Radio Frequency Identification (RFID) technology is well known. An RFID tag may be an integrated circuit embedded within a tag insert or an inlay including an integrated circuit attached to an antenna. An RFID reader/writer sends out electromagnetic waves to an RFID tag that induces a current or voltage in the tag's antenna. The RFID reader/writer may be a fixed device or a portable device. The tag modulates the waves and may send information back to the RFID reader/writer. Additional information about the items the tag is attached to can be stored in the tag. The tag may be passive or active. Passive RFID tags typically have no stored power source such as a local battery, and rely upon the energy delivered by the interrogation signal to transit a stream of information. Active RFID tags may have a power source such as a battery or ultracapacitor. Information may be exchanged between the tag and the RFID reader/writer through either inductive coupling or electromagnetic wave backscattering. RFID systems may use many different frequencies, but generally the most common are low frequency (around 125 KHz), high frequency (13.56 MHz), ultra-high frequency (850-900 MHz), and microwave (2.45 Ghz).
RFID systems may be utilized to determine the current location of articles of interest, inventory control and tracking, asset tracking and recovery, tracking manufacturing parts, tracking goods in supply chains, payment systems, and the like. An RFID tag may store information that may be used for security, access control, and/or authentication purposes.
In some environments, reading a particular tag or group of tags may be difficult due to the density of tags. For example, in a warehouse environment, there may be multiple products with RFID tags in a carton and multiple cartons with RFID tags on a pallet. The pallet may also have an RFID tag. A reading in the vicinity of the pallet will produce multiple colliding responses from the products, cartons and the pallet. Multiple pallets in close proximity compound the likelihood of response collisions.
A framed slotted Aloha algorithm has been proposed where responses from multiple devices to a single interrogation signal are spread amongst several slots of a frame. According to the slotted aloha base protocol ISO18000-6C, a parameter called Q is used to calculate the number of available response slots (2̂Q) to a single interrogation signal. ISO18000-6C compliant tags have a random number generator that enables them to respond in a single time slot. Each tag responds to a random slot in the frame, thus distributing the responses and reducing the number of collisions. By repeatedly interrogating the unread tags, eventually all tags can be read.
As environments become more tag dense, use of the Aloha protocol becomes prohibitive due to the multiple reads to obtain a desired tag reading. Further, as RFID devices become more data-rich, reading a tag may take a significant amount of time to read. For example, reading 1 k of data with C1G2 protocol would fill over 11 standard 96 bit tag payloads. More efficient techniques are needed to read tag information in tag dense and/or data-rich environments.
The present invention may be better understood, and its numerous features and advantages made apparent to those skilled in the art by referencing the accompanying drawings.
The use of the same reference symbols in different drawings indicates similar or identical items.
In the following description, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In other instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
References to “one embodiment,” “an embodiment,” “example embodiment,” “various embodiments,” etc., indicate that the embodiment(s) of the invention so described may include a particular feature, structure, or characteristic, but not every embodiment necessarily includes the particular feature, structure, or characteristic. Further, repeated use of the phrase “in one embodiment” does not necessarily refer to the same embodiment, although it may.
As used herein, unless otherwise specified the use of the ordinal adjectives “first,” “second,” “third,” etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions utilizing terms such as “processing,” “computing,” “calculating,” or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, state machine and the like that manipulate and/or transform data represented as physical, such as electronic, quantities into other data similarly represented as physical quantities.
To access RFID device 106, an interrogation signal 110 may be transmitted by RFID reader 102 in a vicinity of RFID device 106. RFID device 106 receives and processes an RF signal 10 from RFID reader/writer 102. RFID device 106 may include power harvesting and voltage processing circuitry 112, a processor or state machine 114, storage 116, and a random number generator 118. Power harvesting and voltage processing circuitry 112 may include protection circuitry such as a diode (not shown) and a voltage regulator (not shown) and an inductor (not shown) to receive RF signal 110 and charge one or more capacitors (not shown) to generate power to operate RFID device 106, although the invention is not limited in this context. Storage 116 may include non-volatile re-writable memory, although the invention is not limited in this context. Storage 116 may also contain a key for decryption, a device identification for signal authentication, and other such information. Random number generator 118 is used to determine in which slot(s) the RFID device 106 responds. In alternate embodiments of the invention alternate techniques may be used to determine in which slot(s) the RFID device 106 responds.
Although only one RFID device 106 is shown in
According to an embodiment of the present invention, RFID tags may be configurable either at the factory or by users with a specific priority level which determines the number of responses in a given frame. A high priority tag may respond multiple times to a single interrogation signal, either providing the same data or different data with each response. In this way, a high priority or data-rich tag can have much higher probability of responding to the reader and being read in a timely manner than a standard tag.
According to another embodiment of the present invention, a RFID tag may listen for tag responses in Q slots, and if it doesn't detect a response just before the end of the timeslot, it could scavenge them at the last second for its own data transfer purposes.
In one embodiment, the RF signal 110 includes enough power such that the RFID device 106 can process the signal, and send a status message back to the RFID reader/writer. In an alternate embodiment, the RFID device includes its own power source. The RF signal may include device identification, authentication information and may be encrypted.
Although high priority tag responses 206 are illustrated as periodic in
The environment of the system illustrated in
To read all of the tags, the reader may have to provide multiple interrogation signals. In one embodiment of the present invention a tag that has been successfully read is notified and does not respond to subsequent interrogation signals. Further, a data-rich tag that has multiple payloads may respond with only those payloads that have not been successfully read.
Note that a high priority tag may respond multiple times to a single interrogation signal. Some tags may respond with the same data each time. Data-rich tags may respond with different data in each response. The invention is not limited in this respect.
According to embodiments of the present invention, RFID tags may be configured as high priority tags so that critical tags may be read as early as possible (before low priority tags). It addresses one of the issues with an equal priority set of tags without requiring foreknowledge of what types of tags are coming.
According to embodiments of the present invention, RFID tags of sensor applications may report data much faster than otherwise possible, allowing multiple payloads to be read in a shorter period of time.
Although discussed above with reference to RFID like systems, other types of wireless communication systems are intended to be within the scope of the present invention including, although not limited to, Wireless Local Area Network (WLAN), Wireless Wide Area Network (WWAN), Worldwide Interoperability for Microwave Access (WiMax), Wireless Personal Area Network (WPAN), Wireless Metropolitan Area Network (WMAN), Code Division Multiple Access (CDMA) cellular radiotelephone communication systems, Global System for Mobile Communications (GSM) cellular radiotelephone systems, North American Digital Cellular (NADC) cellular radiotelephone systems, Time Division Multiple Access (TDMA) systems, Extended-TDMA (E-TDMA) cellular radiotelephone systems, third generation (3G) systems like Wide-band CDMA (WCDMA), CDMA-2000, Universal Mobile Telecommunications System (UMTS), and the like, although the scope of the invention is not limited in this respect. In at least one implementation, for example, a wireless link is implemented in accordance with the Bluetooth short range wireless protocol (Specification of the Bluetooth System, Version 1.2, Bluetooth SIG, Inc., November 2003, and related specifications and protocols). Other possible wireless networking standards include, for example: IEEE 802.11 (ANSI/IEEE Std 802.11-1999 Edition and related standards), IEEE 802.16 (ANSI/IEEE Std 802.16-2002, IEEE Std 802.16a, March, 2003 and related standards), HIPERLAN 1, 2 and related standards developed by the European Telecommunications Standards Institute (ETSI) Broadband Radio Access Networks (BRAN), HomeRF (HomeRF Specification, Revision 2.01, The HomeRF Technical Committee, July, 2002 and related specifications), and/or others.
Realizations in accordance with the present invention have been described in the context of particular embodiments. These embodiments are meant to be illustrative and not limiting. Many variations, modifications, additions, and improvements are possible. Accordingly, plural instances may be provided for components described herein as a single instance. Boundaries between various components, operations and data stores are somewhat arbitrary, and particular operations are illustrated in the context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within the scope of claims that follow. Finally, structures and functionality presented as discrete components in the various configurations may be implemented as a combined structure or component. These and other variations, modifications, additions, and improvements may fall within the scope of the invention as defined in the claims that follow.