Radio Frequency Identification (RFID) is used in many industries. One such industry in which RFID is very useful is inventory management. Inventory management is used extensively by storage warehouses, transportation companies, and production facilities; and they may rely heavily on RFID systems. RFID enables these companies to control the logistics of their inventory as items are received and distributed from the facility. In addition to inventory management, RFID is also used in hospitals for patient information, in libraries to locate and check out references, and in passports for more detailed identification information.
RFID technology allows information to be retrieved wirelessly from a RFID tag. The two main components of an RFID system are readers and tags. RFID tags are generally attached to an object and hold information regarding the object. RFID readers communicate with tags to retrieve the information contained in the tag. An RFID tag consists of an antenna connected to a small integrated circuit capable of responding via a wireless link to interrogations and includes a memory for storage of information. Usually, the RFID tag stores information and transmits that information to the RFID reader when requested by the reader. Thus, a user can instantly know the information contained in the RFID tag by transmitting a signal to an RFID tag and receiving a response back from the RFID tag. In inventory management settings RFID tags may contain information about when the object arrived at its location, who signed for it, and where it is being sent. RFID tags can be designed to hold any information as desired for the specific application.
RFID tags are either active or passive. Active tags are larger, contain a battery, and can perform more robust communication and processing. Active tags can respond or transmit a signal at any time and have a larger communication distance. In contrast, passive tags contain no battery and are powered from an external source. Passive tags can be smaller than a credit card, and typically hold less information than active tags. Since passive tags have no power source, they have a shorter communication distance. Passive tags obtain the energy needed to transmit responses from the energy contained in the radio signal they receive.
The two types of tags each have a different target application. Active tags, being larger and more costly, are typically used for more expensive items and items that require a larger amount of information. Passive tags are usually used in cost sensitive applications where a reader will be nearby the tag and a small, unobtrusive tag is desired. For example, passive tags are used on retail items, library books, and personal identification cards.
There are also two types of RFID readers, mobile and fixed. Either type of reader can be used with either type of tag. Mobile readers are handheld devices which a user can transport to a remote area to read tags at that location. In contrast, fixed readers are generally permanently mounted to a structure, and can only read tags within range of the reader at its current location.
Each type of reader has advantages and disadvantages. Mobile readers can travel with a user and provide instant access for the user to tags in the vicinity of the user. Mobile readers are typically used by people who must physically interact with the inventory item to which the tag is attached. Due to their dependence on a battery and their practical size restrictions, however, mobile readers have limited range and limited processing power. The limited reception distance of mobile readers adds difficulty to many tasks. For example, it is difficult for a user of a mobile reader to locate a specific item in a very large warehouse, where items are typically separated by distances greater than the range of the mobile reader. The user has to physically travel within range of every single tag until stumbling upon the desired tag. Similarly, when data processing is desired on a large subset of items, a user must travel to the location of each item, and record the data of each item before they can process the data.
On the other hand, fixed readers are connected to line power and have a much larger communication range. Fixed readers are wired to a terminal from where they can request a scan of the RFID tags. Additionally, multiple fixed readers can be networked together to cover even larger areas. Due to their steady power source and computer connection, fixed readers can quickly scan the inventory to locate an item or obtain information from multiple items. Fixed readers, however, can only be used from their host terminal. In a warehouse setting, this requires a user to leave the warehouse, scan for the object and then return to the warehouse every time the object must be scanned. This is impractical when hundreds of objects must be scanned in a single day.
For the reasons stated above, and for other reasons stated below which will become apparent to those skilled in the art upon reading and understanding the present specification, there is a need in the art for a method of improved communication between RFID tags and mobile readers.
The above-mentioned problems of current systems are addressed by embodiments of the present invention and will be understood by reading and studying the following specification. The following summary is made by way of example and not by way of limitation. It is merely provided to aid the reader in understanding some of the aspects of the invention. In one embodiment, a system for communicating with RFID tags is disclosed. The system includes at least one RFID tag and a mobile RFID reader operable to interrogate the at least one RFID tag. The system also includes a first fixed RFID reader operable to interrogate the at least one RFID tag, the first fixed RFID reader configured to receive a request to interrogate the at least one RFID tag from the mobile RFID reader and configured to interrogate the at least one RFID tag based on the request from the mobile RFID reader. Additionally, the mobile RFID reader is configured to send a request to interrogate the at least one RFID tag to the first fixed RFID reader.
The present invention can be more easily understood and further advantages and uses thereof more readily apparent, when considered in view of the detailed description and the following figures in which:
In accordance with common practice, the various described features are not drawn to scale but are drawn to emphasize specific features relevant to the present invention. Reference characters denote like elements throughout Figures and text.
In the following detailed description, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific illustrative embodiments in which the device may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, and it is to be understood that other embodiments may be utilized and that logical, mechanical and electrical changes may be made without departing from the spirit and scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense.
Many RFID systems are made up of both fixed readers and mobile readers. Fixed readers often have communication coverage over larger, and sometimes the entire RFID area. In contrast, mobile readers are generally used to obtain tag information from tags that are nearby the user. In a system of both fixed and mobile readers, however, users of mobile readers expend time and energy trying to reach tags that the fixed readers can already communicate with. Moreover, typical systems with both mobile and fixed readers add complexity because tags can only transmit and receive on a single channel. The mobile and fixed readers, therefore, must coordinate interrogation of tags to avoid overlapping signals and causing data corruption.
The present methods address the above problems by allowing a user of a mobile reader to more effectively communicate with a tag in an environment with both fixed and mobile readers. In these methods the mobile reader communicates with the fixed readers, and can offload tasks to the fixed readers. One task that the mobile reader offloads includes allowing the mobile reader to request that the fixed readers interrogate tags on behalf of the mobile reader. The fixed readers then interrogate the tags for the mobile reader. After receiving the interrogation request from the fixed readers, the tags respond to either the fixed reader or the mobile reader. If the response is sent to the fixed reader, the fixed reader then forwards the response to the mobile reader. In addition to interrogation, the fixed reader can also perform processing of the tags for the mobile reader. Since communication with the fixed readers has a higher signal to noise ratio than communicating with the tags, the mobile reader saves power by communicating with the fixed readers. The mobile reader also saves power because the fixed reader performs the tag interrogation work. This allows the mobile reader to transmit and receive fewer signals, and thereby consume less battery power. Additionally, the processing power of the mobile reader is effectively increased, because the mobile reader utilizes the additional processing power of the fixed readers. Finally, the effective range of the mobile reader is increased to include all of the tags in the entire fixed reader network.
Mobile reader 104 and fixed readers 106, 108 communicate with tags 114, 116 by sending and receiving radio frequency signals. The frequency of the radio signal can be any frequency as is known by those skilled in the art. Mobile reader 104 and fixed readers 106, 108 can communicate with any tag that is within transmission and reception range of reader 104, 106, 108. Fixed readers 106, 108 can communicate with tags at larger distances, because fixed readers 106, 108 have a higher signal to noise ratio with tags than mobile reader 104. In system 100, mobile reader 104 is shown to be within range of cluster of tags 116, but tag 114 is out of range. Fixed reader 106 is within range of cluster of tags 116, but is also out of range of tag 114. Fixed reader 108 is within range of tag 114, and out of range of cluster of tags 116.
In addition to communication with tags 114, 116, mobile reader 104 is configured to communicate with fixed readers 106, 108. In system 100, mobile reader 104 communicates with fixed readers 106, 108 on a different channel than tags 114, 116. Instead of directly interrogating cluster of tags 116, mobile reader 104 sends the interrogation to fixed reader 106, which then performs the tag interrogation. Thus, even though cluster of tags 116 are within range of mobile reader 104, mobile reader 104 sends its interrogation request through fixed reader 106 to save battery power in mobile reader 104. Additionally, since fixed reader 106 and mobile reader 104 communicate on a different channel, fixed reader 106 interrogates tags 114, 116, while simultaneously communicating with mobile reader 104. In another embodiment, mobile reader 104 communicates with fixed readers 106, 108 on the same channel as tags 114, 116. In this embodiment, mobile reader 104 and fixed readers 106, 108 coordinate communications so that signals do not overlap and produce corrupted data.
Mobile reader 202 first sends a request to fixed reader 204 for fixed reader 204 to interrogate tags 206 on behalf of mobile reader 202. In one embodiment, the request to interrogate sent by mobile reader 202 is exactly the same as a transmission which mobile reader 202 would send to tags 206. Thus, in this embodiment, fixed reader 204 acts as a bridge and directly forwards the request to tags 206. In another embodiment, the request to interrogate is formatted for communication with fixed reader 204. In this embodiment, fixed reader 204, reads the request, and interrogates tags 206 as described in the request. In yet another embodiment, mobile reader 204 sends a second request for the fixed reader 204 to process the response(s) received from tags 206 and fixed reader 204 responds to mobile reader 202 with only the requested data. In one embodiment, the second request is sent as part of the original request. In an alternative embodiment, the second request is sent separately from original request. More detail will now be provided by referring to
In another embodiment of method 300, mobile reader 202 sends a second request for fixed reader 204 to perform data processing for mobile reader 202. Mobile reader 202 sends a request to fixed reader 204 for fixed reader 204 to locate a specific tag or obtain specific information from plurality of tags 206. When fixed reader 204 receives responses back from tags 206, instead of forwarding the responses to mobile reader 202, fixed reader 204 analyzes the responses and obtains the information that mobile reader 202 requested from the responses. In one embodiment, each one of tags 206 respond to the interrogation from fixed reader 204 with a standard response containing all the information of the respective tag. In one embodiment, to analyze these responses fixed reader 206 extracts the data requested by mobile reader 202 from a field in the standard response of each of tags 206. In another embodiment, fixed reader 204 analyses the responses of tags 206 by exchanging several messages with each one of tags 206 to obtain the data requested by mobile reader 202. In yet another embodiment, fixed reader 204 analyzes the responses by sorting through the responses and only forwarding the responses from requested subgroup of tags 206 to mobile reader 202. Fixed reader 204 then forwards the information obtained from the responses to mobile reader 202. This embodiment provides additional processing power to mobile reader 202, by allowing mobile reader 202 to offload not only the communication to and from tags 206, but also processing of the responses from tags 206. In this embodiment, mobile reader 202 will receive only one response from fixed reader 204.
In other embodiments of methods 200, 300, and 400, fixed reader 204 is a network of multiple fixed readers 204.
The methods of operating mobile reader 202 and fixed reader 204 will now be explained with reference to
Another embodiment of a method 600 of operation of mobile reader 202 is shown in
One embodiment of a method 700 of operation of fixed reader 204 is shown in
Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that any arrangement, which is calculated to achieve the same purpose, may be substituted for the specific embodiment shown. This application is intended to cover any adaptations or variations of the present invention. Therefore, it is manifestly intended that this invention be limited only by the claims and the equivalents thereof.