1. Field of the Invention
This disclosure generally relates to automatic data collection (ADC) and more particularly to radio-frequency identification.
2. Description of the Related Art
The ADC field is generally directed to the use of devices and methods for automatically capturing data typically encoded in media such as a machine-readable symbol or tag carried by the item to which the data relates. A variety of ADC devices and ADC media are ubiquitous and well known.
For example, a data carrier may take the form of a radio-frequency identification (RFID) tag, which may take the form of a card. Such tags typically include an RFID substrate carrying a circuitry such as a semiconductor device including memory and one or more conductive traces that form an antenna. Typically, RFID tags act as transponders, providing information stored in the semiconductor device in response to a radio-frequency (RF) signal, commonly referred to as an interrogation signal, received at the antenna from a reader or interrogator. Some RFID tags include security measures, such as passwords and/or encryption. Many RFID tags also permit information to be written or stored in the semiconductor memory via an RF signal. Radio-frequency communications include communications in any frequency band or range suitable for wireless communications, including those commonly referred to as the radio wavelength and the microwave wavelength portions of the electromagnetic spectrum.
RFID tags that include a discrete power source, for example a battery, are commonly referred to as active devices. RFID devices that rely on an RF signal to derive power are commonly referred to as passive devices, which typically employ modulation backscatter techniques. RFID tags may employ both active and passive power sources.
Identification of an RFID device or tag generally depends on RF energy produced by a reader or interrogator arriving at the RFID tag and returning to the interrogator. Multiple protocols exist for use with RFID tags. These protocols may specify, among other things, particular frequency ranges, frequency channels, modulation schemes, security schemes, and data formats.
Other radio-frequency devices, such as, for example, telephone and other communication systems, control systems, and other ADC devices, including additional RFID systems, may share frequency channels within a frequency band. This can lead to interference between devices. For example, performance of an RFID device can be degraded due to interference from another device, or operation of an RFID device may degrade the performance of another device. Conventional systems avoid interference by having a reader listen or check for existing traffic within a frequency channel prior to broadcasting an interrogation signal. If a signal above a threshold energy level is detected in a frequency channel, the reader is configured to not transmit an interrogation signal in that frequency channel. See, e.g., European Telecommunications Standard Institute EN 302208. Devices may also employ other techniques to share communications frequencies, such as switching channels periodically, alone or in combination with listening for other traffic on a frequency channel prior to transmitting an interrogation signal in that frequency channel.
Recent regulatory changes have allowed RFID devices, including RFID tags and readers, to increase the power level of the interrogation and/or response signals. For example, in Europe, RFID devices were previously restricted in one example frequency channel to transmitting a signal with an effective radiated energy level of up to 0.5 watts. Under the new regulations, RFID devices may transmit a signal with an effective radiated energy of up to 2 watts in a similar frequency channel. This increased power, however, increases the risk of interfering with the operation of other nearby radio-frequency devices, including other RFID devices. Conventionally, this is addressed by lowering the threshold energy level in a frequency channel above which an RFID reader will not transmit an interrogation signal in that channel.
In one aspect, a radio-frequency identification system comprises a radio-frequency identification tag and an interrogator. In one embodiment, the interrogator is configured to determine a nature of a received signal in a frequency channel and to selectively enable transmission of an interrogation signal in the frequency channel based on the determined nature of the received signal. In another embodiment, the interrogator is configured to select an interrogation frequency channel based on whether interference is likely to occur due to signals in the selected channel and/or signals in adjacent frequency channels.
In one aspect, a radio-frequency interrogator comprises a transceiver configured to receive and transmit radio-frequency signals, and a control system coupled to the transceiver and configured to determine a nature of a signal present in a frequency channel, and selectively enable transmission of an interrogation signal based at least in part on the determined nature of the signal. In one embodiment, the control system is further configured to determine a power level of the signal and selectively enable transmission of the interrogation signal based at least in part on the determined power level. In one embodiment, the control system is configured to determine the nature of the signal by determining a modulation scheme employed by the signal. In one embodiment, the control system comprises a signal type identifier. In one embodiment, the control system further comprises a power detector. In one embodiment, the control system comprises a signal processor configured to determine the nature of the signal. In one embodiment, the control system is configured to enable transmission of the interrogation signal in a different channel. In one embodiment, the control system is further configured to determine a power level of a signal present in a different frequency channel, and selectively enable transmission of the interrogation signal based at least in part on the determined power level of the signal in the different frequency channel. In one embodiment, the control system is further configured to determine a nature of a signal present in a different frequency channel, and selectively enable transmission of the interrogation signal based at least in part on the determined nature of the signal in the different frequency channel.
In another aspect, a radio-frequency identification system comprises a radio-frequency identification tag, and an interrogator configured to determine whether a signal present in a selected frequency channel exceeds a threshold power level, and when the signal present in the selected frequency channel exceeds the threshold power level, analyze a characteristic of the signal present in the selected frequency channel, and selectively enable transmission of an interrogation signal in the selected frequency channel based at least in part on the analysis of the characteristic. In one embodiment, the interrogator is further configured to compare a power level of a signal present in a different frequency channel to a threshold power level, and selectively enable transmission of the interrogation signal in the selected frequency channel based at least in part on the comparison. In one embodiment, the interrogator is further configured to determine a nature of the signal in the different frequency channel, and selectively enable transmission of the interrogation signal in the selected frequency channel based at least in part on the determined nature of the signal in the different frequency channel.
In another aspect, a radio-frequency interrogator comprises a transceiver configured to transmit and receive signals, and a control system coupled to the transceiver and configured to select an interrogation frequency channel, analyze a signal in a second frequency channel, and selectively enable transmission of an interrogation signal in the interrogation frequency channel based at least in part on the analysis of the signal in the second frequency channel. In one embodiment, the control system is configured to analyze the signal in the second frequency channel by comparing the power level of the signal in the second frequency channel to a threshold power level. In one embodiment, the control system is configured to analyze the signal in the second frequency channel by determining whether the signal in the second frequency channel is an interrogation signal. In one embodiment, the control system is further configured to analyze a signal in the interrogation frequency channel, and selectively enable transmission of the interrogation signal in the interrogation frequency channel based at least in part on the analysis of the signal in the interrogation frequency channel.
In another aspect, a method of determining whether an interrogation channel is available for use by a radio-frequency interrogator comprises selecting an interrogation frequency channel, generating an indication of a nature of a signal received by the interrogator, and selectively enabling transmission of an interrogation signal in the interrogation frequency channel based on the generated indication of the nature of the signal received by the interrogator. In one embodiment, the indication of the nature of the signal comprises an indication of a modulation type of the signal. In one embodiment, generating the indication of the nature of the signal comprises extracting data from the signal. In one embodiment, the method further comprises generating an indication of a power level of the signal, and selectively enabling transmission based on the generated indication of the power level. In one embodiment, the received signal is in the interrogation frequency channel. In one embodiment, the received signal is in a frequency channel adjacent to the interrogation frequency channel.
In another aspect, a computer-readable memory medium stores instructions for causing a control system to control an interrogator by generating control signals causing the interrogator to determine a nature of a signal received by the interrogator, and selectively enable transmission of an interrogation signal based on the determined nature of the signal received by the interrogator.
In another aspect, a radio-frequency interrogator comprises means for receiving and transmitting radio-frequency signals and means for selecting an interrogation channel for use by the means for receiving and transmitting radio-frequency signals comprising means for determining a nature of a received radio-frequency signal coupled to the means for receiving and transmitting radio-frequency signals, and means for selectively enabling transmission of an interrogation signal coupled to the means for determining the nature of a received radio-frequency signal.
In another aspect, a radio-frequency interrogator comprises a transceiver, and a control system coupled to the transceiver and configured to select an interrogation frequency channel, determine a power level of a received signal in the interrogation frequency channel, determine a modulation type of the received signal in the interrogation frequency channel, and selectively enable transmission of an interrogation signal in the interrogation frequency channel based at least in part on the determined power level and modulation type of the received signal in the interrogation frequency channel. In one embodiment, the control system is further configured to analyze a signal in a different frequency channel, and selectively enable transmission of the interrogation signal in the interrogation frequency channel based at least in part on the analysis of the signal in the different frequency channel.
In another aspect, a method of determining whether an interrogation channel is available for use by a radio-frequency interrogator comprises selecting an interrogation frequency channel, analyzing a signal in a second frequency channel, and selectively enabling transmission of an interrogation signal in the interrogation frequency channel based at least in part on the analysis of the signal in the second frequency channel. In one embodiment, analyzing the signal in the second frequency channel comprises comparing the power level of the signal in the second frequency channel to a threshold power level. In one embodiment, analyzing the signal in the second frequency channel comprises determining a nature of the signal in the second frequency channel. In one embodiment, the method further comprises analyzing a signal in the interrogation frequency channel, and selectively enabling transmission of the interrogation signal in the interrogation frequency channel based at least in part on the analysis of the signal in the interrogation frequency channel.
In another aspect, a radio-frequency interrogator comprises means for transmitting and receiving radio-frequency signals, and means for selecting an interrogation channel for use by the means for transmitting and receiving radio-frequency signals, comprising means for analyzing a signal in another frequency channel and means for selectively enabling transmission of an interrogation signal in the interrogation channel coupled to the means for analyzing the signal in another frequency channel. In one embodiment, the means for selecting an interrogation channel further comprises means for analyzing a signal in the interrogation frequency channel coupled to the means for selectively enabling transmission.
In the drawings, identical reference numbers identify similar elements or acts. The sizes and relative positions of elements in the drawings are not necessarily drawn to scale. For example, the shapes of various elements and angles are not drawn to scale, and some of these elements are arbitrarily enlarged and positioned to improve drawing legibility. Further, the particular shapes of the elements as drawn are not necessarily intended to convey any information regarding the actual shape of particular elements, and have been selected solely for ease of recognition in the drawings.
In the following description, certain details are set forth in order to provide a thorough understanding of various embodiments of devices, methods and articles. However, one of skill in the art will understand that other embodiments may be practiced without these details. In other instances, well-known structures and methods associated with RFID tags, RFID readers or interrogators, substrates, semiconductor devices, RF signals, and antennas have not been shown or described in detail to avoid unnecessarily obscuring descriptions of the embodiments.
Unless the context requires otherwise, throughout the specification and claims which follow, the word “comprise” and variations thereof, such as “comprising,” and “comprises,” are to be construed in an open, inclusive sense, that is as “including, but not limited to.”
Reference throughout this specification to “one embodiment,” or “an embodiment” means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, the appearances of the phases “in one embodiment,” or “in an embodiment” in various places throughout this specification are not necessarily referring to the same embodiment, or to all embodiments. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments to obtain further embodiments.
The headings are provided for convenience only, and do not interpret the scope or meaning of this disclosure or the claimed invention.
The RFID devices 108 as illustrated comprise an antenna system 110, which as illustrated comprises an antenna 112, a power system 114, which as illustrated comprises an optional rectifier 116 and an optional battery 118, and a data system 120, which as illustrated comprises a processor 122 and a memory 124. The antenna system 110 sends and receives radio-frequency signals and may comprise multiple antennas, multiple antenna arms, and parasitic elements. The power system 114 provides power to the RFID device 108 and may be configured to provide power in a passive and/or an active manner. The data system 120 is configured to generate output signals in response to signals received from the antenna system 110. In some embodiments, the data system 120 may comprise discrete circuitry in addition to, or instead of, the illustrated processor 122 and/or the memory 124.
The interrogator 104 as illustrated comprises an antenna system 126, which as illustrated comprises an antenna 128, a transceiver 127, a power system 130, and a control system 132, which as illustrated comprises a processor 134, a memory 136, an interference controller 138, a signal analyzer 140, and discrete circuitry 142. The antenna system 126 sends and receives radio-frequency signals and may comprise multiple antennas, multiple antenna arms, and parasitic elements. The transceiver 127 transmits interrogation signals and receives signals, such as signals from the RFID tags 102. The power system 130 provides power to the interrogator 104. The control system 132 controls operation of the interrogator 104 so as to reduce the likelihood that operation of the RFID system 100 will result in interference due to the use of one or more frequency channels by other devices or systems. The interference controller 138 is configured to control operation of the interrogator 104 based at least in part on indications received from the signal analyzer 140, as discussed in more detail below. In some embodiments, the control system 132 may comprise discrete circuitry 142 in addition to, or instead of, the illustrated processor 134, the memory 136, the interference controller 138 and the signal analyzer 140.
In one mode of operation, the RFID interrogator 104 queries (i.e., interrogates) one or more RFID tags 102 with a wireless signal, such as an electromagnetic signal. In the embodiment as illustrated, the RFID interrogator 104 broadcasts an RF interrogation signal 144. The RF interrogation signal 144 may be modulated to carry data, instructions or commands. In response to the interrogation signal 144, one or more of the RFID tags 102 may respond to the interrogation signal 144 with a response signal. As illustrated in
The control system 132 may be implemented in a variety of ways, including as separate subsystems. The control system 132 may be implemented as a microprocessor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), or the like, or as a series of instructions stored in a memory, such as the memory 136 and executed by a controller, such as the processor 134, or various combinations of the above. Thus, software modifications to existing hardware may allow the implementation of the control system 132. Various subsystems, such as the interference controller 138 and the signal analyzer 140, are identified as separate blocks in the functional block diagram of
While the illustrated embodiment denotes a single processor 134, other embodiments may comprise multiple processors. The memory 136 may comprise, for example, registers, read only memory (“ROM”), random access memory (“RAM”), flash memory and/or electronically erasable programmable read only memory (“EEPROM”), and may provide instructions and data for use by the control system 132.
An output 210 of the amplifier 208 is coupled to an input 212 of a power detector 214, which as illustrated comprises a rectifier 216 and an RC circuit 218. The RC circuit 218 comprises a resistor 220 having a resistance R1 and a capacitor 222 having a capacitance C1. An output 224 of the power detector 214 provides an indicator of a strength of a signal.
The output 210 of the amplifier 208 is coupled to an input 226 of a signal type identifier 228, which as illustrated comprises a rectifier 230 and an RC circuit 232. The RC circuit 232 comprises a resistor 234 having a resistance R2 and a capacitor 236 having a capacitance C2. An output 238 of the signal type identifier 228 provides an indicator of a type of a signal. The components of the power detector 214 and the signal type identifier 228 may be selected to produce the desired output signal. For example, the time constants of the respective RC circuits 218, 232 may be different. For example, the product C1*R1 may be much greater than the product C2*R2.
At 504, the system 100 measures an indication of signal power. This may be done, for example, by using a power detector as illustrated in
When it is determined at 506 that the power level in the signal is below a threshold power level, the method 500 proceeds from 506 to 508. At 508, the system 100 enables transmission of an interrogation signal in the frequency channel, and the method 500 terminates. When it is determined at 506 that the power level in the signal is not below a threshold, the method 500 proceeds from 506 to 510.
At 510, the system 100 determines the nature of the signal. This may be done, for example, by determining whether the signal employs amplitude modulation, which may be done, for example, by using the signal type identifier 228 illustrated in
At 512, the system 100 determines whether to enable transmission in the selected frequency channel based on the nature of the signal and the power of the signal. For example, the system 100 may be configured to enable transmission if the detected signal employs amplitude modulation. In another example, the system 100 may be configured to enable transmission if the detect signal employs amplitude modulation and the power level is below a second, higher, threshold level.
When the system 100 determines at 512 to enable transmission in the selected frequency channel, the method 500 proceeds from 512 to 514. At 514, the system 100 enables transmission of an interrogation signal in the frequency channel, and the method 500 terminates. When the system determines at 512 not to enable transmission of an interrogation signal in the frequency channel, the method proceeds from 512 to 516. At 516, the method 500 terminates.
At 604, the system 100 determines whether there is a signal in the selected frequency channel with a power level that exceeds a threshold power level. This may be done, for example, by using a power detector as illustrated in
At 606, the system 100 determines whether interference with the signal in the selected frequency channel is likely. This may be done, for example, by determining whether the signal is from another RFID system, and, if so, whether the power level exceeds a second, higher, threshold level. A look-up table may be employed to determine whether interference is likely. When it is determined at 606 that interference with the signal in the selected channel is not likely, the method 600 proceeds from 606 to 608. When it is determined at 606 that interference is likely, the method 600 proceeds from 606 to 610.
At 608, the system 100 determines whether interference with signals in one or more other frequency channels is likely. This may be done, for example, by determining whether the power levels of signals in other frequency channels exceed a threshold level for such signals. In another example, the methods illustrated in
When it is determined at 608 that interference with signals in other frequency channels is likely, the method 600 proceeds from 608 to 610. When it is determined at 608 that interference with signals in other frequency channels is not likely, the method 600 proceeds from 608 to 612. At 610, the system 100 returns an indication that the selected channel is not available and the method 600 terminates. At 612, the system 100 enables transmission in the selected channel and the method 600 terminates.
At 704, the system 100 selects a potential frequency channel on which to transmit an interrogation signal, such as the interrogation signal 144 illustrated in
At 706, the system 100 determines whether a radio-frequency signal is present in the selected frequency channel. This may be done, for example, by determining whether detectable power in the selected radio-frequency channel exceeds a first threshold power level. This first threshold power level may be selected, for example, in accordance with design requirements, regulatory requirements, experience, and/or various combinations of the above. The first threshold power level may be different for different frequency channels and/or operational conditions.
If the system 100 determines at 706 that no radio-frequency signal is present in the selected frequency channel, the method 700 proceeds from 706 to 708. At 708, the system 100 sets an indication that the interrogator 104 may use the selected frequency channel to transmit an interrogation signal. The method 700 proceeds from 708 to 710, where the method terminates.
If the system 100 determines at 706 that a radio-frequency signal is present in the selected frequency channel, the method proceeds from 706 to 712. At 712, the system 100 determines whether a power level of the radio-frequency signal present in the selected frequency channel exceeds a second threshold power level. This second threshold power level may be selected, for example, in accordance with design requirements, regulatory requirements, experience, and/or various combinations of the above, and may be different for different frequency channels and/or operational conditions.
If the system 100 determines at 712 that the power level of the radio-frequency signal present in the selected frequency channel does not exceed the second threshold power level, the method 700 proceeds from 712 to 708. At 708, the system 100 sets an indication that the interrogator 104 may use the selected frequency channel to transmit an interrogation signal. The method 700 proceeds from 708 to 710, where the method 700 terminates.
If the system 100 determines at 712 that the power level of the radio-frequency signal present in the selected frequency channel exceeds the second threshold power level, the method 700 proceeds from 712 to 714.
At 714, the system 100 determines the nature of the signal present in the selected frequency channel. For example, the system 100 may determine the type or source of the signal present in the selected frequency channel. This may be done, for example, by determining whether certain features are present in the signal and/or by measuring features of the signal present in the selected frequency channel. For example, the system may look for a feature that is present in signals of a particular type, such as a code transmitted by an RFID interrogator. In another example, the system 100 may determine whether the signal employs amplitude and/or angular modulation. A look-up table stored in a memory, such as the memory 136, may be employed to determine the nature of the signal present in the selected frequency channel. The system 100 may be configured to make a binary determination of whether a characteristic is present in the signal. For example, the system 100 may be configured to determine whether or not the signal present in the selected frequency channel is from another RFID interrogator. In an alternative example, the system 100 may be configured to determine whether the signal is one of a plurality of types of signals. The method 700 proceeds from 714 to 716.
At 716, the system 100 determines, based at least in part on the nature of the signal present in the selected frequency channel, whether to enable transmission of an interrogation signal by the interrogator 104. This may be done, for example, by determining whether the power level of the signal present in the selected frequency channel exceeds a third threshold power level. This third threshold power level may be selected, for example, in accordance with design requirements, regulatory requirements, experience, and/or various combinations of the above, and may be different for different frequency channels, types of signals and/or operational conditions. For example, if the signal present in the selected frequency channel is from another interrogator, the system 100 may determine whether the power level exceeds a defined interrogator on interrogator interference limit, which may be higher than the second threshold power level. In another example, the system 100 may be configured to enable transmission when it is determined that the signal is of a particular nature. For example, if the signal is determined to be from another interrogator, or from another interrogator of a particular type, the system 100 may be configured to always enable transmission.
If the system determines at 716 to enable transmission, the method proceeds from 716 to 708. At 708, the system 100 sets an indication that the interrogator 104 may use the selected frequency channel to transmit an interrogation signal. The method 700 proceeds from 708 to 710, where the method 700 terminates.
If the system determines at 716 not to enable transmission, the method 700 proceeds from 716 to 718. At 718, the system 100 sets an indication that the selected frequency channel may not currently be used to transmit an interrogation signal. The method 700 proceeds from 718 to 720, where the method 700 terminates.
At 804, the system 100 selects a potential frequency channel on which to transmit an interrogation signal, such as the interrogation signal 144 illustrated in
At 806, the system 100 determines whether a radio-frequency signal is present in the selected frequency channel. This may be done, for example, by determining whether detectable power in the selected radio-frequency channel exceeds a first threshold power level. This first threshold power level may be selected, for example, in accordance with design requirements, regulatory requirements, experience, and/or various combinations of the above. The first threshold power level may be different for different frequency channels and/or operational conditions.
When the system 100 determines at 806 that a radio-frequency signal is present in the selected frequency channel, the method 800 proceeds from 806 to 808. When the system 100 determines at 806 that a radio-frequency signal is not present in the selected frequency channel, the method 800 proceeds from 806 to 816.
At 808, the system 100 determines whether the signal in the selected frequency channel is an RFID signal; for example, whether the signal is from an interrogator or an RFID tag. The system 100 may employ, for example, the method illustrated in
At 810, the system 100 determines whether interference is likely to occur between the RFID signal present in the selected frequency channel and an RFID signal transmitted by the system 100. When it is determined at 810 that interference is likely to occur, the method 800 proceeds from 810 to 812, and returns to 804, where another potential frequency channel is selected. When it is determined at 810 that interference is not likely to occur, the method 800 proceeds from 810 to 816.
At 814, the system 100 determines whether regulatory requirements for transmitting RFID signal in a channel with a non-RFID signal present are satisfied. For example, the system 100 may determine whether the power level of the non-RFID signal is below a threshold level, such as −96 dBm. When it is determined at 814 that the regulatory requirements are satisfied, the method 800 proceeds to 816. When it is determined at 814 that the regulatory requirements are not satisfied, the method 800 returns to 804, where another potential frequency channel is selected.
At 816, the system 100 determines whether interference from signals in one or more other channels is likely. This may be done, for example, by determining whether the power levels of signals in other frequency channels exceed a threshold level for such signals. In another example, the methods illustrated in
When the system 100 determines at 816 that interference with a signal in another frequency channel is likely to occur if transmission in the selected frequency channel is enable, the method 800 proceeds from 816 to 804, where another potential frequency channel is selected. When it is determined at 816 that interference with a signal in another frequency channel is not likely to occur, the method 800 proceeds from 816 to 818. At 818, the system returns an indication that the selected frequency channel is available for use by the RFID system 100.
At 904, the system 100 determines whether the power level of the signal is above a threshold energy level. For example, it may be difficult to determine whether a signal is an RFID signal if the power level of the signal is below the threshold. The particular threshold selected may depend, for example, on the type of RFID signal that is of concern, such as a signal from another interrogator, or an interrogator of a particular type, or the operating conditions for the RFID system 100. For example, some interrogator signals are difficult to detect when the power level is below −94 dBm, and easy to detect when the power level is above −92 dBm. When it is determined at 904 that the power level of the signal is above the threshold energy level, the method 900 proceeds from 904 to 906. When it is determined at 904 that the power level of the signal is not above the threshold energy level, the method 900 proceeds from 904 to 918.
At 906, the system 100 transforms the signal from the time domain to the frequency domain. The method 900 proceeds from 906 to 908. At 908, the system 100 calculates the power spectral density of the modulated sidebands of the signal in the frequency domain. This may be done, for example, by averaging the power over a selected range of frequencies. The method 900 proceeds from 908 to 910.
At 910, the system 100 estimates the power spectral density of the noise of the interrogator. This may be done, for example, by using a look-up table. The values stored in the look-up table may be determined by measuring the power spectral density without any signal present. In another example, this may be done by averaging the power over a selected range of frequencies where no signal is present. The method proceeds from 910 to 912. At 912, the system 100 calculates the ratio of the power spectral density of the signal to the estimated power spectral density of the noise of the signal. The method 900 proceeds from 912 to 914.
At 914, the system 100 determines whether the ratio of the power spectral density of the signal to the estimated power spectral density of the noise is consistent with a RFID signal. This may be done, for example, by using a look-up table. When it is determined at 914 that the ratio of the power spectral density of the signal to the estimated power spectral density of the noise is consistent with a RFID signal, the method proceeds from 914 to 916, where the system 100 returns an indication that the signal is an RFID signal and the method 900 terminates. When it is determined at 914 that the ratio of the power spectral density of the signal to the estimated power spectral density of the noise is not consistent with an RFID signal, the method 900 proceeds from 914 to 918, where the system 100 returns an indication that the signal is not an RFID signal or is indeterminate and the method 900 terminates.
Embodiments of the methods illustrated in
Embodiments of the methods illustrated in
Embodiments of the method discussed in
The term “computer-readable medium” as used herein refers to any medium that participates in providing instructions to a system or a processor for execution. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, hard, optical or magnetic disks. Volatile media includes dynamic memory. Transmission media includes coaxial cables, copper wire and fiber optics. Transmission media can also take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications.
Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, EPROM and an EEPROM, a FLASH-EEPROM, any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read.
Various forms of computer readable media may be involved in carrying one or more sequences of one or more instructions to a processor for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system can receive the data on the telephone line and use an infrared transmitter to convert the data to an infrared signal. An infrared detector coupled to a system bus can receive the data carried in the infrared signal and place the data on system bus. The system bus carries the data to system memory, from which a processor retrieves and executes the instructions. The instructions received by system memory may optionally be stored on storage device either before or after execution by the processor.
Although specific embodiments of and examples for the RFID tags, interrogators, devices, methods, and articles are described herein for illustrative purposes, various equivalent modifications can be made without departing from the spirit and scope of this disclosure, as will be recognized by those skilled in the relevant art. The various embodiments described above can be combined to provide further embodiments.
These and other changes can be made to the invention in light of the above-detailed description. In general, in the following claims, the terms used should not be construed to limit the invention to the specific embodiments disclosed in the specification and the claims. Accordingly, the invention is not limited by the disclosure, but instead its scope is to be determined entirely by the following claims.
This application claims the benefit under 35 U.S.C. § 119(e) of U.S. Provisional Patent Application No. 60/719,344 filed Sep. 22, 2005.
Number | Date | Country | |
---|---|---|---|
60719344 | Sep 2005 | US |