The present invention generally relates to the field of radio frequency identification (RFID) devices, and particularly to adaptive RFID devices and methods for using and making same.
Goods and other items may be tracked and identified using an RFID system. An RFID system includes a tag and a reader. The tag is a small transponder typically placed on an item to be tracked. The reader, sometimes referred to as an interrogator, includes a transceiver and an antenna. The antenna emits electromagnetic (EM) waves generated by the transceiver, which, when received by tag, activates the tag. Once the tag activates, it communicates using radio waves back to the reader, thereby identifying the item to which it is attached.
There are three basic types of RFID tags. A beam-powered tag is a passive device which receives energy required for operation from EM waves generated by the reader. The beam powered tag rectifies an EM field and creates a change in reflectivity of the field which is reflected to and read by the reader. This is commonly referred to as continuous wave backscattering. A battery-powered semi-passive tag also receives and reflects EM waves from the reader; however a battery powers the tag independent of receiving power from the reader. An active tag actively transmits EM waves which are then received by the reader.
In addition to the above tag types, tags are classified by frequency band: low frequency, high frequency, and ultra-high frequency. Tags operating in different frequency bands are dissimilar and incompatible. Furthermore, these generalized frequency bands are further subdivided. For example, in the United States, ultra-high frequency RFID tags are permitted to operate from the 902 MHz to 928 MHz band, while European regulations currently specify a 865 MHz to 868 MHz band.
Even within the same frequency band, tags operate with incompatible communication protocols. UHF passive RFID tags in the United States can be implemented either as bit-wide or packet-wide communications. A bit-wide tag will respond bits at a time to each bit that a reader sends after energizing the tag with an RF field. As an example, EPCglobal's class 0 specification details a bit-wide protocol. In opposite, a packet-wide tag responds with a multi-bit packet after successfully decoding a multi-bit command from the reader. Examples of packet-wide implementations are described in EPCglobal's class 1, generation 1 (“C1G1”) and class 1, generation 2 (“C1G2”) specifications. These bit and packet based specifications, which are incorporated by reference herein, can be found at the following Internet uniform resource locators:
(i) http://www.epcglobalinc.org/standards_technology/Secure/v1.0/UHF-class0.pdf;
(ii) http://www.epcglobalinc.org/standards_technology/Secure/v1.0/UHF-class1.pdf; and
(iii) http://www.epcglobalinc.org/standards_technology/EPCglobalClass-1Generation-2UHFRFIDProtocolV109.pdf
These many different types and protocols for RFID tags introduce difficulties handling mixed tag populations. For example, in certain RFID applications, tag populations will inevitably include C0, C0+, C1G1, and/or C1G2 tags, and possibly others, making it impossible or difficult for a reader to identify all the tags. Conventional multi-protocol readers attempt to address this situation using fixed design hardware consisting of logic instantiation. The hardware maintains power and processing resource for all of the computing elements that would be required for all protocols recognized by the reader. This unnecessarily creates a larger computer power overhead. A mixed tag population is one clear example where conventional RFID systems operate inefficiently in light of external factors.
Another example of an external factor resulting in reader inefficiency is proximity to an interferer. The presence of an interferer can increase the signal level received in an adverse manner. The increased signal level brings the receiver closer to its upper dynamic range limits. Near these limits, a noise enhancement effect is observed. In particular, any noise feed-through from the transmitter is enhanced, which is particularly dominant for circulator based transceiver embodiments. An interferer pushes the gain of the receiver into a non-linear region. Noise energy from the transmitter is amplified in a non-linear manner and thus creates inter-modulation distortion products in the receiver.
Conventional RFID system inefficiency may also stem from unnecessarily high read rates in context of a particular RFID application. Unnecessarily high read rates increase the overall interference generated in close proximity, as well as increase power consumption. Manual adjustment of read rates often proves to be overly burdensome and not properly optimized.
From the above it is seen that techniques for RFID devices adaptive to an environment are desired.
Techniques for an adaptive RFID system are provided. An RFID system, as shown in
In one embodiment of the present invention, an RFID reader includes a processor and a reconfigurable hardware element. The reconfigurable hardware element is reconfigurable by the processor in response to a predetermined condition. Non-volatile memory stores configuration code for the reconfigurable hardware element. In specific embodiments, the predetermined condition can be the presence of a mixed tag population, proximity to an interferer, historical read rates, RF noise level, and reader location, as well as other factors.
In another embodiment of the present invention, an RFID reader includes a processor and a switch controlled, directly or indirectly, by the processor. The reader further includes at least two receiver channels coupled to an antenna and the switch. The first receiver channel is configured to provide a gain for a received signal of a first predetermined range in strength. The gain of the first receiver channel is substantially linear over the first predetermined range. The second receiver channel is configured to provide a gain for a received signal of a second predetermined signal range in strength. The gain of the second receiver channel is substantially linear over the second predetermined range.
In yet another embodiment of the present invention, a method of operating an RFID device includes transmitting an interrogation signal. The RFID device receives a backscatter signal and determines signal strength. In response to the determination, the RFID device selects a receiver channel from a plurality of receiver channels. Each receiver channel provides a substantially linear gain over a specified range.
Various additional objects, features, and advantages of the present invention can be more fully appreciated with reference to the detailed description and accompanying drawings that follow.
The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings in which like references indicate similar elements.
The following description and drawings are illustrative of the invention and are not to be construed as limiting the invention. Numerous specific details are described to provide a thorough understanding of the present invention. However, in certain instances, well known or conventional details are not described in order to avoid obscuring the description of the present invention. References to one or an embodiment in the present disclosure are not necessarily references to the same embodiment; and, such references mean at least one.
The operating configuration of reader 202 varies dependent on the sensed tag population. In the event a tag population is homogenous, the configuration of reader 202 can be optimized for a communication protocol associated with the population. To be precise, reader 202 can be configured to be dedicated to a single communication protocol (e.g., Class 0, C1G1, C1G2, ISO standards, or the like), thus not wasting computing capacity or power with protocols unnecessary at that moment. If the composition of the tag population undergoes a change, reader 202 can be reconfigured for another mix of communication protocols. One or more readers may be coupled to data processing systems to perform inventory operations or other operations. For example, a reader may include an Ethernet port to allow the reader to be coupled, for data communications with the other data processing systems, through a computer network.
When mixed tag populations are present, reader 202 can be adapted to operate in a multi-protocol environment. For example, in a mixed population of tag-talk-first (TTF) and RTF (reader-talk-first) tags, some TTF tags will respond during RTF communications. Reader 202 recognizes the backscatter signal from the TTF tags during RTF communications. Reader 202 can either temporarily quiet the TTF tags, read them all first, or read them in an interleaved manner with RTF tags. The architecture of reader 202 can change to handle both TTF and RTF tag types in parallel.
Also, reader 202 may receive a backscatter signal from tag 212, a class 0+ tag, when it is modulating a C1G2 symbol on a forward link. This troublesome event can occur if both tag types receive an appropriate startup and header information, perhaps from different readers in the vicinity. For example, tag 212 can be put in a wake state by reader 204, thus allowing tag 212 to mistakenly respond to reader 202 operating under a differing RFID protocol. Under this circumstance, reader 202 can recognize a class 0 response, adaptively morph its transceiver to affect quick communications (i.e., reconfigure logic for class 0 protocol) with the class 0 tag, quiet the class 0 tag, and return to communicating with the C1G2 tag. This process can occur quickly between packets of a C1G2 command-response type protocol, or during the “ping” bin times of a C1G1 protocol.
Reader 202 also includes processor 304. Processor 304 utilizes fast data memory (e.g., RAM 310). RAM 310 can be of any suitable size, such as at least 64 megabytes, at least 128 megabytes, at least 256 megabytes, or more. In this specific embodiment, processor 304 is an OMAP chipset manufactured by Texas Instruments, which further includes ARM 306 and DSP 308. Processor 304 controls the configuration and operation of FPGA 302. DSP 308 performs signal processing for bit recovery, state machine processes for each air interface protocol standard, automatic discrimination of tag protocol, radio control functions, and reader management. In addition, DSP 308 can also log phase data from a received signal stream to allow distance measurement and direction finding. ARM 306, a general purpose processor, is configured to execute a real-time operating system to accommodate system management and monitoring functions, tag database and filtering, as well as an application program interface (API) for host communications.
FPGA 402 is configured during a power-up sequence. First, a general purpose processor (GPP) 404 of OMAP 412 will initiate its real-time operating system, and then power-up DSP 406 as needed. GPP 404 can next initiate the configuration of FPGA 402 by transferring code stored in non-volatile memory 408. Non-volatile memory 408 can be any form of solid state memory that does not require periodic refresh, including read-only memory, programmable read-only memory, erasable programmable read-only memory, flash memory, or the like. The configuration code can be stored in a compressed format in memory 408 and decompressed in real-time as it loads. Memory 408 can be of any suitable size, such as at least 64 megabytes, at least 128 megabytes, at least 256 megabytes, or more. In other words, code relating to efficient operation under each RFID protocol or mixed tag population environments can be stored in memory 408, and loaded to the reconfigurable hardware device when needed (or only when needed).
In one embodiment, a microprocessor loads in parallel the configuration from non-volatile memory 408 to a static random access memory (SRAM) 410. Following this, the configuration code can be serially transferred to FPGA 402. This configuration process can be completed in less than about 150 milliseconds, more preferably less than 130 milliseconds, and even more preferably less than 100 milliseconds. Alternatively, the configuration code can be transferred from SRAM 410 to FPGA 402 via a parallel memory mapped I/O interface. FPGA 402 can optionally decompress the configuration code in real-time as it loads. In another embodiment, FPGA 402 can be configured externally via JTAG (Joint Test Action Group) interface 414.
In another embodiment, a reader provides adaptive gain control using parallel receiver channels to address the presence of one or more interferers (e.g., other readers in the vicinity). Interferers push the gain of the receiver into the non-linear region. Noise energy from the transmitter is amplified in a non-linear manner and thus creates inter-modulation distortion, or IMD, products in the receiver. Additional details relating to non-linearity in the presence of interferers are provided in Appendix A. Adaptive gain control using parallel receiver channels provides more dynamic range and linearity than a conventional receiver.
Reader 500 includes at least two receiver channels (e.g., 2, 3, 4, 5 or more channels) in an RF front-end section (alternatively, an intermediate frequency section). Each receiver channel is designed to operate in a linear region (or preferably its most linear region) with their respective signals. For example, as illustrated in
Each receiver channel can have a smaller dynamic range relative to a conventional receiver channel, but better linearity for a predefined signal strength region. That is to say, two or more optimized signal gain stages in parallel provide better performance over a single receiver using gain switching. Linearity and signal integrity is much easier to practically obtain with embodiments of the present invention. It should be understood that, in a specific embodiment, selection of the appropriate receiver channel for an RF signal or intermediate frequency signal reduces or eliminates inter-modulation distortion.
Even though close proximity to another reader introduces a problem as discussed above, it also provides opportunities for further performance improvements over conventional RFID readers. A reader according to an embodiment of the present invention maintains relative position information of other nearby readers and adapts its communication link accordingly. For instance, the reader can increase (or alternatively decrease) transmitted signal strength if it determines another reader is located behind it. Also, awareness of other readers and their respective locations allows a reader to act collaboratively with these other readers. In this situation, communication with a common tag can be coordinated to avoid interference or multiple readers can be used to triangulate tag position.
In another embodiment of the present invention, an RFID system or reader can monitor an RF spectrum and determine the extent and frequency of meaningful ambient noise. Based on this additional information, the reader can set its data rate and rate of backscatter return for better performance. The link margin is thus improved and re-tries minimized. For example, a common noise source for RFID backscatter systems is a fluorescent light. Often between 8 and 50 kHz, a fluorescent light acts as a strong source for reflected backscatter. When the reader automatically determines that a local noise source (e.g., a fluorescent light) is emitting noise at 40 kHz with harmonics at multiples of 40 kHz, the reader can adjust its data rate from the tag to avoid proximity to these specific frequencies.
An RFID system can also automatically adapt to historical read rates. This affects the overall interference generated in close vicinity and reduces power usage. The read rate for a slow moving conveyor belt can be reduced relative to a dock door. As another example, in a store, the appropriate read rate for a first shelf may be much less than the read rate for a second shelf, perhaps because its stock/inventory is not as fast moving. Read rates can be manually set or adjusted, but manual procedures often prove to be overly burdensome and not properly optimized, particularly in an environment that regularly undergoes changes.
Predictive modeling techniques can be used to automatically improve or optimize a reader's read rate. For example, a predictive model using historical read rate data over specified time period (e.g., 5 minutes, 10 minutes, 1 hour, 1 day, or more) can cause the reader to read less or more often based on this information. If tags are infrequently presented or the tag population infrequently changes, the reader can initiate a read less often. Known probabilistic estimation techniques, as well as machine learning techniques, can be applied.
In a specific embodiment, the reader combines two or more predictive models to adjust read rate, such as a short term and long term model. The long term model, using data over a long time period (e.g., 10 minutes, 20 minutes, 1 hour, or more), sets the maximum and minimum read rates. The short term model, using data over a short time period (e.g., less than 1 second, 1 second, 10 seconds, 1 minutes, or more), responds to more dynamic changes in the offered load and changes the read rate between the maximum and minimum read rates defined by the long term model. Under this embodiment, historical read rate data can be accumulated in an integrator with an appropriate time constant.
In addition, the reader can alter its duty cycle. That is, based on predictive modeling (or any of the inputs set forth in
An RFID system according to another embodiment of the present invention adapts based on received signal strength. In the event a weak backscatter signal is received (or no signal is detected), in lieu of or in addition to the adaptive gain control discussed above, a receiver carrier signal can be injected in the received signal stream to improve the system dynamic range and resolution capability. Without the receiver carrier signal to ride on, the weak backscatter signal cannot pass through the signal chain unless the analog-to-digital converter has more resolution.
In specific embodiments of the present invention, the receiver carrier signal is identical to the carrier frequency for UHF tag operation. The intensity of this signal can be varied by the amount of coupling between the transmitter and receiver sections. Some amount of coupling exists in RFID transceivers. Ideally, the sum of the injected carrier and the data signal should be equal to the maximum linear dynamic range of the receiver. In non-RFID embodiments such as time-division-multiple-access (TDMA) transceivers, where backscatter signaling is not used, a separate carrier can be injected. This carrier must be offset by one or more channels from the data rate so that it can be filtered out from the data signal. Depending on the particular RFID application, the receiver carrier signal can take any arbitrary waveform, such square wave, sinusoidal, saw tooth, staircase, or the like. The preferred embodiment is a sinusoid because it has the lowest harmonic content and can be most easily filtered out from the desired data stream. The resulting, usable signal is illustrate in
In the foregoing specification, the invention has been described with reference to specific exemplary embodiments thereof. It will be evident that various modifications may be made thereto without departing from the broader spirit and scope of the invention as set forth in the following claims. The specification and drawings are, accordingly, to be regarded in an illustrative sense rather than a restrictive sense.
This document discusses RFID reader RF nonlinearities especially in the presence of strong interference. The effect of RF nonlinearities on the carrier phase accuracy is of particular concern because of its pending utility for range and bearing estimation. This document does not quantify the amount of non-linearity in any particular product. The numbers are used only for examples. The aim of the document is not to investigate alternative solutions to deal with nonlinearities, although some solutions may be inferred from analysis. The well known two-tone inter-modulation distortion (IMD) concept is extended to an RFID reader receiving a small signal from a tag and a strong interference from another reader. Three cases of practical concern are then discussed.
It is common practice to establish receiver RF nonlinearities by analyzing the effect on two equally powered CW signals within the receiver band [1-3]. Assume x is the received signal, we can write;
x=k1 cos(θ1)+k2 cos(θ2) Eq-1
θ1=2πf1t
θ2=2πf2t Eq-2
where the desired signal is at frequency f1 and the interference is at frequency f2. A nonlinear device can be represented mathematically in the following series expansion.
y=a0+a1x+a2x2+a3x3 Eq-3
In Eq-3, the even order terms produce frequency components far from carrier and are filtered out after the mixer. The dominant distortion comes from the third order term which produces components close to the carrier. This is often called the 3rd order inter-modulation product. If we consider Eq-3 up to the third order term and replace x by Eq-1, we obtain;
y=c10 cos(θ1)+c21 cos(2θ1−θ2)+c12 cos(2θ2−θ1)+ Eq-4
c10=a1k1+0.75a3k13+1.5a3k1k22 Eq-5
c01=a1k+0.75a3k23+1.5a3k2k12 Eq-6
c21=0.75a3k12k2 Eq-7
c12=0.75a3k22k1 Eq-8
where c10 is the magnitude of the desired signal and c21 is the magnitude of the third order Inter-Modulation Distortion (IMD). The ratio of IMD to carrier signal level is a good measure of receiver nonlinearity for a given signal magnitude;
In dB scale this is calculated to be;
As an example assume the following;
k1=k2=1
a1=1 a3=−0.1 Eq-11
Using Eq-9 and Eq-10, we can easily calculate
As another example we assume that the desired signal is much weaker than interference. The total received signal level is the same as in the previous example and has the same nonlinearity parameters;
k1=0.01 k2=1.41
a1=1 a3=−0.1 Eq-13
Then we can easily calculate;
Notice the large difference between these two examples, but before discussing these results further, let us refer to some simulation results run in Matlab for the same nonlinear device which is shown in
The signal is at frequency 910 MHz and the interference is at 912 MHz.
Note that the signals used in simulation are CW. The large bandwidth seen at lower PSD magnitudes are merely simulation artifacts.
Now we consider a case which is more difficult to analyze mathematically but is easily simulated. Assume the following parameters;
k1=0.1 k2=10
a1=1 a3=−0.1 Eq-15
The interference is much larger than the signal. Furthermore, we clip the received signal at magnitudes of ±2.
Note that the results of
Discussion
We can now discuss various scenarios in an RFID environment. The focus of the following discussion is on the reader receiver.
Case I: One Reader, No Interference
In this case we assume there is one reader operating at a time. Therefore there is no cross reader interference. Also we assume there is no significant interference from other sources within the receiver bandwidth. Because the received signal is modulated, the signal is comprised of an infinite number of sinusoids that inter-modulate each other in the presence of nonlinearities. One needs to make sure that over the received signal dynamic range, the IMD is below the acceptable noise level, i.e. the signal to noise ratio is good enough for correct data recovery. Since the worst level of IMD is generated when the received signal is the largest, it is practically enough to verify successful reading in a close range test.
Case II: Two Readers, One Generating a Strong Interference
Similar to case one but we also assume there is a single dominant interferer. As we see in
Notice that LBT readers and readers with photo eye trigger may fall under this category or case I category as they either do not see another interferer or occasionally see one.
Case II: Three Readers, Two of them Generating Strong Interferences
Similar to case one but we also assume there are two interferers of about the same magnitudes. If the inter modulated product of the two interferers fall into the signal band and the interferers are significantly larger than the signal, then a receiver designed for case I and case II may fail. In a frequency hopping system, the probability of such occurrence is small, but if we wish to cover this case we need to assure that the IMD generated is well below the minimum detectable signal level. This imposes a much larger linear dynamic range for the receiver as compared with test case I.
Phase Estimation in the Presence of IMD
As is clear from this analysis and simulation, some IMD products can be filtered out before the signal is used for phase estimation. Such filters are necessary for successful data detection in dense reader environments even if phase estimation is of no concern. When and if proper interference avoidance and/or filtering techniques are implemented, IMD could be modeled as a white noise for the purpose of phase estimation.
If IMD is not prevented or removed, then we may occasionally have strong IMD corrupting the received signal. Before using the received information for phase estimation, we should make sure the received signal is not corrupted by IMD. One may check the CRC in the associated data frame. If the data is detected correctly, then the carrier phase can be used for range estimation. This assumes use of the modulated carrier for phase recovery, which by itself is subject to our future investigation.
Conclusions
The following is a portion of U.S. provisional patent application No. 60/736,587, filed Nov. 12, 2005. It will be understood that the figure numbers and reference numbers referred to in this Appendix B are figure numbers and reference numbers, respectively, from this provisional application which is incorporated herein by reference.
Techniques for RFID networking are provided. An RFID system includes both a star network and a mesh network operating in the same frequency band. The star network is configured for tag-to-reader communication, and the mesh network is configured for reader-to-reader communication. Different modulation procedures are utilized within each network to allow concurrent and independent communication over both the star and mesh networks.
In one embodiment of the present invention, an RFID system includes real-time, wireless star and mesh networks. The star network includes a plurality of tags in communication with a first reader at a carrier frequency using a first modulation procedure. The mesh network includes the first reader in communication with a second reader. Communication with the second reader is performed at the carrier frequency using a second modulation procedure. The second modulation procedure differs from the first modulation procedure to allow concurrent communication over the star network and the mesh network. At least one tag of the plurality of tags includes an environmental sensor, and environmental data can be transferred from the star network to the mesh network. In a specific embodiment, each reader and tag, as well as other components of the RFID system, can be camouflaged.
In another embodiment of the present invention, an RFID device includes circuitry to communicate with at least one sensor tag at a carrier frequency using a first modulation procedure. The reader further includes circuitry to communicate with a second RFID device at the carrier frequency using a second modulation procedure. The first modulation procedure differs from the second modulation procedure to allow concurrent communication by the first device with the at least one sensor tag and the second device.
In yet another embodiment of the present invention, a method of operating an RFID system is provided. A first reader is provided within an area. The first reader is configured to communicate with an RFID tag at carrier frequency using a first modulation procedure. RFID transmissions are monitored within the area by the first reader to detect signal from a second, or rogue, reader. The first and second readers communicate to authenticate an identity of the second reader. If authentication fails, the first reader reports the second reader (e.g. reports to another reader, or to a central controller of readers, that the second reader is not anthenticated) or otherwise initiates a predetermined alarm process.
Many benefits are achieved by way of at least certain embodiments of the present invention. For example, the present technique provides reader-to-reader communication which allows a reader population to self-manage, self-orchestrate, and self-diagnose relative to each other without the need for centralized control. Data can also be shared and correlated in real time so as to reduce the amount of traffic going to a central intelligence system. Readers collaborate in making decisions as small groups without needing to communicate across an entire network and waste battery life. Depending upon the embodiment, one or more of these benefits, as well as others, may be achieved.
In a specific embodiment, the star and mesh network operate within the same frequency band or with the same carrier frequency. This implementation provides many benefits, particularly avoiding the need to dedicate two frequency bands for an RFID system. In order to accomplish this feature, different modulation procedures are utilized within each network to allow concurrent and independent communication over both the star and mesh networks. Examples of modulation procedures include amplitude shift keying (ASK), frequency shift keying (FSK), phase shift keying (PSK), Gaussian frequency shift keying (GFSK), minimum-shift keying (MSK), Gaussian minimum shift keying (GMSK), any constant envelope modulation scheme, or the like.
However, in certain applications, it may be advantageous to dedicate a separate frequency band for the mesh network rather than use a different modulation procedure. For example, reader-to-reader communication can be segregated to a frequency band ranging from about 59 GHz to about 64 GHz, while tag-to-reader communication can remain at a frequency band ranging from about 860 MHz to 960 MHz. Keeping the tag-to-reader link at UHF frequencies provides more efficient power transfer for long operating distances. The higher band for the reader-to-reader link can provide one or more of these advantages:
(i) shorter wavelength, and thus increased positional resolution capabilities;
(ii) large available bandwidth with less interference;
(iii) high penetration loss confining signals to a room while also precluding radio sources outside the room;
(iv) smaller antenna size, which is better suited for phase array, beam steering, smart antennas, and MIMO (multiple-input-multiple-output) techniques; and
(v) reduced antenna cost by allowing micro strip antennas.
Referring back to
Besides outward appearance, these RFID devices differ functionally from tags 106, readers 108, and communication device 110. For example, as shown in
In a specific implementation of smart pebble 306, a Nanoblock® IC device manufactured by Alien Technology Corporation is used.
Low cost manufacturing techniques can be used to produce smart pebbles 306 in high volumes, such as on- or off-pitch roll-to-roll processes (or, alternatively, reel-to-reel, tape-to-tape, or sheet-to-sheet processes). Smart pebbles may also be fabricated through a fluidic self-assembly (FSA) process, as described in U.S. Pat. No. 6,864,570, entitled “Method for fabricating self-assembling microstructures,” which is incorporated by reference herein. For further efficiency, RFID strap based techniques can be applied too as described in U.S. Pat. No. 6,606,247, entitled “Multi-Feature-Size Electronic Structures,” which is hereby incorporated by reference.
Many benefits are achieved using smart pebbles. For example, backscatter based smart pebbles consume orders of magnitude less power than conventional active transmission systems, since no power is harnessed from a battery to be converted for radiation. It is also easier to detect backscatter signals with a high dynamic range transceiver because the reflected signal is phase synchronized and coherent with the transmitted signal. Typical power consumption is less than about 20-micro-watts peak and less than about 100 nano-watts standby. For similar link margin in real-world environments, active devices use at least 100 times more power to both overcome inefficiencies for radiating the power, as well as greater difficulty in recovering a non-phase coherent signal over a non-synchronous link. Depending upon the embodiment, one or more of these benefits may be achieved.
FIGS. 6A-C illustrate an exemplary smart rock 308 according to an embodiment of the present invention. Smart rock 308 provides interrogation and command signals to smart pebbles 306. In this example, smart rock 308 includes a single antenna 602 coupled to a circulator 604 for transmitting and receiving, but in alternative embodiments it may have two or more antennas. One antenna can be dedicated for transmitting and another for receiving.
Smart rock 308 further includes an adaptive digital radio 606. Smart rock 308 recognizes one or more external conditions and modifies its operation through adaptive digital radio 606 in response to these conditions. External factors can include historical read rates, composition of tag population, characteristics of the backscatter signal, and location information of interferers. A soft engine, parallel receiver channels, and predictive models can be employed to adapt smart rock 308. Techniques for adaptive RFID devices are described in U.S. Provisional Patent Application No. 60/729,144 (Attorney Docket No. 03424.P095Z), filed Oct. 10, 2005, entitled “Adaptive RFID Devices,” which is hereby incorporated herein by reference.
Smart rock 308, as illustrated
Smart boulder 310 provides the sensor intelligence of system 300. I other words, sensor network intelligence 712 of smart boulder 310 can process received sensor tag data and act upon it. For example, smart boulder 310 can correlate data from nearby sensor tags to determine if an individual tag is functioning properly. As another example, smart boulder 310 can selectively activate different sensor tags (or sensors) to conserve tag battery power. Besides processing tag sensor data, smart boulder 310 can also generate its own data by providing one or more sensors. As smart boulder 310 is typically much larger than smart rocks 308 or smart pebbles 306, it can accommodate relatively larger sensors, such as video imager 714 and an audio sensor 716 applying independent component analysis (ICA) techniques. ICA is a signal processing technique that utilizes the independence properties of signal sources from multiple generators to separate signals from noise. This technique has been demonstrated to be very successful for audio signal processing. Additional background information relating to ICA is provided by “Independent Component Analysis: Algorithms and Applications” by Aapo Hyvarinen and Erkki Oja of Helsinki University of Technology, which is incorporated by reference herein.
Smart boulder 310 also includes multiple-input multiple-output (MIMO) circuitry 718. MIMO circuitry 718 makes use of multiple transmit and receive antennas, or antenna diversity, to address Rayleigh fading in a multi-path environment. That is to say, fading at each antenna is statistically independent of the other antennas and resulting signals can be combined to produce an output signal. MIMO circuitry 718 has superior a signal-to-noise ratio as each antenna signal is combined in phase, while noise is added incoherently. In alternative embodiments, MIMO circuitry 718 can use antenna selection diversity to select an antenna with highest received signal power, or use switched multi-beam techniques to select the beam with the highest signal-to-noise ratio.
FIGS. 8A-B show deployment patterns for smart pebbles 802 to monitor movement in a remote, inaccessible, or isolated geographical area of interest (such as a national border, battlefield, high security area, or the like). In this example, sensors for smart pebbles 802 are configured to detect, directly or indirectly, the presence of an individual 804. Detection can be based on heat, vibration, vision (image processing), acoustic noise (e.g., speech or movement), changes in RF spectrum, or other detectable characteristics. U.S. patent application Ser. No. 11/136,591, entitled “Interrogator with Human Presence Detector,” to Curtis A. Carrender details certain techniques for detecting the presence of a human being, which is hereby incorporated by reference for all purposes.
In
In the event a rogue reader 1008 is detected by system 1000, readers 1002(a)-(b) can challenge rogue reader 1008 for authentication information. Authentication information can take the form of an identifier, password, encryption key (for use in private and/or public key cryptographic methods), or the like. If rogue reader 1008 is properly authenticated, system 1000 allows the now identified rogue reader 1008 to operate. System 1000 may also log authorization information for rogue reader 1008 in a database for future reference, and thus avoid future challenges.
If rogue reader 1008 fails to be authenticated, a trusted reader can relay information to enterprise information system 1004 or initiate a predetermined alarm procedure. For instance, reader 1002(a) can sound an alarm (audio or visual), send an electronic email alert, interfere with commands or RF transmissions from rogue reader 1008 (e.g., continuous broadcast of SLEEP commands to tags 1006 at maximum power at the same carrier frequency), kill tags within the area, command tags not to respond to rogue reader 1008, or command tags to respond to rogue reader 1008 with incorrect or false information.
In an alternative embodiment, system 1000 can be configured such that each trusted reader periodically transmits a specific or predetermined signal when it attempts to communicate with tags. This specific signal can be obscured from being discovered by an eavesdropping party. As an example, this specific signal could be at a different frequency from the normal tag communication frequency. As another example, this specific signal could be a sequence of standard reader commands, but performed in a particular order, or with certain timing, in order to provide an indication of authorization. The exact details of this special command could be determined by reference to an algorithm dependent on an internal or external clock, so that an eavesdropper could not readily determine the authorization sequence.
Detection of rogue reader 1008 can be particularly useful in a retail environment. Without a system 1000 according to an embodiment of the present invention, a competitor can walk through a store with a rogue reader 1008 and quickly capture the store's complete product selection (e.g., type, quantities available, remaining shelf life of items, and like). In fact, a competitor can deduce sensitive sales information by capturing one's inventory multiple times over a period. Pricing and discount information can also be surreptitiously obtained if stored within item tags or smart shelves.
In one embodiment of the present invention, readers 1002(a)-(b) can additionally determine the relative location of rogue reader 1008 in the area using range and bearing techniques. U.S. patent application Ser. No. 11/080,379, entitled “Distance/ranging determination using Relative Phase Data” to Curtis L. Carrender and John M. Price, describes specific range and bearing techniques and is hereby incorporated by reference for all purposes. Providing location information can be helpful in quickly locating and removing the rogue reader 1008. Determination of rogue reader 1008 location can also be used by system 1000 to determine whether rogue reader 1008 is an intruder. For example, system 1000 can determine if rogue reader is physically disposed inside a predetermined area.
If readers 1002(a)-(b) have known locations, then readers 1002(a)-(b) can translate the relative location of rogue reader 1008 to specific coordinates (e.g., latitude and longitude). Readers 1002(a)-(b) can employ a global positing system (GPS) or a landmark beacon/fiducial tag 1010 to determine its location. Further, the GPS system can be utilized at one or more instances or locations in the network to serve as absolute location anchor points. Range and bearing techniques in combination with a tilt sensor (such as a single-, dual-, or triple-axis microelectromechanical tilt sensor) and/or electronic compass can then be used to determine all node locations relative to an instance. Tilt sensors can be helpful to sense pitch, for example in the event a sensor lands on hilly terrain. Direction can be determined by the electronic compass, particularly if a GPS signal is weak or unavailable.
Additional GPS instances may be added for improved accuracy by comparing absolute location information with relative location information. Implementations may also use of fiducial tags as described in U.S. patent application Ser. No. 11/136,591, entitled “Location Management for Radio Frequency Identification Readers,” which is hereby incorporated herein by reference.
This application claims the benefit of the filing dates of U.S. provisional patent application Nos. 60/729,144, filed Oct. 20, 2005 and 60/736,587, filed Nov. 12, 2005, both of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60729144 | Oct 2005 | US | |
60736587 | Nov 2005 | US |