct field dominates. FIG. 29 shows the interrogation zones based on the same value for the required power level that was used in FIG. 27. The interrogation zone of the data signal alone (FIG. 29 Left) has widened because the reflected field from the wall can set off additional tags. The interrogation zone achieved by broadcasting both data and scramble signals (FIG. 29 Right) is much narrower and the power of the reflected scramble signal prevents additional tags from being set off. This example illustrates that the two-element reader can work in a multipath environment.
  • A Three-Element Reader
  • A standard commercially available reader can be augmented to achieve a narrow well-defined interrogation zone. The standard reader employs one antenna that broadcasts a single interrogation beam. From the discussion that follows, it is straightforward to augment standard readers that employ multiple antennas.
  • FIG. 30 shows the antenna array consisting of the antenna of the standard reader in the middle surrounded by two scramble-signal antennas, where the array comprises three identical patch antennas. The middle antenna broadcasts the data signal. The outer antennas broadcast scramble signals. The two outer elements are tilted by the angle α. The signals fed to the scramble antennas are 180° out of phase and generated by a scramble signal generator as shown in FIG. 31. The signal fed to the middle antenna is simply the signal from the standard reader, which need not be modified. The two outer elements are driven by the scramble signal. As indicated in FIG. 30, the antenna elements can be tilted to achieve the desired interrogation zone as described in [2]. The beam patterns for each signal are determined by the weighting coefficients, as shown in the boxes in FIG. 31.
  • Consider a special design where the three elements are the 900 MHz patch antennas used above in the two-element reader. The element distance is chosen to be 17 cm, and the scramble signal antennas are tilted by the angle α=30° as indicated in FIG. 30. FIG. 32 shows the resulting field distribution of the data beam (Left) and scramble beam (Right). FIG. 33 shows the interrogation zones (assuming that the power level is adjusted to achieve a 10 m range) for the standard reader that broadcasts only a data signal (Left) and for the augmented reader in FIG. 31 that broadcasts both scramble and data beams (Right). The augmented reader has a much narrower interrogation zone.
  • The design in FIG. 31 does not require data and scramble signals to be mixed since each antenna element transmits only a data or a scramble signal. This design can therefore be a cost-effective embodiment of a reader that operates in accordance with the principles of [2].
  • Using Multiple Sets of Excitation Coefficients to Overcome Multipath Effects
  • In indoor environments, signals bounce off walls and other objects, so the field at a given observation point is the sum of signals that have traveled through different paths. In some areas the multipath field components can sum to produce a total field that is too weak to communicate with a tag. Further, one must consider areas of low field strength in the scramble signal, which cause the data signal to “leak” out into unintended regions.
  • FIG. 34 shows a reader that consists of four x-directed dipole antennas that operate at 900 MHz with the excitation coefficients in FIG. 35. FIG. 35 shows a schematic of RF control electronics for the four-element array shown in FIG. 34. Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal. The beam patterns for each signal are determined by the weighting coefficients (in boxes). Phase shifts (time delays) can be used to steer the total beam pattern in a specific direction. To interrogate tags that are placed on items that move on a conveyer belt, the reader broadcasts toward a metal wall 3 m away as shown in FIG. 36. The frame of the conveyer belt is modeled as metal cylinders with a thin-wire approximation. Floor and ceiling are made of concrete. The field distribution is computed with a geometrical optics model that includes single bounces off the metal wall, floor, ceiling, and cylinders. FIG. 37 (Top) shows the interrogation zones for a simple superposition of one data beam and one scramble beam 50 cm above the conveyer belt where the data signal is at least 10 dB greater than the scramble. The data signal leaks out in several locations as indicated because multipath effects produce areas where the scramble signal is too weak.
  • This leakage can be eliminated by a modification of the broadcast scheme, which uses complementary scramble signals broadcast from the same array and creates the narrow interrogation zone shown in the bottom plot of FIG. 37. This new scheme operates as follows: Two complementary scramble patterns are created, for example, using the set of scramble array coefficients in FIG. 35 and its mirror image. These two scramble patterns can be broadcast simultaneously using two different scramble signals and additional mixing elements in the control electronics. Alternatively, the two signals can be broadcast sequentially during the same interrogation cycle. The bottom plot of FIG. 37 illustrates how narrow interrogation zones can be achieved even in severe multipath environments with the additional scramble signal.
  • The data signals can also be affected by multipath making it impossible to interrogate tags at certain locations. This problem can in some cases be overcome by broadcasting the data signal with multiple sets of excitation coefficients. To avoid interference, the various data beams should be broadcast sequentially.
  • These examples serve to illustrate a general method for reducing the effect of multipath: broadcast multiple beams with the same purpose (either data or scramble beams) by applying different sets of excitation coefficients to the array. For non-symmetric excitations coefficients (such as the scramble beam coefficients in FIG. 35), one can employ sets of excitation coefficients that are mirror images of each other. Sets of excitation coefficients that steer the beams in slightly different directions can also help overcome multipath effects.
  • Optimal sets of excitation coefficients can be determined from modeling and/or on-site measurements with the following procedure: (1) Set all excitation coefficients equal to zero except the excitation coefficient for the first array element, which is set equal to one. (2) Compute or measure the one-element field distribution over the desired interrogation zones. (3) Repeat this procedure for all other array elements to obtain N sets of one-element field distributions for an array with N elements. (4) Use linear combinations of the one-element field distributions to compute the total field distribution when the array is driven by a particular set of excitation coefficients. (5) Select sets of excitation coefficients so that the combined beams result in correct interrogation of tags placed at arbitrary locations in the interrogation zone.
  • Step (5) of the procedure can be achieved as follows: Start with a first set of excitation coefficients that would work for free space. Determine the locations in the interrogation zones where the corresponding field distribution is too weak when the reader operates in the multipath environment of interest. Determine a second set of excitation coefficients by modifying the first set of excitation coefficients, which creates a field distribution that fills out the areas where the field distribution of the first set of excitation coefficients is too weak. The modification of the first set of excitation coefficients can be achieved, for example, by slightly changing the phase and by changing the order of the excitation coefficients.
  • Creating Well-Defined Interrogation Zones and Preventing Reader Collisions
  • This section considers a network of readers and shows how to prevent interference and collisions between readers, as described in [6]. FIG. 38 shows two readers that are located in a room with a concrete wall, floor, and ceiling. The readers interrogate tags placed on items that move on two conveyer belts. Each reader uses the two-element array of patch antennas illustrated in FIGS. 24 and 25. The readers are in close proximity of each other and the concrete wall. Concrete is modeled by a homogeneous medium with a relative permittivity of 6 and a conductivity of 0.1 S/m. The field distributions are computed from geometrical optics with one bounce off each surface included. Polarization, reflection coefficients, and geometrical spreading are included in these calculations (this simulation and the other simulations are included simply for purposes of illustration; a different calculation of the field can be used in any given configuration to determine the fields to whatever order is needed). The power levels are adjusted so that when a reader operates in free space the data signal is just strong enough to set off tags 10 m away from the reader in the main-beam direction, as shown in FIG. 27.
  • FIG. 39 shows the total field distributions 1.5 m above the concrete floor of the data signals of the left and right reader. The direct and reflected fields being in and out of phase cause the ripples of the total field. FIG. 40 shows the interrogation zones of the two readers when they broadcast only data signals. A tag placed near the origin will receive enough power from both readers to be powered up. However, such a tag would not function properly, even if the two readers broadcast at different frequencies, because it simultaneously receives two sets of instructions (reader collision occurs). Hence, the readers cannot operate simultaneously. Moreover, both readers interrogate tags on both conveyer belts, so it would not be possible to determine which belt carried a tagged item.
  • For this example, assume that the two readers broadcast both data and scramble signals, and in addition place a scramble signal transmitter between the two conveyer belts as indicated in FIG. 38. FIG. 41 (Left) shows the ratio of total scramble beam (obtained with the scramble transmitter and the two readers) to data beam of the reader on the left. FIG. 41 (Right) shows the ratio of total scramble beam to data beam of the reader on the right. Tags are interrogated only in the regions where a data beam dominates. The data signals dominate in the dark shaded regions. FIG. 42 shows the interrogation zones of the two readers where (1) the power of the data signal is sufficient to set off a tag and (2) the data signal overshadows the scramble signal by at least 10 dB (where the value 10 dB is chosen for illustration purposes). The interrogation zones are now disjoint and each reader interrogates only the tags on one conveyer belt. This aspect of the present invention solves two problems: (1) Reader collision is avoided: tags near the origin stay quiet and do not modify their stored data because they receive a scramble signal that does not instruct them to operate. (2) It is now possible to determine which belt carried a tagged item.
  • More generally, one can set up a reader network with unknown parameters (array excitation coefficients, reader locations, and reader orientations) and optimize the parameters to create desired interrogation zones in a given environment. The optimization can be carried out by interactive methods that minimize a user-defined cost function (see, for example, P. Venkataraman, “Applied Optimization with MATLAB Programming,” Wiley, 2001). This approach is equivalent to an inverse source problem where the task is to determine the strength and location of sources that result in a desired field distribution.
  • One type of solution would determine the optimal source distribution (excitation coefficients) to maximize the signal from a tag placed on a particular object using the techniques described in the paper by David Isaacson entitled “Distinguishability of Conductivities by Electric Current Computed Tomography” (IEEE Trans. on Medical Imaging, Vol. MI-5, No. 2, 91-95, 1986).
  • In one embodiment of this method, the array element locations are fixed and on-site measurements are carried out to determine the N one-element field distributions described above. These N data sets are subsequently used in an optimization procedure that determines array coefficients that produce the desired interrogation regions.
  • Optimum Tag Placement
  • Numerous studies have demonstrated the difficulty of reading tags accurately, especially when other objects shield the tags from the interrogation signal (see, for example, “RFID will present a stiff test,” Supply Chain Management Review, Jan. 15, 2004). This section describes a systematic method for determining the optimal tag placement that will maximize the scattered field from the tags. The method involves the following steps:
  • (1) Create a model of the environment in which the tags must operate. For example, if the tags are to be placed on individual soda bottles that are stacked on a pallet, the model would consist of a collection of stacked high-dielectric scatterers shaped as soda bottles.
  • (2) Numerically determine the total electric field for the scattering problem in which the field of the reader illuminates the model. For the soda bottles on the pallet, a finite-difference time-domain method would be suitable for determining the total electric field everywhere (A. Taflove and S. Hagness, “Computational Electrodynamics: The Finite-Difference Time-Domain Method,” Artech House, 2nd Ed., 2000). High-frequency methods (A. K. Bhattacharyya, “High-Frequency Electromagnetic Techniques,” John Wiley & Sons, 1995) and exact solutions (W. C. Chew, “Waves and Fields in Inhomogeneous Media,” IEEE Press, 1995) are also useful for solving the scattering problems.
  • (3) Based on the computed field distribution, place the tag antennas such that the electric field is disturbed as much as possible. For example, if the tag antenna is a linear dipole and the object is a soda bottle, the dipole should be placed at a point on the surface of the bottle where the electric field is strongest. Moreover, the tag antenna should be aligned with the electric field at that point. For soda bottles on a pallet, the optimum tag locations may vary from bottle to bottle.
  • As shown by the 2D model in FIG. 43, this method works in the following way: the item to be tagged is modeled by an infinite dielectric cylinder of radius 5 cm with a relative dielectric constant of 81 and a conductivity of 0.01 S/m. The field of a line source (the reader) illuminates a dielectric cylinder (bottle containing a liquid). A conducting wire (the tag) is close to the surface of the cylinder. The reader is modeled with an electric line source 5 m away that broadcasts at 900 MHz. Assume that the reader is monostatic: the transmitting and receiving antennas are collocated. FIG. 44 shows the resulting total electric field inside and outside the dielectric cylinder, whose circumference is indicated by a distinct circle. An optimal tag placement for this object would be either the front or back (as seen from the reader) where the electric field attains its maximum values. A tag placed on the sides of the dielectric cylinder would not scatter much. The field distributions obtained with a thin wire placed on the side and on the back of the dielectric object are shown in FIGS. 45 and 46, respectively. As expected, the wire placed on the back (FIG. 46) alters the field much more than the wire placed on the side (FIG. 45).
  • To compute the modulated scattered field that would be observed by the reader, one may model the two states of a tag as follows: A short-circuited tag antenna is a thin wire, and an open-circuited tag antenna is an absent wire. With this model, a tag placed on the side of the dielectric object communicates with the reader by changing the field distribution from the one displayed in FIG. 44 (tag antenna open-circuited) to the distribution in FIG. 45 (tag antenna short-circuited). Similarly, a tag placed on the back of the dielectric object communicates with the reader by changing the field distribution from the one displayed in FIG. 44 (tag antenna open-circuited) to the distribution in FIG. 46 (tag antenna short-circuited).
  • The difference fields recorded by the reader far from the dielectric cylinder are shown in FIG. 47 (tag placed on side of cylinder) and FIG. 48 (tag placed on back of cylinder). As expected from the discussion above, the difference field is very weak when the tag is placed on the side of the cylinder, so the tag may not be read correctly. By placing the tag on the back of the cylinder in accordance with the method of the present invention, a much stronger difference field results (at least 100 times stronger) and the chances that the reader accurately obtains the information stored on the tag greatly improves.
  • Bistatic RFID Reader Configuration
  • A bistatic reader configuration is shown in FIG. 49 where the transmitter and receiver are not collocated. FIG. 49 shows a bistatic RFID reader consisting of a transmitter and a receiver that interrogates a collection of tags that are placed on items in a box. The difference field in FIG. 47 attains its maximum values at locations that are approximately 90° away from the transmitting antenna of the reader. Hence, if the receiving antenna of the reader were placed 90° away from the transmitting antenna, the reader would more effectively interrogate the tag in this configuration where the tag is on the side of the cylinder. Moreover, by separating the transmitter from the receiver, the direct coupling is significantly reduced and the read range is no longer limited by the condition that the tag signal may be no more than 100 dB below the level of the transmitters carrier signal. (See page 145 of reference [1] cited above for a discussion of the 100 dB condition.)
  • This example illustrates two advantages of a bistatic reader over a monostatic reader: (1) a bistatic reader may be able to correctly read certain tags that cannot be read accurately by a monostatic reader because the back scattered field is much weaker than the scattered field at an optimal receiver location, and (2) the direct coupling between the transmitter and receiver is much weaker for a bistatic reader, thus making it possible to correctly interrogate tags that are further away.
  • An even more effective reader would have several receiving antennas distributed around the objects of interrogation to pick up scattered fields that peak in many different directions (multistatic reader). For fixed geometries, such as soda bottles on a pallet, numerical simulations can determine the optimal bistatic configuration. The use of numerical simulations to optimize the placement of tags and reader antennas is illustrated by the example above, which shows that a 90° bistatic configuration is optimal for a tag placed on the side of a dielectric cylinder.
  • Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions, and alterations can be made herein without departing from the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods, and steps described in the specification. As one will readily appreciate from the disclosure, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.

Claims (46)

1. A method for interrogating RFID tags comprising:
transmitting a data signal that causes said RFID tags to respond,
transmitting one or more scramble signals that do not cause said RFID tags to respond, and
adjusting said data signal and said one or more scramble signals such that said one or more scramble signals overshadow said data signal in all but selected regions.
2. The method of claim 1, wherein at least one of said one or more scramble signals contains a separate intelligible data stream.
3. The method of claim 1, wherein at least one of said one or more scramble signals charges said RFID tags when said RFID tags are not being interrogated.
4. The method of claim 1, wherein at least one of said one or more scramble signals broadcasts a sine wave.
5. The method of claim 1, wherein said selected regions are varied during the transmission of said data signal.
6. The method of claim 1, wherein said data signal comprises a plurality of bits, and said plurality of bits is divided into a first part and a second part.
7. The method of claim 6, wherein for each of said first part and said second part, a corresponding scramble-signal null direction is defined that is slightly away from the peak direction of said data signal.
8. The method of claim 6, wherein each of said first part and said second part is transmitted while at least one of said one or more scramble signals has its central null steered in the direction of a corresponding scramble-signal null direction.
9. The method of claim 1, wherein said one or more scramble signals have approximately constant amplitudes away from a central null for each scramble signal, and the total radiated power is approximately omni-directional.
10. The method of claim 9, wherein constant-amplitude scramble signals are achieved by moving zeros off the Schelkunoff unit circle.
11. The method of claim 9, wherein constant-amplitude scramble signals are achieved by iterative methods.
12. The method of claim 1, further comprising the steps of:
employing two or more array readers that scan an area with data and scramble signals to determine the angular positions of each tag within range, and
determining the absolute position of said RFID tags through triangulation using the angular positions obtained with said two or more array readers.
13. The method of claim 12, further comprising the step of:
employing anti-collision methods when more than one of said RFID tags responds at any given scan angle.
14. The method of claim 1, wherein said reader and said RFID tags are inductively coupled and said reader employs two or more loops to transmit said data signal and said one or more scramble signals.
15. The method of claim 14, wherein the configuration of said loops of said reader is optimized with iterative techniques to ensure that the magnetic field of said data signal is overshadowed by the magnetic fields of said one or more scramble signal except in selected regions.
16. The method of claim 1, further comprising the step of employing one or more security measures.
17. The method of claim 16, wherein said one or more security measures comprises placing of nulls in receiving patterns.
18. The method of claim 16, wherein said one or more security measures comprises using highly directive antennas.
19. The method of claim 16, wherein said one or more security measures comprises transmitting scramble signals.
20. A method for optically displaying the interrogation zone of an RFID reader, comprising the steps of:
attaching an optical source to an RFID reader, and,
transmitting one or more light beams with said optical source to visualize said interrogation zone.
21. The method of claim 20, wherein at least one of said one or more light beams is pointed in the direction of the center of said interrogation zone.
22. The method of claim 20, further comprising the step of transmitting two or more light beams such that each light beam coincides with a boundary of said interrogation zone.
23. The method of claim 20, further comprising the step of scanning a light beam back and forth between boundaries of said interrogation zone.
24. The method of claim 22, wherein said light beams are transmitted with lasers.
25. The method of claim 20, wherein said optical source is built into the housing of said RFID reader.
26. The method of claim 20, wherein said optical source is attached to the housing of said RFID reader.
27. A method for improving the efficiency of RFID systems having RFID readers and RFID tags, comprising the steps of:
employing an antenna array by an RFID reader,
broadcasting a data signal using said antenna array, and,
broadcasting a scramble signal using said antenna array.
28. The method of claim 27, wherein said antenna array employs patch antennas.
29. The method of claim 27, further comprising the step of employing three antenna elements by said RFID reader, wherein two antenna elements transmit said scramble signal and one antenna element interrogates RFID tags.
30. The method of claim 27, further comprising the step of adjusting the array excitation coefficients for said data signal and said scramble signal to create an interrogation beam that fits an opening in a container.
31. The method of claim 27, further comprising the step of employing an antenna, wherein said antenna transmits two or more interrogation beams and wherein any of said RFID tags in said interrogation zone receive sufficient power to operate from at least one of said two or more interrogation beams.
32. The method of claim 27, further comprising the step of employing two or more scramble signals, wherein said two or more scramble signals prevent leakage of said data signal.
33. The method of claim 32, wherein two or more scramble signals employ coefficients that are mirror images.
34. The method of claim 27, further comprising the step of transmitting said data signal and said scramble signal adjusted to create closely spaced disjoint interrogation zones.
35. The method of claim 27, wherein the position of said RFID reader is determined from the solution of an inverse source problem.
36. The method of claim 35, wherein the inverse source problem is solved with an iterative optimization scheme.
37. The method of claim 27, wherein the position of said RFID reader is determined from measurements.
38. The method of claim 27, wherein the array excitation coefficients are determined from the solution to an inverse source problem.
39. The method of claim 38, wherein the inverse source problem is solved with an iterative optimization scheme.
40. The method of claim 27, wherein the array excitation coefficients are determined from measurements.
41. A method for interrogating RFID tags comprising the steps of:
providing a tag antenna to interrogate said RFID tags, and,
placing said RFID tags at locations where said tag antenna creates maximum disruption of a field distribution.
42. The method of claim 41, wherein the field distribution on an object is computed with a numerical method.
43. The method of claim 41, wherein the field distribution on an object is obtained from measurements.
44. The method of claim 41 further comprising the step of transmitting and receiving signals in a bistatic mode of operation.
45. The method of claim 41 further comprising the step of transmitting and receiving signals in a multistatic mode of operation.
46. The method of claim 45 further comprising the step of determining the location of said receivers by solving a scattering problem.
US11/758,086 2004-03-05 2007-06-05 Method and apparatus for improving the efficiency and accuracy of rfid systems Abandoned US20070252687A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/758,086 US20070252687A1 (en) 2004-03-05 2007-06-05 Method and apparatus for improving the efficiency and accuracy of rfid systems

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US55035504P 2004-03-05 2004-03-05
US55041104P 2004-03-05 2004-03-05
US56143304P 2004-04-12 2004-04-12
US60353104P 2004-08-20 2004-08-20
US61342804P 2004-09-27 2004-09-27
US11/066,048 US7456726B2 (en) 2004-03-05 2005-02-25 Method and apparatus for improving the efficiency and accuracy of RFID systems
US11/758,086 US20070252687A1 (en) 2004-03-05 2007-06-05 Method and apparatus for improving the efficiency and accuracy of rfid systems

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/066,048 Division US7456726B2 (en) 2004-03-05 2005-02-25 Method and apparatus for improving the efficiency and accuracy of RFID systems

Publications (1)

Publication Number Publication Date
US20070252687A1 true US20070252687A1 (en) 2007-11-01

Family

ID=35056667

Family Applications (4)

Application Number Title Priority Date Filing Date
US11/066,048 Active 2026-02-17 US7456726B2 (en) 2004-03-05 2005-02-25 Method and apparatus for improving the efficiency and accuracy of RFID systems
US11/758,118 Abandoned US20070252677A1 (en) 2004-03-05 2007-06-05 Method and apparatus for improving the efficiency and accuracy of rfid systems
US11/758,086 Abandoned US20070252687A1 (en) 2004-03-05 2007-06-05 Method and apparatus for improving the efficiency and accuracy of rfid systems
US12/270,045 Abandoned US20090066481A1 (en) 2004-03-05 2008-11-13 Method and apparatus for improving the efficiency and accuracy of rfid systems

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US11/066,048 Active 2026-02-17 US7456726B2 (en) 2004-03-05 2005-02-25 Method and apparatus for improving the efficiency and accuracy of RFID systems
US11/758,118 Abandoned US20070252677A1 (en) 2004-03-05 2007-06-05 Method and apparatus for improving the efficiency and accuracy of rfid systems

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/270,045 Abandoned US20090066481A1 (en) 2004-03-05 2008-11-13 Method and apparatus for improving the efficiency and accuracy of rfid systems

Country Status (4)

Country Link
US (4) US7456726B2 (en)
EP (1) EP1743271B1 (en)
AT (1) ATE542186T1 (en)
WO (1) WO2005091889A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040266481A1 (en) * 2002-03-18 2004-12-30 Jay Patel RF ID tag reader utilizing a scanning antenna system and method

Families Citing this family (65)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7051945B2 (en) * 2002-09-30 2006-05-30 Nanosys, Inc Applications of nano-enabled large area macroelectronic substrates incorporating nanowires and nanowire composites
WO2005008578A2 (en) * 2003-07-07 2005-01-27 Avery Dennison Corporation Rfid device with changeable characteristics
ATE542186T1 (en) * 2004-03-05 2012-02-15 Seknion Inc METHOD AND APPARATUS FOR IMPROVING THE PERFORMANCE AND ACCURACY OF RFID SYSTEMS
WO2005091890A2 (en) * 2004-03-05 2005-10-06 Seknion, Inc. Method and apparatus for security in a wireless network
US7199719B2 (en) * 2004-03-24 2007-04-03 Dan Alan Steinberg RFID tag reader with tag location indicated by visible light beam
US7410096B2 (en) * 2004-06-07 2008-08-12 Rf Code, Inc. Middleware appliance for scalable and reliable automated identification
US7551081B2 (en) 2004-11-10 2009-06-23 Rockwell Automation Technologies, Inc. Systems and methods that integrate radio frequency identification (RFID) technology with agent-based control systems
US7339476B2 (en) 2004-11-10 2008-03-04 Rockwell Automation Technologies, Inc. Systems and methods that integrate radio frequency identification (RFID) technology with industrial controllers
US7988055B2 (en) * 2005-01-20 2011-08-02 Wright State University Uncontrolled passive radio frequency identification tag and system with 3-D positioning
US7132948B2 (en) * 2005-01-22 2006-11-07 Odin Technologies, Inc. System for optimally placing radio frequency identification (RFID) antennas, tags, and interrogators
US20110221566A1 (en) * 2005-02-04 2011-09-15 Douglas Kozlay Authenticating device with wireless directional radiation
US7474220B2 (en) * 2005-06-04 2009-01-06 Sungkyunkwan University Foundation For Corporate Collaboration Three-dimensional radio frequency identification tag and environment condition recognition system and method using tag
TWI271536B (en) * 2005-06-27 2007-01-21 Lite On Technology Corp Position indicating system
US7388491B2 (en) 2005-07-20 2008-06-17 Rockwell Automation Technologies, Inc. Mobile RFID reader with integrated location awareness for material tracking and management
US7764191B2 (en) 2005-07-26 2010-07-27 Rockwell Automation Technologies, Inc. RFID tag data affecting automation controller with internal database
US8260948B2 (en) 2005-08-10 2012-09-04 Rockwell Automation Technologies, Inc. Enhanced controller utilizing RFID technology
DE102006032833B4 (en) * 2005-08-26 2016-11-03 Honda Motor Co., Ltd. Transponder evaluation system and method
US7510110B2 (en) 2005-09-08 2009-03-31 Rockwell Automation Technologies, Inc. RFID architecture in an industrial controller environment
US7931197B2 (en) 2005-09-20 2011-04-26 Rockwell Automation Technologies, Inc. RFID-based product manufacturing and lifecycle management
US7446662B1 (en) 2005-09-26 2008-11-04 Rockwell Automation Technologies, Inc. Intelligent RFID tag for magnetic field mapping
US8025227B2 (en) 2005-09-30 2011-09-27 Rockwell Automation Technologies, Inc. Access to distributed databases via pointer stored in RFID tag
US20070096909A1 (en) * 2005-10-28 2007-05-03 Matthew Lally Interactive networking device
US7705733B2 (en) * 2006-01-06 2010-04-27 Warsaw Orthopedic, Inc. Coiled RFID tag
US7154283B1 (en) 2006-02-22 2006-12-26 Avery Dennison Corporation Method of determining performance of RFID devices
US8131263B2 (en) * 2006-12-06 2012-03-06 Microsoft Corporation Backup media with wireless identifications tags
US20080136635A1 (en) * 2006-12-08 2008-06-12 Symbol Technologies, Inc. Low power rfid reader that gives visibility to passive tags as active tags using low power 802.11
US7812731B2 (en) * 2006-12-22 2010-10-12 Vigilan, Incorporated Sensors and systems for detecting environmental conditions or changes
US8502684B2 (en) 2006-12-22 2013-08-06 Geoffrey J. Bunza Sensors and systems for detecting environmental conditions or changes
US7639138B2 (en) 2007-02-12 2009-12-29 At&T Intellectual Property I, L.P. Methods and apparatus to visualize locations of radio frequency identification (RFID) tagged items
US20080198000A1 (en) * 2007-02-18 2008-08-21 James Neil Rodgers RFID interrogation of liquid/metal
US20100120441A1 (en) * 2007-03-22 2010-05-13 Telefonaktiebolaget Lm Ericsson Increasing a sectorization order in a first sector of an antenna array
US20090002165A1 (en) * 2007-06-28 2009-01-01 Micron Technology, Inc. Method and system of determining a location characteristic of a rfid tag
EP2188868B1 (en) * 2007-09-11 2018-07-11 RF Controls, LLC Radio frequency signal acquisition and source location system
US20090160638A1 (en) * 2007-12-20 2009-06-25 3M Innovative Properties Company Radio frequency identification reader system
TW201001958A (en) 2008-04-29 2010-01-01 Odin Technologies Inc Method and apparatus for a deployable radio-frequency identification portal system
US9442192B2 (en) * 2008-07-28 2016-09-13 Thingamagigwerks, Llc Method and apparatus for location determination using reflected interferometry
US8854212B2 (en) 2009-03-30 2014-10-07 Datalogic Automation, Inc. Radio frequency identification tag identification system
ES2641771T3 (en) * 2009-10-16 2017-11-13 Alert Systems Aps An electronic anti-theft protection system
US8461965B2 (en) * 2010-01-13 2013-06-11 The Boeing Company Portable radio frequency identification (RFID) reader
KR20120043309A (en) * 2010-10-26 2012-05-04 한국전자통신연구원 Method and apparatus for visualizing recognition area of rfid
EP2678707A4 (en) * 2011-02-22 2018-01-10 Celeno Communications (Israel) Ltd. Phy-level wireless security
US9197984B2 (en) * 2011-04-19 2015-11-24 Qualcomm Incorporated RFID device with wide area connectivity
EP2535850B1 (en) * 2011-06-16 2019-01-23 Deutsche Post AG Logistic terminal with loading dock areas suitable to identify objects
US8695884B2 (en) 2011-08-25 2014-04-15 Michael H. Baym Systems, devices, admixtures, and methods including transponders for indication of food attributes
US20130049934A1 (en) * 2011-08-25 2013-02-28 Elwha LLC, a limited liability company of the State of Delaware Systems, devices, methods, and admixtures including interrogators and interrogation of tags for indication of food attributes
RU2488889C1 (en) * 2012-06-18 2013-07-27 Общество с ограниченной ответственностью "АМ Девелопмент" Method of detecting moving electroconductive objects and apparatus for realising said method
US9841492B2 (en) 2013-02-25 2017-12-12 Quake Global, Inc. Ceiling-mounted RFID-enabled tracking
JP6280571B2 (en) 2013-02-26 2018-02-14 クエイク グローバル インコーポレイティッドQuake Global, Inc. Method and apparatus for automatic identification wristband
US9715609B1 (en) 2013-03-11 2017-07-25 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration Systems, apparatuses and methods for beamforming RFID tags
US9472075B1 (en) 2015-06-04 2016-10-18 Tyco Fire & Security Gmbh Systems and methods for locating items in a facility
US10134253B2 (en) 2015-06-04 2018-11-20 Tyco Fire & Security Gmbh Systems and methods for locating and determining the orientation of a handheld device
US9852319B1 (en) 2015-07-02 2017-12-26 Impinj, Inc. Inventory-cycle-based RFID tag location
US11147719B2 (en) 2015-11-16 2021-10-19 Hill-Rom Services, Inc. Incontinence detection systems for hospital beds
EP3306576B1 (en) * 2016-10-05 2023-03-15 The Swatch Group Research and Development Ltd Method and system for secure access to a determined space by means of a portable object
WO2018104822A1 (en) 2016-12-08 2018-06-14 Celeno Communications (Israel) Ltd. Establishing a secure uplink channel by transmitting a secret word over a secure downlink channel
US10334454B2 (en) * 2017-05-11 2019-06-25 Intel Corporation Multi-finger beamforming and array pattern synthesis
EP3403580B1 (en) * 2017-05-16 2021-05-05 Hill-Rom Services, Inc. Incontinence detection apparatus
CN107222286B (en) * 2017-08-09 2018-03-13 罗普特(厦门)科技集团有限公司 A kind of method of network directional shielding
US10656263B2 (en) 2017-09-14 2020-05-19 Qualcomm Incorporated Extended localization range and assets tracking
EP3834186B1 (en) * 2018-08-06 2022-12-14 Sensormatic Electronics, LLC Pedestal with embedded camera(s) for beam steering
CN109242069B (en) * 2018-09-20 2019-11-26 上海华申智能卡应用系统有限公司 A kind of steel cylinder electronic label read-write method and system based on phased array antenna
CN112073082B (en) * 2019-05-22 2022-04-22 成都华为技术有限公司 Backscatter communication method, excitation device, reflection device, and reception device
NL2026233B1 (en) * 2020-08-07 2022-04-13 Nedap Nv Tag interrogation system
US20220261565A1 (en) * 2021-02-16 2022-08-18 Qatar University Method and apparatus for physically secure backscatter communications
FR3139258A1 (en) * 2022-08-30 2024-03-01 Airbus Defence And Space Sas OPTICAL TERMINAL FOR COMMUNICATION BY LASER SIGNALS

Citations (55)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4068178A (en) * 1976-10-01 1978-01-10 Telenetics, Inc. Variable frequency waveform synthesizer
US4114151A (en) * 1976-09-14 1978-09-12 Alfa-Laval Company Limited Passive transponder apparatus for use in an interrogator-responder system
US4467140A (en) * 1981-05-01 1984-08-21 Masco Corporation Of Indiana Microprocessor-based cordless telephone system
US4956864A (en) * 1987-01-27 1990-09-11 Brockman Milton H Receiver for communications satellite down-link reception
US4975926A (en) * 1989-03-30 1990-12-04 Guenther Knapp Wireless indoor data communication system
US5157687A (en) * 1989-06-29 1992-10-20 Symbol Technologies, Inc. Packet data communication network
US5173705A (en) * 1990-11-16 1992-12-22 Thomson Composants Microondes Telecommunications device using electromagnetic waves
US5252965A (en) * 1991-03-15 1993-10-12 Delco Electronics Corporation Changing one of many access codes upon removal of ignition key
US5265265A (en) * 1990-02-09 1993-11-23 Seiko Epson Corporation Wristwatch radio communication device having an improved noise shielding structure
US5382784A (en) * 1993-02-08 1995-01-17 Indala Corporation Hand-held dual technology identification tag reading head
US5410141A (en) * 1989-06-07 1995-04-25 Norand Hand-held data capture system with interchangable modules
US5420589A (en) * 1993-06-07 1995-05-30 Wells; C. T. System for evaluating the inner medium characteristics of non-metallic materials
US5495237A (en) * 1992-12-07 1996-02-27 Akishima Laboratories (Mitsui Zosen) Inc. Measuring tool for collecting down hole information and metering valve for producing mud-pulse used in the same
US5519381A (en) * 1992-11-18 1996-05-21 British Technology Group Limited Detection of multiple articles
US5550871A (en) * 1993-12-29 1996-08-27 Hyundai Electronics Industries, Co., Ltd. Satellite communication receiving apparatus
US5564020A (en) * 1994-06-30 1996-10-08 Compaq Computer Corporation Apparatus for reducing interference between a computer device and a radio transceiver utilizing separated units with an infrared link
US5655019A (en) * 1995-03-30 1997-08-05 Mckernan; Randolph W. Identity protection method for use with wireless telephone systems
US5671219A (en) * 1993-11-01 1997-09-23 Omnipoint Corporation Communication protocol for spread spectrum communication
US5727608A (en) * 1996-05-24 1998-03-17 Nusbaumer; Joseph M. Automated fuel management system, components therefor, and methods of making the same
US5748147A (en) * 1992-03-04 1998-05-05 Motorola Inc Position locating rescue transceiver
US5790922A (en) * 1996-03-11 1998-08-04 Canon Kabushiki Kaisha Image forming apparatus constructed to have a high heat radiating efficiency
US5805643A (en) * 1993-02-26 1998-09-08 Kabushiki Kaisha Toshiba Diversity receiver system used in digital communication
US5805055A (en) * 1993-05-11 1998-09-08 Elementare Watson S.R.L. Antitheft system integrated with functions of security, information and navigation, based on electronic cartography, vocal synthesis and radio telecommunication
US5838237A (en) * 1996-05-22 1998-11-17 Revell; Graeme Charles Personal alarm device
US5874724A (en) * 1997-01-10 1999-02-23 International Business Machines Corporation Light selectable radio frequency identification tag and method therefor
US5918155A (en) * 1995-03-13 1999-06-29 Hitachi, Ltd. Satellite communication system and method thereof
US5959367A (en) * 1996-07-11 1999-09-28 Donnelly Corporation Vehicle mirror digital network and dynamically interactive mirror system
US6025780A (en) * 1997-07-25 2000-02-15 Checkpoint Systems, Inc. RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system
US6028551A (en) * 1994-12-13 2000-02-22 Schoen; Neil Charles Micro-miniature beacon transmit-only geo-location emergency system for personal security
US6031497A (en) * 1997-12-22 2000-02-29 Samsung Electronics Co., Ltd. Antenna apparatus for smart phone
US6035039A (en) * 1995-11-30 2000-03-07 Tisdale; William R. Fraud detection and user validation system for mobile earth terminal communication device
US6111550A (en) * 1996-09-26 2000-08-29 Texas Instruments Incorporated High gain compact scanning personal communication system array
US6184841B1 (en) * 1996-12-31 2001-02-06 Lucent Technologies Inc. Antenna array in an RFID system
US6275679B1 (en) * 1985-06-24 2001-08-14 The United States Of America As Represented By The Secretary Of The Air Force Secure communication using array transmitter
US6285318B1 (en) * 1994-12-13 2001-09-04 Neil Charles Schoen Micro-miniature beacon transmit-only geo-location emergency system for personal security
US6294992B1 (en) * 1995-08-17 2001-09-25 Pittway Corp. High power control signal transmission and low power data signal transmission in a wireless security system
US20010028302A1 (en) * 2000-04-06 2001-10-11 Marc Degrauwe Active transponder with means allowing the maximum communication distance to be varied
US6397063B1 (en) * 2001-03-30 2002-05-28 Bellsouth Intellectual Property Corporation Air-surface test system and method to evaluate potential wireless base station sites
US6414605B1 (en) * 1998-09-02 2002-07-02 Schlumberger Resource Management Services, Inc. Utility meter pit lid mounted antenna assembly and method
US20020097157A1 (en) * 2001-01-25 2002-07-25 Piri John L. Device and method for alerting to the need to recover something, identifying it, and determining its location for purposes of recovery
US20030026196A1 (en) * 2001-06-21 2003-02-06 Bae Systems Information And Electronic Systems Integration Inc. Reduced algorithm receiver
US6567032B1 (en) * 1999-06-30 2003-05-20 International Business Machines Corp. Method of directing communication between addressable targets using a generalized pointing device
US20030097304A1 (en) * 2001-11-16 2003-05-22 Hunt Douglas Harold Automated unmanned rental system and method
US6608588B2 (en) * 2000-05-05 2003-08-19 Greenwich Technologies Associates Remote sensing using Rayleigh signaling
US20030179073A1 (en) * 2002-03-20 2003-09-25 Ohanes Ghazarian Electronic secure locking system
US6628205B2 (en) * 2000-11-30 2003-09-30 Hewlett-Packard Development Company, L.P. Visual meter for providing a long-term indication of dynamic parameters
US6650846B1 (en) * 1998-06-09 2003-11-18 Nec Corporation Optical transmitter and optical transmission system
US6831547B2 (en) * 2001-07-05 2004-12-14 Kabushiki Kaisha Honda Lock Vehicle equipment remote control system
US20050128985A1 (en) * 2000-03-21 2005-06-16 Liberti Joseph C.Jr. Combined adaptive spatio-temporal processing and multi-user detection for CDMA wireless systems
US7054296B1 (en) * 1999-08-04 2006-05-30 Parkervision, Inc. Wireless local area network (WLAN) technology and applications including techniques of universal frequency translation
US7075436B2 (en) * 2001-02-12 2006-07-11 Symbol Technologies, Inc. Method, system, and apparatus for binary traversal of a tag population
US7084769B2 (en) * 2002-01-09 2006-08-01 Vue Technology, Inc. Intelligent station using multiple RF antennae and inventory control system and method incorporating same
US7106174B1 (en) * 1998-06-22 2006-09-12 Hanex Co., Ltd. Anti-collision tag apparatus and system
US7398078B2 (en) * 2004-03-05 2008-07-08 Seknion, Inc. Method and apparatus for security in a wireless network
US7456726B2 (en) * 2004-03-05 2008-11-25 Seknion, Inc. Method and apparatus for improving the efficiency and accuracy of RFID systems

Family Cites Families (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2530140A (en) * 1944-08-11 1950-11-14 Tung Sol Lamp Works Inc Secret signaling system
US4032922A (en) * 1976-01-09 1977-06-28 The United States Of America As Represented By The Secretary Of The Navy Multibeam adaptive array
US4717919A (en) * 1985-05-28 1988-01-05 Hughes Aircraft Company Feedback limited adaptive antenna with signal environment power level compensation
GB2236233A (en) * 1989-09-04 1991-03-27 Philips Electronic Associated Communicating information by radio;preventing communication overlap
US5144553A (en) * 1990-05-17 1992-09-01 Hassett John J Electronic vehicle toll collection system and method
US5083111A (en) * 1990-11-26 1992-01-21 Sensormatic Electronics Corporation Jamming apparatus for electronic article surveillance systems
JPH0540893A (en) 1991-08-06 1993-02-19 Fujitsu General Ltd Security data collecting device
SE469673B (en) * 1992-01-20 1993-08-16 Rso Corp SETTING AND DEVICE ON CONTACT-FREE SALE OF OBJECTS
JPH05304514A (en) 1992-04-24 1993-11-16 Clarion Co Ltd Spread spectrum communication equipment
JPH07271939A (en) 1994-03-30 1995-10-20 Mitsubishi Denki Semiconductor Software Kk Non-contact ic card, card reader/writer and card device
CA2154378C (en) 1994-08-01 2006-03-21 Larry W. Thompson Method and apparatus for interrogating a borehole
JPH08204613A (en) * 1995-01-23 1996-08-09 Uniden Corp Radio communication equipment
DE69619977T2 (en) 1995-05-24 2002-11-07 Bellsouth Corp., Atlanta ASYMMETRICAL DATA COMMUNICATION SYSTEM
US5790022A (en) 1996-09-09 1998-08-04 Delvecchio; George Security tracking system
US5955969A (en) * 1997-04-09 1999-09-21 Texas Instruments Incorporated Method to prevent rouge transponder responses in automatic vehicle identification systems
GB2332546A (en) 1997-12-16 1999-06-23 Atl Monitors Limited Remote metering
JPH11344562A (en) * 1998-03-17 1999-12-14 Supersensor Pty Ltd Maximum output variable challenge responder
JP3410357B2 (en) 1998-04-10 2003-05-26 日本電信電話株式会社 Antenna device
JP2000285208A (en) 1999-03-31 2000-10-13 Toshiba Corp Radio communication system
EP1051049A3 (en) 1999-05-04 2001-01-17 Nortel Networks Limited A radio communication apparatus for subscriber premises
JP2001024547A (en) 1999-07-09 2001-01-26 Nippon Avionics Co Ltd Rfid repeater
DE50004188D1 (en) 1999-09-10 2003-11-27 Siemens Transit Telematic Systems Ag METHOD AND SYSTEM FOR REGISTERING TICKETS
JP4103268B2 (en) 1999-10-14 2008-06-18 株式会社デンソー Wireless communication device
JP2001298377A (en) 2000-04-14 2001-10-26 Matsushita Electric Works Ltd Rechargeable receiver
ATE261231T1 (en) * 2000-05-10 2004-03-15 Mitsubishi Electric Inf Tech METHOD FOR ASSIGNING SECONDARY SYNCHRONIZATION CODES TO A BASE STATION OF A MOBILE COMMUNICATIONS SYSTEM
FR2812986B1 (en) * 2000-08-09 2002-10-31 St Microelectronics Sa DETECTION OF AN ELECTRIC SIGNATURE OF AN ELECTROMAGNETIC TRANSPONDER
JP2002236953A (en) 2001-02-09 2002-08-23 Mitsubishi Electric Corp On-vehicle unit for dedicated short range communication
JP2002321725A (en) 2001-04-20 2002-11-05 Oji Paper Co Ltd Conveyer mounted with data carrier and method for receiving radio wave by the same
US6970089B2 (en) * 2002-07-03 2005-11-29 Battelle Memorial Institute K1-53 Full-spectrum passive communication system and method
US7119658B2 (en) * 2003-02-03 2006-10-10 Ingrid, Inc. Device enrollment in a security system
US7119692B2 (en) * 2003-11-10 2006-10-10 3M Innovative Properties Company System for detecting radio-frequency identification tags
US7088248B2 (en) * 2004-03-24 2006-08-08 Avery Dennison Corporation System and method for selectively reading RFID devices

Patent Citations (61)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4114151A (en) * 1976-09-14 1978-09-12 Alfa-Laval Company Limited Passive transponder apparatus for use in an interrogator-responder system
US4068178A (en) * 1976-10-01 1978-01-10 Telenetics, Inc. Variable frequency waveform synthesizer
US4467140A (en) * 1981-05-01 1984-08-21 Masco Corporation Of Indiana Microprocessor-based cordless telephone system
US6275679B1 (en) * 1985-06-24 2001-08-14 The United States Of America As Represented By The Secretary Of The Air Force Secure communication using array transmitter
US4956864A (en) * 1987-01-27 1990-09-11 Brockman Milton H Receiver for communications satellite down-link reception
US4975926A (en) * 1989-03-30 1990-12-04 Guenther Knapp Wireless indoor data communication system
US5410141A (en) * 1989-06-07 1995-04-25 Norand Hand-held data capture system with interchangable modules
US5157687A (en) * 1989-06-29 1992-10-20 Symbol Technologies, Inc. Packet data communication network
US5265265A (en) * 1990-02-09 1993-11-23 Seiko Epson Corporation Wristwatch radio communication device having an improved noise shielding structure
US5173705A (en) * 1990-11-16 1992-12-22 Thomson Composants Microondes Telecommunications device using electromagnetic waves
US5252965A (en) * 1991-03-15 1993-10-12 Delco Electronics Corporation Changing one of many access codes upon removal of ignition key
US5969673A (en) * 1992-03-04 1999-10-19 Motorola, Inc. Position locating rescue transceiver
US5982322A (en) * 1992-03-04 1999-11-09 Motorola, Inc. Position locating rescue transceiver
US5748147A (en) * 1992-03-04 1998-05-05 Motorola Inc Position locating rescue transceiver
US5519381A (en) * 1992-11-18 1996-05-21 British Technology Group Limited Detection of multiple articles
US5495237A (en) * 1992-12-07 1996-02-27 Akishima Laboratories (Mitsui Zosen) Inc. Measuring tool for collecting down hole information and metering valve for producing mud-pulse used in the same
US5382784A (en) * 1993-02-08 1995-01-17 Indala Corporation Hand-held dual technology identification tag reading head
US5805643A (en) * 1993-02-26 1998-09-08 Kabushiki Kaisha Toshiba Diversity receiver system used in digital communication
US5805055A (en) * 1993-05-11 1998-09-08 Elementare Watson S.R.L. Antitheft system integrated with functions of security, information and navigation, based on electronic cartography, vocal synthesis and radio telecommunication
US5420589A (en) * 1993-06-07 1995-05-30 Wells; C. T. System for evaluating the inner medium characteristics of non-metallic materials
US5671219A (en) * 1993-11-01 1997-09-23 Omnipoint Corporation Communication protocol for spread spectrum communication
US5768264A (en) * 1993-11-01 1998-06-16 Omnipoint Corporation Time division multiple access base station supporting ISDN messages
US5550871A (en) * 1993-12-29 1996-08-27 Hyundai Electronics Industries, Co., Ltd. Satellite communication receiving apparatus
US5564020A (en) * 1994-06-30 1996-10-08 Compaq Computer Corporation Apparatus for reducing interference between a computer device and a radio transceiver utilizing separated units with an infrared link
US5734487A (en) * 1994-06-30 1998-03-31 Compaq Computer Corporation Computer system incorporating an infrared link for reduced interference communication with a radio transceiver
US6285318B1 (en) * 1994-12-13 2001-09-04 Neil Charles Schoen Micro-miniature beacon transmit-only geo-location emergency system for personal security
US6028551A (en) * 1994-12-13 2000-02-22 Schoen; Neil Charles Micro-miniature beacon transmit-only geo-location emergency system for personal security
US5918155A (en) * 1995-03-13 1999-06-29 Hitachi, Ltd. Satellite communication system and method thereof
US5655019A (en) * 1995-03-30 1997-08-05 Mckernan; Randolph W. Identity protection method for use with wireless telephone systems
US6294992B1 (en) * 1995-08-17 2001-09-25 Pittway Corp. High power control signal transmission and low power data signal transmission in a wireless security system
US6035039A (en) * 1995-11-30 2000-03-07 Tisdale; William R. Fraud detection and user validation system for mobile earth terminal communication device
US5790922A (en) * 1996-03-11 1998-08-04 Canon Kabushiki Kaisha Image forming apparatus constructed to have a high heat radiating efficiency
US5838237A (en) * 1996-05-22 1998-11-17 Revell; Graeme Charles Personal alarm device
US5727608A (en) * 1996-05-24 1998-03-17 Nusbaumer; Joseph M. Automated fuel management system, components therefor, and methods of making the same
US6175164B1 (en) * 1996-07-11 2001-01-16 Donnelly Corporation Vehicle mirror digital network and dynamically interactive mirror system
US5959367A (en) * 1996-07-11 1999-09-28 Donnelly Corporation Vehicle mirror digital network and dynamically interactive mirror system
US6111550A (en) * 1996-09-26 2000-08-29 Texas Instruments Incorporated High gain compact scanning personal communication system array
US6184841B1 (en) * 1996-12-31 2001-02-06 Lucent Technologies Inc. Antenna array in an RFID system
US5874724A (en) * 1997-01-10 1999-02-23 International Business Machines Corporation Light selectable radio frequency identification tag and method therefor
US6025780A (en) * 1997-07-25 2000-02-15 Checkpoint Systems, Inc. RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system
US6031497A (en) * 1997-12-22 2000-02-29 Samsung Electronics Co., Ltd. Antenna apparatus for smart phone
US6650846B1 (en) * 1998-06-09 2003-11-18 Nec Corporation Optical transmitter and optical transmission system
US7106174B1 (en) * 1998-06-22 2006-09-12 Hanex Co., Ltd. Anti-collision tag apparatus and system
US6414605B1 (en) * 1998-09-02 2002-07-02 Schlumberger Resource Management Services, Inc. Utility meter pit lid mounted antenna assembly and method
US6567032B1 (en) * 1999-06-30 2003-05-20 International Business Machines Corp. Method of directing communication between addressable targets using a generalized pointing device
US7054296B1 (en) * 1999-08-04 2006-05-30 Parkervision, Inc. Wireless local area network (WLAN) technology and applications including techniques of universal frequency translation
US20050128985A1 (en) * 2000-03-21 2005-06-16 Liberti Joseph C.Jr. Combined adaptive spatio-temporal processing and multi-user detection for CDMA wireless systems
US20010028302A1 (en) * 2000-04-06 2001-10-11 Marc Degrauwe Active transponder with means allowing the maximum communication distance to be varied
US6608588B2 (en) * 2000-05-05 2003-08-19 Greenwich Technologies Associates Remote sensing using Rayleigh signaling
US6628205B2 (en) * 2000-11-30 2003-09-30 Hewlett-Packard Development Company, L.P. Visual meter for providing a long-term indication of dynamic parameters
US6545606B2 (en) * 2001-01-25 2003-04-08 The United States Of America As Represented By The Secretary Of The Navy Device and method for alerting to the need to recover something, identifying it, and determining its location for purposes of recovery
US20020097157A1 (en) * 2001-01-25 2002-07-25 Piri John L. Device and method for alerting to the need to recover something, identifying it, and determining its location for purposes of recovery
US7075436B2 (en) * 2001-02-12 2006-07-11 Symbol Technologies, Inc. Method, system, and apparatus for binary traversal of a tag population
US6397063B1 (en) * 2001-03-30 2002-05-28 Bellsouth Intellectual Property Corporation Air-surface test system and method to evaluate potential wireless base station sites
US20030026196A1 (en) * 2001-06-21 2003-02-06 Bae Systems Information And Electronic Systems Integration Inc. Reduced algorithm receiver
US6831547B2 (en) * 2001-07-05 2004-12-14 Kabushiki Kaisha Honda Lock Vehicle equipment remote control system
US20030097304A1 (en) * 2001-11-16 2003-05-22 Hunt Douglas Harold Automated unmanned rental system and method
US7084769B2 (en) * 2002-01-09 2006-08-01 Vue Technology, Inc. Intelligent station using multiple RF antennae and inventory control system and method incorporating same
US20030179073A1 (en) * 2002-03-20 2003-09-25 Ohanes Ghazarian Electronic secure locking system
US7398078B2 (en) * 2004-03-05 2008-07-08 Seknion, Inc. Method and apparatus for security in a wireless network
US7456726B2 (en) * 2004-03-05 2008-11-25 Seknion, Inc. Method and apparatus for improving the efficiency and accuracy of RFID systems

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040266481A1 (en) * 2002-03-18 2004-12-30 Jay Patel RF ID tag reader utilizing a scanning antenna system and method
US7496329B2 (en) * 2002-03-18 2009-02-24 Paratek Microwave, Inc. RF ID tag reader utilizing a scanning antenna system and method

Also Published As

Publication number Publication date
US7456726B2 (en) 2008-11-25
WO2005091889A3 (en) 2007-03-29
EP1743271B1 (en) 2012-01-18
ATE542186T1 (en) 2012-02-15
US20070252677A1 (en) 2007-11-01
WO2005091889A2 (en) 2005-10-06
EP1743271A2 (en) 2007-01-17
US20050212660A1 (en) 2005-09-29
EP1743271A4 (en) 2010-10-27
US20090066481A1 (en) 2009-03-12

Similar Documents

Publication Publication Date Title
US7456726B2 (en) Method and apparatus for improving the efficiency and accuracy of RFID systems
Buffi et al. A phase-based technique for localization of UHF-RFID tags moving on a conveyor belt: Performance analysis and test-case measurements
EP1078329B1 (en) Systems and methods for wirelessly projecting power using in-phase current loops and for identifying radio frequency identification tags that are simultaneously interrogated
Bekkali et al. Performance analysis of passive UHF RFID systems under cascaded fading channels and interference effects
US8395484B2 (en) System and method for monitoring objects, people, animals or places
US20100237996A1 (en) Reader for rfid transponders and corresponding method
US7751799B2 (en) Method and apparatus for security in a wireless network
WO2007104339A1 (en) Reading method and device for systems of radiofrequency identification
US7605684B2 (en) Method and apparatus for determining the direction of movement of RFID tags and for creating constant-width interrogation zones
US20160292472A1 (en) Secure short-range radio communication device, system and method
Mickle et al. Physics and Geometry of RFID
Zomorrodi et al. Introduction of electromagnetic image-based chipless RFID system
Hansen et al. Method for controlling the angular extent of interrogation zones in RFID
CN208314797U (en) A kind of anti-string reading ultrahigh frequency RFID system based on wireless signal perturbation technique
US7801491B2 (en) Wireless communication system and method
CN108595996B (en) Anti-serial-reading ultrahigh-frequency RFID system and method based on wireless signal interference technology
WO2000005674A9 (en) Communicating with radio frequency identification tags within shaped electromagnetic fields
Nepa et al. Location and tracking of UHF-RFID tags
US10348382B1 (en) Low probability of intercept radio-frequency system using beamforming techniques
Karmakar Recent paradigm shift in RFID and smart antenna
Motroni et al. Smart RFID gate exploiting a near-field focused array
Sayeed et al. A simple LMS algorithm based smart antenna to solve the reader collision problems in RFID system
Ahmed Realistic frequency coded chipless RFID: physically modulated tags and refectarray readers
CN109154999A (en) Answering machine, especially RFID answering machine and operation answering machine, the method for especially RFID answering machine
Ndifon Distributed Phased Array Antennas in Wide Area RFID.

Legal Events

Date Code Title Description
AS Assignment

Owner name: SEKNION, INC., MASSACHUSETTS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HANSEN, THORKILD;ORISTAGLIO, MICHAEL L.;REEL/FRAME:019791/0760

Effective date: 20050427

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION