Detecting tampered with radio frequency identification tags

Information

  • Patent Grant
  • 8427316
  • Patent Number
    8,427,316
  • Date Filed
    Thursday, March 20, 2008
    16 years ago
  • Date Issued
    Tuesday, April 23, 2013
    11 years ago
Abstract
The present disclosure is directed to a system and method for tracking tampered with RFID tags. In some implementations, an RFID tag includes a tearable substrate including at least a portion of an RFID circuit. The portion of the RFID circuit is substantially destroyable in response to at least an attempt to remove the tag from a surface. In addition, the RFID includes an adhesive layer adjacent at least a portion of the tearable substrate and configured to affix the tag to the surface.
Description
TECHNICAL FIELD

This invention relates to radio frequency identification (RFID) systems and, more particularly, to detecting tampered with RFID tags.


BACKGROUND

Radio Frequency Identification (RFID) is being used increasingly as a means to identify goods at a distance, without requiring physical contact or even line of sight access to the goods. RFID enables information about an item to be stored on an item, and in some implementations also allows this stored information to be modified at a distance. The most compact and cost effective means to provide this RFID capability is by means of a pressure sensitive (i.e. self adhesive) label incorporating an RFID capability.


The ability to detect remotely whether a pressure sensitive label or seal applied to an item has been tampered with or removed is becoming increasingly important in order to detect theft, product substitution, tampering, warranty violation and other problems.


SUMMARY

The present disclosure is directed to a system and method for tracking tampered with RFID tags. In some implementations, an RFID tag includes a tearable substrate including at least a portion of an RFID circuit. The portion of the RFID circuit is substantially destroyable in response to at least an attempt to remove the tag from a surface. In addition, the RFID includes an adhesive layer adjacent at least a portion of the tearable substrate and configured to affix the tag to the surface.


The details of one or more embodiments of the invention are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from the claims.





DESCRIPTION OF DRAWINGS


FIG. 1 is a tracking system in accordance with some implementations of the present disclosure;



FIGS. 2A and 2B illustrate a cross-sectional view of an example tag of FIG. 1 in accordance with some implementations of the present disclosure;



FIG. 3 is a flow chart illustrating an example method of manufacturing break on removal (BOR) tags; and



FIG. 4 is a flow chart illustrating an example method of monitoring BOR tags.





Like reference symbols in the various drawings indicate like elements.


DETAILED DESCRIPTION


FIG. 1 is a block diagram illustrating an example system 100 for tracking alternations to Radio Frequency IDentification (RFID) tags in accordance with some implementations of the present disclosure. For example, one or more RFID tags may include RFID circuits on tearable substrates such that at least partial removal destroys one or more RFID components resulting in the tag being at least substantially inoperable. Tearable materials may include fiber material (e.g., paper), certain fabrics, certain plastics, and/or other material that tear or otherwise break in response to a force such as shearing. In some implementations of tracking alterations, the system 100 may initially identify a plurality of RFID tags affixed or otherwise coupled to assets, periodically poll the RFID tags to determine an associated status (e.g., location), and determine that one or more RFID tags are tampered with, altered or otherwise not operating within specifications (e.g., inoperable). In general, the system 100 may include RFID tags such that attempts to remove or otherwise modify the tags result in at least modifying the operation of the RFID tags. For example, an RFID tag may be destroyed in an attempt to remove the RFID tag and, as a result, may not transmit information detectable by an RFID reader. In some implementations, the system 100 can include RFID tags embedded or otherwise incorporate in a tearable material (e.g., paper) such that attempts to remove, relocate, or otherwise modify a tag affixed to a surface can result in the material tearing and destroying a portion of the RFID tag.


At a high level, the system 100 includes RFID tags 102a-c communicably coupled with an RFID reader 104. The RF reader 104 transmits requests for information to the tags 102 through one or more antennas 106. In response to at least the request, the tags 102 transmits a response that may include information identifying a specific tag and/or associated asset 108. The tags 102 may be affixed or otherwise coupled to assets 108 such that an attempt to remove or otherwise modify the tags 102 may destroy at least a portion of the RF circuit, as illustrated by the tag 102b. In the illustrated implementation, the tags 102 include substrates 110. The substrates 110 include at least a portion of the RF electric circuit for communicating with the reader 104. In the event that a tag 102 is removed, relocated or otherwise modified at least a portion of the substrate 110 may be destroyed making the tag 102 at least partially inoperable. In this case, the reader 104 may detect RFID tags 102 that have been removed or otherwise modified.


Turning to a more detailed description, the RFID tags 102 can include any software, hardware, and/or firmware configured to wirelessly communicate RF signals with the reader 104. In some implementations, the tags 102 may operate without the use of an internal power supply. Rather, the tags 102 may transmit a reply to a received signal using power from received RF signals independent of an internal power source. This mode of operation is typically referred to as backscattering. The tags 102 can, in some implementations, receive signals from or transmit signals to the RFID antennas 106. In some implementations, the tags 102 can alternate between absorbing power from signals transmitted by the reader 104 and transmitting responses to the signals using at least a portion of the absorbed power. In passive tag operation, the tags 102 typically have a maximum allowable time to maintain at least a minimum DC voltage level. In some implementations, this time duration is determined by the amount of power available from an antenna of a tag 102 minus the power consumed by the tag 102 to charge the on-chip capacitance. The effective capacitance can, in some implementations, be configured to store sufficient power to support the internal DC voltage when the antenna power is disabled. The tag 102 may consume the stored power when information is either transmitted to the tag 102 or the tag 102 responds to the reader 104 (e.g., modulated signal on the antenna input). In transmitting responses, the tags 102 may include one or more of the following: an identification string, locally stored data, tag status, internal temperature, and/or other parameters. In the illustrated implementation, the tags 102 include substrates 110 for processing RF signals.


The substrate 110 can include any software, hardware, and/or firmware for processing RF signals. For example, the substrate 110 may include a fibrous material (e.g., paper) with an embedded RFID circuit. In some implementations, the substrate 110 can tear in response to an applied force such that at least a portion of the RFID circuit (e.g., tuning loop) is destroyed or otherwise rendered inoperable. For example, the substrate 110 may break one or more electrical connections in the RFID circuit such that the tag 102 fails. In some implementations, the substrate 110 includes an RFID circuit that is printed on a material using, for example, a carbon/graphite based conductive ink, metal ink (e.g., silver), and/or other ink. In connection with printing a circuit, the substrate 110 may be heated for a period of time to at least partially diffuse the circuit into the material. For example, the substrate 110 may be heated at 100° C. or greater for a period of a minute or longer. In some implementations, the substrate 110 includes an RFID circuit at least partially formed using one or more electrically conductive adhesives. Components of the RFID circuit may include one or more of the following metals: silver, aluminum, copper, and/or others. In general, the substrate 110, including the RFID circuit, may not have a high intrinsic physical strength such that operation of the RFID circuit is at least disrupted in the event that the tag 102 is removed or at least modified. In some implementations, an adhesive (not illustrated) is applied to the substrate 110 such that the substrate is affixed to a surface of a container 108. The substrate 110 may be directly affixed to a surface of an asset (not illustrated) without departing from the scope of this disclosure.


The containers 108 may be any article capable of holding, storing or otherwise at least partially enclosing one or more assets (e.g., produce, goods). For example, the containers 108 may be RPCs including produce immersed in water. In some implementations, each container 108 may include one or more tags 102. In some examples, the tag 102 may be affixed to a surface of the container 108. In some implementations, the containers 108 may be of any shape or geometry that, in at least one spatial arrangement and/or orientation of the containers 108, facilitates communication between the tags 102 and the reader 104. For example, the geometry of the containers 108 may include right angles (as illustrated), obtuse and/or angles, rounded corners and/or rounded sides, and a variety of other features. In some implementations, the containers 108 may be formed from or otherwise include one or more of the following: cardboard, paper, plastic, fibers, wood, and/or other materials.


The RFID reader 104 can include any software, hardware, and/or firmware configured to transmit and receive RF signals. The RFID reader 104 may transmit requests for information within an interrogation zone 112 associated with the reader 104. The reader 104 may transmit the query in response to a request, automatically, in response to a threshold being satisfied (e.g., expiration of time), as well as others events. The interrogation zone 112 may be based on one or more parameters such as transmission power, associated protocol, nearby impediments (e.g., objects, walls, buildings), as well as others. The RFID reader 104 may include a controller, a transceiver coupled to the controller, and one or more RF antennas 106 coupled to the transceiver. In the illustrated example, the RF antenna 106 transmits commands generated by the controller and receive responses from RFID tags 102. In certain cases such as tag-talks-first (TTF) systems, the reader 104 may not transmit commands but only RF energy. In some implementations, the controller can determine statistical data and/or position data based, at least in part, on tag responses. The reader 104 often includes a power supply or may obtain power from a coupled source for powering included elements and transmitting signals. In some implementations, the reader 104 operates in one or more of frequency bands allotted for RF communication. For example, the Federal Communication Commission (FCC) have assigned 902-928 MHz and 2400-2483.5 MHz as frequency bands for certain RFID applications. In some implementations, the reader 104 may dynamically switch between different frequency bands. The reader 104 can, in some implementations, include three or more antennas 106 in any geometric configuration that allows triangulation based, at least in part, on TDOA. In some implementations, the antennas 106 may be selectively positioned to optimize, enhance, or otherwise increase precision and/or accuracy of position tracking.


In one aspect of operation, the reader 104 periodically transmits signals in the interrogation zone 112. In the event that the transmitted signal reaches the tags 102, the tags 102 processes the signals. In response to at least receiving the signal, the tags 102 transmit a response including, for example, information identifying the tag 102. The reader 104 may identify an initial group of tags 102 for tracking tampered with tags 102. In subsequent polling, the reader 104 may compare identified tags 102 to previously identified tags 102. In the event that the tag 102b was tampered with, the reader 104 may identify the tag 102b as not operating within specifications. In some implementations, the reader 104 may generate a notification identifying the tag 102b and/or associated container 108b.



FIGS. 2A and 2B illustrate an example tag 102 of FIG. 1 in accordance with some implementations of the present disclosure. In the illustrated implementation, the tag 102 is a tamper-proof or Break On Removal (BOR) tag. In this case, the tag 102 may be destroyed in the event of removal, partial removal, and/or an attempt of removal. In other words, the electronic circuit of the tag 102 may be destroyed upon removal or relocation from its original placement. For example, a tuning loop of the tag 102 may be inlayed on a fiber material such that at least partial removal of the fiber material damages the tuning loop resulting in the tag 102 being inoperable.


In the illustrated implementation, the tag 102 includes a facing material 202, a first adhesive 204, a substrate 110, a second adhesive 206, and a release liner 208. The illustrated layers are for example purposes only, and the tag 102 may include some, all or different layers without departing from the scope of this disclosure. For example, the tag 102 may not include the facing material 202 and the first adhesive 204. In the example tag 102, the substrate 110 includes an RFID circuit 210 in a fiber material and a chip 212 (e.g., memory chip). The RFID circuit 210 includes RFID components for transmitting and receiving RF signals from the reader 104. In some implementations, the RFID circuit 210 may be active such that the substrate 110 includes battery power and/or other internal power supply. The RFID circuit 210 may include electrical connections between the different components (e.g., tuning loop) as well as one or more antennas for receiving and transmitting wireless signals. The facing material 202 may be affixed to the substrate 110 using the adhesive layer 204. In some implementations, the facing material 202 provides a top surface for the tag 102 protecting the RFID circuit 210. At least a portion of the facing material 202 may be substantially transparent such that damage to the RFID circuit 210 may be visible. In some implementations, the facing material 202 may be configured to receive print, symbols, and/or other information (e.g., bar code, serial number). The facing material 202 may include one or more of the following: polyester, polypropylene, plastic, and/or other material. In some implementations, the facing material 202 is substantially untearable relative to the substrate 110. The release liner 208 may be affixed to the substrate 110 using the adhesive 206 and may be used to attach the tag 102 to a surface such as the surface of the container 108. In some implementations, the adhesive 204 and/or 206 can be transfer adhesives previously applied to the facing material 202 and/or the release liner 208. In this case, the substrate 110 may be affixed to the facing material 202 and/or the release liner 208 by aligning the substrate with the previously applied adhesives 204 and/or 206. FIG. 2B illustrates the tag 102 without the release liner 208. In this case, the tag 102 may be affixed to a surface 214 using the adhesive 206.



FIG. 3 is a flowchart illustrating an example method 300 for manufacturing BOR tags in accordance with some implementations of the present disclosure. Generally, the method 300 describes an example process for printing at least a portion of an RFID circuit on a tearable material. The method 300 may use any appropriate combination and arrangement of logical elements implementing some or all of the described functionality.


The method 300 begins at step 302 where at least a portion of an RFID circuit is printed on tearable material. For example, the RFID circuit may be printed on paper using silver-based ink. In some implementations, the RFID circuit is printed using a flexography screen, offset printing, and/or other processes. At step 304, the substrate including the printed circuit is heated to a certain temperature for a period of time. For example, the substrate may be heated at 100° C. or greater for a minute or longer. In some implementations, the RFID circuit diffused into the material as a result of the heating processes. Next, at step 306, a memory chip is affixed to the RFID circuit using, for example, a conductive adhesive. In some implementations, the adhesive may be curred using thermal compression. A release liner is affixed to the substrate using an adhesive at step 308. At step 310, a facing material is affixed to the substrate using an adhesive.



FIG. 4 is a flowchart illustrating an example method 400 for tracking tampered with RFID tags in accordance with some implementations of the present disclosure. Generally, the method 400 determines whether a tag has stopped transmitting detectable signals to an RFID reader. The method 400 may use any appropriate combination and arrangement of logical elements implementing some or all of the described functionality.


Method 400 begins at step 402 where an RFID transmits a request for information within an interrogation zone. For example, the RFID reader 104 may transmit a request for information with the interrogation zone 112. At step 404, the RFID reader receives a plurality of responses from tags within the interrogation zone. In the example, the tags 102a-c may initially transmit response to the RFID reader 104. Next, at step 406, the RFID reader identifies an initial group of tags based, at least in part, on the plurality of responses. Again in the example, the RFID reader 104 may identify the tags 102a-c using information included in the responses. A subsequent request for information is transmitted at step 408 and, at step 410, subsequent responses from the tags are received. At step 412, the tags transmitting the subsequent responses are identified. Turning to the example, the reader 104 may determine that only tags 102a and 102c transmitted responses to the subsequent request. If the subsequent group of tags is the same as the initial group of tags at decisional step 414, then execution returns to step 408. If the subsequent group of tags is not the same as the initial group of tags at decisional step 414, then a notification identifying a tag that has been tampered with is generated at step 416.


A number of embodiments of the invention have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the invention.

Claims
  • 1. A Radio Frequency IDentification (RFID) tag, comprising: a plastic substrate having a bottom surface;a fibrous substrate having a top surface and a bottom surface and including at least a portion of an RFID circuit on the bottom surface, wherein the RFID circuit is diffused into the fibrous substrate;a chip directly connected to the portion of the RFID circuit on the bottom surface of the fibrous substrate and affixed to the bottom surface of the fibrous substrate;a first adhesive layer adjacent the bottom surface of the plastic substrate and the top layer of the fibrous substrate and configured to affix the plastic substrate to the fibrous layer; anda second adhesive layer adjacent the portion of the RFID circuit and the chip and configured to affix the portion of the RFID circuit and the chip to an object surface, wherein the RFID circuit is substantially destroyed in response to at least an attempt to remove the fibrous substrate from the object surface.
  • 2. The RFID tag of claim 1, wherein the RFID circuit includes a metallic ink.
  • 3. The RFID tag of claim 1, wherein the RFID circuit includes a tuning loop such that the tuning loop is substantially destroyed in response to at least an attempt to remove the tag.
  • 4. The RFID tag of claim 1, wherein the RFID circuit is destroyed in response to at least shearing substantially parallel to a plane of the fibrous substrate.
  • 5. The RFID tag of claim 1, wherein the RFID circuit is destroyed in response to at least shearing substantially perpendicular to a plane of the fibrous substrate.
  • 6. The RFID tag of claim 1, further comprising a release liner affixed to at least a portion of a surface of the fibrous substrate using the second adhesive layer.
  • 7. The RFID tag of claim 1, wherein the RFID circuit is at least partially diffused into the fibrous substrate using one or more thermal processes.
  • 8. The RFID tag of claim 1, wherein the chip comprises a memory connected to the RFID circuit using thermal compression.
  • 9. The RFID tag of claim 1, wherein the RFID circuit is passive.
  • 10. The RFID tag of claim 1, wherein the tag is inoperable when the portion of the RFID circuit is destroyed.
  • 11. The RFID tag of claim 1, wherein the portion of the RFID circuit is destroyed when the substrate is torn during an attempt to remove the tag.
  • 12. A method of manufacturing a Break On Removal (BOR) tag, comprising: printing a least a portion of an RFID circuit on a bottom surface of a fiber material;heating the fiber material for a period of time to diffuse at least a portion of the RFID circuit into the bottom surface of the fiber material;affixing a top surface of the fiber material to a bottom surface of a plastic substrate using a first adhesive layer;affixing a memory chip the bottom surface of the fiber material;directly connecting the memory chip to the at least portion of RFID circuit diffused into the bottom surface of the fiber material; andaffixing a release liner to the RFID circuit and the chip on the fiber material using a second adhesive layer.
  • 13. The method of claim 12, wherein the portion of the RFID circuit is printed using flexography.
  • 14. The method of claim 12, wherein the RFID circuit is printed using conductive ink.
  • 15. The method of claim 12, wherein the fiber material is paper.
  • 16. The method of claim 12, wherein the fiber material is heated to 100° C. or greater.
  • 17. The method of claim 12, further comprising affixing a facing material adjacent the RFID circuit using an adhesive.
US Referenced Citations (236)
Number Name Date Kind
3568197 Cubley Mar 1971 A
3663932 Mount et al. May 1972 A
3688250 Howlett Aug 1972 A
3696429 Tressa Oct 1972 A
3876946 La Clair et al. Apr 1975 A
3984835 Kaplan et al. Oct 1976 A
4243955 Daniel et al. Jan 1981 A
4297672 Fruchey et al. Oct 1981 A
4325057 Bishop Apr 1982 A
4509123 Vereen Apr 1985 A
4595915 Close Jun 1986 A
4849706 Davis et al. Jul 1989 A
4857925 Brubaker Aug 1989 A
4870391 Cooper Sep 1989 A
4873529 Gibson Oct 1989 A
4903033 Tsao et al. Feb 1990 A
4968967 Stove Nov 1990 A
5012225 Gill Apr 1991 A
5021780 Fabiano et al. Jun 1991 A
5038283 Caveney Aug 1991 A
5095536 Loper Mar 1992 A
5165109 Han et al. Nov 1992 A
5278563 Spiess Jan 1994 A
5278569 Ohta et al. Jan 1994 A
5293408 Takahashi et al. Mar 1994 A
5334822 Sanford Aug 1994 A
5381157 Shiga Jan 1995 A
5396489 Harrison Mar 1995 A
5430441 Bickley et al. Jul 1995 A
5444864 Smith Aug 1995 A
5461374 Lewiner et al. Oct 1995 A
5477215 Mandelbaum Dec 1995 A
5495500 Jovanovich et al. Feb 1996 A
5506584 Boles Apr 1996 A
5519729 Jurisch et al. May 1996 A
5539394 Cato et al. Jul 1996 A
5608379 Narlow et al. Mar 1997 A
5613216 Galler Mar 1997 A
5630072 Dobbins May 1997 A
5648767 O'Connor et al. Jul 1997 A
5649295 Shober et al. Jul 1997 A
5661485 Manuel Aug 1997 A
5661494 Bondyopadhyay Aug 1997 A
5668558 Hong Sep 1997 A
5708423 Ghaffari et al. Jan 1998 A
5729576 Stone et al. Mar 1998 A
5745037 Guthrie et al. Apr 1998 A
5777561 Chieu et al. Jul 1998 A
5784414 Bruekers et al. Jul 1998 A
5825753 Betts et al. Oct 1998 A
5831578 Lefevre Nov 1998 A
5841814 Cupo Nov 1998 A
5850187 Carrender et al. Dec 1998 A
5861848 Iwasaki Jan 1999 A
5892396 Anderson et al. Apr 1999 A
5898405 Iwasaki Apr 1999 A
5905405 Ishizawa May 1999 A
5940006 MacLellan et al. Aug 1999 A
5974301 Palmer et al. Oct 1999 A
6025780 Bowers et al. Feb 2000 A
6026378 Onozaki Feb 2000 A
6084530 Pidwerbetsky et al. Jul 2000 A
6094149 Wilson Jul 2000 A
6107910 Nysen Aug 2000 A
6121929 Olson et al. Sep 2000 A
6137447 Saitoh et al. Oct 2000 A
6177861 MacLellan et al. Jan 2001 B1
6192225 Arpaia et al. Feb 2001 B1
6219534 Torii Apr 2001 B1
6229817 Fischer et al. May 2001 B1
6229987 Greeff et al. May 2001 B1
6232837 Yoo et al. May 2001 B1
6275192 Kim Aug 2001 B1
6317027 Watkins Nov 2001 B1
6320542 Yamamoto et al. Nov 2001 B1
6366216 Olesen Apr 2002 B1
6412086 Friedman et al. Jun 2002 B1
6414626 Greef et al. Jul 2002 B1
6442276 Doljack Aug 2002 B1
6456668 MacLellan et al. Sep 2002 B1
6459687 Bourlas et al. Oct 2002 B1
6466130 Van Horn et al. Oct 2002 B2
6492933 McEwan Dec 2002 B1
6501807 Chieu et al. Dec 2002 B1
6531957 Nysen Mar 2003 B1
6538564 Cole Mar 2003 B1
6566997 Bradin May 2003 B1
6567648 Ahn et al. May 2003 B1
6603391 Greeff et al. Aug 2003 B1
6639509 Martinez Oct 2003 B1
6700547 Mejia et al. Mar 2004 B2
6714121 Moore Mar 2004 B1
6714133 Hum et al. Mar 2004 B2
6768441 Singvall et al. Jul 2004 B2
6774685 O'Toole et al. Aug 2004 B2
6784789 Eroglu et al. Aug 2004 B2
6794000 Adams et al. Sep 2004 B2
6798384 Aikawa et al. Sep 2004 B2
6816125 Kuhns et al. Nov 2004 B2
6819938 Sahota Nov 2004 B2
6831603 Menache Dec 2004 B2
6838989 Mays et al. Jan 2005 B1
6888509 Atherton May 2005 B2
6974928 Boom Dec 2005 B2
7009496 Arneson et al. Mar 2006 B2
7034689 Teplitxky et al. Apr 2006 B2
7039359 Martinez May 2006 B2
7043269 Ono et al. May 2006 B2
7053755 Atkins et al. May 2006 B2
7058368 Nicholls et al. Jun 2006 B2
7084769 Bauer et al. Aug 2006 B2
7088248 Forster Aug 2006 B2
7091828 Greeff et al. Aug 2006 B2
7095324 Conwell et al. Aug 2006 B2
7095985 Hofmann Aug 2006 B1
7099406 Najarian et al. Aug 2006 B2
7099671 Liang Aug 2006 B2
7100835 Selker Sep 2006 B2
7109867 Forster Sep 2006 B2
7155172 Scott Dec 2006 B2
7180402 Carrender et al. Feb 2007 B2
7197279 Bellantoni Mar 2007 B2
7199713 Barink et al. Apr 2007 B2
7215976 Brideglall May 2007 B2
7221900 Reade et al. May 2007 B2
7256682 Sweeney, II Aug 2007 B2
7257079 Bachrach Aug 2007 B1
7284703 Powell et al. Oct 2007 B2
7357299 Frerking Apr 2008 B2
7375634 Sprague May 2008 B2
7385511 Muchkaev Jun 2008 B2
7388468 Diorio et al. Jun 2008 B2
7388501 Tang et al. Jun 2008 B2
7409194 Shi et al. Aug 2008 B2
7411505 Smith et al. Aug 2008 B2
7413124 Frank et al. Aug 2008 B2
7429953 Buris et al. Sep 2008 B2
7432817 Phipps et al. Oct 2008 B2
7432874 Meissner Oct 2008 B2
7440743 Hara et al. Oct 2008 B2
7450919 Chen et al. Nov 2008 B1
7460014 Pettus Dec 2008 B2
7477887 Youn Jan 2009 B2
7479874 Kim et al. Jan 2009 B2
7492812 Ninomiya et al. Feb 2009 B2
7526266 Al-Mahdawi Apr 2009 B2
7548153 Gravelle et al. Jun 2009 B2
7551085 Pempsell et al. Jun 2009 B2
7557762 Shimasaki et al. Jul 2009 B2
7561866 Oliver et al. Jul 2009 B2
7562083 Smith et al. Jul 2009 B2
7570164 Chakraborty et al. Aug 2009 B2
7576657 Duron et al. Aug 2009 B2
7580378 Carrender et al. Aug 2009 B2
7583179 Wu et al. Sep 2009 B2
7586416 Ariyoshi et al. Sep 2009 B2
7592898 Ovard et al. Sep 2009 B1
7592915 Liu Sep 2009 B2
7594153 Kim et al. Sep 2009 B2
7595729 Ku et al. Sep 2009 B2
7596189 Yu et al. Sep 2009 B2
7606532 Wuidart Oct 2009 B2
7609163 Shafer Oct 2009 B2
7612675 Miller et al. Nov 2009 B2
20010048715 Lee et al. Dec 2001 A1
20020021208 Nicholson et al. Feb 2002 A1
20020067264 Soehnlen Jun 2002 A1
20020072344 Souissi Jun 2002 A1
20020119748 Prax et al. Aug 2002 A1
20020135481 Conwell et al. Sep 2002 A1
20020141347 Harp et al. Oct 2002 A1
20030021367 Smith Jan 2003 A1
20030052161 Rakers et al. Mar 2003 A1
20030156032 Adams et al. Aug 2003 A1
20030228860 Jou Dec 2003 A1
20040119593 Kuhns Jun 2004 A1
20050084003 Duron et al. Apr 2005 A1
20050099270 Diorio et al. May 2005 A1
20050099340 Suzuki May 2005 A1
20050107051 Aparin et al. May 2005 A1
20050114326 Smith et al. May 2005 A1
20050116867 Park et al. Jun 2005 A1
20050156031 Goel et al. Jul 2005 A1
20050179520 Ziebertz Aug 2005 A1
20050237843 Hyde Oct 2005 A1
20050259768 Yang et al. Nov 2005 A1
20060022800 Krishna et al. Feb 2006 A1
20060086809 Shanks et al. Apr 2006 A1
20060098765 Thomas et al. May 2006 A1
20060103533 Pahlavan et al. May 2006 A1
20060125603 Nahear Jun 2006 A1
20060132313 Moskowitz Jun 2006 A1
20060183454 Al-Mahdawi Aug 2006 A1
20060214773 Wagner et al. Sep 2006 A1
20060238302 Loving et al. Oct 2006 A1
20060252398 Park et al. Nov 2006 A1
20060267734 Taki et al. Nov 2006 A1
20060290502 Rawlings Dec 2006 A1
20070001809 Kodukula et al. Jan 2007 A1
20070001813 Maguire et al. Jan 2007 A1
20070018792 Take et al. Jan 2007 A1
20070029384 Atherton Feb 2007 A1
20070046432 Aiouaz et al. Mar 2007 A1
20070060075 Mikuteit Mar 2007 A1
20070082617 McCallister Apr 2007 A1
20070096917 Yang May 2007 A1
20070133392 Shin et al. Jun 2007 A1
20070139200 Yushkov et al. Jun 2007 A1
20070164868 Deavours et al. Jul 2007 A1
20070188305 Drucker Aug 2007 A1
20070206704 Zhou et al. Sep 2007 A1
20070206705 Stewart Sep 2007 A1
20070207284 McClintic Sep 2007 A1
20070210173 Nagel Sep 2007 A1
20070222604 Phipps et al. Sep 2007 A1
20070222606 Phipps et al. Sep 2007 A1
20070236335 Aiouaz et al. Oct 2007 A1
20070285238 Batra Dec 2007 A1
20070290846 Schilling et al. Dec 2007 A1
20080012688 Ha et al. Jan 2008 A1
20080018431 Turner et al. Jan 2008 A1
20080048867 Oliver et al. Feb 2008 A1
20080049870 Shoarinejad et al. Feb 2008 A1
20080065957 Shoarinejad et al. Mar 2008 A1
20080068173 Alexis et al. Mar 2008 A1
20080084310 Nikitin et al. Apr 2008 A1
20080136595 Finkenzeller Jun 2008 A1
20080143486 Downie et al. Jun 2008 A1
20080191961 Tuttle Aug 2008 A1
20080258916 Diorio et al. Oct 2008 A1
20080278286 Takaluoma et al. Nov 2008 A1
20090022067 Gotwals Jan 2009 A1
20090053996 Enguent et al. Feb 2009 A1
20090091454 Tuttle Apr 2009 A1
20090096612 Seppa et al. Apr 2009 A1
20090101720 Dewan et al. Apr 2009 A1
Foreign Referenced Citations (30)
Number Date Country
2218269 Apr 1999 CA
0133317 Feb 1985 EP
0498369 Aug 1992 EP
0156440 Dec 1992 EP
0915573 May 1999 EP
0923061 Jun 1999 EP
1095427 May 2001 EP
1436857 Jul 2004 EP
2648602 Dec 1990 FR
1270456 Apr 1972 GB
1158836 Jun 1989 JP
2002-185381 Jun 2002 JP
2005-227818 Aug 2005 JP
2005-253058 Sep 2005 JP
2006-252367 Sep 2006 JP
2002-0091572 Dec 2002 KR
WO 9016119 Dec 1990 WO
WO 9905659 Feb 1999 WO
WO 0124407 Apr 2001 WO
02095675 Nov 2002 WO
WO 03044892 May 2003 WO
WO 04001445 Dec 2003 WO
WO 2005072137 Aug 2005 WO
WO 2006037241 Apr 2006 WO
WO 2006068635 Jun 2006 WO
WO 2007003300 Jan 2007 WO
2007092482 Aug 2007 WO
WO 2007094787 Aug 2007 WO
WO 2007126240 Nov 2007 WO
WO 2009058809 May 2009 WO
Non-Patent Literature Citations (25)
Entry
International Search Report and Written Opinion of the International Searching Authority issued in corresponding International Application No. PCT/US2009/037633; May 15, 2009; 12 pages.
International Preliminary Report on Patentability issued in International Application No. PCT/US2009/037633 on Jun. 29, 2010; 12 pages.
Bridgelall, Raj; “Bluetooth/802.11 Protocol Adaptation for RFID Tags”; Symbol Technologies, Research & Development, One Symbol Plaza, Holtsville, New York 11742; 4 pages. Retrieved from <http://www2.ing.unipi.it/ew2002/proceedings/001.pdf>.
Burgener, E.C.; “A Personal Transit Arrival Time Receiver;” IEEE—IEE Vehicle Navigation & Information Systems Conference; Ottawa, Ontario, Canada; 1993; pp. 54-55. Retrieved from <http://ieeexplore.ieee.org/xpl/freeabs—all.jsp?arnumber=585583>.
Cavoukian, Ann; “Adding an On/Off Device to Activate the RFID in Enhanced Driver's Licenses: Pioneering a Made-in-Ontario Transformative Technology that Delivers Both Privacy and Security”; Information and Privacy Commissioner of Ontario; Ontario, Canada; Mar. 2009; 3 pages. Retrieved from <http://www.ipc.on.ca/images/Resources/edl.pdf>.
Desmons, Dimitri; “UHF Gen 2 for Item-Level Tagging”; Impinji, Inc.; 24 pages. Retrieved from < http://www.impinj.com/files/Impinj—ILT—RFID—World.pdf>.
Donovan, John; “Software-Defined Radio Tackles Wireless Compatibility Issues”; Portable Design; Apr. 2006; pp. 8-12. Retrieved from <http://www.qmags.com/download/default.aspx?pub=PD&upid=11675&fl=others/PD/PD—20060401—Apr—2006.pdf>.
Han Y. et al.; “System Modeling and Simulation of RFID”; Auto-ID Labs at Fudan University, Shanghai, P.R. China; 12 pages. Retrieved from <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.116.7275&rep=repl&type=pdf>.
Hansen, T. et al.; “Method for Controlling the Angular Extent of Interrogation Zones in RFID”; Seknion, Inc., 2000 Commonwealth Avenue, Suite 1008, Boston, MA 02135; 12 pages. Retrieved from <http://seknion.com/DOWNLOADS/Seknion—Paper—RFID.pdf>.
Hiltunen, Kimmo; “Using RF Repeaters to Improve WCDMA HSDPA Coverage and Capacity inside Buildings”; the 17th Annual IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC-06); 2006; 5 pages. Retrieved from <http://www.ericsson.com/technology/research—papers/wireless—access/doc/PIMRC06—hiltunen.pdf >.
Khandelwal, G. et al. “Intelligent MAC Design for RFID Networks”; The Pennsylvania State University; 1 page.
Khandelwal, G. et al.; “OPT: Optimal Protocol Tree for Efficient Tag Identification in Dense RFID Systems”; IEEE International Conference on Communications; Jun. 11-15, 2006; pp. 128-133.
Kusy et al.; “Tracking Mobile Nodes Using RF Doppler Shifts”; Vanderbilt University, Nashville, Tennessee; 14 pages. Retrieved from <http://www.isis.vanderbilt.edu/sites/default/files/Kusy—B—11—7—2007—Tracking—M.pdf>.
“New Alien Software Can Identify Velocity, Position of Tags”; RFID News; Apr. 14, 2008; 2 pages. Retrieved from <http://www.rfidnews.org/2008/04/14/new-alien-software-can-identify-velocity-position-of-tags>.
O'Connor, Mary Catherine; “Wal-Mart Seeks UHF for Item-Level”; RFID Journal, Inc.; 2005; 2 pages. Retrieved from < http://www.rfidjournal.com/article/articleview/2228/1/1/>.
Rohatgi, A. et al.; “Implementation of an Anti-Collision Differential-Offset Spread Spectrum FRID System”; Georgia Institute of Technology, School of Electrical and Computer Engineering; IEEE Antennas Propagation Society International Symposium 2006; 4 pages. Retrieved from <http://www.propagation.gatech.edu/Archive/PG—CP—060710—AR/PG—CP—060710—AR.PDF>.
Waldrop et al.; “Colorwave: a MAC for RFID Reader Networks”; Auto-ID Center, Massachusetts Institute of Technology, Cambridge, MA; 4 pages.
Yu, P. et al.; “Securing RFID with ULTRA-Wideband Modulation”; Virginia Tech Electrical and Computer Engineering Department; Blacksburg, VA; Workshop on RFID Security; Jul. 2006; 12 pages. Retrieved from <http://events.iaik.tugraz.at/RFIDSec06/Program/papers/004%20-%20Ultra%20Wideband%20Modulation.pdf>.
“Near Field UHF Versus HF”; IDTechEx; May 16, 2006; 1 pages. Retrieved from <http://www.idtechex.com/research/articles/near—field—uhf—versus—hf—00000474.asp>.
Kiming, Q. et al.; “Development of a 3cm Band Reflected Power Canceller ”; Research Institute of Navigation Technology; 2001 CIE International Conference on, Proceedings; 2001; pp. 1098-1102.
“Developments in Printed Conductors and Tags”; IDTechEx; Jun. 6, 2005; 1 page. Retrieved from <http://www.idtechex.com/research/articles/developments—in—printed—conductors—and—tags—00000188.asp>.
Ryu, H-K. et al.; “Size Reduction in UHF Band RFID Tag Antenna Based on Circular Loop Antenna”; 18th International Conference on Applied Electromagnetics and Communications, ICECom; Oct. 12-14, 2005; pp. 1-4.
Binu P, et al.; “A New Microstrip Patch Antenna for Mobile Communications and Bluetooth Applications”; Microwave and Optical Technology Letters; vol. 33, No. 4, May 20, 2002; pp. 285-286.
Garg et al.; “Microstrip Radiators”; Microstrip Antenna Design Handbook; Artech House, Inc. Norwood, MA; 2001; pp. 1-72.
“Radio Frequency Identification (RFID) Primer” 23 pages. Retrieved from <http://ocw.mit.edu/NR/rdonlyres/Sloan-School-of-Management/15-762JSpring-2005/23F46055-7F21-4046-B2C3-7E96680790DD/0/rfid—primer.pdf>.
Related Publications (1)
Number Date Country
20090237249 A1 Sep 2009 US