1. Field of Invention
The invention relates to near field communications (NFC), and more specifically to detecting a presence of a NFC capable device.
2. Related Art
Near field communication (NFC) devices are being integrated into mobile devices, such as smartphones for example, to facilitate the use of these mobile devices in conducting daily transactions. For example, instead of carrying numerous credit cards, the credit information provided by these credit cards can be loaded into a NFC device and stored therein to be used as needed. The NFC device is simply tapped to a credit card terminal to relay the credit information to it to complete a transaction. As another example, a ticket writing system, such as those used in bus and train terminals, may simply write ticket fare information onto the NFC device instead of providing a paper ticket to a passenger. The passenger simply taps the NFC device to a reader to ride the bus or the train without the use of the paper ticket.
Generally, NFC includes a polling mode of operation to establish a communication among NFC devices. A first conventional approach probes a magnetic field of a first conventional NFC device for a second NFC device in accordance with a predefined polling routine. In this first conventional approach, the first conventional NFC device generates the magnetic field without any information for a predetermined duration, typically referred to as a guard time, that is technology dependent. The first conventional NFC device then probes the magnetic field for a second NFC device of a first technology type, such as type A, type B, or type F to provide some examples, using a conventional polling command upon expiration of the guard time. The conventional polling command includes such a conventional request command, type A (REQA), a conventional request command, type B (REQB), or a conventional request command, type F (REQF). The first conventional NFC device then generates the magnetic field without any information for another guard time and probes the magnetic field for a second NFC device of a second technology type using the conventional polling command if no response is received from the second conventional NFC device. The first conventional approach is further described in “NFC Forum: NFC Activity Specification: Technical Specification, NFC Forum™ Activity 1.0 NFCForum-TS-Activity-1.0,” published Nov. 18, 2010, which is incorporated by reference herein in its entirety.
The guard time of the first conventional approach unnecessarily consumes power. Typically, the guard time is approximately 5 ms when probing for type A and type B NFC devices and may reach more than 20 ms when probing for type F NFC devices. Additionally, the first conventional NFC device may have to generate the magnetic field without any information for more than one guard time and probe the magnetic field using more than one polling command for certain technologies. For example, the first conventional approach typically polls for type A devices then for type B devices which is followed by type F devices. In this example, the first conventional NFC device generates the guard time for type A, B, and F devices and provides the REQA, REQB, and REQF commands to establish a communication with a type F NFC device.
A second conventional approach transmit detection pulses having substantially similar magnitudes to detect a presence of NFC devices. A first NFC device continuously provides the detection pulses until a change in the magnitude one of the detection pulses is detected. This change is indicative of a second NFC device being present within a magnetic field of the first NFC device. The second conventional approach is further described in U.S. patent application Ser. No. 12/446,591, filed on Apr. 22, 2009 under 35 U.S.C. §371(c), which is incorporated herein by reference in its entirety.
However, this simple detection of pulse change is susceptible to changes in environment. For example, moving the first NFC device around the environment may cause the magnitudes of the one or more detection pulses to change. As another example, objects within the environment, such as metal objects or other non-NFC capable devices to provide some examples, entering into the magnetic field may cause the magnitudes of the one or more detection pulses to change. These changes may result from changes in the environment alone and, not from the second NFC becoming present within the magnetic field. Consequentially, the first NFC device may improperly determine that the second NFC device is present.
Thus, there is a need to detect a presence of another NFC device within a magnetic field that overcomes the shortcomings described above. Further aspects and advantages of the present invention will become apparent from the detailed description that follows.
Embodiments of the invention are described with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Additionally, the left most digit(s) of a reference number identifies the drawing in which the reference number first appears.
The invention will now be described with reference to the accompanying drawings. In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements. The drawing in which an element first appears is indicated by the leftmost digit(s) in the reference number.
The following Detailed Description refers to accompanying drawings to illustrate exemplary embodiments consistent with the invention. References in the Detailed Description to “one exemplary embodiment,” “an exemplary embodiment,” “an example exemplary embodiment,” etc., indicate that the exemplary embodiment described may include a particular feature, structure, or characteristic, but every exemplary embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same exemplary embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an exemplary embodiment, it is within the knowledge of those skilled in the relevant art(s) to affect such feature, structure, or characteristic in connection with other exemplary embodiments whether or not explicitly described.
The exemplary embodiments described herein are provided for illustrative purposes, and are not limiting. Other exemplary embodiments are possible, and modifications may be made to the exemplary embodiments within the spirit and scope of the invention. Therefore, the Detailed Description is not meant to limit the invention. Rather, the scope of the invention is defined only in accordance with the following claims and their equivalents.
Embodiments of the invention may be implemented in hardware, firmware, software, or any combination thereof. Embodiments of the invention may also be implemented as instructions stored on a machine-readable medium, which may be read and executed by one or more processors. A machine-readable medium may include any mechanism for storing or transmitting information in a form readable by a machine (e.g., a computing device). For example, a machine-readable medium may include read only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; electrical, optical, acoustical or other forms of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.), and others. Further, firmware, software, routines, instructions may be described herein as performing certain actions. However, it should be appreciated that such descriptions are merely for convenience and that such actions in fact result from computing devices, processors, controllers, or other devices executing the firmware, software, routines, instructions, etc.
The following Detailed Description of the exemplary embodiments will so fully reveal the general nature of the invention that others can, by applying knowledge of those skilled in relevant art(s), readily modify and/or adapt for various applications such exemplary embodiments, without undue experimentation, without departing from the spirit and scope of the invention. Therefore, such adaptations and modifications are intended to be within the meaning and plurality of equivalents of the exemplary embodiments based upon the teaching and guidance presented herein. It is to be understood that the phraseology or terminology herein is for the purpose of description and not of limitation, such that the terminology or phraseology of the present specification is to be interpreted by those skilled in relevant art(s) in light of the teachings herein.
Although, the description of the present invention is to be described in terms of NFC, those skilled in the relevant art(s) will recognize that the present invention may be applicable to other communications that use the near field and/or the far field without departing from the spirit and scope of the present invention. For example, although the present invention is to be described using NFC capable communication devices, those skilled in the relevant art(s) will recognize that functions of these NFC capable communication devices may be applicable to other communications devices that use the near field and/or the far field without departing from the spirit and scope of the present invention.
An Exemplary Near Field Communications (NFC) Environment
The first NFC device 102 detects a presence of the second NFC device 104 to enable communication of the information between the first NFC device 102 and the second NFC device 104. Typically, the first NFC device 102 observes its magnetic field for the presence of the second NFC device 104. The first NFC device 102 observes a change to its magnetic field upon entry of the second NFC device 104 into the magnetic field.
Conventional Detection Mode of Operation
Conventionally, a first conventional NFC device operates in a conventional detection mode of operation to detect the presence of a second conventional NFC device. The first conventional NFC enters into a conventional polling mode of operation to establish communication with the second conventional NFC device upon detection of the second conventional NFC device.
As illustrated by a graphical illustration 202, the first conventional NFC device provides one or more conventional detection pulses 206.1 through 206.N, each of the conventional detection pulses 206.1 through 206.N being characterized as having a substantially similar magnitude. For example, a magnitude of the conventional detection pulse 206.1 is substantially similar to a magnitude of the conventional detection pulse 206.2 which is substantially similar to a magnitude of the conventional detection pulse 206.N. As additionally illustrated by the graphical illustration 202, the first conventional NFC device enters into a conventional polling mode of operation 208 following the conventional detection pulse 206.N to establish communication with the second conventional NFC device. One example of the conventional polling mode of operation 208 is described in “NFC Forum: NFC Activity Specification: Technical Specification, NFC Forum™ Activity 1.0 NFCForum-TS-Activity-1.0,” published Nov. 18, 2010, which is incorporated by reference herein in its entirety.
As illustrated by a graphical illustration 204, the first conventional NFC device observes the one or more conventional detection pulses 206.1 through 206.N, referred to as one or more observed detection pulses 210.1 through 210.N. The one or more observed detection pulses 210.1 through 210.(N-1) are characterized as having substantially similar magnitudes. The substantially similar magnitudes of the one or more observed detection pulses 210.1 through 210.(N-1) indicate that the second conventional NFC device is not present within the magnetic field. As additionally illustrated by the graphical illustration 204, a magnitude of the observed detection pulse 210.N is not substantially similar to the magnitude of the observed detection pulse 210.(N-1). This difference in magnitudes indicates that the second conventional NFC device has entered into the magnetic field during the conventional detection pulse 206.N. Accordingly, the first conventional NFC device may enter into the conventional polling mode of operation 208 to establish communication with the second conventional NFC device. The first conventional NFC device continues to observe the conventional polling mode of operation 208, referred to as an observed polling mode of operation 212, to verify that the second conventional NFC device remains present within the magnetic field. The conventional detection mode of operation is further described in U.S. patent application Ser. No. 12/446,591, filed on Apr. 22, 2009 under 35 U.S.C. §371(c), which is incorporated herein by reference in its entirety.
However, this simple detection of changes of the conventional detection mode is susceptible to changes in environment. For example, moving the first conventional NFC device around the environment may cause the magnitudes of the one or more conventional detection pulses 206.1 through 206.N to change. As another example, objects within the environment, such as metal objects or other non-NFC capable devices to provide some examples, entering into the magnetic field may cause the magnitudes of the one or more conventional detection pulses 206.1 through 206.N to change. However, these changes result from changes in the environment, not from the second conventional NFC becoming present within the magnetic field. Consequentially, the first conventional NFC device may improperly determine that the second conventional NFC device is present within the magnetic field and enter into the conventional polling mode of operation 208 when the second conventional NFC device is not present within the magnetic field.
Typically, these changes that result from the environment may be characterized as being linear. Whereas, changes that result from another NFC capable device becoming present within the magnetic field may be characterized as being non-linear. For example, the other NFC capable device begins to derive or harvest power upon entering the magnetic field which causes a non-linear change in the magnetic field. However, the conventional detection mode of operation is unable to distinguish between linear changes and non-linear changes; therefore, the conventional detection mode is susceptible to misinterpreting changes in the environment as an indication of the second conventional NFC is present within the magnetic field.
Exemplary Detection Mode of Operation
However, the present invention is capable of differentiating between linear changes and non-linear changes such that changes in detection pulses of the present invention which are characterized as being linear may be disregarded as being changes in the environment. Those changes in the detection pulses of the present invention which are characterized as being non-linear may be identified as resulting from another NFC capable device becoming present within the magnetic field.
The first NFC capable device provides a detection sequence including one or more detection signals 302.1 through 302.N to detect for the presence of the second NFC capable device within its magnetic field. Typically, the one or more detection signals 302.1 through 302.N are characterized as being substantially similar ramp functions. In an exemplary embodiment, the ramp functions may be approximated using step or staircase functions having ever increasing magnitudes. However, the one or more detection signals 302.1 through 302.N are not limited to ramp functions; those skilled in the relevant art(s) may implement the one or more detection signals 302.1 through 302.N using any other suitable monotonically increasing and/or decreasing function without departing from the spirit and scope of the present invention. The first NFC capable device may modulate the one or more detection signals 302.1 through 302.N onto a carrier wave to provide the detection sequence.
The first NFC capable device observes the detection sequence to recover one or more observed detection signals 304.1 through 304.N to detect a change in the magnetic field. The change in the magnetic field may indicate that the second NFC capable device may be present within the magnetic field. For example, the first NFC capable device may compare one of the observed detection signals 304.1 through 304.N with a previous observed detection signal from among the observed detection signals 304.1 through 304.N to detect the change in the magnetic field. As another example, the first NFC capable device may compare one of the observed detection signals 304.1 through 304.N with a corresponding one of the one or more detection signals 302.1 through 302.N to detect the change in the magnetic field.
Typically, the first NFC capable device may observe no change, a linear change, and/or a non-linear change in its magnetic field. For example, as shown in
Objects within the environment, such as metal objects or other non-NFC capable devices to provide some examples, may enter into the magnetic field of the first NFC capable device. These objects may cause the linear change in the magnetic field of the first NFC capable device. For example, as shown in
Typically, the second NFC capable device derives or harvests power from the one or more detection signals 302.1 through 302.N. The second NFC capable device turns on after sufficient power has been harvested from the one or more detection signals 302.1 through 302.N. The turning on of the second NFC capable device, as well as harvesting of the power, may cause the non-linear change in the magnetic field of the first NFC capable device.
For example, as shown in
It should be noted that the linear change as shown in
Referring again to
NFC capable device 104 within its magnetic field, the first NFC capable device 102 may enter into a polling mode, such as the conventional polling mode of operation 208 or any other suitable polling mode that will be apparent to those skilled in the relevant art(s) without departing from the spirit and scope of the present invention, to establish communication with the second NFC capable device.
The first NFC device 102 modulates its corresponding information onto the first carrier wave and generates the first magnetic field by applying the modulated information communication to the first antenna to provide the first information communication 152. The first NFC device 102 continues to apply the first carrier wave without its corresponding information to continue to provide the first information communication 152 once the information has been transferred to the second NFC device 104. The first NFC device 102 is sufficiently proximate to the second NFC device 104 such that the first information communication 152 is inductively coupled onto a second antenna of the second NFC device 104.
The second NFC device 104 derives or harvests power from the first information communication 152 to recover, to process, and/or to provide a response to the information. The second NFC device 104 demodulates the first information communication 152 to recover and/or to process the information. The second NFC device 104 may respond to the information by applying its corresponding information to the first carrier wave that is inductively coupled onto the second antenna to provide the second modulated information communication 154.
Further operations of the first NFC device 102 and/or the second NFC device 104 may be described in International Standard ISO/IE 18092: 2004(E), “Information Technology-Telecommunications and Information Exchange Between Systems-Near Field Communication-Interface and Protocol (NFCIP-1),” published on Apr. 1, 2004 and International Standard ISO/IE 21481: 2005(E), “Information Technology-Telecommunications and Information Exchange Between Systems-Near Field Communication-Interface and Protocol-2 (NFCIP-2),” published on Jan. 15, 2005, each of which is incorporated by reference herein in its entirety.
Although
Method for Detecting NFC Capable Devices
At step 402, the operational control flow receives a detection signal, such one of the one or more detection signals 302.1 through 302.N to provide an example. The operational control flow provides a detection sequence including the detection signal to its environment. For example, the operational control flow may modulate the detection signal using a carrier wave and generates a magnetic field using the modulated detection signal to provide the detection sequence. The detection signal represents a monotonically increasing and/or decreasing signal, such as a ramp signal to provide an example, that is to be modulated onto a carrier wave.
At step 404, the operational control flow observes the detection sequence from 402 as it is being provided to its environment to provide an observed detection sequence. The operational control demodulates the detection sequence from 402 to recover an observed detection signal, such as one of the one or more observed detection signals 304.1 through 304.N to provide an example.
At step 406, the operational control flow determines a signal metric change between detection signals. For example, the operational control flow may compare one or more signal metrics of the detection signal from step 402 and one or more signal metrics of the observed detection signal from step 404 to provide the signal metric change. As another example, the operational control flow may compare the one or more signal metrics of observed detection signal from step 404 with one or more signal metrics of one or more prior observed detection signals to provide the signal metric change. The operational control flow may revert to step 402 to receive another detection signal when the signal metric change is approximately equal to zero. Alternatively, the operational control flow reverts back to step 402 may revert to step 402 when the signal metric change is less than and/or equal to a threshold. In this alternate, the threshold is used to compensate for signal metric changes that may be attributed other factors, such as generation of the detection sequence from step 406 and/or recovery of the observed detection sequence from step 404 to provide some examples, that are not attributed to NFC devices becoming present in a magnetic field. For example, the threshold may be used to compensate for linear and/or non-linear effects that may be attributed to a modulator for generating the detection sequence from step 406. As another example, the threshold may be used to compensate for linear and/or non-linear effects that may be attributed to a demodulator for recovering the observed detection sequence from step 404. As a further example, the threshold may be used to compensate for linear and/or non-linear effects that may be attributed to a communication channel.
The operational control flow determines that the NFC capable device may be present within the magnetic field from step 402 and proceeds to step 408 when the signal metric change is greater than zero or, alternatively, greater than the threshold.
At step 408, the operational control flow characterizes the signal metric change from step 406 as being non-linear or linear. For example, the operational control flow may differentiate the signal metric change from step 406 to determine whether it is non-linear or linear. Typically, a derivative of a linear function is characterized as being substantially constant. The operational control flow may characterize the signal metric change from step 406 as being linear when its derivative is substantially constant or as being non-linear when its derivative is not substantially constant. Additionally, the operational control flow may use the derivative as an input to a trigger a counting device, such as a binary counter to provide an example. In this alternate, a count of the counting device changes from its present state to another state when the derivative changes. Additionally, in this alternate, the operational control flow may characterize the signal metric change from step 406 as being linear when the count of the counting device is less than or equal to a predetermined value or as being non-linear when the count of the counting device is greater than or equal to the predetermined value.
At step 410, the operational control flow characterizes the signal metric change from step 406 as resulting from changes in the environment. The operational control flow determines that the NFC capable device is not present within the magnetic field from step 402 and reverts to step 402 to provide another detection signal to its environment.
At step 412, the operational control flow characterizes the signal metric change from step 406 as resulting from the NFC capable device being present within the magnetic field from step 402.
A First Exemplary NFC Device
The controller module 502 controls overall operation and/or configuration of the NFC device 500. The controller module 502 generates a detection signal 552, such one of the one or more detection signals 302.1 through 302.N to provide an example, in the detection mode of operation. The detection signal 552 may represent a monotonically increasing and/or decreasing function, such as a ramp function to provide an example, or a step or staircase function to approximate the monotonically increasing and/or decreasing function.
The controller module 502 may generate the detection signal 552 in response to a command. The command may be provided to the controller module 502 from one or more data storage devices such as one or more contactless transponders, one or more contactless tags, one or more contactless smartcards, any other machine-readable mediums that will be apparent to those skilled in the relevant art(s) without departing from the spirit and scope of the invention, or any combination thereof. The other machine-readable medium may include, but is not limited to, read only memory (ROM), random access memory (RAM), magnetic disk storage media, optical storage media, flash memory devices, electrical, optical, acoustical or other forms of propagated signals such as carrier waves, infrared signals, digital signals to provide some examples. The controller module 502 may also receive the command from a user interface such as a touch-screen display, an alphanumeric keypad, a microphone, a mouse, a speaker, any other suitable user interface that will be apparent to those skilled in the relevant art(s) without departing from the spirit and scope of the invention to provide some examples. The controller module 502 may further receive the command from other electrical devices or host devices coupled to the NFC device 500.
The modulator module 504 modulates the detection signal 552 onto a carrier wave, such as a radio frequency carrier wave having a frequency of approximately 13.56 MHz to provide an example, using any suitable analog or digital modulation technique to provide a modulated detection signal 554. The suitable analog or digital modulation technique may include amplitude modulation (AM), frequency modulation (FM), phase modulation (PM), phase shift keying (PSK), frequency shift keying (FSK), amplitude shift keying (ASK), quadrature amplitude modulation (QAM) and/or any other suitable modulation technique that will be apparent to those skilled in the relevant art(s). In an exemplary embodiment, the modulator module 504 may include a direct digital synthesizer (DDS) under control of the controller module 502 to generate the detection signal 552. In this exemplary embodiment, the modulator module 504 further includes an analog to digital converter (ADC) to convert the detection signal 552 from a digital representation to an analog representation in accordance with the carrier wave to provide the modulated detection signal 554.
The antenna module 506 applies the modulated detection signal 554 to an inductive coupling element, such as a resonant tuned circuit to provide an example, to generate a magnetic field to provide a detection sequence 556. The antenna module 506 observes the detection sequence 556 to provide an observed detection sequence 560.
The demodulator module 508 demodulates the observed detection sequence 558 using any suitable analog or digital modulation technique to provide a recovered detection signal 560. The suitable analog or digital modulation technique may include amplitude modulation (AM), frequency modulation (FM), phase modulation (PM), phase shift keying (PSK), frequency shift keying (FSK), amplitude shift keying (ASK), quadrature amplitude modulation (QAM) and/or any other suitable modulation technique that will be apparent to those skilled in the relevant art(s).
The controller module 502 may determine one of more signal metrics of the detection signal 552 and/or the recovered detection signal 560. The one or more signal metrics may include a mean voltage and/or current level, an average voltage and/or current level, an instantaneous voltage and/or current level, a root mean square voltage and/or current level, a mean power, an average power, an instantaneous power, a root mean square power, a signal envelope, and/or any other suitable signal metric of the detection signal 552 and/or the recovered detection signal 560 which will be apparent to those skilled in the relevant art(s) without departing from the spirit and scope of the invention.
The controller module 502 may compare the one of more signal metrics of the recovered detection signal 560 with one or more previous signal metrics of the recovered detection signal 560 to provide a signal metric change. Alternatively, the controller module 502 may compare the one of more signal metrics of the recovered detection signal 560 with the one of more signal metrics of the detection signal 552 to provide the signal metric change.
The controller module 502 may compare the signal metric change with a threshold to determine whether the signal metric change indicates a difference between signal metrics. The threshold is used to compensate for differences between the detection signal 552 and/or the recovered detection signal 560 that may be attributed to imperfections in the NFC device 500, such as imperfections within the modulator module 504, the antenna module 506, or the demodulator module 508 to provide some examples. For example, imperfections within the demodulator module 508 may cause unwanted attenuation of the recovered detection signal 560. This unwanted attenuation of the recovered detection signal 560 is not attributed to another NFC capable device being present within the magnetic field. Therefore, the controller compares the signal metric change with the threshold to substantially reduce the possibility of the controller module interpreting the signal metric change as being caused by another NFC capable device when the signal metric change may be attributed to imperfections within the NFC device 500.
The signal metric change indicates no difference between signal metrics when the signal metric change is less than or equal to the threshold. In this situation, any changes in signal metrics between the one of more signal metrics of the recovered detection signal 560 and the one of more signal metrics of the detection signal 552 and/or the one or more previous signal metrics of the recovered detection signal 560 may be attributed to imperfections within the NFC device 500, not another NFC device becoming present within the magnetic field.
The signal metric change indicates the difference between signal metrics when the signal metric change is greater than the threshold. The controller module 502 analyzes the signal metric change to determine whether another NFC capable device is present within the magnetic field. For example, the controller module 502 may differentiate the signal metric change to determine whether it is non-linear or linear. The controller module 502 may characterize the signal metric change as being linear when its derivative is substantially constant or as being non-linear when its derivative is not substantially constant. Additionally, the controller module 502 may use the derivative as an input to trigger a counting device, such as a binary counter to provide an example. In this alternate, a count of the counting device changes from its present state to another state when the derivative changes. Additionally, in this alternate, the controller module 502 may characterize the difference from step 406 as being linear when the count of the counting device is less than or equal to a predetermined value or as being non-linear when the count of the counting device is greater than or equal to the predetermined value.
Referring again to
As shown in
However, a signal envelope of the observed detection signal 602.N is substantially similar to a signal envelope of the detection signals 302.N indicating that the second NFC capable device no longer derives or harvests power from the detection signal 302.N. Therefore, the second NFC capable device no remains within the magnetic field of the first NFC capable device. Consequently, the first NFC capable device begins to detect for the presence of the second NFC capable device as discussed above.
It is to be appreciated that the Detailed Description section, and not the
Abstract section, is intended to be used to interpret the claims. The Abstract section may set forth one or more, but not all exemplary embodiments, of the invention, and thus, are not intended to limit the invention and the appended claims in any way.
The invention has been described above with the aid of functional building blocks illustrating the implementation of specified functions and relationships thereof The boundaries of these functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternate boundaries may be defined so long as the specified functions and relationships thereof are appropriately performed.
It will be apparent to those skilled in the relevant art(s) that various changes in form and detail can be made therein without departing from the spirit and scope of the invention. Thus the invention should not be limited by any of the above-described exemplary embodiments, but should be defined only in accordance with the following claims and their equivalents.
The present application claims the benefit of U.S. Provisional Patent Appl. No. 61/499,489, filed Jun. 21, 2011, which is incorporated by reference herein in its entirety.
Number | Date | Country | |
---|---|---|---|
61499489 | Jun 2011 | US |