US20070252687A1 - Method and apparatus for improving the efficiency and accuracy of rfid systems - Google Patents
Method and apparatus for improving the efficiency and accuracy of rfid systems Download PDFInfo
- Publication number
- US20070252687A1 US20070252687A1 US11/758,086 US75808607A US2007252687A1 US 20070252687 A1 US20070252687 A1 US 20070252687A1 US 75808607 A US75808607 A US 75808607A US 2007252687 A1 US2007252687 A1 US 2007252687A1
- Authority
- US
- United States
- Prior art keywords
- scramble
- reader
- signal
- array
- rfid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 118
- 230000003287 optical effect Effects 0.000 claims abstract description 16
- 230000005284 excitation Effects 0.000 claims description 60
- 238000009826 distribution Methods 0.000 claims description 29
- 230000005540 biological transmission Effects 0.000 claims description 9
- 238000005457 optimization Methods 0.000 claims description 8
- 238000005259 measurement Methods 0.000 claims description 6
- 238000003491 array Methods 0.000 description 15
- 230000001934 delay Effects 0.000 description 14
- 230000006870 function Effects 0.000 description 12
- 238000013461 design Methods 0.000 description 11
- 230000001939 inductive effect Effects 0.000 description 9
- 230000000694 effects Effects 0.000 description 7
- 230000005684 electric field Effects 0.000 description 7
- CDBYLPFSWZWCQE-UHFFFAOYSA-L Sodium Carbonate Chemical compound [Na+].[Na+].[O-]C([O-])=O CDBYLPFSWZWCQE-UHFFFAOYSA-L 0.000 description 6
- 230000003044 adaptive effect Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 238000013507 mapping Methods 0.000 description 4
- 239000002184 metal Substances 0.000 description 4
- 230000010363 phase shift Effects 0.000 description 4
- 230000005855 radiation Effects 0.000 description 4
- 238000004088 simulation Methods 0.000 description 4
- 230000003190 augmentative effect Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 239000000203 mixture Substances 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000000295 complement effect Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 238000010168 coupling process Methods 0.000 description 2
- 238000005859 coupling reaction Methods 0.000 description 2
- 239000007788 liquid Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 238000010561 standard procedure Methods 0.000 description 2
- 238000013068 supply chain management Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 238000002591 computed tomography Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000008260 defense mechanism Effects 0.000 description 1
- 238000002059 diagnostic imaging Methods 0.000 description 1
- 230000005520 electrodynamics Effects 0.000 description 1
- 230000005672 electromagnetic field Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000007429 general method Methods 0.000 description 1
- 230000006698 induction Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000010287 polarization Effects 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 238000003892 spreading Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000001308 synthesis method Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/0008—General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K7/00—Methods or arrangements for sensing record carriers, e.g. for reading patterns
- G06K7/10—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
- G06K7/10009—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves
- G06K7/10019—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers.
- G06K7/10079—Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation sensing by radiation using wavelengths larger than 0.1 mm, e.g. radio-waves or microwaves resolving collision on the communication channels between simultaneously or concurrently interrogated record carriers. the collision being resolved in the spatial domain, e.g. temporary shields for blindfolding the interrogator in specific directions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/40—Jamming having variable characteristics
- H04K3/43—Jamming having variable characteristics characterized by the control of the jamming power, signal-to-noise ratio or geographic coverage area
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K3/00—Jamming of communication; Counter-measures
- H04K3/80—Jamming or countermeasure characterized by its function
- H04K3/82—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection
- H04K3/825—Jamming or countermeasure characterized by its function related to preventing surveillance, interception or detection by jamming
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K2203/00—Jamming of communication; Countermeasures
- H04K2203/10—Jamming or countermeasure used for a particular application
- H04K2203/20—Jamming or countermeasure used for a particular application for contactless carriers, e.g. RFID carriers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K2203/00—Jamming of communication; Countermeasures
- H04K2203/30—Jamming or countermeasure characterized by the infrastructure components
- H04K2203/32—Jamming or countermeasure characterized by the infrastructure components including a particular configuration of antennas
Definitions
- Radio Frequency Identification is a generic term for technologies that use radio waves to automatically identify individual items. Objects can be identified using RFID by storing a serial number that identifies the object on a chip that is attached to an antenna. The chip and the antenna together are called an RFID tag. An RFID reader sends out electromagnetic waves that are received by the antenna on the RFID tag. Passive RFID tags draw power from this electromagnetic field to power the chip. Active tags use their own batteries to power the chip. The tag responds to the reader by transmitting a bit stream to the reader that contains information about the tag (serial number, etc.). The current state of RFID technology is described by [1] K. Finkenzeller in “RFID Handbook” (John Wiley & Sons, 2003).
- RFID systems operate at many different frequencies. The most common are low frequencies around 135 KHz, high frequencies around 13.56 MHz, ultra-high frequencies around 900 MHz, and microwave frequencies around 2.45 GHz and 5.8 GHz.
- the RFID reader's efficiency is related to its coverage or “accuracy,” which is measured by the percentage of tags within range that are read correctly.
- accuracy is not acceptable for many applications, which require 100 percent accuracy.
- the main cause of low reader accuracy is the inability of readers to transmit enough power to activate tags that are surrounded by other objects such as tags affixed to items stored in the middle of a pallet.
- the article reports that ad hoc repositioning of the RFID tags or increasing reader power can often fix this problem.
- the problems of reader collision and low reader accuracy are related: if one attempts to solve the problem of low reader accuracy by increasing the reader power, then the interrogation zones grow and reader collisions become more frequent.
- the data and scramble signals are transmitted with different beams that are adjusted such that the scramble signals overshadow the data signals in all but selected regions.
- a tag will respond only if it is located in one of the selected regions, called the interrogation zones.
- Provisional patent application [2] describes methods for using sum and difference patterns of array antennas to transmit data into selected narrow angular regions.
- the data signal is shielded by a scramble signal that makes the total transmitted signal unintelligible everywhere except in the narrow angular region.
- the scramble signal is also allowed to contain its own data that is different from the data carried by the data signal.
- Provisional patent application [2] further describes how the precise angular positions of RFID tags can be determined.
- Provisional patent application [4] describes how the width of the interrogation zone can be reduced and how the absolute location of a tag can be obtained from triangulation.
- Provisional patent application [5] describes how the interrogation zone can be visualized with optical sources.
- Provisional patent application [6] describes how the efficiency of RFID readers and reader networks can be improved through measurements, modeling, and inversion.
- the present invention is directed to a method for interrogating RFID tags comprising transmitting a data beam that causes the tags to respond, transmitting one or more scramble beams that do not cause the tags to respond, and adjusting the data beam and the scramble beams such that the scramble beams overshadow the data beam in all but selected regions.
- a tag can respond to the data signal either by broadcasting or changing its stored information.
- a scramble beam can contain a separate intelligible data stream and can charge tags that are not being interrogated.
- the data signal bits are divided into two or more parts. For each part of the data signal, a corresponding scramble-beam direction is defined that is slightly away from the direction of the data beam. Each part of the data signal is then transmitted while the scramble beam has its central null steered towards a corresponding scramble-beam direction.
- the division of the data signal must be such that a tag responds only if it receives all the data bits.
- the scramble signal is a sine wave.
- the scramble beams have approximately constant amplitudes away from their central null, so that the total radiated power from the reader is approximately omni-directional. Constant-amplitude scramble beams are achieved by moving zeros far off the Schelkunoff unit circle or by iterative methods.
- the method further comprises employing two or more array readers that scan an area with data and scramble beams to determine the angular positions of each tag within range.
- the angular positions obtained with two or more readers determine the absolute position of the tags through triangulation.
- anti-collision methods are employed when more than one tag responds at any given scan angle.
- the reader and tags are inductively coupled and the reader employs two or more loops to transmit data and scramble signals.
- the loop configuration of the reader is optimized with iterative techniques to ensure that the magnetic field of the data signal is overshadowed by the magnetic field of the scramble signal except in selected regions.
- the security measures described in [2] and [3] are employed to enhance the security of the RFID system.
- the present invention is further directed to a method for optically displaying the interrogation zone of an RFID reader that includes the steps of attaching an optical source to an RFID reader and transmitting one or more light beams with said optical source to visualize the interrogation zone.
- the light beam is pointed in the direction of the center of the interrogation zone.
- two or more light beams are transmitted such that each light beam coincides with a boundary of the interrogation zone.
- a light beam is scanned back and forth between the boundaries of the interrogation zone.
- the light beams are transmitted with lasers.
- the optical source is built into the housing of the RFID reader. In another embodiment of the present invention, the optical source is attached to the housing of the RFID reader.
- the present invention is additionally directed to methods for improving the efficiency of RFID systems.
- the reader employs two antennas that broadcast both data and scramble signals.
- the antennas are patch antennas.
- the reader employs three antenna elements where two of them transmit the scramble signal and one interrogates the tags.
- the reader employs one standard commercially available reader and two additional antennas that broadcast a scramble signal.
- the array excitation coefficients for the data and scramble signals are adjusted to create an interrogation beam that precisely fits an opening in a container.
- the reader employs an antenna that transmits two or more interrogation beams designed such that any tag in the interrogation zone receives sufficient power to operate from at least one of the interrogation beams.
- the reader employs two or more scramble beams to prevent leakage of the data signal.
- two sets of scramble-beam coefficients are mirror images.
- a network of readers transmits both data and scramble beams adjusted to create closely spaced independent interrogation zones.
- the positions of the readers is determined from the solution of an inverse source problem.
- the excitation coefficients are determined from the solution to an inverse source problem.
- the inverse source problem is solved with an iterative optimization scheme.
- the tags are placed at locations where the tag antenna creates maximum disruption of the field distribution.
- the field distribution on an object is computed with a numerical method.
- an RFID reader uses a bistatic mode of operation. In one embodiment of the present invention, the RFID reader uses a multistatic mode of operation. In one embodiment of the present invention, the location of the RFID reader receivers are determined by solving a scattering problem with a model for a typical tagged item.
- FIG. 1 illustrates an 18-element linear array.
- FIG. 5 illustrates a square planar array with 324 elements.
- FIG. 6 illustrates a mapping of the excitation coefficients for the sum pattern of the 324-element planar array.
- FIG. 7 illustrates a 3-D mapping of the array sum pattern corresponding to the excitation coefficients.
- FIG. 8 illustrates a mapping of the excitation coefficients for the cosine difference pattern of the 324-element planar array.
- FIG. 9 illustrates a 3-D mapping of the array difference pattern corresponding to the excitation coefficients.
- FIG. 10 illustrates a circular ring array
- FIG. 11 is a perspective view of a reflector antenna with its feed at the focal point.
- FIG. 12 illustrates a linear array with 4 elements having element spacing equal to 10 cm.
- the array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot.
- the array elements are patch antennas and both sets of excitation coefficients are shown above the plot.
- the array elements are patch antennas and both sets of excitation coefficients are shown above the plot.
- FIG. 16 illustrates a linear array with 8 elements having element spacing equal to 6.25 cm.
- the array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot.
- the array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot.
- FIG. 19 illustrates a scanning-array positioning system that employs two array-antenna readers.
- FIG. 20 illustrates an inductive RFID reader employing two loops parallel to the x-y plane.
- FIG. 21 illustrates the magnitudes of the z-components of the magnetic fields for the data and scramble signals transmitted by the inductive reader in FIG. 20 .
- FIG. 22 illustrates an RFID tag reader with an optical source attached to its housing.
- FIG. 23 illustrates the ratio of the scramble signal and data signals for a four-element array reader operating around 900 MHz.
- the data signal dominates in the black shaded zone.
- the two light beams mark the boundaries of the interrogation zone.
- FIG. 24 illustrates the geometry for an array of two antenna elements that can be tilted independently with respect to the array axis.
- FIG. 25 illustrates a schematic of RF control electronics for a two-element array.
- Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal.
- the beam patterns for each signal are determined by the weighting coefficients (in boxes); phase shifts (time delays) can be used to steer the total beam pattern in a specific direction.
- FIG. 26 illustrates free-space signal strength of data beam (Left) and scramble beam (Right). Axis units are meters.
- FIG. 27 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right).
- FIG. 28 illustrates total signal strength of the data beam (Left) and the scramble beam (Right) when the beams are broadcast toward a concrete wall.
- FIG. 29 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right) when the reader broadcasts toward a concrete wall.
- FIG. 30 illustrates geometry for an array of three identical patch antennas.
- the middle antenna broadcasts the data signal.
- the outer antennas broadcast scramble signals.
- the two outer elements are tilted by the angle ⁇ .
- FIG. 31 illustrates a schematic of RF control electronics for a three-element array.
- the middle antenna element is driven by the data signal.
- the two outer elements are driven by the scramble signal.
- the beam patterns for each signal are determined by the weighting coefficients (in boxes).
- FIG. 33 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right).
- FIG. 34 illustrates the geometry for an array of four identical antenna elements.
- FIG. 35 illustrates a schematic of RF control electronics for a four-element array.
- Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal.
- the beam patterns for each signal are determined by the weighting coefficients (in boxes); phase shifts (time delays) can be used to steer the total beam pattern in a specific direction.
- FIG. 36 illustrates the geometry of a 3D model of an RF tag reader (array), operating in front of a conveyor belt in a room with a metal wall and concrete floor and ceiling.
- FIG. 37 illustrates interrogation zones above the conveyor belt where the data signal is more than 10 dB greater than the scramble.
- the top plot shows the interrogation zone for a simple superposition of one data beam and one scramble beam. Because of multi-path effects, the scramble beam has nulls that cause leakage of the data signal into undesired regions.
- the bottom plot shows the results of a more sophisticated scheme that uses two scramble beams to eliminate leakage.
- FIG. 38 illustrates top and side views of a 3D model of a network consisting of two RF tag readers and one scramble transmitter that each uses a 2-element antenna array.
- the readers operate in front of a concrete wall in a room with concrete floor and ceiling.
- FIG. 39 illustrates signal strengths of the data beams of the two readers in FIG. 38 . Reflections in the wall, floor, and ceiling are included. Axis units are in meters.
- FIG. 40 illustrates interrogation zones of the data beams of the two readers in FIG. 38 when they broadcast toward the concrete wall. Reader collision occurs near the origin. Both readers set off tags on both conveyer belts so it is not possible to determine which conveyer belt carried a given item.
- FIG. 41 (Left) illustrates the ratio of total scramble beam (obtained with the scramble transmitter and the two readers) to data beam of the reader on the left.
- FIG. 41 (Right) illustrates the ratio of total scramble beam to data beam of the reader on the right. Tags are interrogated only in the regions where a data beam dominates.
- FIG. 42 illustrates two independent interrogation zones obtained with the combined data and scramble beams of the scramble transmitter and the two readers. Reader collision is avoided, and it is possible to tell which conveyer belt carries a given item.
- FIG. 43 illustrates a 2D model of a reader that interrogates a tag placed on a high-dielectric object.
- the field of a line source (the reader) illuminates a dielectric cylinder (bottle containing a liquid).
- a conducting wire (the tag) is close to the surface of the cylinder.
- FIG. 44 illustrates the total field in the vicinity of the dielectric cylinder when the wire is removed.
- the white circle marks the surface of the cylinder.
- FIG. 45 illustrates the total field in the vicinity of the dielectric cylinder when the wire is placed on the side of the cylinder (as seen from the reader).
- FIG. 46 illustrates the total field in the vicinity of the dielectric cylinder when the wire is placed on the back of the cylinder (as seen from the reader).
- FIG. 47 illustrates the difference far field for tag placed on the side of the cylinder.
- the amplitude of the backscattered field is very low.
- FIG. 48 illustrates the difference far field for tag placed on the back of the cylinder.
- the amplitude of the backscattered field is large.
- FIG. 49 illustrates a Bistatic RFID reader with a transmitter and a receiver that interrogates a collection of tags that are placed on items in a box.
- the present invention provides (a) designs for RFID readers, (b) a method for reducing the width of the interrogation region, (c) a method for providing a user defined interrogation zone for one or more readers, (d) a method for location of transceivers in 2D and 3D using more than one information-steering transmitter, (e) a method for precise tag location that works in the induction regime where the wavelength is much longer than the physical dimensions involved, (f) a new set of security measures for RFID systems, (g) a method for optically displaying the interrogation zone, (h) a method for overcoming multipath effects, (i) a method for optimal tag placement, and (j) a bistatic RFID reader.
- a common feature in items (a)-(f) is that two or more signals are transmitted simultaneously, including:
- a reader is said to employ information steering when it transmits both data and scramble signals.
- the present invention makes extensive use of antenna arrays.
- the following references describe the theory and design of phased arrays: R. C. Hansen, “Phased Array Antennas,” John Wiley & Sons, 1998; R. J. Mailloux, “Phased Array Antenna Handbook,” Artech House, 1994; and, R. S. Elliot, “Antenna Theory and Design,” IEEE Press, 2003.
- adaptive phased arrays also known as smart antennas, the received signals and environmental parameters are fed to powerful processors that steer the beams to optimize performance.
- FIG. 1 is a graph of a linear array with 18 elements having element spacing of half of a wavelength.
- the data time signal is represented by a(t), which depends on the chosen modulation and coding techniques, and on the transfer functions of the antenna elements.
- the present invention works for any modulation and coding techniques and for any set of array elements.
- T p ( t ) A p a ( t ⁇ p ) where A p is the excitation coefficient and ⁇ p is the time delay.
- a p is the excitation coefficient
- ⁇ p is the time delay.
- each array element with time functions that have different time dependence to compensate for array imperfections, end-element effects, or array elements differences. Such adjustments would be well known and straightforward to those working in this area. Therefore, it is assumed presently that the time dependence of each input signal is the same (the amplitudes and time delays are different).
- a typical array radiation pattern and the associated excitation coefficients are shown in FIG. 2 for the 18-element linear array shown in FIG. 1 .
- the element spacing is equal to half a wavelength. All time delays are zero, so the array operates in broadside mode. Since all the excitation coefficients have the same sign, the array radiates a sum pattern, which is characterized by a main beam and side lobes that are below a certain level ( ⁇ 55 dB in the embodiment shown in FIG. 2 ).
- Beam steering can be achieved by assigning nonzero values to the time delays, which results in the complex excitation coefficients A p exp(i2 ⁇ f 0 ⁇ p ) when the exp( ⁇ i2 ⁇ f 0 t) time dependence is suppressed and f 0 is the frequency at which the sum pattern is evaluated.
- a difference pattern may be broadcast.
- a difference pattern and the associated excitation coefficients are shown in FIG. 3 for the 18-element array shown in FIG. 1 .
- the difference pattern has a deep null in the center that is surrounded by two steep peaks.
- the term “difference pattern” is used because half of the excitation coefficients are positive and the other half negative.
- the time delays in FIG. 3 are all zero. As seen for the sum pattern, beam steering can be achieved by assigning nonzero values to the time delays.
- a narrow interrogation zone is obtained with the present invention by feeding each element with a total signal that is obtained by adding at least one scramble signal to the data signal.
- FIGS. 2 and 3 the sum and difference patterns of FIGS. 2 and 3 are plotted together as shown in FIG. 4 .
- the data signal a(t) is transmitted through the sum pattern, and the scramble signal is transmitted through the difference pattern.
- An observer located at the nulls of the difference pattern will receive only the data signal.
- an observer located at nulls of the sum pattern will receive only the scramble signal.
- the present invention may also be used with planar arrays such as the 324-element array (18 elements by 18 elements) shown in FIG. 5 .
- the element spacing is half a wavelength.
- FIG. 6 shows a typical set of sum excitation coefficients
- FIG. 7 shows the corresponding array sum pattern.
- the array pattern is almost independent of ⁇ and has a main beam in the broadside direction. Standard methods, as previously noted, can be used to steer the beam in any desired direction.
- the difference patterns with sharp nulls have cos( ⁇ ) or sin( ⁇ ) angular dependence.
- the ⁇ independent difference patterns for planar arrays result in a broadening of the angular regions in which the signals are intelligible.
- FIG. 8 shows a set of difference excitation coefficients with cos( ⁇ ) angular dependence
- FIG. 9 shows the corresponding difference pattern.
- the excitation coefficients for both the sum and difference patterns for the planar array may be obtained with semi-analytical methods to achieve prescribed side lobe levels and main beam widths. Alternatively, the coefficients may be obtained with nonlinear optimization techniques.
- the coefficients as shown in FIGS. 6 and 8 are obtained with the MATLABTM function FMINUNC, which minimizes a user-defined cost function. The cost function is designed to ensure that the side lobes are below a certain level for all ⁇ .
- the excitation coefficients and array pattern for a sin( ⁇ ) difference pattern are obtained by rotating the plots as shown in FIGS. 8 and 9 ninety degrees around the z axis.
- T p ( t ) A p a ( t ⁇ p )+ B p b ( t ⁇ p )+ C p c ( t ⁇ p )
- B p and C p are the excitation coefficients
- ⁇ p and ⁇ p are time delays
- ⁇ p (p 1, 2, . . . .
- N are the time delays for the data signal.
- Interrogation zones in accordance with the present invention may also be achieved with arrays that are neither linear nor planar.
- the circular ring array shown in FIG. 10 is useful for providing 360° coverage.
- the interrogation zones can be obtained with sum and difference patterns obtained from standard theory.
- Similar interrogation zones can be realized with reflector antennas as shown in FIG. 11 by applying the present invention to its feed, which is typically a smaller antenna located at the focal point. More generally, one may use the present invention for any antenna type to obtain sum and difference patterns that can be combined to achieve the desired interrogation zones.
- the examples herein are confined to sum and difference patterns because such patterns have been studied extensively in the radar literature.
- Interrogation zones in accordance with the present invention can be achieved, however, with any combination of array patterns in which one of the patterns (the “difference pattern”) has a null in the direction of the tags of interest and is larger in magnitude than the other pattern (the “sum pattern”) in directions where other tags may be present.
- difference patterns must be slightly broader than the sum patterns to achieve the desired interrogation zones.
- the numerical examples presented herein demonstrate that difference patterns may be designed to have beam widths that are just slightly broader than the beam widths of the corresponding sum patterns.
- one feeds element #p with a signal of the form: T p ( t ) A p a ( t )+ B p b ( t ) where a(t) is the data signal and b(t) is a scramble signal.
- a p and B p are the excitation coefficients for the data and scramble signals, respectively.
- FIG. 13 shows the far field of the reader for the case where the array elements are z-directed dipoles with array excitation coefficients given above the plot.
- the present invention also contemplates a design for a hand-held reader that radiates little energy in the backward direction (towards the operator).
- the array elements are made of patch antennas with sin 2 ( ⁇ ) radiation patterns in the forward direction and very low radiation pattern in the backward direction.
- FIG. 14 shows the field of this reader for forward directions 0 ⁇ 180°. The patterns of the patch antennas ensure that the field in the backward directions 180° ⁇ 360° is low.
- the width of the angular region of the data signal is reduced by dividing the data signal bits into two parts: the first part and the second part.
- the first part is transmitted while the scramble beam has its central null steered slightly to one side of the direction of the data beam.
- the second part of the data signal is transmitted while the scramble beam has its central null steered slightly to the other side of the direction of the data beam.
- the division of the data signal must be such that a tag responds only if it receives both the first and second part of the data signal.
- FIG. 15 shows how this method can be implemented with the four-element array in FIG. 12 , with patch antennas.
- the excitation coefficients are provided above the plot.
- the width of the data-signal region there is no lower limit on the width of the data-signal region obtainable with this method.
- This method of reducing the width of the data-signal region works also for other the types of antennas described above and in [2].
- the method works for planar arrays if the two scramble-beams nulls are steered in orthogonal directions (planar arrays require two scramble beams as explained above and in [2]).
- Another way of reducing the width of the data-signal region is to continuously vary the direction of the scramble beam while the data signal is being transmitted.
- Yet another way of reducing the width of the data-signal region is to increase the power of the scramble beam(s), and thereby move the scramble-beam shoulders above the peak of the data beam.
- a reader can be designed such that its radiated power is omni-directional while its data signal stays highly directional.
- Typical data and scramble beams for this array are shown in FIG. 17 .
- the theory related to the Shelkunoff unit circle is described in the book “Antenna Theory and Design” by R. S. Elliot, IEEE Press, 2003.
- the reader provides little energy to charge or communicate with the tags that are located outside this 60° angular region.
- FIG. 18 shows a scramble beam that has all its zeros, except the central one, located on a circle in the complex plane of radius 1.46.
- the excitation coefficients are given above the figure. All the excitation coefficients for the scramble beam in FIG. 18 are positive except the last one, which equals ⁇ 1. The sum of these coefficients equals zero.
- the array used in this section operates at 2.4 GHz.
- the method for creating a reader with omni-directional power pattern works for any frequency that results in electromagnetic wave propagation, and in particular for the popular RFID frequencies around 900 MHz.
- the Schelkunoff unit circle representation instead of using the Schelkunoff unit circle representation to achieve the constant-level scramble signal, one can use the iterative array-synthesis methods discussed above and in [2] with appropriate cost functions.
- the iterative methods can be used directly to achieve constant-level scramble beams for ring arrays and planar arrays.
- This section describes the method of the present invention for determining the precise location of tags.
- the method may be explained with reference to FIG. 19 where the tags are located inside a room with two array readers placed on the walls.
- the array readers transmit narrow signal beams surrounded by scramble beams as described above.
- the beams are scanned using standard beam steering.
- the data signal simply causes a tag to transmit its tag identification number.
- the data signal contains the current scan angle and a reader identification number, and the tags respond by re-transmitting that scan angle and reader identification number along with a tag identification number. If two or more tags are present in the region of the data signal at any given scan angle, prior art anti-collision methods are employed [1, Chapter 7].
- the tag transmissions can be recorded by the readers or by other receivers.
- a table is populated with a field for each tag that contains the scan angles for which the tag received a signal beam from each of the two readers.
- a tag typically receives the data signal from a reader at more than one scan angle since the scan-angle increments are smaller than the width of the data-signal beam.
- array reader # 1 and array reader # 2 To determine the position of tags located directly in the line-of-sight between array reader # 1 and array reader # 2 requires an additional array reader. For many applications, however, it is possible to place array reader # 1 and array reader # 2 such that no tag can be located directly between the readers, and all tag positions can be determined with array reader # 1 and array reader # 2 .
- the optimal positions for the readers depend on the spatial distribution of the tags and on possible obstacles that can interfere with the transmissions. For some indoor applications, it is advantageous to hang from the ceiling ring-array readers that each can scan 360 degrees. The position of a tag could be determined from the transmission of two ring-array readers, provided the tag is not directly between those readers. A combination of ring-array, planar-array, and linear-array readers may be optimal in complicated scenarios.
- the readers are stationary and the tags are allowed to move around.
- a reader can be any type of active transceiver with a narrow signal beam, including planar array antennas that have pencil-like signal beams suitable for 3D location.
- a tag can be any type of passive or active transceiver that can be placed on an object whose precise location is sought. Such tag-reader systems can replace laser and GPS positioning systems in certain applications.
- a tag can continuously transmit the positions of the vehicle to any receiver within range.
- Another application of such precision tag-reader systems is land surveying, where the locations in 3D are sought for surface features in the area of interest.
- Yet another application is remote sensing where the position of receivers must be known precisely.
- the present invention also provides a method for determining the position of a vehicle in an area where multiple tags are placed at known locations on stationary objects such as walls.
- An RFID reader mounted on the vehicle can determine the position of the vehicle by recording the angles of at least two tags using triangulation.
- Inductive RFID systems operate at frequencies below 50 MHz, where the wavelength is much longer than the physical dimensions involved, and the reader and tags are inductively coupled. Precise tag location and user-defined interrogation regions can be achieved with inductive RFID systems as described below.
- the reader employs two small loops that lie in the x-y plane with their center points 10 cm apart.
- the spatial dependence of the magnetic fields emitted by such loops can be approximated well by the spatial dependence of the magnetic fields of z-directed static magnetic dipoles, as described in the reference “Plane-wave theory of time-domain fields” by T. B. Hansen and A. D. Yaghjian, IEEE Press, 1999.
- FIG. 21 shows the magnitudes of the z-components of the resulting magnetic fields at the tag locations obtained from the magnetic dipole approximation. Also shown in FIG. 21 is the noise floor that determines the minimum signal strength required to interrogate a tag. If the scramble signal is turned off, all tags within a 75 cm region respond to the reader (75 cm is approximately the interrogation width obtained with a reader that employs only a single loop antenna). With the scramble signal turned on, only tags within a 10 cm region respond to the reader, thereby allowing the precise location of individual tags and reducing tag collisions. The scramble signal can charge and prepare the tags for interrogation in a scenario where the reader scans along a line.
- high-security RFID systems should have defense mechanisms against the following three types of attacks: (1) Unauthorized reading of a data carrier in order to duplicate and/or modify data. (2) The placing of a foreign data carrier within the interrogation zone of a reader with the intention of gaining access to a building or receiving services without payment. (3) Eavesdropping into radio communications and replaying the data in order to imitate a genuine data carrier (“replay and fraud”).
- RFID systems currently use authentication and encryption methods to defend against these attacks. These defense methods have certain inherent weaknesses as described in [2] and [3]. Additional security measures can be obtained by using the secure transmission and reception techniques described in [2] and [3]. These techniques work for any wireless communication system, including systems that operate in the inductive regime as demonstrated above.
- the scramble signals can prevent an eavesdropper located outside the interrogation zone from gaining access to the data stream that is broadcast by the RFID reader.
- Highly directive antennas can be employed to prevent eavesdropping and unauthorized access to the network.
- Nulls can be placed in the receiving pattern of the reader to prevent unauthorized access to the network.
- This section describes a method for optically displaying the interrogation zone of an RFID reader.
- the reader interrogates only tags located in the interrogation zone.
- An optical source attached to the RFID reader sends out one or more light beams that visualize the interrogation zone.
- the optical source can be a small laser pointer that transmits a beam in the direction of the center of the interrogation zone.
- the user will see a laser dot on an object that is located in the center of the interrogation zone.
- the reader can be pointed precisely toward a selected object.
- the boundaries of the interrogation zone can be displayed, as illustrated in the following example.
- FIG. 23 shows an optical source that sends out two light beams and is attached to a four-element hand-held tag reader that operates at frequencies around 900 MHz.
- the element spacing is 10 cm and the total array length is 30 cm.
- This type of tag reader is described in [4].
- FIG. 23 shows the ratio in dB of the scramble signal and the data signal in a 20 meter by 20 meter region of space, color coded with a gray scale color map.
- the data beam dominates in the shaded region, which therefore is the interrogation zone for the reader.
- the optical source transmits two light beams that coincide with the boundaries of the interrogation zone, as shown in FIG. 23 and described in [5].
- the two light beams are generated by two laser pointers that produce red dots on objects that are at the edges of the interrogation zone. Thus, the user can see which objects are in the interrogation zone.
- FIG. 24 shows a compact RFID reader design that employs a two-element antenna array, as described in [6].
- the antenna elements can be of any type suitable for broadcasting at the RFID frequencies.
- the array elements can be tilted independently with respect to the array axis.
- FIG. 25 shows the schematic of RF control electronics for the two-element array.
- Each antenna element is driven by a linear combination of two RF signals: a data and a scramble signal.
- the beam patterns for each signal are determined by the weighting coefficients A 1 , A 2 , B 1 , and B 2 .
- Phase shifts time delays
- B 1 ⁇ B 2 .
- FIG. 26 shows the free-space field distributions in the x-y plane when the array elements are patch antennas with (1+cos(v)) patterns, where v is the angle between the element normal and the observation point in the x-y plane, displaying the strength of the data beam (Left) and the scramble beam (Right).
- the sum pattern carries the data signal and the difference pattern carries the scramble signal.
- the data signal ( FIG. 26 Left) has its peak in the broadside direction where the scramble signal ( FIG. 26 Right) has its null.
- the plot on the left in FIG. 27 shows the tag interrogation zone achieved with a reader that broadcasts only the data signal. All tags at the edge of the interrogation zone receive just enough power to function. Tags outside the interrogation zone do not receive enough power.
- FIG. 27 shows the interrogation zone obtained when the reader broadcasts both data and scramble signals.
- a tag For a tag to function in this mode of operation, it must be in a location where two conditions are met: (1) the power of the data signal is sufficient to set off a tag and (2) the data signal overshadows the scramble signal (the data signal is at least 10 dB larger than the scramble signal in the dark shaded area of the right plot in FIG. 27 ; this 10 dB threshold is an arbitrary figure chosen for illustration purposes only, the actual threshold will depend on the particular system being used).
- the interrogation zone obtained with information steering is much narrower than the interrogation zone achieved with a standard broadcast scheme.
- the angular extent of the interrogation zone is independent of the power levels of the signals, provided the ratio of the scramble signal power and data signal power is kept constant.
- the array excitation coefficients for the data and scramble signals can thus be adjusted to create an interrogation beam that precisely fits an opening of a container.
- FIG. 28 shows the total field distributions (direct field plus reflected field) for the data and scramble signals. More specifically, FIG. 28 shows the total signal strength of the data beam (Left) and the scramble beam (Right) when the beams are broadcast toward a concrete wall. The field distributions have ripples (peaks and nulls) that result from the direct and reflected fields being in and out of phase. Close to the reader, however, the direct field dominates.
- FIG. 29 shows the interrogation zones based on the same value for the required power level that was used in FIG. 27 . The interrogation zone of the data signal alone ( FIG. 29 Left) has widened because the reflected field from the wall can set off additional tags.
- the interrogation zone achieved by broadcasting both data and scramble signals ( FIG. 29 Right) is much narrower and the power of the reflected scramble signal prevents additional tags from being set off.
- This example illustrates that the two-element reader can work in a multipath environment.
- a standard commercially available reader can be augmented to achieve a narrow well-defined interrogation zone.
- the standard reader employs one antenna that broadcasts a single interrogation beam. From the discussion that follows, it is straightforward to augment standard readers that employ multiple antennas.
- FIG. 30 shows the antenna array consisting of the antenna of the standard reader in the middle surrounded by two scramble-signal antennas, where the array comprises three identical patch antennas.
- the middle antenna broadcasts the data signal.
- the outer antennas broadcast scramble signals.
- the two outer elements are tilted by the angle ⁇ .
- the signals fed to the scramble antennas are 180° out of phase and generated by a scramble signal generator as shown in FIG. 31 .
- the signal fed to the middle antenna is simply the signal from the standard reader, which need not be modified.
- the two outer elements are driven by the scramble signal.
- the antenna elements can be tilted to achieve the desired interrogation zone as described in [2].
- the beam patterns for each signal are determined by the weighting coefficients, as shown in the boxes in FIG. 31 .
- FIG. 32 shows the resulting field distribution of the data beam (Left) and scramble beam (Right).
- FIG. 33 shows the interrogation zones (assuming that the power level is adjusted to achieve a 10 m range) for the standard reader that broadcasts only a data signal (Left) and for the augmented reader in FIG. 31 that broadcasts both scramble and data beams (Right).
- the augmented reader has a much narrower interrogation zone.
- the design in FIG. 31 does not require data and scramble signals to be mixed since each antenna element transmits only a data or a scramble signal. This design can therefore be a cost-effective embodiment of a reader that operates in accordance with the principles of [2].
- FIG. 34 shows a reader that consists of four x-directed dipole antennas that operate at 900 MHz with the excitation coefficients in FIG. 35 .
- FIG. 35 shows a schematic of RF control electronics for the four-element array shown in FIG. 34 .
- Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal.
- the beam patterns for each signal are determined by the weighting coefficients (in boxes). Phase shifts (time delays) can be used to steer the total beam pattern in a specific direction.
- the reader broadcasts toward a metal wall 3 m away as shown in FIG. 36 .
- FIG. 37 shows the interrogation zones for a simple superposition of one data beam and one scramble beam 50 cm above the conveyer belt where the data signal is at least 10 dB greater than the scramble. The data signal leaks out in several locations as indicated because multipath effects produce areas where the scramble signal is too weak.
- This leakage can be eliminated by a modification of the broadcast scheme, which uses complementary scramble signals broadcast from the same array and creates the narrow interrogation zone shown in the bottom plot of FIG. 37 .
- This new scheme operates as follows: Two complementary scramble patterns are created, for example, using the set of scramble array coefficients in FIG. 35 and its mirror image. These two scramble patterns can be broadcast simultaneously using two different scramble signals and additional mixing elements in the control electronics. Alternatively, the two signals can be broadcast sequentially during the same interrogation cycle.
- the bottom plot of FIG. 37 illustrates how narrow interrogation zones can be achieved even in severe multipath environments with the additional scramble signal.
- the data signals can also be affected by multipath making it impossible to interrogate tags at certain locations. This problem can in some cases be overcome by broadcasting the data signal with multiple sets of excitation coefficients. To avoid interference, the various data beams should be broadcast sequentially.
- Optimal sets of excitation coefficients can be determined from modeling and/or on-site measurements with the following procedure: (1) Set all excitation coefficients equal to zero except the excitation coefficient for the first array element, which is set equal to one. (2) Compute or measure the one-element field distribution over the desired interrogation zones. (3) Repeat this procedure for all other array elements to obtain N sets of one-element field distributions for an array with N elements. (4) Use linear combinations of the one-element field distributions to compute the total field distribution when the array is driven by a particular set of excitation coefficients. (5) Select sets of excitation coefficients so that the combined beams result in correct interrogation of tags placed at arbitrary locations in the interrogation zone.
- Step (5) of the procedure can be achieved as follows: Start with a first set of excitation coefficients that would work for free space. Determine the locations in the interrogation zones where the corresponding field distribution is too weak when the reader operates in the multipath environment of interest. Determine a second set of excitation coefficients by modifying the first set of excitation coefficients, which creates a field distribution that fills out the areas where the field distribution of the first set of excitation coefficients is too weak.
- the modification of the first set of excitation coefficients can be achieved, for example, by slightly changing the phase and by changing the order of the excitation coefficients.
- FIG. 38 shows two readers that are located in a room with a concrete wall, floor, and ceiling.
- the readers interrogate tags placed on items that move on two conveyer belts.
- Each reader uses the two-element array of patch antennas illustrated in FIGS. 24 and 25 .
- the readers are in close proximity of each other and the concrete wall. Concrete is modeled by a homogeneous medium with a relative permittivity of 6 and a conductivity of 0.1 S/m.
- the field distributions are computed from geometrical optics with one bounce off each surface included.
- Polarization, reflection coefficients, and geometrical spreading are included in these calculations (this simulation and the other simulations are included simply for purposes of illustration; a different calculation of the field can be used in any given configuration to determine the fields to whatever order is needed).
- the power levels are adjusted so that when a reader operates in free space the data signal is just strong enough to set off tags 10 m away from the reader in the main-beam direction, as shown in FIG. 27 .
- FIG. 39 shows the total field distributions 1.5 m above the concrete floor of the data signals of the left and right reader.
- the direct and reflected fields being in and out of phase cause the ripples of the total field.
- FIG. 40 shows the interrogation zones of the two readers when they broadcast only data signals.
- a tag placed near the origin will receive enough power from both readers to be powered up. However, such a tag would not function properly, even if the two readers broadcast at different frequencies, because it simultaneously receives two sets of instructions (reader collision occurs). Hence, the readers cannot operate simultaneously.
- both readers interrogate tags on both conveyer belts, so it would not be possible to determine which belt carried a tagged item.
- FIG. 41 shows the ratio of total scramble beam (obtained with the scramble transmitter and the two readers) to data beam of the reader on the left.
- FIG. 41 (Right) shows the ratio of total scramble beam to data beam of the reader on the right.
- Tags are interrogated only in the regions where a data beam dominates. The data signals dominate in the dark shaded regions.
- the optimization can be carried out by interactive methods that minimize a user-defined cost function (see, for example, P. Venkataraman, “Applied Optimization with MATLAB Programming,” Wiley, 2001). This approach is equivalent to an inverse source problem where the task is to determine the strength and location of sources that result in a desired field distribution.
- the array element locations are fixed and on-site measurements are carried out to determine the N one-element field distributions described above. These N data sets are subsequently used in an optimization procedure that determines array coefficients that produce the desired interrogation regions.
- the tag antennas such that the electric field is disturbed as much as possible. For example, if the tag antenna is a linear dipole and the object is a soda bottle, the dipole should be placed at a point on the surface of the bottle where the electric field is strongest. Moreover, the tag antenna should be aligned with the electric field at that point. For soda bottles on a pallet, the optimum tag locations may vary from bottle to bottle.
- this method works in the following way: the item to be tagged is modeled by an infinite dielectric cylinder of radius 5 cm with a relative dielectric constant of 81 and a conductivity of 0.01 S/m.
- the field of a line source (the reader) illuminates a dielectric cylinder (bottle containing a liquid).
- a conducting wire (the tag) is close to the surface of the cylinder.
- the reader is modeled with an electric line source 5 m away that broadcasts at 900 MHz. Assume that the reader is monostatic: the transmitting and receiving antennas are collocated.
- FIG. 44 shows the resulting total electric field inside and outside the dielectric cylinder, whose circumference is indicated by a distinct circle.
- FIGS. 45 and 46 The field distributions obtained with a thin wire placed on the side and on the back of the dielectric object are shown in FIGS. 45 and 46 , respectively. As expected, the wire placed on the back ( FIG. 46 ) alters the field much more than the wire placed on the side ( FIG. 45 ).
- a short-circuited tag antenna is a thin wire
- an open-circuited tag antenna is an absent wire.
- a tag placed on the side of the dielectric object communicates with the reader by changing the field distribution from the one displayed in FIG. 44 (tag antenna open-circuited) to the distribution in FIG. 45 (tag antenna short-circuited).
- a tag placed on the back of the dielectric object communicates with the reader by changing the field distribution from the one displayed in FIG. 44 (tag antenna open-circuited) to the distribution in FIG. 46 (tag antenna short-circuited).
- the difference fields recorded by the reader far from the dielectric cylinder are shown in FIG. 47 (tag placed on side of cylinder) and FIG. 48 (tag placed on back of cylinder).
- the difference field is very weak when the tag is placed on the side of the cylinder, so the tag may not be read correctly.
- a much stronger difference field results (at least 100 times stronger) and the chances that the reader accurately obtains the information stored on the tag greatly improves.
- FIG. 49 shows a bistatic RFID reader consisting of a transmitter and a receiver that interrogates a collection of tags that are placed on items in a box.
- the difference field in FIG. 47 attains its maximum values at locations that are approximately 90° away from the transmitting antenna of the reader.
- the reader would more effectively interrogate the tag in this configuration where the tag is on the side of the cylinder.
- the direct coupling is significantly reduced and the read range is no longer limited by the condition that the tag signal may be no more than 100 dB below the level of the transmitters carrier signal. (See page 145 of reference [1] cited above for a discussion of the 100 dB condition.)
- This example illustrates two advantages of a bistatic reader over a monostatic reader: (1) a bistatic reader may be able to correctly read certain tags that cannot be read accurately by a monostatic reader because the back scattered field is much weaker than the scattered field at an optimal receiver location, and (2) the direct coupling between the transmitter and receiver is much weaker for a bistatic reader, thus making it possible to correctly interrogate tags that are further away.
- An even more effective reader would have several receiving antennas distributed around the objects of interrogation to pick up scattered fields that peak in many different directions (multistatic reader).
- multistatic reader For fixed geometries, such as soda bottles on a pallet, numerical simulations can determine the optimal bistatic configuration.
- the use of numerical simulations to optimize the placement of tags and reader antennas is illustrated by the example above, which shows that a 90° bistatic configuration is optimal for a tag placed on the side of a dielectric cylinder.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Artificial Intelligence (AREA)
- Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Signal Processing (AREA)
- Electromagnetism (AREA)
- General Health & Medical Sciences (AREA)
- Radar Systems Or Details Thereof (AREA)
- Near-Field Transmission Systems (AREA)
Abstract
The present invention relates to a method and apparatus for transmitting a narrow signal beam that allows the precise location of RFID tags to be determined and reduces tag collisions. The present invention further relates to a method and apparatus for combing an RFID reader with an optical source to visualize the interrogation zone of the reader. The present invention also relates to a method and apparatus for improving the efficiency of RFID systems.
Description
- This application claims the benefit of U.S. Provisional Application No. 60/550,355, filed Mar. 5, 2004, U.S. Provisional Application No. 60/550,411, filed Mar. 5, 2004, U.S. Provisional Application No. 60/561,433, filed Apr. 12, 2004, U.S. Provisional Application No. 60/603,531, filed Aug. 20, 2004, U.S. Provisional Application No. 60/613,428, filed Sep. 27, 2004, and U.S. patent application Ser. No. 11/066,048, filed Feb. 25, 2005, each of which is hereby incorporated by reference in its entirety.
- Radio Frequency Identification (“RFID”) is a generic term for technologies that use radio waves to automatically identify individual items. Objects can be identified using RFID by storing a serial number that identifies the object on a chip that is attached to an antenna. The chip and the antenna together are called an RFID tag. An RFID reader sends out electromagnetic waves that are received by the antenna on the RFID tag. Passive RFID tags draw power from this electromagnetic field to power the chip. Active tags use their own batteries to power the chip. The tag responds to the reader by transmitting a bit stream to the reader that contains information about the tag (serial number, etc.). The current state of RFID technology is described by [1] K. Finkenzeller in “RFID Handbook” (John Wiley & Sons, 2003).
- RFID systems operate at many different frequencies. The most common are low frequencies around 135 KHz, high frequencies around 13.56 MHz, ultra-high frequencies around 900 MHz, and microwave frequencies around 2.45 GHz and 5.8 GHz.
- Current RFID systems are not suited for precise location of tags because readers transmit very broad beams that cause tags in a large region to respond. Moreover, when two or more tags respond simultaneously, the transmissions from the tags get scrambled and become unintelligible to the reader. This phenomenon is known as tag collision. Procedures that involve repeated transmissions of tag data have been developed to deal with tag collisions [1, Chapter 7]. However, the interrogation speed (number of tags interrogated per second) is reduced when a large number of repeated transmissions are needed, so it is desirable to reduce tag collisions as much as possible.
- The RFID reader's efficiency is related to its coverage or “accuracy,” which is measured by the percentage of tags within range that are read correctly. The accuracy of today's readers is not acceptable for many applications, which require 100 percent accuracy. For example, a study published in the article “Smart Tags for Your Supply Chain,” McKinsey Quarterly, 2003,
Number 4, found that RFID-tagged pallets failed 3 percent of the time even when double-tagged, and only 78 percent of the individually tagged pallets were read accurately. - According to the article “RFID will present a stiff test,” published in Supply Chain Management Review, Jan. 15, 2004, the main cause of low reader accuracy is the inability of readers to transmit enough power to activate tags that are surrounded by other objects such as tags affixed to items stored in the middle of a pallet. The article reports that ad hoc repositioning of the RFID tags or increasing reader power can often fix this problem.
- The problem of reader collisions is another barrier to the large-scale deployment of RFID. Reader collisions can occur when the interrogation zones of two or more readers overlap. In the article “Why UHF RFID Systems Won't Scale,” RFID Journal, July 2004, H. L. van Eeden states that “The main technical problem facing end-user companies is the possibility of large-scale reader interference that could render UHF RFID installations completely inoperable and severely limit the rollout of UHF RFID systems.”
- The problems of reader collision and low reader accuracy are related: if one attempts to solve the problem of low reader accuracy by increasing the reader power, then the interrogation zones grow and reader collisions become more frequent.
- The following five U.S. Provisional Applications describe RFID readers that transmit data signals that cause the tags to respond and scramble signals that do not cause the tags to respond: [2] “Method and apparatus for secure transmission of data using array,” U.S. Provisional Application No. 60/550,355, filed Mar. 5, 2004, [3] “Method and apparatus for preventing unauthorized transmitters from gaining access to a wireless network,” U.S. Provisional Application No. 60/550,411, filed Mar. 5, 2004, [4] “Method and apparatus for precise location of RFID tags,” U.S. Provisional Application No. 60/561,433, filed Apr. 12, 2004, [5] “Optically guided reader of RFID tags,” U.S. Provisional Application No. 60/603,531, filed Aug. 20, 2004, and [6] “Method and apparatus for improving the efficiency of RFID systems,” U.S. Provisional Applications No. 60/613,428, filed Sep. 27, 2004. These five provisional applications are incorporated herein by reference in their entirety.
- The data and scramble signals are transmitted with different beams that are adjusted such that the scramble signals overshadow the data signals in all but selected regions. Hence, a tag will respond only if it is located in one of the selected regions, called the interrogation zones.
- Provisional patent application [2] describes methods for using sum and difference patterns of array antennas to transmit data into selected narrow angular regions. The data signal is shielded by a scramble signal that makes the total transmitted signal unintelligible everywhere except in the narrow angular region. The scramble signal is also allowed to contain its own data that is different from the data carried by the data signal. Provisional patent application [2] further describes how the precise angular positions of RFID tags can be determined. Provisional patent application [4] describes how the width of the interrogation zone can be reduced and how the absolute location of a tag can be obtained from triangulation. Provisional patent application [5] describes how the interrogation zone can be visualized with optical sources. Provisional patent application [6] describes how the efficiency of RFID readers and reader networks can be improved through measurements, modeling, and inversion.
- The present invention is directed to a method for interrogating RFID tags comprising transmitting a data beam that causes the tags to respond, transmitting one or more scramble beams that do not cause the tags to respond, and adjusting the data beam and the scramble beams such that the scramble beams overshadow the data beam in all but selected regions. A tag can respond to the data signal either by broadcasting or changing its stored information. A scramble beam can contain a separate intelligible data stream and can charge tags that are not being interrogated.
- In one embodiment of the present invention, the data signal bits are divided into two or more parts. For each part of the data signal, a corresponding scramble-beam direction is defined that is slightly away from the direction of the data beam. Each part of the data signal is then transmitted while the scramble beam has its central null steered towards a corresponding scramble-beam direction. The division of the data signal must be such that a tag responds only if it receives all the data bits.
- In one embodiment of the present invention, the scramble signal is a sine wave. In one embodiment of the present invention, the scramble beams have approximately constant amplitudes away from their central null, so that the total radiated power from the reader is approximately omni-directional. Constant-amplitude scramble beams are achieved by moving zeros far off the Schelkunoff unit circle or by iterative methods.
- In one embodiment of the present invention, the method further comprises employing two or more array readers that scan an area with data and scramble beams to determine the angular positions of each tag within range. In one embodiment the angular positions obtained with two or more readers determine the absolute position of the tags through triangulation. In one embodiment, anti-collision methods are employed when more than one tag responds at any given scan angle.
- In one embodiment of the present invention, the reader and tags are inductively coupled and the reader employs two or more loops to transmit data and scramble signals. In one embodiment of the present invention, the loop configuration of the reader is optimized with iterative techniques to ensure that the magnetic field of the data signal is overshadowed by the magnetic field of the scramble signal except in selected regions.
- In one embodiment the security measures described in [2] and [3] are employed to enhance the security of the RFID system.
- The present invention is further directed to a method for optically displaying the interrogation zone of an RFID reader that includes the steps of attaching an optical source to an RFID reader and transmitting one or more light beams with said optical source to visualize the interrogation zone. In one embodiment of the present invention, the light beam is pointed in the direction of the center of the interrogation zone. In another embodiment of the present invention, two or more light beams are transmitted such that each light beam coincides with a boundary of the interrogation zone.
- In a further embodiment of the present invention, a light beam is scanned back and forth between the boundaries of the interrogation zone. In another embodiment of the present invention, the light beams are transmitted with lasers.
- In one embodiment of the present invention, the optical source is built into the housing of the RFID reader. In another embodiment of the present invention, the optical source is attached to the housing of the RFID reader.
- The present invention is additionally directed to methods for improving the efficiency of RFID systems. In one embodiment of the present invention, the reader employs two antennas that broadcast both data and scramble signals. In one embodiment of the present invention, the antennas are patch antennas. In one embodiment of the present invention, the reader employs three antenna elements where two of them transmit the scramble signal and one interrogates the tags. In one embodiment of the present invention, the reader employs one standard commercially available reader and two additional antennas that broadcast a scramble signal. In one embodiment of the present invention, the array excitation coefficients for the data and scramble signals are adjusted to create an interrogation beam that precisely fits an opening in a container.
- In one embodiment of the present invention, the reader employs an antenna that transmits two or more interrogation beams designed such that any tag in the interrogation zone receives sufficient power to operate from at least one of the interrogation beams. In one embodiment of the present invention, the reader employs two or more scramble beams to prevent leakage of the data signal. In one embodiment of the present invention, two sets of scramble-beam coefficients are mirror images.
- In one embodiment of the present invention, a network of readers transmits both data and scramble beams adjusted to create closely spaced independent interrogation zones. In one embodiment of the present invention, the positions of the readers is determined from the solution of an inverse source problem. In one embodiment of the present invention, the excitation coefficients are determined from the solution to an inverse source problem. In one embodiment of the present invention, the inverse source problem is solved with an iterative optimization scheme.
- In one embodiment of the present invention, the tags are placed at locations where the tag antenna creates maximum disruption of the field distribution. In one embodiment of the present invention, the field distribution on an object is computed with a numerical method.
- In one embodiment of the present invention, an RFID reader uses a bistatic mode of operation. In one embodiment of the present invention, the RFID reader uses a multistatic mode of operation. In one embodiment of the present invention, the location of the RFID reader receivers are determined by solving a scattering problem with a model for a typical tagged item.
-
FIG. 1 illustrates an 18-element linear array. -
FIG. 2 illustrates a sum pattern of the 18-element array evaluated at θ=90°. The excitation coefficients are shown above the plot. -
FIG. 3 illustrates a difference pattern of the 18-element array evaluated at θ=900. The excitation coefficients are shown above the plot. -
FIG. 4 illustrates the sum and difference patterns of the 18-element array evaluated at θ=900. Both sets of excitation coefficients are shown above the plot. -
FIG. 5 illustrates a square planar array with 324 elements. -
FIG. 6 illustrates a mapping of the excitation coefficients for the sum pattern of the 324-element planar array. -
FIG. 7 illustrates a 3-D mapping of the array sum pattern corresponding to the excitation coefficients. -
FIG. 8 illustrates a mapping of the excitation coefficients for the cosine difference pattern of the 324-element planar array. -
FIG. 9 illustrates a 3-D mapping of the array difference pattern corresponding to the excitation coefficients. -
FIG. 10 illustrates a circular ring array. -
FIG. 11 is a perspective view of a reflector antenna with its feed at the focal point. -
FIG. 12 illustrates a linear array with 4 elements having element spacing equal to 10 cm. -
FIG. 13 illustrates data and scramble beams of the array inFIG. 12 evaluated at θ=90°. The array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot. -
FIG. 14 illustrates data and scramble beams of the array inFIG. 12 evaluated at θ=90°. The array elements are patch antennas and both sets of excitation coefficients are shown above the plot. -
FIG. 15 illustrates one data beam and two scramble beams of the array inFIG. 12 evaluated at θ=90°. The array elements are patch antennas and both sets of excitation coefficients are shown above the plot. -
FIG. 16 illustrates a linear array with 8 elements having element spacing equal to 6.25 cm. -
FIG. 17 illustrates one set of data and scramble beams of the array inFIG. 16 evaluated at θ=90°. The array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot. -
FIG. 18 illustrates another set of data and scramble beams of the array inFIG. 16 evaluated at θ=90°. The array elements are z-directed dipoles and both sets of excitation coefficients are shown above the plot. -
FIG. 19 illustrates a scanning-array positioning system that employs two array-antenna readers. -
FIG. 20 illustrates an inductive RFID reader employing two loops parallel to the x-y plane. -
FIG. 21 illustrates the magnitudes of the z-components of the magnetic fields for the data and scramble signals transmitted by the inductive reader inFIG. 20 . -
FIG. 22 illustrates an RFID tag reader with an optical source attached to its housing. -
FIG. 23 illustrates the ratio of the scramble signal and data signals for a four-element array reader operating around 900 MHz. The data signal dominates in the black shaded zone. The two light beams mark the boundaries of the interrogation zone. -
FIG. 24 illustrates the geometry for an array of two antenna elements that can be tilted independently with respect to the array axis. -
FIG. 25 illustrates a schematic of RF control electronics for a two-element array. Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal. The beam patterns for each signal are determined by the weighting coefficients (in boxes); phase shifts (time delays) can be used to steer the total beam pattern in a specific direction. -
FIG. 26 illustrates free-space signal strength of data beam (Left) and scramble beam (Right). Axis units are meters. -
FIG. 27 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right). -
FIG. 28 illustrates total signal strength of the data beam (Left) and the scramble beam (Right) when the beams are broadcast toward a concrete wall. -
FIG. 29 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right) when the reader broadcasts toward a concrete wall. -
FIG. 30 illustrates geometry for an array of three identical patch antennas. The middle antenna broadcasts the data signal. The outer antennas broadcast scramble signals. The two outer elements are tilted by the angle α. -
FIG. 31 illustrates a schematic of RF control electronics for a three-element array. The middle antenna element is driven by the data signal. The two outer elements are driven by the scramble signal. The beam patterns for each signal are determined by the weighting coefficients (in boxes). -
FIG. 32 illustrates free-space signal strength of data beam (Left) and scramble beam (Right). Axis units are meters. The distance between array elements is d=17 cm, and the tilt angle is α=30°. -
FIG. 33 illustrates interrogation zones of data beam (Left) and of combined data and scramble beams (Right). -
FIG. 34 illustrates the geometry for an array of four identical antenna elements. -
FIG. 35 illustrates a schematic of RF control electronics for a four-element array. Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal. The beam patterns for each signal are determined by the weighting coefficients (in boxes); phase shifts (time delays) can be used to steer the total beam pattern in a specific direction. -
FIG. 36 illustrates the geometry of a 3D model of an RF tag reader (array), operating in front of a conveyor belt in a room with a metal wall and concrete floor and ceiling. -
FIG. 37 illustrates interrogation zones above the conveyor belt where the data signal is more than 10 dB greater than the scramble. The top plot shows the interrogation zone for a simple superposition of one data beam and one scramble beam. Because of multi-path effects, the scramble beam has nulls that cause leakage of the data signal into undesired regions. The bottom plot shows the results of a more sophisticated scheme that uses two scramble beams to eliminate leakage. -
FIG. 38 illustrates top and side views of a 3D model of a network consisting of two RF tag readers and one scramble transmitter that each uses a 2-element antenna array. The readers operate in front of a concrete wall in a room with concrete floor and ceiling. -
FIG. 39 illustrates signal strengths of the data beams of the two readers inFIG. 38 . Reflections in the wall, floor, and ceiling are included. Axis units are in meters. -
FIG. 40 illustrates interrogation zones of the data beams of the two readers inFIG. 38 when they broadcast toward the concrete wall. Reader collision occurs near the origin. Both readers set off tags on both conveyer belts so it is not possible to determine which conveyer belt carried a given item. -
FIG. 41 (Left) illustrates the ratio of total scramble beam (obtained with the scramble transmitter and the two readers) to data beam of the reader on the left.FIG. 41 (Right) illustrates the ratio of total scramble beam to data beam of the reader on the right. Tags are interrogated only in the regions where a data beam dominates. -
FIG. 42 illustrates two independent interrogation zones obtained with the combined data and scramble beams of the scramble transmitter and the two readers. Reader collision is avoided, and it is possible to tell which conveyer belt carries a given item. -
FIG. 43 illustrates a 2D model of a reader that interrogates a tag placed on a high-dielectric object. The field of a line source (the reader) illuminates a dielectric cylinder (bottle containing a liquid). A conducting wire (the tag) is close to the surface of the cylinder. -
FIG. 44 illustrates the total field in the vicinity of the dielectric cylinder when the wire is removed. The white circle marks the surface of the cylinder. -
FIG. 45 illustrates the total field in the vicinity of the dielectric cylinder when the wire is placed on the side of the cylinder (as seen from the reader). -
FIG. 46 illustrates the total field in the vicinity of the dielectric cylinder when the wire is placed on the back of the cylinder (as seen from the reader). -
FIG. 47 illustrates the difference far field for tag placed on the side of the cylinder. The amplitude of the backscattered field is very low. -
FIG. 48 illustrates the difference far field for tag placed on the back of the cylinder. The amplitude of the backscattered field is large. -
FIG. 49 illustrates a Bistatic RFID reader with a transmitter and a receiver that interrogates a collection of tags that are placed on items in a box. - The present invention provides (a) designs for RFID readers, (b) a method for reducing the width of the interrogation region, (c) a method for providing a user defined interrogation zone for one or more readers, (d) a method for location of transceivers in 2D and 3D using more than one information-steering transmitter, (e) a method for precise tag location that works in the induction regime where the wavelength is much longer than the physical dimensions involved, (f) a new set of security measures for RFID systems, (g) a method for optically displaying the interrogation zone, (h) a method for overcoming multipath effects, (i) a method for optimal tag placement, and (j) a bistatic RFID reader. A common feature in items (a)-(f) is that two or more signals are transmitted simultaneously, including:
-
- 1. A data signal that causes the tags to respond. The data signal may instruct the tags to broadcast or modify stored information. The data signal may contain information about scan angles that the tags can retransmit back to the reader. Also, the data signal may employ any of the methods developed to solve the problem of tag collision that occurs when two or more tags transmit simultaneously [1, Chapter 7].
- 2. One or more scramble signals that do not cause the tags to respond. The tags neither broadcast nor modify their stored information. A pure sine wave works as a scramble signal for UHF tags. The scramble signals can be used to charge the tags and to convey a separate intelligible information stream. The scramble signal can also be referred to as a guard signal.
- A reader is said to employ information steering when it transmits both data and scramble signals. The present invention makes extensive use of antenna arrays. The following references describe the theory and design of phased arrays: R. C. Hansen, “Phased Array Antennas,” John Wiley & Sons, 1998; R. J. Mailloux, “Phased Array Antenna Handbook,” Artech House, 1994; and, R. S. Elliot, “Antenna Theory and Design,” IEEE Press, 2003. With adaptive phased arrays, also known as smart antennas, the received signals and environmental parameters are fed to powerful processors that steer the beams to optimize performance. The technology for designing and constructing adaptive phased arrays with hundreds of elements that produce prescribed sum and difference patterns has reached a mature stage, as described in the following references: M. I. Skolnik, “Radar Handbook,” McGraw-Hill, 1990, 2nd edition; R. T. Compton, “Adaptive Antennas,” Prentice-Hall, 1998; and, G. V. Tsoulos, ed. “Adaptive Antennas for Wireless Communications,” IEEE Press, 2001.
- Two types of array patterns widely used in radar applications are of particular interest to the present invention: (1) the sum pattern and (2) the difference pattern, the relevance of which will be seen in the context of
FIG. 1 . -
FIG. 1 is a graph of a linear array with 18 elements having element spacing of half of a wavelength. The data time signal is represented by a(t), which depends on the chosen modulation and coding techniques, and on the transfer functions of the antenna elements. The present invention works for any modulation and coding techniques and for any set of array elements. - In standard operation, one would feed array element #p with a signal of the form:
T p(t)=A p a(t−α p)
where Ap is the excitation coefficient and αp is the time delay. Generally, one could feed each array element with time functions that have different time dependence to compensate for array imperfections, end-element effects, or array elements differences. Such adjustments would be well known and straightforward to those working in this area. Therefore, it is assumed presently that the time dependence of each input signal is the same (the amplitudes and time delays are different). The array excitation coefficients and time delays (Ap and αp, p=1, 2, . . . , N, where N is the number of elements) are determined by standard methods to achieve a desired radiation pattern of the array that adapts to its environment. -
FIG. 2 is a graph of a sum pattern of the 18 element array inFIG. 1 , evaluated at θ=90°. A typical array radiation pattern and the associated excitation coefficients are shown inFIG. 2 for the 18-element linear array shown inFIG. 1 . The element spacing is equal to half a wavelength. All time delays are zero, so the array operates in broadside mode. Since all the excitation coefficients have the same sign, the array radiates a sum pattern, which is characterized by a main beam and side lobes that are below a certain level (−55 dB in the embodiment shown inFIG. 2 ). Beam steering can be achieved by assigning nonzero values to the time delays, which results in the complex excitation coefficients Apexp(i2πf0αp) when the exp(−i2πf0t) time dependence is suppressed and f0 is the frequency at which the sum pattern is evaluated. These issues are well known to those working in this area. - In addition to the sum pattern, a difference pattern may be broadcast. A difference pattern and the associated excitation coefficients are shown in
FIG. 3 for the 18-element array shown inFIG. 1 . The difference pattern has a deep null in the center that is surrounded by two steep peaks. The term “difference pattern” is used because half of the excitation coefficients are positive and the other half negative. The time delays inFIG. 3 are all zero. As seen for the sum pattern, beam steering can be achieved by assigning nonzero values to the time delays. - A narrow interrogation zone is obtained with the present invention by feeding each element with a total signal that is obtained by adding at least one scramble signal to the data signal. In the case of one scramble signal b(t), the total input signal to array element #p is:
T p(t)=A p a(t−α p)+B p b(t−β p)
where Bp (p=1, 2, . . . , N) are the excitation coefficients and βp (p=1, 2, . . . , N) are time delays for the scramble signal. This arrangement of signals creates a narrow interrogation zone when the data excitation coefficients Ap (p=1, 2, . . . , N) produce a sum pattern and the scramble excitation coefficients Bp (p=1, 2, . . . , N) produce a difference pattern. To steer the sum and difference beams in the same direction, one simply sets αp=βp. - To see how the narrow interrogation zone is provided, the sum and difference patterns of
FIGS. 2 and 3 are plotted together as shown inFIG. 4 . The data signal a(t) is transmitted through the sum pattern, and the scramble signal is transmitted through the difference pattern. An observer located at the nulls of the difference pattern will receive only the data signal. Conversely, an observer located at nulls of the sum pattern will receive only the scramble signal. In most locations, however, there are no nulls and an observer would receive a weighted sum of the data and scramble signals. The weights are simply the sum and difference patterns at that particular location. - As shown by way of example in
FIG. 4 , it is evident that everywhere outside the narrow angular region 87°<φ<93°, the difference pattern is greater in magnitude than the sum pattern. Hence, an observer located at the angle φ will receive the following signals: -
- φ=90°: the pure data signal a(t).
- 87°<φ<93°: a weighted sum of data and scramble signals in which the weight for the data signal is greatest.
- 0°<φ<87° or 93°<φ<180°: a weighted sum of data and scramble signals in which the weight for the scramble signal is greatest.
- Consequently, in this example, only observers in the narrow angular region 87°<φ<93° will understand the data signal. Additionally, the angular region in which the data signal can be understood is likely even narrower due to noise.
- The present invention may also be used with planar arrays such as the 324-element array (18 elements by 18 elements) shown in
FIG. 5 . The element spacing is half a wavelength.FIG. 6 shows a typical set of sum excitation coefficients, andFIG. 7 shows the corresponding array sum pattern. The array pattern is almost independent of φ and has a main beam in the broadside direction. Standard methods, as previously noted, can be used to steer the beam in any desired direction. - For planar arrays, the difference patterns with sharp nulls have cos(φ) or sin(φ) angular dependence. The φ independent difference patterns for planar arrays result in a broadening of the angular regions in which the signals are intelligible.
FIG. 8 shows a set of difference excitation coefficients with cos(φ) angular dependence, andFIG. 9 shows the corresponding difference pattern. - The excitation coefficients for both the sum and difference patterns for the planar array may be obtained with semi-analytical methods to achieve prescribed side lobe levels and main beam widths. Alternatively, the coefficients may be obtained with nonlinear optimization techniques. The coefficients as shown in
FIGS. 6 and 8 are obtained with the MATLAB™ function FMINUNC, which minimizes a user-defined cost function. The cost function is designed to ensure that the side lobes are below a certain level for all φ. - The difference pattern shown in
FIG. 9 has a null for φ=90° and φ=270°. With only one difference beam, the data signal leaks out at observation points with φ=90° or φ=270°. Therefore, at least two difference beams are used for a planar array. The excitation coefficients and array pattern for a sin(φ) difference pattern are obtained by rotating the plots as shown inFIGS. 8 and 9 ninety degrees around the z axis. The input to array element #p is therefore a sum of the three terms:
T p(t)=A p a(t−α p)+B p b(t−β p)+C p c(t−χ p)
where Bp and Cp are the excitation coefficients, βp and χp are time delays, and b(t) and c(t) are the scramble signals applied to the cos(φ) and sin(φ) difference patterns, respectively (p=1, 2, . . . , N). As before, Ap (p=1, 2, . . . , N) are the excitation coefficients and αp (p=1, 2, . . . , N) are the time delays for the data signal. With at least two independent scramble signals, one achieves a narrow interrogation zone around θ=0°. To steer the sum and difference beams in the same direction, one simply sets αp=βp=χp. - User defined interrogation zones in accordance with the present invention may also be achieved with arrays that are neither linear nor planar. For example, the circular ring array shown in
FIG. 10 is useful for providing 360° coverage. For ring arrays, the interrogation zones can be obtained with sum and difference patterns obtained from standard theory. Similar interrogation zones can be realized with reflector antennas as shown inFIG. 11 by applying the present invention to its feed, which is typically a smaller antenna located at the focal point. More generally, one may use the present invention for any antenna type to obtain sum and difference patterns that can be combined to achieve the desired interrogation zones. - For purposes of illustration, the examples herein are confined to sum and difference patterns because such patterns have been studied extensively in the radar literature. Interrogation zones in accordance with the present invention can be achieved, however, with any combination of array patterns in which one of the patterns (the “difference pattern”) has a null in the direction of the tags of interest and is larger in magnitude than the other pattern (the “sum pattern”) in directions where other tags may be present.
- The difference patterns must be slightly broader than the sum patterns to achieve the desired interrogation zones. The numerical examples presented herein demonstrate that difference patterns may be designed to have beam widths that are just slightly broader than the beam widths of the corresponding sum patterns.
- Consider a four-element tag reader operating at frequencies around 900 MHz. (RFID systems are allowed to operate at 915 MHz in the United States and at 869 MHz in Europe.)
FIG. 12 shows a four-element array for a hand-held tag reader operating around 900 MHz, with element spacing=10 cm and total array length=30 cm. The tags to be interrogated are near the (θ,φ)=(90°, 90°) direction. As in [2], one feeds element #p with a signal of the form:
T p(t)=A p a(t)+B p b(t)
where a(t) is the data signal and b(t) is a scramble signal. Ap and Bp are the excitation coefficients for the data and scramble signals, respectively. -
FIG. 13 shows the far field of the reader for the case where the array elements are z-directed dipoles with array excitation coefficients given above the plot. This design results in a data-signal width of about 30 degrees. Hence, only those tags that are located in a 30 degree region centered on φ=90° will respond to this reader, allowing the operator to narrow the region in which a given tag is located. Since the z-directed dipoles are omni-directional in the θ=90° plane, the array radiates equal amounts of power in the forward and backward directions. - The present invention also contemplates a design for a hand-held reader that radiates little energy in the backward direction (towards the operator). Assume that the array elements are made of patch antennas with sin2(φ) radiation patterns in the forward direction and very low radiation pattern in the backward direction.
FIG. 14 shows the field of this reader forforward directions 0<φ<180°. The patterns of the patch antennas ensure that the field in thebackward directions 180°<φ<360° is low. - The width of the angular region of the data signal is reduced by dividing the data signal bits into two parts: the first part and the second part. The first part is transmitted while the scramble beam has its central null steered slightly to one side of the direction of the data beam. The second part of the data signal is transmitted while the scramble beam has its central null steered slightly to the other side of the direction of the data beam. The division of the data signal must be such that a tag responds only if it receives both the first and second part of the data signal.
-
FIG. 15 shows how this method can be implemented with the four-element array inFIG. 12 , with patch antennas.Scramble beam # 1 is obtained by steering the central null to φ=99°.Scramble beam # 2 is obtained by steering the central null to φ=81°. The excitation coefficients are provided above the plot. A tag must then be located in a very narrow region (at most, 15° wide in this example) around φ=90° in order to receive both the first and second part of the data signal. - In principle, there is no lower limit on the width of the data-signal region obtainable with this method. One may even divide the data signal into three or more parts and employ three or more scramble beams, as long as the tags respond only if they receive all parts of the data signal. This method of reducing the width of the data-signal region works also for other the types of antennas described above and in [2]. In particular, the method works for planar arrays if the two scramble-beams nulls are steered in orthogonal directions (planar arrays require two scramble beams as explained above and in [2]). Another way of reducing the width of the data-signal region is to continuously vary the direction of the scramble beam while the data signal is being transmitted. Yet another way of reducing the width of the data-signal region is to increase the power of the scramble beam(s), and thereby move the scramble-beam shoulders above the peak of the data beam.
- Systems that employ these highly localized data-signal beams may be used to locate tags or transceivers with such accuracy that they can replace more costly laser positioning systems. Such applications are discussed below.
- A reader can be designed such that its radiated power is omni-directional while its data signal stays highly directional. Consider the 8-element array in
FIG. 16 that consists of z-directed dipoles and operates at 2.4 GHz, with element spacing=6.25 cm and the total array length=50 cm. The tags to be interrogated are near the (θ, φ)=(90°, 90°) direction. - Typical data and scramble beams for this array are shown in
FIG. 17 . All the zeros of the scramble beam, except the central one at φ=90°, are moved radially off the Shelkunoff unit circle to points on a circle in the complex plane of radius 1.06. (The theory related to the Shelkunoff unit circle is described in the book “Antenna Theory and Design” by R. S. Elliot, IEEE Press, 2003.) As a result, the scramble beam has only one null (the central one) and stays above the data beam everywhere else. Notice that the scramble beam “follows” the data beam closely, so that the power of the scramble beam is extremely low away from a 60° angular region centered on φ=90°. Hence, the reader provides little energy to charge or communicate with the tags that are located outside this 60° angular region. -
FIG. 18 shows a scramble beam that has all its zeros, except the central one, located on a circle in the complex plane of radius 1.46. This scramble beam has an almost constant amplitude away from the central zero at φ=90°. Hence, it is well suited for charging and communicating with any tag located away from φ=90°. The excitation coefficients are given above the figure. All the excitation coefficients for the scramble beam inFIG. 18 are positive except the last one, which equals −1. The sum of these coefficients equals zero. - The array used in this section operates at 2.4 GHz. The method for creating a reader with omni-directional power pattern works for any frequency that results in electromagnetic wave propagation, and in particular for the popular RFID frequencies around 900 MHz. Instead of using the Schelkunoff unit circle representation to achieve the constant-level scramble signal, one can use the iterative array-synthesis methods discussed above and in [2] with appropriate cost functions. The iterative methods can be used directly to achieve constant-level scramble beams for ring arrays and planar arrays.
- This section describes the method of the present invention for determining the precise location of tags. The method may be explained with reference to
FIG. 19 where the tags are located inside a room with two array readers placed on the walls. The array readers transmit narrow signal beams surrounded by scramble beams as described above. The beams are scanned using standard beam steering. - In one embodiment, the data signal simply causes a tag to transmit its tag identification number. In a more advanced embodiment, the data signal contains the current scan angle and a reader identification number, and the tags respond by re-transmitting that scan angle and reader identification number along with a tag identification number. If two or more tags are present in the region of the data signal at any given scan angle, prior art anti-collision methods are employed [1, Chapter 7]. The tag transmissions can be recorded by the readers or by other receivers.
- Hence, after the two array readers have completed a scan, a table is populated with a field for each tag that contains the scan angles for which the tag received a signal beam from each of the two readers. A tag typically receives the data signal from a reader at more than one scan angle since the scan-angle increments are smaller than the width of the data-signal beam. For location purposes, one can average the angles to obtain a table for each tag that contains one scan angle for each reader. This procedure is illustrated in
FIG. 19 where the scan angles for one of the tags are v1 and v2. The location of the tag is easily determined from these two angles and the positions of the readers. - To determine the position of tags located directly in the line-of-sight between
array reader # 1 andarray reader # 2 requires an additional array reader. For many applications, however, it is possible to placearray reader # 1 andarray reader # 2 such that no tag can be located directly between the readers, and all tag positions can be determined witharray reader # 1 andarray reader # 2. - The optimal positions for the readers depend on the spatial distribution of the tags and on possible obstacles that can interfere with the transmissions. For some indoor applications, it is advantageous to hang from the ceiling ring-array readers that each can scan 360 degrees. The position of a tag could be determined from the transmission of two ring-array readers, provided the tag is not directly between those readers. A combination of ring-array, planar-array, and linear-array readers may be optimal in complicated scenarios.
- In the example above, the readers are stationary and the tags are allowed to move around. In certain applications, it is advantageous to permit the readers to move as well. For example, one can record the position of the inventory of a large warehouse with one or more readers that move around, provided the location and orientation of the readers are known at all times.
- A reader can be any type of active transceiver with a narrow signal beam, including planar array antennas that have pencil-like signal beams suitable for 3D location. A tag can be any type of passive or active transceiver that can be placed on an object whose precise location is sought. Such tag-reader systems can replace laser and GPS positioning systems in certain applications.
- For example, if a tag is placed on a moving vehicle and readers continuously scan as described above, the tag can continuously transmit the positions of the vehicle to any receiver within range. Another application of such precision tag-reader systems is land surveying, where the locations in 3D are sought for surface features in the area of interest. Yet another application is remote sensing where the position of receivers must be known precisely.
- The present invention also provides a method for determining the position of a vehicle in an area where multiple tags are placed at known locations on stationary objects such as walls. An RFID reader mounted on the vehicle can determine the position of the vehicle by recording the angles of at least two tags using triangulation.
- Inductive RFID Systems
- Inductive RFID systems operate at frequencies below 50 MHz, where the wavelength is much longer than the physical dimensions involved, and the reader and tags are inductively coupled. Precise tag location and user-defined interrogation regions can be achieved with inductive RFID systems as described below.
- Consider the tag-reader system in
FIG. 20 where the reader is at the origin and the tags are placed on a line parallel to the x axis given by z=30 cm, y=0. The tag antennas are loops parallel to the x-y plane, so the tags respond only to z-directed magnetic fields. - The reader employs two small loops that lie in the x-y plane with their center points 10 cm apart. The spatial dependence of the magnetic fields emitted by such loops can be approximated well by the spatial dependence of the magnetic fields of z-directed static magnetic dipoles, as described in the reference “Plane-wave theory of time-domain fields” by T. B. Hansen and A. D. Yaghjian, IEEE Press, 1999.
- The loops of the reader each transmit two signals, so that the total signal transmitted by loop #p is
T p(t)=A p a(t)+B p b(t)
where a(t) is the data signal and b(t) is a scramble signal. Ap and Bp (p=1, 2, . . . , N) are the excitation coefficients for the data and scramble signals, respectively.FIG. 20 shows an inductive RFID reader employing two loops parallel to the x-y plane. The center points of the loops are on the x axis at x=−5 cm and x=5 cm. The tags are located along the line z=30 cm, y=0 and respond to z-directed magnetic fields. For the reader shown inFIG. 20 , the coefficients are set as follows: -
FIG. 21 shows the magnitudes of the z-components of the resulting magnetic fields at the tag locations obtained from the magnetic dipole approximation. Also shown inFIG. 21 is the noise floor that determines the minimum signal strength required to interrogate a tag. If the scramble signal is turned off, all tags within a 75 cm region respond to the reader (75 cm is approximately the interrogation width obtained with a reader that employs only a single loop antenna). With the scramble signal turned on, only tags within a 10 cm region respond to the reader, thereby allowing the precise location of individual tags and reducing tag collisions. The scramble signal can charge and prepare the tags for interrogation in a scenario where the reader scans along a line. - This example involving a reader that employs two loops demonstrates the use of data and scramble signals in inductive RFID systems. Optimization methods can be employed by those skilled in the art of coil design to obtain loop configurations for which the magnetic field of the data signal is overshadowed by the magnetic field of the scramble signal except in selected regions. See, for example, U.S. Pat. Nos. 5,157,605 and 6,557,794 and the references therein. Thus, one obtains inductive readers with user-specified interrogation zones.
- According to [1, Chapter 8], high-security RFID systems should have defense mechanisms against the following three types of attacks: (1) Unauthorized reading of a data carrier in order to duplicate and/or modify data. (2) The placing of a foreign data carrier within the interrogation zone of a reader with the intention of gaining access to a building or receiving services without payment. (3) Eavesdropping into radio communications and replaying the data in order to imitate a genuine data carrier (“replay and fraud”).
- As with other types of wireless communication systems, RFID systems currently use authentication and encryption methods to defend against these attacks. These defense methods have certain inherent weaknesses as described in [2] and [3]. Additional security measures can be obtained by using the secure transmission and reception techniques described in [2] and [3]. These techniques work for any wireless communication system, including systems that operate in the inductive regime as demonstrated above.
- The scramble signals can prevent an eavesdropper located outside the interrogation zone from gaining access to the data stream that is broadcast by the RFID reader. Highly directive antennas can be employed to prevent eavesdropping and unauthorized access to the network. Nulls can be placed in the receiving pattern of the reader to prevent unauthorized access to the network.
- This section describes a method for optically displaying the interrogation zone of an RFID reader. The reader interrogates only tags located in the interrogation zone.
- An optical source attached to the RFID reader, as shown in
FIG. 22 , sends out one or more light beams that visualize the interrogation zone. For hand-held readers, the optical source can be a small laser pointer that transmits a beam in the direction of the center of the interrogation zone. With this embodiment, the user will see a laser dot on an object that is located in the center of the interrogation zone. Hence, the reader can be pointed precisely toward a selected object. With more than one laser pointer, the boundaries of the interrogation zone can be displayed, as illustrated in the following example. -
FIG. 23 shows an optical source that sends out two light beams and is attached to a four-element hand-held tag reader that operates at frequencies around 900 MHz. The element spacing is 10 cm and the total array length is 30 cm. This type of tag reader is described in [4].FIG. 23 shows the ratio in dB of the scramble signal and the data signal in a 20 meter by 20 meter region of space, color coded with a gray scale color map. The data beam dominates in the shaded region, which therefore is the interrogation zone for the reader. - The optical source transmits two light beams that coincide with the boundaries of the interrogation zone, as shown in
FIG. 23 and described in [5]. In one embodiment, the two light beams are generated by two laser pointers that produce red dots on objects that are at the edges of the interrogation zone. Thus, the user can see which objects are in the interrogation zone. - Multiple readers that work together can be used with triangulation to determine the absolute location of tags, as described above and in [4]. If optical sources are attached to each reader, the intersection of light beams shows the absolute position of tags.
-
FIG. 24 shows a compact RFID reader design that employs a two-element antenna array, as described in [6]. The antenna elements can be of any type suitable for broadcasting at the RFID frequencies. The array elements can be tilted independently with respect to the array axis.FIG. 25 shows the schematic of RF control electronics for the two-element array. Each antenna element is driven by a linear combination of two RF signals: a data and a scramble signal. The beam patterns for each signal are determined by the weighting coefficients A1, A2, B1, and B2. Phase shifts (time delays) can be used to steer the beam patterns in a specific direction. To achieve a difference pattern for the scramble signal, one can set B1=−B2. -
FIG. 26 shows the free-space field distributions in the x-y plane when the array elements are patch antennas with (1+cos(v)) patterns, where v is the angle between the element normal and the observation point in the x-y plane, displaying the strength of the data beam (Left) and the scramble beam (Right). (See R. J. Mailloux, “Phased Array Antenna Handbook,” Artech House, 1994,Chapter 4.) The elements are located at (x, y, z)=(2 m, 8.3 cm, 0) and (x, y, z)=(2 m, −8.3 cm, 0), with element normals pointing in the x direction. The antennas operate at 900 MHz with weighting coefficients A1=A2=B1=−B2=1. All time delays are zero so the beams point in the broadside direction. - The sum pattern carries the data signal and the difference pattern carries the scramble signal. The data signal (
FIG. 26 Left) has its peak in the broadside direction where the scramble signal (FIG. 26 Right) has its null. Assume that the power level of the data signal is adjusted so that tags in the broadside direction at a distance of 10 m receive just enough power to function, and that the modulated scattering from these tags can be correctly understood by the reader. The plot on the left inFIG. 27 shows the tag interrogation zone achieved with a reader that broadcasts only the data signal. All tags at the edge of the interrogation zone receive just enough power to function. Tags outside the interrogation zone do not receive enough power. The right plot inFIG. 27 shows the interrogation zone obtained when the reader broadcasts both data and scramble signals. For a tag to function in this mode of operation, it must be in a location where two conditions are met: (1) the power of the data signal is sufficient to set off a tag and (2) the data signal overshadows the scramble signal (the data signal is at least 10 dB larger than the scramble signal in the dark shaded area of the right plot inFIG. 27 ; this 10 dB threshold is an arbitrary figure chosen for illustration purposes only, the actual threshold will depend on the particular system being used). The interrogation zone obtained with information steering is much narrower than the interrogation zone achieved with a standard broadcast scheme. Moreover, the angular extent of the interrogation zone is independent of the power levels of the signals, provided the ratio of the scramble signal power and data signal power is kept constant. For example, the interrogation zone in the right plot ofFIG. 27 is achieved with A1=A2=B1=−B2=1. The same angular interrogation width can be obtained with A1=A2=B1=−B2=0.5 (since less power is transmitted, however, the interrogation range is reduced). - The angular extent of the interrogation zone can be adjusted by changing the ratio of the scramble signal power and data signal power. For example, A1=A2=1 and B1=−B2=0.5 would produce an interrogation zone that is wider than the one in the right plot of
FIG. 27 . The array excitation coefficients for the data and scramble signals can thus be adjusted to create an interrogation beam that precisely fits an opening of a container. - A concrete wall is now placed 4 m from the reader.
FIG. 28 shows the total field distributions (direct field plus reflected field) for the data and scramble signals. More specifically,FIG. 28 shows the total signal strength of the data beam (Left) and the scramble beam (Right) when the beams are broadcast toward a concrete wall. The field distributions have ripples (peaks and nulls) that result from the direct and reflected fields being in and out of phase. Close to the reader, however, the direct field dominates.FIG. 29 shows the interrogation zones based on the same value for the required power level that was used inFIG. 27 . The interrogation zone of the data signal alone (FIG. 29 Left) has widened because the reflected field from the wall can set off additional tags. The interrogation zone achieved by broadcasting both data and scramble signals (FIG. 29 Right) is much narrower and the power of the reflected scramble signal prevents additional tags from being set off. This example illustrates that the two-element reader can work in a multipath environment. - A standard commercially available reader can be augmented to achieve a narrow well-defined interrogation zone. The standard reader employs one antenna that broadcasts a single interrogation beam. From the discussion that follows, it is straightforward to augment standard readers that employ multiple antennas.
-
FIG. 30 shows the antenna array consisting of the antenna of the standard reader in the middle surrounded by two scramble-signal antennas, where the array comprises three identical patch antennas. The middle antenna broadcasts the data signal. The outer antennas broadcast scramble signals. The two outer elements are tilted by the angle α. The signals fed to the scramble antennas are 180° out of phase and generated by a scramble signal generator as shown inFIG. 31 . The signal fed to the middle antenna is simply the signal from the standard reader, which need not be modified. The two outer elements are driven by the scramble signal. As indicated inFIG. 30 , the antenna elements can be tilted to achieve the desired interrogation zone as described in [2]. The beam patterns for each signal are determined by the weighting coefficients, as shown in the boxes inFIG. 31 . - Consider a special design where the three elements are the 900 MHz patch antennas used above in the two-element reader. The element distance is chosen to be 17 cm, and the scramble signal antennas are tilted by the angle α=30° as indicated in
FIG. 30 .FIG. 32 shows the resulting field distribution of the data beam (Left) and scramble beam (Right).FIG. 33 shows the interrogation zones (assuming that the power level is adjusted to achieve a 10 m range) for the standard reader that broadcasts only a data signal (Left) and for the augmented reader inFIG. 31 that broadcasts both scramble and data beams (Right). The augmented reader has a much narrower interrogation zone. - The design in
FIG. 31 does not require data and scramble signals to be mixed since each antenna element transmits only a data or a scramble signal. This design can therefore be a cost-effective embodiment of a reader that operates in accordance with the principles of [2]. - In indoor environments, signals bounce off walls and other objects, so the field at a given observation point is the sum of signals that have traveled through different paths. In some areas the multipath field components can sum to produce a total field that is too weak to communicate with a tag. Further, one must consider areas of low field strength in the scramble signal, which cause the data signal to “leak” out into unintended regions.
-
FIG. 34 shows a reader that consists of four x-directed dipole antennas that operate at 900 MHz with the excitation coefficients inFIG. 35 .FIG. 35 shows a schematic of RF control electronics for the four-element array shown inFIG. 34 . Each antenna element is driven by a linear combination of two RF signals: a data signal and a scramble signal. The beam patterns for each signal are determined by the weighting coefficients (in boxes). Phase shifts (time delays) can be used to steer the total beam pattern in a specific direction. To interrogate tags that are placed on items that move on a conveyer belt, the reader broadcasts toward a metal wall 3 m away as shown inFIG. 36 . The frame of the conveyer belt is modeled as metal cylinders with a thin-wire approximation. Floor and ceiling are made of concrete. The field distribution is computed with a geometrical optics model that includes single bounces off the metal wall, floor, ceiling, and cylinders.FIG. 37 (Top) shows the interrogation zones for a simple superposition of one data beam and onescramble beam 50 cm above the conveyer belt where the data signal is at least 10 dB greater than the scramble. The data signal leaks out in several locations as indicated because multipath effects produce areas where the scramble signal is too weak. - This leakage can be eliminated by a modification of the broadcast scheme, which uses complementary scramble signals broadcast from the same array and creates the narrow interrogation zone shown in the bottom plot of
FIG. 37 . This new scheme operates as follows: Two complementary scramble patterns are created, for example, using the set of scramble array coefficients inFIG. 35 and its mirror image. These two scramble patterns can be broadcast simultaneously using two different scramble signals and additional mixing elements in the control electronics. Alternatively, the two signals can be broadcast sequentially during the same interrogation cycle. The bottom plot ofFIG. 37 illustrates how narrow interrogation zones can be achieved even in severe multipath environments with the additional scramble signal. - The data signals can also be affected by multipath making it impossible to interrogate tags at certain locations. This problem can in some cases be overcome by broadcasting the data signal with multiple sets of excitation coefficients. To avoid interference, the various data beams should be broadcast sequentially.
- These examples serve to illustrate a general method for reducing the effect of multipath: broadcast multiple beams with the same purpose (either data or scramble beams) by applying different sets of excitation coefficients to the array. For non-symmetric excitations coefficients (such as the scramble beam coefficients in
FIG. 35 ), one can employ sets of excitation coefficients that are mirror images of each other. Sets of excitation coefficients that steer the beams in slightly different directions can also help overcome multipath effects. - Optimal sets of excitation coefficients can be determined from modeling and/or on-site measurements with the following procedure: (1) Set all excitation coefficients equal to zero except the excitation coefficient for the first array element, which is set equal to one. (2) Compute or measure the one-element field distribution over the desired interrogation zones. (3) Repeat this procedure for all other array elements to obtain N sets of one-element field distributions for an array with N elements. (4) Use linear combinations of the one-element field distributions to compute the total field distribution when the array is driven by a particular set of excitation coefficients. (5) Select sets of excitation coefficients so that the combined beams result in correct interrogation of tags placed at arbitrary locations in the interrogation zone.
- Step (5) of the procedure can be achieved as follows: Start with a first set of excitation coefficients that would work for free space. Determine the locations in the interrogation zones where the corresponding field distribution is too weak when the reader operates in the multipath environment of interest. Determine a second set of excitation coefficients by modifying the first set of excitation coefficients, which creates a field distribution that fills out the areas where the field distribution of the first set of excitation coefficients is too weak. The modification of the first set of excitation coefficients can be achieved, for example, by slightly changing the phase and by changing the order of the excitation coefficients.
- This section considers a network of readers and shows how to prevent interference and collisions between readers, as described in [6].
FIG. 38 shows two readers that are located in a room with a concrete wall, floor, and ceiling. The readers interrogate tags placed on items that move on two conveyer belts. Each reader uses the two-element array of patch antennas illustrated inFIGS. 24 and 25 . The readers are in close proximity of each other and the concrete wall. Concrete is modeled by a homogeneous medium with a relative permittivity of 6 and a conductivity of 0.1 S/m. The field distributions are computed from geometrical optics with one bounce off each surface included. Polarization, reflection coefficients, and geometrical spreading are included in these calculations (this simulation and the other simulations are included simply for purposes of illustration; a different calculation of the field can be used in any given configuration to determine the fields to whatever order is needed). The power levels are adjusted so that when a reader operates in free space the data signal is just strong enough to set off tags 10 m away from the reader in the main-beam direction, as shown inFIG. 27 . -
FIG. 39 shows the total field distributions 1.5 m above the concrete floor of the data signals of the left and right reader. The direct and reflected fields being in and out of phase cause the ripples of the total field.FIG. 40 shows the interrogation zones of the two readers when they broadcast only data signals. A tag placed near the origin will receive enough power from both readers to be powered up. However, such a tag would not function properly, even if the two readers broadcast at different frequencies, because it simultaneously receives two sets of instructions (reader collision occurs). Hence, the readers cannot operate simultaneously. Moreover, both readers interrogate tags on both conveyer belts, so it would not be possible to determine which belt carried a tagged item. - For this example, assume that the two readers broadcast both data and scramble signals, and in addition place a scramble signal transmitter between the two conveyer belts as indicated in
FIG. 38 .FIG. 41 (Left) shows the ratio of total scramble beam (obtained with the scramble transmitter and the two readers) to data beam of the reader on the left.FIG. 41 (Right) shows the ratio of total scramble beam to data beam of the reader on the right. Tags are interrogated only in the regions where a data beam dominates. The data signals dominate in the dark shaded regions.FIG. 42 shows the interrogation zones of the two readers where (1) the power of the data signal is sufficient to set off a tag and (2) the data signal overshadows the scramble signal by at least 10 dB (where thevalue 10 dB is chosen for illustration purposes). The interrogation zones are now disjoint and each reader interrogates only the tags on one conveyer belt. This aspect of the present invention solves two problems: (1) Reader collision is avoided: tags near the origin stay quiet and do not modify their stored data because they receive a scramble signal that does not instruct them to operate. (2) It is now possible to determine which belt carried a tagged item. - More generally, one can set up a reader network with unknown parameters (array excitation coefficients, reader locations, and reader orientations) and optimize the parameters to create desired interrogation zones in a given environment. The optimization can be carried out by interactive methods that minimize a user-defined cost function (see, for example, P. Venkataraman, “Applied Optimization with MATLAB Programming,” Wiley, 2001). This approach is equivalent to an inverse source problem where the task is to determine the strength and location of sources that result in a desired field distribution.
- One type of solution would determine the optimal source distribution (excitation coefficients) to maximize the signal from a tag placed on a particular object using the techniques described in the paper by David Isaacson entitled “Distinguishability of Conductivities by Electric Current Computed Tomography” (IEEE Trans. on Medical Imaging, Vol. MI-5, No. 2, 91-95, 1986).
- In one embodiment of this method, the array element locations are fixed and on-site measurements are carried out to determine the N one-element field distributions described above. These N data sets are subsequently used in an optimization procedure that determines array coefficients that produce the desired interrogation regions.
- Numerous studies have demonstrated the difficulty of reading tags accurately, especially when other objects shield the tags from the interrogation signal (see, for example, “RFID will present a stiff test,” Supply Chain Management Review, Jan. 15, 2004). This section describes a systematic method for determining the optimal tag placement that will maximize the scattered field from the tags. The method involves the following steps:
- (1) Create a model of the environment in which the tags must operate. For example, if the tags are to be placed on individual soda bottles that are stacked on a pallet, the model would consist of a collection of stacked high-dielectric scatterers shaped as soda bottles.
- (2) Numerically determine the total electric field for the scattering problem in which the field of the reader illuminates the model. For the soda bottles on the pallet, a finite-difference time-domain method would be suitable for determining the total electric field everywhere (A. Taflove and S. Hagness, “Computational Electrodynamics: The Finite-Difference Time-Domain Method,” Artech House, 2nd Ed., 2000). High-frequency methods (A. K. Bhattacharyya, “High-Frequency Electromagnetic Techniques,” John Wiley & Sons, 1995) and exact solutions (W. C. Chew, “Waves and Fields in Inhomogeneous Media,” IEEE Press, 1995) are also useful for solving the scattering problems.
- (3) Based on the computed field distribution, place the tag antennas such that the electric field is disturbed as much as possible. For example, if the tag antenna is a linear dipole and the object is a soda bottle, the dipole should be placed at a point on the surface of the bottle where the electric field is strongest. Moreover, the tag antenna should be aligned with the electric field at that point. For soda bottles on a pallet, the optimum tag locations may vary from bottle to bottle.
- As shown by the 2D model in
FIG. 43 , this method works in the following way: the item to be tagged is modeled by an infinite dielectric cylinder ofradius 5 cm with a relative dielectric constant of 81 and a conductivity of 0.01 S/m. The field of a line source (the reader) illuminates a dielectric cylinder (bottle containing a liquid). A conducting wire (the tag) is close to the surface of the cylinder. The reader is modeled with an electric line source 5 m away that broadcasts at 900 MHz. Assume that the reader is monostatic: the transmitting and receiving antennas are collocated.FIG. 44 shows the resulting total electric field inside and outside the dielectric cylinder, whose circumference is indicated by a distinct circle. An optimal tag placement for this object would be either the front or back (as seen from the reader) where the electric field attains its maximum values. A tag placed on the sides of the dielectric cylinder would not scatter much. The field distributions obtained with a thin wire placed on the side and on the back of the dielectric object are shown inFIGS. 45 and 46 , respectively. As expected, the wire placed on the back (FIG. 46 ) alters the field much more than the wire placed on the side (FIG. 45 ). - To compute the modulated scattered field that would be observed by the reader, one may model the two states of a tag as follows: A short-circuited tag antenna is a thin wire, and an open-circuited tag antenna is an absent wire. With this model, a tag placed on the side of the dielectric object communicates with the reader by changing the field distribution from the one displayed in
FIG. 44 (tag antenna open-circuited) to the distribution inFIG. 45 (tag antenna short-circuited). Similarly, a tag placed on the back of the dielectric object communicates with the reader by changing the field distribution from the one displayed inFIG. 44 (tag antenna open-circuited) to the distribution inFIG. 46 (tag antenna short-circuited). - The difference fields recorded by the reader far from the dielectric cylinder are shown in
FIG. 47 (tag placed on side of cylinder) andFIG. 48 (tag placed on back of cylinder). As expected from the discussion above, the difference field is very weak when the tag is placed on the side of the cylinder, so the tag may not be read correctly. By placing the tag on the back of the cylinder in accordance with the method of the present invention, a much stronger difference field results (at least 100 times stronger) and the chances that the reader accurately obtains the information stored on the tag greatly improves. - A bistatic reader configuration is shown in
FIG. 49 where the transmitter and receiver are not collocated.FIG. 49 shows a bistatic RFID reader consisting of a transmitter and a receiver that interrogates a collection of tags that are placed on items in a box. The difference field inFIG. 47 attains its maximum values at locations that are approximately 90° away from the transmitting antenna of the reader. Hence, if the receiving antenna of the reader were placed 90° away from the transmitting antenna, the reader would more effectively interrogate the tag in this configuration where the tag is on the side of the cylinder. Moreover, by separating the transmitter from the receiver, the direct coupling is significantly reduced and the read range is no longer limited by the condition that the tag signal may be no more than 100 dB below the level of the transmitters carrier signal. (See page 145 of reference [1] cited above for a discussion of the 100 dB condition.) - This example illustrates two advantages of a bistatic reader over a monostatic reader: (1) a bistatic reader may be able to correctly read certain tags that cannot be read accurately by a monostatic reader because the back scattered field is much weaker than the scattered field at an optimal receiver location, and (2) the direct coupling between the transmitter and receiver is much weaker for a bistatic reader, thus making it possible to correctly interrogate tags that are further away.
- An even more effective reader would have several receiving antennas distributed around the objects of interrogation to pick up scattered fields that peak in many different directions (multistatic reader). For fixed geometries, such as soda bottles on a pallet, numerical simulations can determine the optimal bistatic configuration. The use of numerical simulations to optimize the placement of tags and reader antennas is illustrated by the example above, which shows that a 90° bistatic configuration is optimal for a tag placed on the side of a dielectric cylinder.
- Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions, and alterations can be made herein without departing from the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the process, machine, manufacture, composition of matter, means, methods, and steps described in the specification. As one will readily appreciate from the disclosure, processes, machines, manufacture, compositions of matter, means, methods, or steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized. Accordingly, the appended claims are intended to include within their scope such processes, machines, manufacture, compositions of matter, means, methods, or steps.
Claims (46)
1. A method for interrogating RFID tags comprising:
transmitting a data signal that causes said RFID tags to respond,
transmitting one or more scramble signals that do not cause said RFID tags to respond, and
adjusting said data signal and said one or more scramble signals such that said one or more scramble signals overshadow said data signal in all but selected regions.
2. The method of claim 1 , wherein at least one of said one or more scramble signals contains a separate intelligible data stream.
3. The method of claim 1 , wherein at least one of said one or more scramble signals charges said RFID tags when said RFID tags are not being interrogated.
4. The method of claim 1 , wherein at least one of said one or more scramble signals broadcasts a sine wave.
5. The method of claim 1 , wherein said selected regions are varied during the transmission of said data signal.
6. The method of claim 1 , wherein said data signal comprises a plurality of bits, and said plurality of bits is divided into a first part and a second part.
7. The method of claim 6 , wherein for each of said first part and said second part, a corresponding scramble-signal null direction is defined that is slightly away from the peak direction of said data signal.
8. The method of claim 6 , wherein each of said first part and said second part is transmitted while at least one of said one or more scramble signals has its central null steered in the direction of a corresponding scramble-signal null direction.
9. The method of claim 1 , wherein said one or more scramble signals have approximately constant amplitudes away from a central null for each scramble signal, and the total radiated power is approximately omni-directional.
10. The method of claim 9 , wherein constant-amplitude scramble signals are achieved by moving zeros off the Schelkunoff unit circle.
11. The method of claim 9 , wherein constant-amplitude scramble signals are achieved by iterative methods.
12. The method of claim 1 , further comprising the steps of:
employing two or more array readers that scan an area with data and scramble signals to determine the angular positions of each tag within range, and
determining the absolute position of said RFID tags through triangulation using the angular positions obtained with said two or more array readers.
13. The method of claim 12 , further comprising the step of:
employing anti-collision methods when more than one of said RFID tags responds at any given scan angle.
14. The method of claim 1 , wherein said reader and said RFID tags are inductively coupled and said reader employs two or more loops to transmit said data signal and said one or more scramble signals.
15. The method of claim 14 , wherein the configuration of said loops of said reader is optimized with iterative techniques to ensure that the magnetic field of said data signal is overshadowed by the magnetic fields of said one or more scramble signal except in selected regions.
16. The method of claim 1 , further comprising the step of employing one or more security measures.
17. The method of claim 16 , wherein said one or more security measures comprises placing of nulls in receiving patterns.
18. The method of claim 16 , wherein said one or more security measures comprises using highly directive antennas.
19. The method of claim 16 , wherein said one or more security measures comprises transmitting scramble signals.
20. A method for optically displaying the interrogation zone of an RFID reader, comprising the steps of:
attaching an optical source to an RFID reader, and,
transmitting one or more light beams with said optical source to visualize said interrogation zone.
21. The method of claim 20 , wherein at least one of said one or more light beams is pointed in the direction of the center of said interrogation zone.
22. The method of claim 20 , further comprising the step of transmitting two or more light beams such that each light beam coincides with a boundary of said interrogation zone.
23. The method of claim 20 , further comprising the step of scanning a light beam back and forth between boundaries of said interrogation zone.
24. The method of claim 22 , wherein said light beams are transmitted with lasers.
25. The method of claim 20 , wherein said optical source is built into the housing of said RFID reader.
26. The method of claim 20 , wherein said optical source is attached to the housing of said RFID reader.
27. A method for improving the efficiency of RFID systems having RFID readers and RFID tags, comprising the steps of:
employing an antenna array by an RFID reader,
broadcasting a data signal using said antenna array, and,
broadcasting a scramble signal using said antenna array.
28. The method of claim 27 , wherein said antenna array employs patch antennas.
29. The method of claim 27 , further comprising the step of employing three antenna elements by said RFID reader, wherein two antenna elements transmit said scramble signal and one antenna element interrogates RFID tags.
30. The method of claim 27 , further comprising the step of adjusting the array excitation coefficients for said data signal and said scramble signal to create an interrogation beam that fits an opening in a container.
31. The method of claim 27 , further comprising the step of employing an antenna, wherein said antenna transmits two or more interrogation beams and wherein any of said RFID tags in said interrogation zone receive sufficient power to operate from at least one of said two or more interrogation beams.
32. The method of claim 27 , further comprising the step of employing two or more scramble signals, wherein said two or more scramble signals prevent leakage of said data signal.
33. The method of claim 32 , wherein two or more scramble signals employ coefficients that are mirror images.
34. The method of claim 27 , further comprising the step of transmitting said data signal and said scramble signal adjusted to create closely spaced disjoint interrogation zones.
35. The method of claim 27 , wherein the position of said RFID reader is determined from the solution of an inverse source problem.
36. The method of claim 35 , wherein the inverse source problem is solved with an iterative optimization scheme.
37. The method of claim 27 , wherein the position of said RFID reader is determined from measurements.
38. The method of claim 27 , wherein the array excitation coefficients are determined from the solution to an inverse source problem.
39. The method of claim 38 , wherein the inverse source problem is solved with an iterative optimization scheme.
40. The method of claim 27 , wherein the array excitation coefficients are determined from measurements.
41. A method for interrogating RFID tags comprising the steps of:
providing a tag antenna to interrogate said RFID tags, and,
placing said RFID tags at locations where said tag antenna creates maximum disruption of a field distribution.
42. The method of claim 41 , wherein the field distribution on an object is computed with a numerical method.
43. The method of claim 41 , wherein the field distribution on an object is obtained from measurements.
44. The method of claim 41 further comprising the step of transmitting and receiving signals in a bistatic mode of operation.
45. The method of claim 41 further comprising the step of transmitting and receiving signals in a multistatic mode of operation.
46. The method of claim 45 further comprising the step of determining the location of said receivers by solving a scattering problem.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/758,086 US20070252687A1 (en) | 2004-03-05 | 2007-06-05 | Method and apparatus for improving the efficiency and accuracy of rfid systems |
Applications Claiming Priority (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US55035504P | 2004-03-05 | 2004-03-05 | |
US55041104P | 2004-03-05 | 2004-03-05 | |
US56143304P | 2004-04-12 | 2004-04-12 | |
US60353104P | 2004-08-20 | 2004-08-20 | |
US61342804P | 2004-09-27 | 2004-09-27 | |
US11/066,048 US7456726B2 (en) | 2004-03-05 | 2005-02-25 | Method and apparatus for improving the efficiency and accuracy of RFID systems |
US11/758,086 US20070252687A1 (en) | 2004-03-05 | 2007-06-05 | Method and apparatus for improving the efficiency and accuracy of rfid systems |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/066,048 Division US7456726B2 (en) | 2004-03-05 | 2005-02-25 | Method and apparatus for improving the efficiency and accuracy of RFID systems |
Publications (1)
Publication Number | Publication Date |
---|---|
US20070252687A1 true US20070252687A1 (en) | 2007-11-01 |
Family
ID=35056667
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/066,048 Active 2026-02-17 US7456726B2 (en) | 2004-03-05 | 2005-02-25 | Method and apparatus for improving the efficiency and accuracy of RFID systems |
US11/758,118 Abandoned US20070252677A1 (en) | 2004-03-05 | 2007-06-05 | Method and apparatus for improving the efficiency and accuracy of rfid systems |
US11/758,086 Abandoned US20070252687A1 (en) | 2004-03-05 | 2007-06-05 | Method and apparatus for improving the efficiency and accuracy of rfid systems |
US12/270,045 Abandoned US20090066481A1 (en) | 2004-03-05 | 2008-11-13 | Method and apparatus for improving the efficiency and accuracy of rfid systems |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/066,048 Active 2026-02-17 US7456726B2 (en) | 2004-03-05 | 2005-02-25 | Method and apparatus for improving the efficiency and accuracy of RFID systems |
US11/758,118 Abandoned US20070252677A1 (en) | 2004-03-05 | 2007-06-05 | Method and apparatus for improving the efficiency and accuracy of rfid systems |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/270,045 Abandoned US20090066481A1 (en) | 2004-03-05 | 2008-11-13 | Method and apparatus for improving the efficiency and accuracy of rfid systems |
Country Status (4)
Country | Link |
---|---|
US (4) | US7456726B2 (en) |
EP (1) | EP1743271B1 (en) |
AT (1) | ATE542186T1 (en) |
WO (1) | WO2005091889A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040266481A1 (en) * | 2002-03-18 | 2004-12-30 | Jay Patel | RF ID tag reader utilizing a scanning antenna system and method |
Families Citing this family (65)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7051945B2 (en) * | 2002-09-30 | 2006-05-30 | Nanosys, Inc | Applications of nano-enabled large area macroelectronic substrates incorporating nanowires and nanowire composites |
WO2005008578A2 (en) * | 2003-07-07 | 2005-01-27 | Avery Dennison Corporation | Rfid device with changeable characteristics |
ATE542186T1 (en) * | 2004-03-05 | 2012-02-15 | Seknion Inc | METHOD AND APPARATUS FOR IMPROVING THE PERFORMANCE AND ACCURACY OF RFID SYSTEMS |
WO2005091890A2 (en) * | 2004-03-05 | 2005-10-06 | Seknion, Inc. | Method and apparatus for security in a wireless network |
US7199719B2 (en) * | 2004-03-24 | 2007-04-03 | Dan Alan Steinberg | RFID tag reader with tag location indicated by visible light beam |
US7410096B2 (en) * | 2004-06-07 | 2008-08-12 | Rf Code, Inc. | Middleware appliance for scalable and reliable automated identification |
US7551081B2 (en) | 2004-11-10 | 2009-06-23 | Rockwell Automation Technologies, Inc. | Systems and methods that integrate radio frequency identification (RFID) technology with agent-based control systems |
US7339476B2 (en) | 2004-11-10 | 2008-03-04 | Rockwell Automation Technologies, Inc. | Systems and methods that integrate radio frequency identification (RFID) technology with industrial controllers |
US7988055B2 (en) * | 2005-01-20 | 2011-08-02 | Wright State University | Uncontrolled passive radio frequency identification tag and system with 3-D positioning |
US7132948B2 (en) * | 2005-01-22 | 2006-11-07 | Odin Technologies, Inc. | System for optimally placing radio frequency identification (RFID) antennas, tags, and interrogators |
US20110221566A1 (en) * | 2005-02-04 | 2011-09-15 | Douglas Kozlay | Authenticating device with wireless directional radiation |
US7474220B2 (en) * | 2005-06-04 | 2009-01-06 | Sungkyunkwan University Foundation For Corporate Collaboration | Three-dimensional radio frequency identification tag and environment condition recognition system and method using tag |
TWI271536B (en) * | 2005-06-27 | 2007-01-21 | Lite On Technology Corp | Position indicating system |
US7388491B2 (en) | 2005-07-20 | 2008-06-17 | Rockwell Automation Technologies, Inc. | Mobile RFID reader with integrated location awareness for material tracking and management |
US7764191B2 (en) | 2005-07-26 | 2010-07-27 | Rockwell Automation Technologies, Inc. | RFID tag data affecting automation controller with internal database |
US8260948B2 (en) | 2005-08-10 | 2012-09-04 | Rockwell Automation Technologies, Inc. | Enhanced controller utilizing RFID technology |
DE102006032833B4 (en) * | 2005-08-26 | 2016-11-03 | Honda Motor Co., Ltd. | Transponder evaluation system and method |
US7510110B2 (en) | 2005-09-08 | 2009-03-31 | Rockwell Automation Technologies, Inc. | RFID architecture in an industrial controller environment |
US7931197B2 (en) | 2005-09-20 | 2011-04-26 | Rockwell Automation Technologies, Inc. | RFID-based product manufacturing and lifecycle management |
US7446662B1 (en) | 2005-09-26 | 2008-11-04 | Rockwell Automation Technologies, Inc. | Intelligent RFID tag for magnetic field mapping |
US8025227B2 (en) | 2005-09-30 | 2011-09-27 | Rockwell Automation Technologies, Inc. | Access to distributed databases via pointer stored in RFID tag |
US20070096909A1 (en) * | 2005-10-28 | 2007-05-03 | Matthew Lally | Interactive networking device |
US7705733B2 (en) * | 2006-01-06 | 2010-04-27 | Warsaw Orthopedic, Inc. | Coiled RFID tag |
US7154283B1 (en) | 2006-02-22 | 2006-12-26 | Avery Dennison Corporation | Method of determining performance of RFID devices |
US8131263B2 (en) * | 2006-12-06 | 2012-03-06 | Microsoft Corporation | Backup media with wireless identifications tags |
US20080136635A1 (en) * | 2006-12-08 | 2008-06-12 | Symbol Technologies, Inc. | Low power rfid reader that gives visibility to passive tags as active tags using low power 802.11 |
US7812731B2 (en) * | 2006-12-22 | 2010-10-12 | Vigilan, Incorporated | Sensors and systems for detecting environmental conditions or changes |
US8502684B2 (en) | 2006-12-22 | 2013-08-06 | Geoffrey J. Bunza | Sensors and systems for detecting environmental conditions or changes |
US7639138B2 (en) | 2007-02-12 | 2009-12-29 | At&T Intellectual Property I, L.P. | Methods and apparatus to visualize locations of radio frequency identification (RFID) tagged items |
US20080198000A1 (en) * | 2007-02-18 | 2008-08-21 | James Neil Rodgers | RFID interrogation of liquid/metal |
US20100120441A1 (en) * | 2007-03-22 | 2010-05-13 | Telefonaktiebolaget Lm Ericsson | Increasing a sectorization order in a first sector of an antenna array |
US20090002165A1 (en) * | 2007-06-28 | 2009-01-01 | Micron Technology, Inc. | Method and system of determining a location characteristic of a rfid tag |
EP2188868B1 (en) * | 2007-09-11 | 2018-07-11 | RF Controls, LLC | Radio frequency signal acquisition and source location system |
US20090160638A1 (en) * | 2007-12-20 | 2009-06-25 | 3M Innovative Properties Company | Radio frequency identification reader system |
TW201001958A (en) | 2008-04-29 | 2010-01-01 | Odin Technologies Inc | Method and apparatus for a deployable radio-frequency identification portal system |
US9442192B2 (en) * | 2008-07-28 | 2016-09-13 | Thingamagigwerks, Llc | Method and apparatus for location determination using reflected interferometry |
US8854212B2 (en) | 2009-03-30 | 2014-10-07 | Datalogic Automation, Inc. | Radio frequency identification tag identification system |
ES2641771T3 (en) * | 2009-10-16 | 2017-11-13 | Alert Systems Aps | An electronic anti-theft protection system |
US8461965B2 (en) * | 2010-01-13 | 2013-06-11 | The Boeing Company | Portable radio frequency identification (RFID) reader |
KR20120043309A (en) * | 2010-10-26 | 2012-05-04 | 한국전자통신연구원 | Method and apparatus for visualizing recognition area of rfid |
EP2678707A4 (en) * | 2011-02-22 | 2018-01-10 | Celeno Communications (Israel) Ltd. | Phy-level wireless security |
US9197984B2 (en) * | 2011-04-19 | 2015-11-24 | Qualcomm Incorporated | RFID device with wide area connectivity |
EP2535850B1 (en) * | 2011-06-16 | 2019-01-23 | Deutsche Post AG | Logistic terminal with loading dock areas suitable to identify objects |
US8695884B2 (en) | 2011-08-25 | 2014-04-15 | Michael H. Baym | Systems, devices, admixtures, and methods including transponders for indication of food attributes |
US20130049934A1 (en) * | 2011-08-25 | 2013-02-28 | Elwha LLC, a limited liability company of the State of Delaware | Systems, devices, methods, and admixtures including interrogators and interrogation of tags for indication of food attributes |
RU2488889C1 (en) * | 2012-06-18 | 2013-07-27 | Общество с ограниченной ответственностью "АМ Девелопмент" | Method of detecting moving electroconductive objects and apparatus for realising said method |
US9841492B2 (en) | 2013-02-25 | 2017-12-12 | Quake Global, Inc. | Ceiling-mounted RFID-enabled tracking |
JP6280571B2 (en) | 2013-02-26 | 2018-02-14 | クエイク グローバル インコーポレイティッドQuake Global, Inc. | Method and apparatus for automatic identification wristband |
US9715609B1 (en) | 2013-03-11 | 2017-07-25 | The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration | Systems, apparatuses and methods for beamforming RFID tags |
US9472075B1 (en) | 2015-06-04 | 2016-10-18 | Tyco Fire & Security Gmbh | Systems and methods for locating items in a facility |
US10134253B2 (en) | 2015-06-04 | 2018-11-20 | Tyco Fire & Security Gmbh | Systems and methods for locating and determining the orientation of a handheld device |
US9852319B1 (en) | 2015-07-02 | 2017-12-26 | Impinj, Inc. | Inventory-cycle-based RFID tag location |
US11147719B2 (en) | 2015-11-16 | 2021-10-19 | Hill-Rom Services, Inc. | Incontinence detection systems for hospital beds |
EP3306576B1 (en) * | 2016-10-05 | 2023-03-15 | The Swatch Group Research and Development Ltd | Method and system for secure access to a determined space by means of a portable object |
WO2018104822A1 (en) | 2016-12-08 | 2018-06-14 | Celeno Communications (Israel) Ltd. | Establishing a secure uplink channel by transmitting a secret word over a secure downlink channel |
US10334454B2 (en) * | 2017-05-11 | 2019-06-25 | Intel Corporation | Multi-finger beamforming and array pattern synthesis |
EP3403580B1 (en) * | 2017-05-16 | 2021-05-05 | Hill-Rom Services, Inc. | Incontinence detection apparatus |
CN107222286B (en) * | 2017-08-09 | 2018-03-13 | 罗普特(厦门)科技集团有限公司 | A kind of method of network directional shielding |
US10656263B2 (en) | 2017-09-14 | 2020-05-19 | Qualcomm Incorporated | Extended localization range and assets tracking |
EP3834186B1 (en) * | 2018-08-06 | 2022-12-14 | Sensormatic Electronics, LLC | Pedestal with embedded camera(s) for beam steering |
CN109242069B (en) * | 2018-09-20 | 2019-11-26 | 上海华申智能卡应用系统有限公司 | A kind of steel cylinder electronic label read-write method and system based on phased array antenna |
CN112073082B (en) * | 2019-05-22 | 2022-04-22 | 成都华为技术有限公司 | Backscatter communication method, excitation device, reflection device, and reception device |
NL2026233B1 (en) * | 2020-08-07 | 2022-04-13 | Nedap Nv | Tag interrogation system |
US20220261565A1 (en) * | 2021-02-16 | 2022-08-18 | Qatar University | Method and apparatus for physically secure backscatter communications |
FR3139258A1 (en) * | 2022-08-30 | 2024-03-01 | Airbus Defence And Space Sas | OPTICAL TERMINAL FOR COMMUNICATION BY LASER SIGNALS |
Citations (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4068178A (en) * | 1976-10-01 | 1978-01-10 | Telenetics, Inc. | Variable frequency waveform synthesizer |
US4114151A (en) * | 1976-09-14 | 1978-09-12 | Alfa-Laval Company Limited | Passive transponder apparatus for use in an interrogator-responder system |
US4467140A (en) * | 1981-05-01 | 1984-08-21 | Masco Corporation Of Indiana | Microprocessor-based cordless telephone system |
US4956864A (en) * | 1987-01-27 | 1990-09-11 | Brockman Milton H | Receiver for communications satellite down-link reception |
US4975926A (en) * | 1989-03-30 | 1990-12-04 | Guenther Knapp | Wireless indoor data communication system |
US5157687A (en) * | 1989-06-29 | 1992-10-20 | Symbol Technologies, Inc. | Packet data communication network |
US5173705A (en) * | 1990-11-16 | 1992-12-22 | Thomson Composants Microondes | Telecommunications device using electromagnetic waves |
US5252965A (en) * | 1991-03-15 | 1993-10-12 | Delco Electronics Corporation | Changing one of many access codes upon removal of ignition key |
US5265265A (en) * | 1990-02-09 | 1993-11-23 | Seiko Epson Corporation | Wristwatch radio communication device having an improved noise shielding structure |
US5382784A (en) * | 1993-02-08 | 1995-01-17 | Indala Corporation | Hand-held dual technology identification tag reading head |
US5410141A (en) * | 1989-06-07 | 1995-04-25 | Norand | Hand-held data capture system with interchangable modules |
US5420589A (en) * | 1993-06-07 | 1995-05-30 | Wells; C. T. | System for evaluating the inner medium characteristics of non-metallic materials |
US5495237A (en) * | 1992-12-07 | 1996-02-27 | Akishima Laboratories (Mitsui Zosen) Inc. | Measuring tool for collecting down hole information and metering valve for producing mud-pulse used in the same |
US5519381A (en) * | 1992-11-18 | 1996-05-21 | British Technology Group Limited | Detection of multiple articles |
US5550871A (en) * | 1993-12-29 | 1996-08-27 | Hyundai Electronics Industries, Co., Ltd. | Satellite communication receiving apparatus |
US5564020A (en) * | 1994-06-30 | 1996-10-08 | Compaq Computer Corporation | Apparatus for reducing interference between a computer device and a radio transceiver utilizing separated units with an infrared link |
US5655019A (en) * | 1995-03-30 | 1997-08-05 | Mckernan; Randolph W. | Identity protection method for use with wireless telephone systems |
US5671219A (en) * | 1993-11-01 | 1997-09-23 | Omnipoint Corporation | Communication protocol for spread spectrum communication |
US5727608A (en) * | 1996-05-24 | 1998-03-17 | Nusbaumer; Joseph M. | Automated fuel management system, components therefor, and methods of making the same |
US5748147A (en) * | 1992-03-04 | 1998-05-05 | Motorola Inc | Position locating rescue transceiver |
US5790922A (en) * | 1996-03-11 | 1998-08-04 | Canon Kabushiki Kaisha | Image forming apparatus constructed to have a high heat radiating efficiency |
US5805643A (en) * | 1993-02-26 | 1998-09-08 | Kabushiki Kaisha Toshiba | Diversity receiver system used in digital communication |
US5805055A (en) * | 1993-05-11 | 1998-09-08 | Elementare Watson S.R.L. | Antitheft system integrated with functions of security, information and navigation, based on electronic cartography, vocal synthesis and radio telecommunication |
US5838237A (en) * | 1996-05-22 | 1998-11-17 | Revell; Graeme Charles | Personal alarm device |
US5874724A (en) * | 1997-01-10 | 1999-02-23 | International Business Machines Corporation | Light selectable radio frequency identification tag and method therefor |
US5918155A (en) * | 1995-03-13 | 1999-06-29 | Hitachi, Ltd. | Satellite communication system and method thereof |
US5959367A (en) * | 1996-07-11 | 1999-09-28 | Donnelly Corporation | Vehicle mirror digital network and dynamically interactive mirror system |
US6025780A (en) * | 1997-07-25 | 2000-02-15 | Checkpoint Systems, Inc. | RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system |
US6028551A (en) * | 1994-12-13 | 2000-02-22 | Schoen; Neil Charles | Micro-miniature beacon transmit-only geo-location emergency system for personal security |
US6031497A (en) * | 1997-12-22 | 2000-02-29 | Samsung Electronics Co., Ltd. | Antenna apparatus for smart phone |
US6035039A (en) * | 1995-11-30 | 2000-03-07 | Tisdale; William R. | Fraud detection and user validation system for mobile earth terminal communication device |
US6111550A (en) * | 1996-09-26 | 2000-08-29 | Texas Instruments Incorporated | High gain compact scanning personal communication system array |
US6184841B1 (en) * | 1996-12-31 | 2001-02-06 | Lucent Technologies Inc. | Antenna array in an RFID system |
US6275679B1 (en) * | 1985-06-24 | 2001-08-14 | The United States Of America As Represented By The Secretary Of The Air Force | Secure communication using array transmitter |
US6285318B1 (en) * | 1994-12-13 | 2001-09-04 | Neil Charles Schoen | Micro-miniature beacon transmit-only geo-location emergency system for personal security |
US6294992B1 (en) * | 1995-08-17 | 2001-09-25 | Pittway Corp. | High power control signal transmission and low power data signal transmission in a wireless security system |
US20010028302A1 (en) * | 2000-04-06 | 2001-10-11 | Marc Degrauwe | Active transponder with means allowing the maximum communication distance to be varied |
US6397063B1 (en) * | 2001-03-30 | 2002-05-28 | Bellsouth Intellectual Property Corporation | Air-surface test system and method to evaluate potential wireless base station sites |
US6414605B1 (en) * | 1998-09-02 | 2002-07-02 | Schlumberger Resource Management Services, Inc. | Utility meter pit lid mounted antenna assembly and method |
US20020097157A1 (en) * | 2001-01-25 | 2002-07-25 | Piri John L. | Device and method for alerting to the need to recover something, identifying it, and determining its location for purposes of recovery |
US20030026196A1 (en) * | 2001-06-21 | 2003-02-06 | Bae Systems Information And Electronic Systems Integration Inc. | Reduced algorithm receiver |
US6567032B1 (en) * | 1999-06-30 | 2003-05-20 | International Business Machines Corp. | Method of directing communication between addressable targets using a generalized pointing device |
US20030097304A1 (en) * | 2001-11-16 | 2003-05-22 | Hunt Douglas Harold | Automated unmanned rental system and method |
US6608588B2 (en) * | 2000-05-05 | 2003-08-19 | Greenwich Technologies Associates | Remote sensing using Rayleigh signaling |
US20030179073A1 (en) * | 2002-03-20 | 2003-09-25 | Ohanes Ghazarian | Electronic secure locking system |
US6628205B2 (en) * | 2000-11-30 | 2003-09-30 | Hewlett-Packard Development Company, L.P. | Visual meter for providing a long-term indication of dynamic parameters |
US6650846B1 (en) * | 1998-06-09 | 2003-11-18 | Nec Corporation | Optical transmitter and optical transmission system |
US6831547B2 (en) * | 2001-07-05 | 2004-12-14 | Kabushiki Kaisha Honda Lock | Vehicle equipment remote control system |
US20050128985A1 (en) * | 2000-03-21 | 2005-06-16 | Liberti Joseph C.Jr. | Combined adaptive spatio-temporal processing and multi-user detection for CDMA wireless systems |
US7054296B1 (en) * | 1999-08-04 | 2006-05-30 | Parkervision, Inc. | Wireless local area network (WLAN) technology and applications including techniques of universal frequency translation |
US7075436B2 (en) * | 2001-02-12 | 2006-07-11 | Symbol Technologies, Inc. | Method, system, and apparatus for binary traversal of a tag population |
US7084769B2 (en) * | 2002-01-09 | 2006-08-01 | Vue Technology, Inc. | Intelligent station using multiple RF antennae and inventory control system and method incorporating same |
US7106174B1 (en) * | 1998-06-22 | 2006-09-12 | Hanex Co., Ltd. | Anti-collision tag apparatus and system |
US7398078B2 (en) * | 2004-03-05 | 2008-07-08 | Seknion, Inc. | Method and apparatus for security in a wireless network |
US7456726B2 (en) * | 2004-03-05 | 2008-11-25 | Seknion, Inc. | Method and apparatus for improving the efficiency and accuracy of RFID systems |
Family Cites Families (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US2530140A (en) * | 1944-08-11 | 1950-11-14 | Tung Sol Lamp Works Inc | Secret signaling system |
US4032922A (en) * | 1976-01-09 | 1977-06-28 | The United States Of America As Represented By The Secretary Of The Navy | Multibeam adaptive array |
US4717919A (en) * | 1985-05-28 | 1988-01-05 | Hughes Aircraft Company | Feedback limited adaptive antenna with signal environment power level compensation |
GB2236233A (en) * | 1989-09-04 | 1991-03-27 | Philips Electronic Associated | Communicating information by radio;preventing communication overlap |
US5144553A (en) * | 1990-05-17 | 1992-09-01 | Hassett John J | Electronic vehicle toll collection system and method |
US5083111A (en) * | 1990-11-26 | 1992-01-21 | Sensormatic Electronics Corporation | Jamming apparatus for electronic article surveillance systems |
JPH0540893A (en) | 1991-08-06 | 1993-02-19 | Fujitsu General Ltd | Security data collecting device |
SE469673B (en) * | 1992-01-20 | 1993-08-16 | Rso Corp | SETTING AND DEVICE ON CONTACT-FREE SALE OF OBJECTS |
JPH05304514A (en) | 1992-04-24 | 1993-11-16 | Clarion Co Ltd | Spread spectrum communication equipment |
JPH07271939A (en) | 1994-03-30 | 1995-10-20 | Mitsubishi Denki Semiconductor Software Kk | Non-contact ic card, card reader/writer and card device |
CA2154378C (en) | 1994-08-01 | 2006-03-21 | Larry W. Thompson | Method and apparatus for interrogating a borehole |
JPH08204613A (en) * | 1995-01-23 | 1996-08-09 | Uniden Corp | Radio communication equipment |
DE69619977T2 (en) | 1995-05-24 | 2002-11-07 | Bellsouth Corp., Atlanta | ASYMMETRICAL DATA COMMUNICATION SYSTEM |
US5790022A (en) | 1996-09-09 | 1998-08-04 | Delvecchio; George | Security tracking system |
US5955969A (en) * | 1997-04-09 | 1999-09-21 | Texas Instruments Incorporated | Method to prevent rouge transponder responses in automatic vehicle identification systems |
GB2332546A (en) | 1997-12-16 | 1999-06-23 | Atl Monitors Limited | Remote metering |
JPH11344562A (en) * | 1998-03-17 | 1999-12-14 | Supersensor Pty Ltd | Maximum output variable challenge responder |
JP3410357B2 (en) | 1998-04-10 | 2003-05-26 | 日本電信電話株式会社 | Antenna device |
JP2000285208A (en) | 1999-03-31 | 2000-10-13 | Toshiba Corp | Radio communication system |
EP1051049A3 (en) | 1999-05-04 | 2001-01-17 | Nortel Networks Limited | A radio communication apparatus for subscriber premises |
JP2001024547A (en) | 1999-07-09 | 2001-01-26 | Nippon Avionics Co Ltd | Rfid repeater |
DE50004188D1 (en) | 1999-09-10 | 2003-11-27 | Siemens Transit Telematic Systems Ag | METHOD AND SYSTEM FOR REGISTERING TICKETS |
JP4103268B2 (en) | 1999-10-14 | 2008-06-18 | 株式会社デンソー | Wireless communication device |
JP2001298377A (en) | 2000-04-14 | 2001-10-26 | Matsushita Electric Works Ltd | Rechargeable receiver |
ATE261231T1 (en) * | 2000-05-10 | 2004-03-15 | Mitsubishi Electric Inf Tech | METHOD FOR ASSIGNING SECONDARY SYNCHRONIZATION CODES TO A BASE STATION OF A MOBILE COMMUNICATIONS SYSTEM |
FR2812986B1 (en) * | 2000-08-09 | 2002-10-31 | St Microelectronics Sa | DETECTION OF AN ELECTRIC SIGNATURE OF AN ELECTROMAGNETIC TRANSPONDER |
JP2002236953A (en) | 2001-02-09 | 2002-08-23 | Mitsubishi Electric Corp | On-vehicle unit for dedicated short range communication |
JP2002321725A (en) | 2001-04-20 | 2002-11-05 | Oji Paper Co Ltd | Conveyer mounted with data carrier and method for receiving radio wave by the same |
US6970089B2 (en) * | 2002-07-03 | 2005-11-29 | Battelle Memorial Institute K1-53 | Full-spectrum passive communication system and method |
US7119658B2 (en) * | 2003-02-03 | 2006-10-10 | Ingrid, Inc. | Device enrollment in a security system |
US7119692B2 (en) * | 2003-11-10 | 2006-10-10 | 3M Innovative Properties Company | System for detecting radio-frequency identification tags |
US7088248B2 (en) * | 2004-03-24 | 2006-08-08 | Avery Dennison Corporation | System and method for selectively reading RFID devices |
-
2005
- 2005-02-25 AT AT05723946T patent/ATE542186T1/en active
- 2005-02-25 US US11/066,048 patent/US7456726B2/en active Active
- 2005-02-25 WO PCT/US2005/006293 patent/WO2005091889A2/en active Application Filing
- 2005-02-25 EP EP05723946A patent/EP1743271B1/en not_active Not-in-force
-
2007
- 2007-06-05 US US11/758,118 patent/US20070252677A1/en not_active Abandoned
- 2007-06-05 US US11/758,086 patent/US20070252687A1/en not_active Abandoned
-
2008
- 2008-11-13 US US12/270,045 patent/US20090066481A1/en not_active Abandoned
Patent Citations (61)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4114151A (en) * | 1976-09-14 | 1978-09-12 | Alfa-Laval Company Limited | Passive transponder apparatus for use in an interrogator-responder system |
US4068178A (en) * | 1976-10-01 | 1978-01-10 | Telenetics, Inc. | Variable frequency waveform synthesizer |
US4467140A (en) * | 1981-05-01 | 1984-08-21 | Masco Corporation Of Indiana | Microprocessor-based cordless telephone system |
US6275679B1 (en) * | 1985-06-24 | 2001-08-14 | The United States Of America As Represented By The Secretary Of The Air Force | Secure communication using array transmitter |
US4956864A (en) * | 1987-01-27 | 1990-09-11 | Brockman Milton H | Receiver for communications satellite down-link reception |
US4975926A (en) * | 1989-03-30 | 1990-12-04 | Guenther Knapp | Wireless indoor data communication system |
US5410141A (en) * | 1989-06-07 | 1995-04-25 | Norand | Hand-held data capture system with interchangable modules |
US5157687A (en) * | 1989-06-29 | 1992-10-20 | Symbol Technologies, Inc. | Packet data communication network |
US5265265A (en) * | 1990-02-09 | 1993-11-23 | Seiko Epson Corporation | Wristwatch radio communication device having an improved noise shielding structure |
US5173705A (en) * | 1990-11-16 | 1992-12-22 | Thomson Composants Microondes | Telecommunications device using electromagnetic waves |
US5252965A (en) * | 1991-03-15 | 1993-10-12 | Delco Electronics Corporation | Changing one of many access codes upon removal of ignition key |
US5969673A (en) * | 1992-03-04 | 1999-10-19 | Motorola, Inc. | Position locating rescue transceiver |
US5982322A (en) * | 1992-03-04 | 1999-11-09 | Motorola, Inc. | Position locating rescue transceiver |
US5748147A (en) * | 1992-03-04 | 1998-05-05 | Motorola Inc | Position locating rescue transceiver |
US5519381A (en) * | 1992-11-18 | 1996-05-21 | British Technology Group Limited | Detection of multiple articles |
US5495237A (en) * | 1992-12-07 | 1996-02-27 | Akishima Laboratories (Mitsui Zosen) Inc. | Measuring tool for collecting down hole information and metering valve for producing mud-pulse used in the same |
US5382784A (en) * | 1993-02-08 | 1995-01-17 | Indala Corporation | Hand-held dual technology identification tag reading head |
US5805643A (en) * | 1993-02-26 | 1998-09-08 | Kabushiki Kaisha Toshiba | Diversity receiver system used in digital communication |
US5805055A (en) * | 1993-05-11 | 1998-09-08 | Elementare Watson S.R.L. | Antitheft system integrated with functions of security, information and navigation, based on electronic cartography, vocal synthesis and radio telecommunication |
US5420589A (en) * | 1993-06-07 | 1995-05-30 | Wells; C. T. | System for evaluating the inner medium characteristics of non-metallic materials |
US5671219A (en) * | 1993-11-01 | 1997-09-23 | Omnipoint Corporation | Communication protocol for spread spectrum communication |
US5768264A (en) * | 1993-11-01 | 1998-06-16 | Omnipoint Corporation | Time division multiple access base station supporting ISDN messages |
US5550871A (en) * | 1993-12-29 | 1996-08-27 | Hyundai Electronics Industries, Co., Ltd. | Satellite communication receiving apparatus |
US5564020A (en) * | 1994-06-30 | 1996-10-08 | Compaq Computer Corporation | Apparatus for reducing interference between a computer device and a radio transceiver utilizing separated units with an infrared link |
US5734487A (en) * | 1994-06-30 | 1998-03-31 | Compaq Computer Corporation | Computer system incorporating an infrared link for reduced interference communication with a radio transceiver |
US6285318B1 (en) * | 1994-12-13 | 2001-09-04 | Neil Charles Schoen | Micro-miniature beacon transmit-only geo-location emergency system for personal security |
US6028551A (en) * | 1994-12-13 | 2000-02-22 | Schoen; Neil Charles | Micro-miniature beacon transmit-only geo-location emergency system for personal security |
US5918155A (en) * | 1995-03-13 | 1999-06-29 | Hitachi, Ltd. | Satellite communication system and method thereof |
US5655019A (en) * | 1995-03-30 | 1997-08-05 | Mckernan; Randolph W. | Identity protection method for use with wireless telephone systems |
US6294992B1 (en) * | 1995-08-17 | 2001-09-25 | Pittway Corp. | High power control signal transmission and low power data signal transmission in a wireless security system |
US6035039A (en) * | 1995-11-30 | 2000-03-07 | Tisdale; William R. | Fraud detection and user validation system for mobile earth terminal communication device |
US5790922A (en) * | 1996-03-11 | 1998-08-04 | Canon Kabushiki Kaisha | Image forming apparatus constructed to have a high heat radiating efficiency |
US5838237A (en) * | 1996-05-22 | 1998-11-17 | Revell; Graeme Charles | Personal alarm device |
US5727608A (en) * | 1996-05-24 | 1998-03-17 | Nusbaumer; Joseph M. | Automated fuel management system, components therefor, and methods of making the same |
US6175164B1 (en) * | 1996-07-11 | 2001-01-16 | Donnelly Corporation | Vehicle mirror digital network and dynamically interactive mirror system |
US5959367A (en) * | 1996-07-11 | 1999-09-28 | Donnelly Corporation | Vehicle mirror digital network and dynamically interactive mirror system |
US6111550A (en) * | 1996-09-26 | 2000-08-29 | Texas Instruments Incorporated | High gain compact scanning personal communication system array |
US6184841B1 (en) * | 1996-12-31 | 2001-02-06 | Lucent Technologies Inc. | Antenna array in an RFID system |
US5874724A (en) * | 1997-01-10 | 1999-02-23 | International Business Machines Corporation | Light selectable radio frequency identification tag and method therefor |
US6025780A (en) * | 1997-07-25 | 2000-02-15 | Checkpoint Systems, Inc. | RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system |
US6031497A (en) * | 1997-12-22 | 2000-02-29 | Samsung Electronics Co., Ltd. | Antenna apparatus for smart phone |
US6650846B1 (en) * | 1998-06-09 | 2003-11-18 | Nec Corporation | Optical transmitter and optical transmission system |
US7106174B1 (en) * | 1998-06-22 | 2006-09-12 | Hanex Co., Ltd. | Anti-collision tag apparatus and system |
US6414605B1 (en) * | 1998-09-02 | 2002-07-02 | Schlumberger Resource Management Services, Inc. | Utility meter pit lid mounted antenna assembly and method |
US6567032B1 (en) * | 1999-06-30 | 2003-05-20 | International Business Machines Corp. | Method of directing communication between addressable targets using a generalized pointing device |
US7054296B1 (en) * | 1999-08-04 | 2006-05-30 | Parkervision, Inc. | Wireless local area network (WLAN) technology and applications including techniques of universal frequency translation |
US20050128985A1 (en) * | 2000-03-21 | 2005-06-16 | Liberti Joseph C.Jr. | Combined adaptive spatio-temporal processing and multi-user detection for CDMA wireless systems |
US20010028302A1 (en) * | 2000-04-06 | 2001-10-11 | Marc Degrauwe | Active transponder with means allowing the maximum communication distance to be varied |
US6608588B2 (en) * | 2000-05-05 | 2003-08-19 | Greenwich Technologies Associates | Remote sensing using Rayleigh signaling |
US6628205B2 (en) * | 2000-11-30 | 2003-09-30 | Hewlett-Packard Development Company, L.P. | Visual meter for providing a long-term indication of dynamic parameters |
US6545606B2 (en) * | 2001-01-25 | 2003-04-08 | The United States Of America As Represented By The Secretary Of The Navy | Device and method for alerting to the need to recover something, identifying it, and determining its location for purposes of recovery |
US20020097157A1 (en) * | 2001-01-25 | 2002-07-25 | Piri John L. | Device and method for alerting to the need to recover something, identifying it, and determining its location for purposes of recovery |
US7075436B2 (en) * | 2001-02-12 | 2006-07-11 | Symbol Technologies, Inc. | Method, system, and apparatus for binary traversal of a tag population |
US6397063B1 (en) * | 2001-03-30 | 2002-05-28 | Bellsouth Intellectual Property Corporation | Air-surface test system and method to evaluate potential wireless base station sites |
US20030026196A1 (en) * | 2001-06-21 | 2003-02-06 | Bae Systems Information And Electronic Systems Integration Inc. | Reduced algorithm receiver |
US6831547B2 (en) * | 2001-07-05 | 2004-12-14 | Kabushiki Kaisha Honda Lock | Vehicle equipment remote control system |
US20030097304A1 (en) * | 2001-11-16 | 2003-05-22 | Hunt Douglas Harold | Automated unmanned rental system and method |
US7084769B2 (en) * | 2002-01-09 | 2006-08-01 | Vue Technology, Inc. | Intelligent station using multiple RF antennae and inventory control system and method incorporating same |
US20030179073A1 (en) * | 2002-03-20 | 2003-09-25 | Ohanes Ghazarian | Electronic secure locking system |
US7398078B2 (en) * | 2004-03-05 | 2008-07-08 | Seknion, Inc. | Method and apparatus for security in a wireless network |
US7456726B2 (en) * | 2004-03-05 | 2008-11-25 | Seknion, Inc. | Method and apparatus for improving the efficiency and accuracy of RFID systems |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040266481A1 (en) * | 2002-03-18 | 2004-12-30 | Jay Patel | RF ID tag reader utilizing a scanning antenna system and method |
US7496329B2 (en) * | 2002-03-18 | 2009-02-24 | Paratek Microwave, Inc. | RF ID tag reader utilizing a scanning antenna system and method |
Also Published As
Publication number | Publication date |
---|---|
US7456726B2 (en) | 2008-11-25 |
WO2005091889A3 (en) | 2007-03-29 |
EP1743271B1 (en) | 2012-01-18 |
ATE542186T1 (en) | 2012-02-15 |
US20070252677A1 (en) | 2007-11-01 |
WO2005091889A2 (en) | 2005-10-06 |
EP1743271A2 (en) | 2007-01-17 |
US20050212660A1 (en) | 2005-09-29 |
EP1743271A4 (en) | 2010-10-27 |
US20090066481A1 (en) | 2009-03-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7456726B2 (en) | Method and apparatus for improving the efficiency and accuracy of RFID systems | |
Buffi et al. | A phase-based technique for localization of UHF-RFID tags moving on a conveyor belt: Performance analysis and test-case measurements | |
EP1078329B1 (en) | Systems and methods for wirelessly projecting power using in-phase current loops and for identifying radio frequency identification tags that are simultaneously interrogated | |
Bekkali et al. | Performance analysis of passive UHF RFID systems under cascaded fading channels and interference effects | |
US8395484B2 (en) | System and method for monitoring objects, people, animals or places | |
US20100237996A1 (en) | Reader for rfid transponders and corresponding method | |
US7751799B2 (en) | Method and apparatus for security in a wireless network | |
WO2007104339A1 (en) | Reading method and device for systems of radiofrequency identification | |
US7605684B2 (en) | Method and apparatus for determining the direction of movement of RFID tags and for creating constant-width interrogation zones | |
US20160292472A1 (en) | Secure short-range radio communication device, system and method | |
Mickle et al. | Physics and Geometry of RFID | |
Zomorrodi et al. | Introduction of electromagnetic image-based chipless RFID system | |
Hansen et al. | Method for controlling the angular extent of interrogation zones in RFID | |
CN208314797U (en) | A kind of anti-string reading ultrahigh frequency RFID system based on wireless signal perturbation technique | |
US7801491B2 (en) | Wireless communication system and method | |
CN108595996B (en) | Anti-serial-reading ultrahigh-frequency RFID system and method based on wireless signal interference technology | |
WO2000005674A9 (en) | Communicating with radio frequency identification tags within shaped electromagnetic fields | |
Nepa et al. | Location and tracking of UHF-RFID tags | |
US10348382B1 (en) | Low probability of intercept radio-frequency system using beamforming techniques | |
Karmakar | Recent paradigm shift in RFID and smart antenna | |
Motroni et al. | Smart RFID gate exploiting a near-field focused array | |
Sayeed et al. | A simple LMS algorithm based smart antenna to solve the reader collision problems in RFID system | |
Ahmed | Realistic frequency coded chipless RFID: physically modulated tags and refectarray readers | |
CN109154999A (en) | Answering machine, especially RFID answering machine and operation answering machine, the method for especially RFID answering machine | |
Ndifon | Distributed Phased Array Antennas in Wide Area RFID. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: SEKNION, INC., MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HANSEN, THORKILD;ORISTAGLIO, MICHAEL L.;REEL/FRAME:019791/0760 Effective date: 20050427 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |