Claims
- 1. A method for communicating with a plurality of radio frequency identification (RFID) tags, comprising:
(a) receiving a series of bits from the plurality of RFID tags and storing said series of bits in corresponding nodes in a binary tree, wherein each node in said binary tree is associated with a counter; (b) incrementing a counter associated with a node in said binary tree when a bit received from said plurality of RFID tags matches a bit stored in said node; (c) decrementing a counter associated with a node in said binary tree when a bit received from said plurality of RFID tags does not match a bit stored in said node; and (d) assigning a value to a bit received from said plurality of RFID tags based on a value of a counter associated with a node in said binary tree.
- 2. A method in a radio frequency identification (RFID) reader for interrogating a population of tags using binary tree traversal protocol, comprising the steps of:
(a) entering a logical node in a binary tree; (b) transmitting a symbol to the population of tags; (c) determining if at least one symbol is received from the population of tags; (d) if it is determined in step (c) that at least one symbol has been received, determining whether one symbol received from the population of tags corresponds to a first logical value; (e) if it is determined in step (d) that one symbol received corresponds to a first logical value, incrementing a node counter value associated with the first logical value; (f) if it is determined in step (d) that one symbol received does not correspond to a first logical value, decrementing the node counter value associated with the first logical value; (g) if it is determined in step (c) that at least one symbol has been received, determining whether one symbol received from the population of tags corresponds to a second logical value; (h) if it is determined in step (g) that one symbol received corresponds to a second logical value, incrementing a node counter value associated with the second logical value; (i) if it is determined in step (g) that one symbol received does not correspond to a first logical value, decrementing the node counter value associated with the second logical value; (j) selecting which logical value to store as a bit of a tag bit pattern; (k) storing the selected logical value as the bit of the tag bit pattern; (l) determining whether the bit pattern is complete; and (m) if the bit pattern is not complete; proceeding to step (a).
- 3. The method of claim 2 wherein step (j) includes the steps of:
determining whether one symbol received from the population of tags corresponds to a first logical value and a second symbol received from the population of tags corresponds to a second logical value; determining whether either symbol was likely caused by noise; and if it is determined it is likely that one received symbol was caused by noise, selecting the logical value associated with the other received symbol as the bit of the tag bit pattern.
- 4. The method of claim 3 wherein the step of determining the likelihood that either received symbol was caused by noise comprises:
evaluating the counter value associated with the first logical value and the counter value associated with the second logical value.
- 5. The method of claim 4 further comprising the step of:
if it is determined in step (c) that at least one symbol has been received from the population of tags, incrementing a node activity register value.
- 6. The method of claim 5 wherein the step of determining the likelihood that either received symbol was caused by noise further comprises:
retrieving the activity register; and evaluating the value of the activity register.
- 7. The method of claim 2 wherein step (j) includes the steps of:
determining whether one symbol received from the population of tags corresponds to a first logical value and a second symbol received from the population of tags corresponds to a second logical value; determining whether either received symbol was likely generated by a weak tag; and if it is likely that one received symbol was generated by a weak tag, selecting the logical value associated with the one received symbol as the bit of the tag bit pattern.
- 8. The method of claim 7 wherein the step of determining the likelihood that either received symbol was caused by noise comprises:
evaluating the counter value associated with the first logical value and the counter value associated with the second logical value.
- 9. The method of claim 8 further comprising the step of:
if it is determined in step (c) that at least one symbol has been received from the population of tags, incrementing a node activity register value.
- 10. The method of claim 9 wherein the step of determining the likelihood that either received symbol was caused by noise further comprises:
retrieving an activity register; and evaluating the value of the activity register.
- 11. The method of claim 2 wherein the tag bit pattern contains a tag identification number.
- 12. The method of claim 11 further comprising:
if it is determined in step (l) that the tag bit pattern is complete, determining whether the stored bit pattern contains a valid tag identification number.
- 13. The method of claim 12 wherein each bit in the tag bit pattern corresponds to a logical node in the binary tree.
- 14. The method of claim 13 further comprising:
if the bit pattern does not contain a valid tag identification number, decrementing the node counters for the logical nodes corresponding to each bit in the tag bit pattern.
- 15. The method of claim 2 further comprising:
if it is determined in step (c) that at least one symbol has not been received, decrementing the node counter corresponding to the last stored bit in the bit pattern.
- 16. The method of claim 2 wherein the first logical value is a data “0” and the second logical value is a data “1.”
- 17. A method in a radio frequency identification (RFID) reader for interrogating a population of tags using binary tree traversal protocol, comprising the steps of:
(a) entering a logical node in a binary tree; (b) transmitting a symbol to the population of tags; (c) determining if at least one symbol is received from the population of tags; (d) if it is determined in step (c) that at least one symbol has been received, adjusting information stored for the logical node; (e) selecting which logical value to store as a bit of a tag bit pattern; (f) storing the selected logical value as the bit of the tag bit pattern; (g) determining whether the bit pattern is complete; and (h) if the bit pattern is not complete; proceeding to step (a).
- 18. The method of claim 17 wherein step (d) comprises the steps of:
if it is determined in step (c) that at least one symbol has been received, determining whether one symbol received from the population of tags corresponds to a first logical value; if it is determined in step that one symbol received corresponds to a first logical value, incrementing a node counter value associated with the first logical value; if it is determined in step that one symbol received does not correspond to a first logical value, decrementing the node counter value associated with the first logical value; if it is determined in step (c) that at least one symbol has been received, determining whether one symbol received from the population of tags corresponds to a second logical value; if it is determined in step that one symbol received corresponds to a second logical value, incrementing a node counter value associated with the second logical value; and if it is determined in step that one symbol received does not correspond to a first logical value, decrementing the node counter value associated with the second logical value.
- 19. The method of claim 18 wherein step (d) further comprises the step of:
if it is determined in step (c) that at least one symbol has been received from the population of tags, incrementing a node activity register value.
- 20. A method in a radio frequency identification (RFID) reader for interrogating a population of tags using a binary tree traversal protocol, comprising the steps of:
reading a tag identification bit pattern as a result of a binary tree traversal interrogation of a tag in the population of tags; receiving an error detection code from the tag; identifying one or more bit positions in the read tag identification bit pattern potentially corrupted by noise; identifying potential bit patterns having alternate bit values in one or more of the identified bit positions; calculating an error detection code value for the accumulated tag identification bit pattern; calculating an error detection code value for each identified potential bit pattern; and determining whether any of the calculate error detection code values matches the received error detection code.
- 21. The method of claim 14 wherein the error detection code value is a cyclic redundancy code value.
- 22. A method in a radio frequency identification (RFID) reader for interrogating a population of tags using binary tree traversal protocol, comprising the steps of:
storing data related to the tag population, wherein the tag population data includes information associated with each populated node in a binary tree; during binary tree traversal, determining a traversal path based on the tag population data.
- 23. The method of claim 22 wherein the information associated with each populated node in the binary tree includes node weighting information, wherein the storing step comprises
(1) storing the node weighting information for each populated node.
- 24. The method of claim 23 wherein the node weighting information includes:
a first stored counter value associated with a first logical bit value; and a second stored counter value associated with a second logical bit value; wherein step (1) comprises storing the first stored counter value and the second stored counter value for each populated node.
- 25. The method of claim 22 further comprising:
obtaining at least some of the tag population data from external to the reader.
- 26. The method of claim 25 wherein the at least some of the tag population data is obtained from a second reader.
- 27. The method of claim 26 wherein the at least some of the tag population data is obtained from a database.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims priority to U.S. Provisional Application No. 60/419,091, entitled “Method for the Efficient Reading of a Population of Radio Frequency Identification Tags with Unique Identification Numbers Over a Noisy Air Channel,” filed Oct. 18, 2002, which is hereby incorporated by reference in its entirety.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60419091 |
Oct 2002 |
US |