The various aspects and embodiments described herein generally relate to radio frequency (RF) communications, and more particularly, to communications by a Radio Frequency Identification (RFID) reader.
Radio Frequency Identification (RFID) systems typically include RFID readers, also known as RFID reader/writers or RFID interrogators, and RFID tags. RFID systems can be used in many ways for locating and identifying objects to which the tags are attached, as well as reading and/or writing information to/from the tags. RFID systems are particularly useful in product-related and service-related industries for tracking objects being processed, inventoried, or handled. In such cases, an RFID tag is usually attached to an individual item, or to its package.
RFID techniques entail using an RFID reader to interrogate one or more RFID tags. The reader transmits a Radio Frequency (RF) wave to perform the interrogation. The RF wave may encode one or more commands that instruct the tags to perform one or more actions.
An RFID tag that senses the interrogating RF wave responds by transmitting back another RF wave. The RFID tag generates the RF wave either originally, or by reflecting back a portion of the interrogating RF wave in a process known as backscatter. Typically, most RFID tags backscatter the interrogating RF wave (e.g., energy from the RFID reader), and very few RFID tags generate their own energy. Thus, the transmitting of an RF wave by the RFID tag typically includes the RFID backscattering a portion of the interrogating RF wave.
The RF wave generated by the RFID tag may include a message that is encoded with data stored in the tag, such as a number. The RF wave is then received by the RFID reader, where the message is demodulated and decoded by the RFID reader, which thereby identifies, counts, or otherwise interacts with the associated item. The decoded data can denote a serial number, a price, a date, a time, a destination, an encrypted message, an electronic signature, other attribute(s), any combination of attributes, and so on. The data items are sometimes known as codes. Accordingly, when a reader receives tag data (codes) it can learn about the item that hosts the tag and/or about the tag itself.
The following presents a simplified summary relating to one or more aspects and/or embodiments disclosed herein. As such, the following summary should not be considered an extensive overview relating to all contemplated aspects and/or embodiments, nor should the following summary be regarded to identify key or critical elements relating to all contemplated aspects and/or embodiments or to delineate the scope associated with any particular aspect and/or embodiment. Accordingly, the following summary has the sole purpose to present certain concepts relating to one or more aspects and/or embodiments relating to the mechanisms disclosed herein in a simplified form to precede the detailed description presented below.
According to one aspect, a method of communicating by a Radio Frequency Identification (RFID) reader includes transmitting, by the RFID reader, a continuous radio frequency (RF) wave at a first frequency. The method also includes adjusting, by the RFID reader, the first frequency of the continuous RF wave to a second frequency and then receiving a backscattered RF wave at the first frequency from an RFID tag. The backscattered RF wave is generated by the RFID tag in response to the continuous RF wave of the first frequency. A difference between the first frequency and the second frequency is equal to or greater than a frequency difference threshold to reduce interference between the backscattered RF wave and the continuous RF wave.
According to another aspect, a Radio Frequency Identification (RFID) reader includes a transceiver that is configured to transmit a continuous radio frequency (RF) wave at a first frequency. The RFID reader is also configured to adjust the first frequency of the continuous RF wave to a second frequency, and then receive a backscattered RF wave at the first frequency from an RFID tag. The backscattered RF wave generated by the RFID tag in response to the continuous RF wave of the first frequency. A difference between the first frequency and the second frequency is equal to or greater than a frequency difference threshold to reduce interference between the backscattered RF wave and the continuous RF wave.
According to yet another aspect, a Radio Frequency Identification (RFID) reader includes means for transmitting a continuous radio frequency (RF) wave at a first frequency. The RFID reader also includes means for adjusting the first frequency of the continuous RF wave to a second frequency, and means for receiving a backscattered RF wave at the first frequency from an RFID tag. The backscattered RF wave is generated by the RFID tag in response to the continuous RF wave of the first frequency, where a difference between the first frequency and the second frequency is equal to or greater than a frequency difference threshold to reduce interference between the backscattered RF wave and the continuous RF wave.
According to another aspect, a non-transitory computer-readable storage medium includes computer-executable instructions recorded thereon, where executing the computer-executable instructions on one or more processors of a Radio Frequency Identification (RFID) reader causes the RFID reader to perform operations. The operations include: (i) transmit a continuous radio frequency (RF) wave at a first frequency; (ii) adjust the first frequency of the continuous RF wave to a second frequency; and then (iii) receive a backscattered RF wave at the first frequency from an RFID tag. The backscattered RF wave is generated by the RFID tag in response to the continuous RF wave of the first frequency, where a difference between the first frequency and the second frequency is equal to or greater than a frequency difference threshold to reduce interference between the backscattered RF wave and the continuous RF wave.
Other objects and advantages associated with the aspects and embodiments disclosed herein will be apparent to those skilled in the art based on the accompanying drawings and detailed description.
A more complete appreciation of the various aspects and embodiments described herein and many attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings which are presented solely for illustration and not limitation, and in which:
Various aspects and embodiments are disclosed in the following description and related drawings to show specific examples relating to exemplary aspects and embodiments. Alternate aspects and embodiments will be apparent to those skilled in the pertinent art upon reading this disclosure, and may be constructed and practiced without departing from the scope or spirit of the disclosure. Additionally, well-known elements will not be described in detail or may be omitted so as to not obscure the relevant details of the aspects and embodiments disclosed herein.
The word “exemplary” is used herein to mean “serving as an example, instance, or illustration.” Any embodiment described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments. Likewise, the term “embodiments” does not require that all embodiments include the discussed feature, advantage or mode of operation.
The terminology used herein describes particular embodiments only and should not be construed to limit any embodiments disclosed herein. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. Those skilled in the art will further understand that the terms “comprises,” “comprising,” “includes,” and/or “including,” when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Further, many aspects are described in terms of sequences of actions to be performed by, for example, elements of a computing device. Those skilled in the art will recognize that various actions described herein can be performed by specific circuits (e.g., an application specific integrated circuit (ASIC)), by program instructions being executed by one or more processors, or by a combination of both. Additionally, these sequence of actions described herein can be considered to be embodied entirely within any form of computer-readable storage medium having stored therein a corresponding set of computer instructions that upon execution would cause an associated processor to perform the functionality described herein. Thus, the various aspects described herein may be embodied in a number of different forms, all of which have been contemplated to be within the scope of the claimed subject matter. In addition, for each of the aspects described herein, the corresponding form of any such aspects may be described herein as, for example, “logic configured to” perform the described action.
RFID reader 125 is configured to communicate with the RFID tags of the platforms 110-118 over a physical communications interface or layer, shown in
The Internet 175 includes a number of routing agents and processing agents (not shown in
In
The RFID reader 125 may be connected to the Internet 175 via, for example, an optical communication system, such as FiOS, a cable modem, a digital subscriber line (DSL) modem, or the like. The RFID reader 125 may communicate with the respective RFID tags of platforms 110-120 using an RFID protocol over air interface 108 and may communicate with the Internet 175 using the standard Internet protocols (e.g., TCP/IP).
Server 170 is shown as connected to the Internet 175. The server 170 can be implemented as a plurality of structurally separate servers, or alternately may correspond to a single server. In various embodiments, the server 170 may be optional (as indicated by the dotted line), and may contain functionality to manage a group of platforms containing RFID tags, such as the group of platforms 110-118, based on communications with RFID reader 125 via Internet 175.
As mentioned above, each of the platforms 110-118 may include a respective RFID tag. RFID reader 125 may detect, store data received from, communicate with, act on, and/or the like with one or more of the RFID tags present in the wireless communications system 100. For example, automobile 116 may include an RFID tag embedded within or attached thereto (e.g., by way of a decal or pass card). RFID reader 125 may be located on or near a roadway to detect the presence and communicate with the RFID tag to obtain data from the RFID tag. The RFID reader 125 may then pass the data along to computer 120 and or server 170, where the data is used to identify the user of the automobile 116 for performing a variety of tasks, such as charging a user for roadway tolls.
RFID tag 204 can be either a passive, active, or battery-assisted passive. An active RFID tag has an on-board battery and periodically transmits its ID signal. A battery-assisted passive (BAP) RFID tag has a small battery on board and is activated when in the presence of RFID reader 202. A passive RFID tag is cheaper and smaller because it has no battery; instead, the passive RFID tag uses the radio energy transmitted by the RFID reader 202. However, to operate a passive RFID tag, it must be illuminated with a power level much larger than required for the passive RFID tag to transmit a signal transmission.
RFID Tag 204 may either be read-only, having a factory-assigned serial number that is used as a key into a database, or may be read/write, where object-specific data can be written into the tag by the system user. Field programmable tags may be write-once, read-multiple; “blank” tags may be written with an electronic product code by the user.
RFID tag 204 may contain at least two parts: (1) an integrated circuit for storing and processing information, modulating and demodulating a radio-frequency (RF) signal, collecting DC power from the incident reader signal, and other specialized functions; and (2) an antenna for receiving and transmitting the signal. The tag information may be stored in a non-volatile memory contained in the RFID tag 204. The RFID tag 204 may include either fixed or programmable logic for processing the transmission and sensor data, respectively.
The transceiver 206 of the RFID reader 202 transmits one or more messages by way of a continuous RF wave 208 to energize and interrogate the RFID tag 204. Although
However, in some instances a portion 212 of the continuous RF wave 208 currently being transmitted by the transceiver 206 of RFID reader 202 and the backscattered RF wave 210 received from the RFID tag 204 are received on the same receive chain of the transceiver 206, thus causing interference. Furthermore, as the range between the RFID reader 202 and RFID tag 204 increases, the RFID reader 202 may attempt to increase the transmit power of the continuous RF wave 208. However, doing so only exasperates the interference problem, as with increased transmit power there will be more leakage power, by way of portion 212 that will go into the receive chain of the transceiver 206. Also, as the range to the RFID tag 204 increases, the propagation loss will be larger. Thus, the signal to tone ratio will be lower (i.e., since transmit power of continuous RF wave 208 is increased and the power of backscattered RF wave 210 decreases due to propagation loss, the ratio of the power of the backscattered RF wave 210 to power of the continuous RF wave 208 is reduced).
Accordingly, aspects of the present disclosure include an RFID reader 202 that is configured to vary the frequency of the continuous RF wave 208. By varying the frequency of the continuous RF wave 208, the backscattered RF wave 210 received at RFID reader 202 may be sufficiently far enough away from the frequency of the continuous RF wave 208 that the RFID reader 202 is currently transmitting so as to reduce interference between the backscattered RF wave 210 and the portion 212 of the continuous RF wave 208 that is also received at the transceiver 206.
In a process block 405, the transmitter 304 of transceiver 302 transmits the continuous RF wave 208 at a first frequency. The transmitting of the continuous RF wave 208 may include transmitting a message, such as a query message, according to one or more RFID protocols. Next, in a process block 410, the transmitter 304 adjusts the first frequency of the continuous RF wave 208 to a second frequency. As shown in
In one example, the RFID reader 202 may be configured to determine whether or not to adjust the frequency of the continuous RF wave 208 in response to a transmit power of the continuous RF wave 208. That is, the RFID reader 202 may compare a current transmit power of the continuous RF wave 208 to a power threshold. If the transmit power is greater than or equal to the power threshold, then the RFID reader 202 may proceed with adjusting the frequency of the continuous RF wave 208, as discussed above. However, if the transmit power is less than the power threshold, then the RFID reader may be configured to maintain the continuous RF wave 208 at the first frequency, such that the continuous RF wave 208 is at the first frequency when the backscattered RF wave 210 of the first frequency is received at the receiver 306. In one aspect, the power threshold may correspond to a range between the RFID reader and a respective RFID tag. For shorter ranges, the transmit power may be reduced and propagation delays are shorter. Thus interference may be less of a factor for these shorter ranges.
Next, in process block 415, the receiver 306 receives the backscattered RF wave 210 at the first frequency from an RFID tag (e.g., RFID tag 204). As discussed above, the RFID tag 204 may be a passive or partially passive RFID tag 204 that is configured to generate the backscattered RF wave 210 in response to, and at the same frequency as, the continuous RF wave 208 received at the RFID tag 204.
As shown in
In another example, the adjustment to the frequency of the continuous RF wave 208 is based on a frequency difference threshold. For example, where the continuous RF wave 208 is initially generated at a first frequency, the frequency adjust signal 312 may adjust the first frequency to a second frequency by the time the backscattered RF wave 210 is received at the receiver 306, where a difference between the first frequency and the second frequency is equal to or greater than the frequency difference threshold. In one example, the frequency difference threshold ensures that the second frequency of the continuous RF wave 208 currently being transmitted by the transmitter 304 is sufficiently different from the first frequency of the backscattered RF wave 210 so as to further reduce interference between the continuous RF wave 208 and the portion 212 of the continuous RF wave 208.
As shown in
In one aspect, the bandwidth/stop band of the filter 310 is selected to remove/attenuate the continuous RF wave 208 that is currently being transmitted by transmitter 304 when the backscattered RF wave 210 is received at the receiver 306. As will be appreciated, insufficient removal/attenuation of the continuous RF wave 208 by filter 310 may result in undesirable interference or effects, such as a resultant beat frequency at output 314. In one aspect, the frequency difference threshold is based on a bandwidth/stopband of the filter 310. For example, the frequency difference threshold may be made smaller for filters 310 with a narrower bandwidth/stopband.
Referring back to
By way of example,
At time T1, the RFID reader 502 transmits a first message 506 utilizing a continuous RF wave (e.g., continuous RF wave 208). The first message 506 may be a Query message, a QueryAdjust message, or a QueryRep message according to one or more RFID protocols. In one example, first message 506 (e.g., QueryRep) is a repetition command to talk to the next RFID tag and is configured to get the RFID tag to respond with an RN16. The RN16 is a 16 bit random or pseudo-random number configured to address the RFID tag, especially before the ID (e.g., EPC) of the RFID tag is known. At time T2, the RFID tag 504 generates a response to the first message 506, which as shown in
However, in other examples, transaction 500 may continue with RFID reader 502 further interacting with RFID tag 504. For example, at time T5, the RFID reader 502 then transmits a REQ_RN(RN16) message 514 to the RFID tag 504. In one example, the REQ_RN(RN16) message 514 is a request for a random number, however, other request may be utilized as well. Again, if the RN16 contained in the REQ_RN(RN16) message 514 is valid, RFID tag 504 then responds at time T6 by generating a HANDLE message 516. At time T7, the RFID reader 502 then accesses the RFID tag 504 by generating one or more command messages 518 using the received handle as a parameter. The command messages 518 may include one or more commands to read other memories in the RFID tag 504 and/or commands for the RFID tag 504 to perform one or more other operations (e.g., read sensors, encryption).
Each of the above-referenced messages 506, 510, 514, and 518 are transmitted by the RFID reader 502 utilizing a continuous RF wave generated by the RFID reader 502 and each of the messages 508, 512, and 516 are received by the RFID reader 502 via a backscattered RF wave generated by the RFID tag 504. In one aspect, the RFID reader 502 is configured to adjust the frequency of the continuous RF wave after completing transmission of a message and prior to receiving a corresponding response on the backscattered RF wave. For example, RFID reader 502 may transmit the first message 506 on the continuous RF wave of a first frequency. After transmission of the first message 506 is complete and prior to receiving a response to the first message 506, (e.g., RN16 message 508), the RFID reader 502 may adjust the first frequency of the continuous RF wave to a second frequency, such that the continuous RF wave is at the second frequency when the backscattered RF wave of the first frequency carrying the RN16 message 508 is received at the RFID reader 502. As discussed above, a difference between the first frequency and the second frequency is equal to or greater than the frequency difference threshold so as to reduce interference between the backscattered RF wave and the continuous RF wave currently being transmitted by RFID reader 502.
As shown in
By way of another example, the RFID reader 502 may then transmit the ACK message 510 utilizing the continuous RF wave 602 at the second frequency f2. The transmission of the ACK message 510 is shown as being completed at time T3 when continuous RF wave 602 is at a second frequency f2. Thus, the corresponding {PC, EPC} message 512 will be generated by the RFID tag 504 utilizing a backscattered RF wave at the second frequency f2. Prior to receiving the {PC+EPC+CRC} message 512 at time T4, the RFID reader 502 adjusts the frequency of the continuous RF wave 602 to a third frequency f3. Thus, at time T4, the frequency of the continuous RF wave 602 is at the third frequency f3 that is sufficiently different (e.g., greater than or equal to the frequency difference threshold) from the second frequency f2 of the backscattered RF wave of the {PC, EPC} message 512.
As mentioned above, adjusting the frequency of the continuous RF wave 602 may be implemented in a variety of ways in accordance with various aspects of the present disclosure. For example,
As discussed above, a difference between the first frequency F2 and the second frequency F2 may be based on a frequency difference threshold, so as to reduce interference between the continuous RF wave 702 and the backscattered RF wave 704 at time T2′. In one example, the frequency difference threshold may be maintained by the RFID reader by way of controlling a slew rate of the continuous RF wave 702. That is, by controlling the slew rate of the continuous RF wave 702 with respect to a range of the RFID tag, interference between the continuous RF wave 702 and the backscattered RF wave 704 can be mitigated (e.g., by way of filter 310 of
By way of a specific example, assuming an RFID tag is about 20 meters from the RFID reader, then the round trip time (RTT) is approximately 120 ns (i.e., T2′−T1′=120 ns). Continuing with this example, the RFID reader may be capable of using 25 MHz of the ISM band and includes an analog filter (e.g., filter 310 of
As shown in
While internal components of RFID readers, such as RFID reader 800, can be embodied with different hardware configurations, a basic high-level configuration for internal hardware components is shown as platform 802 in
Accordingly, various aspects can include an RFID reader (e.g., RFID reader 800) including the ability to perform the functions described herein. As will be appreciated by those skilled in the art, the various logic elements can be embodied in discrete elements, software modules executed on a processor (e.g., processor 808) or any combination of software and hardware to achieve the functionality disclosed herein. For example, transceiver 806, processor 808, memory 812, and I/O interface 814 may all be used cooperatively to load, store and execute the various functions disclosed herein and thus the logic to perform these functions may be distributed over various elements. Alternatively, the functionality could be incorporated into one discrete component. Therefore, the features of the RFID reader 800 in
A module 905 for transmitting a continuous RF wave at a first frequency may correspond at least in some aspects to, for example, transceiver 206 of
The functionality of the modules 905-915 may be implemented in various ways consistent with the teachings herein. In some designs, the functionality of modules 905-915 may be implemented as one or more electrical components. In some designs, the functionality of modules 905-915 may be implemented as a processing system including one or more processor components. In some designs, the functionality of modules 905-915 may be implemented using, for example, at least a portion of one or more integrated circuits (e.g., an ASIC). As discussed herein, an integrated circuit may include a processor, software, other related components, or some combination thereof. Thus, the functionality of different modules may be implemented, for example, as different subsets of an integrated circuit, as different subsets of a set of software modules, or a combination thereof. Also, it will be appreciated that a given subset (e.g., of an integrated circuit and/or of a set of software modules) may provide at least a portion of the functionality for more than one module.
In addition, the components and functions represented by
Further, those of skill in the art will appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or a combination of computer software and electronic hardware. To clearly illustrate this interchangeability of hardware and hardware-software combinations, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The methods, sequences and/or algorithms described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium may be integral to the processor.
Accordingly, an embodiment of the invention can include a non-transitory computer-readable media embodying a process for the communicating by an RFID reader, as discussed above with reference to process 400 of
While the foregoing disclosure shows illustrative embodiments of the invention, it should be noted that various changes and modifications could be made herein without departing from the scope of the invention as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the embodiments of the invention described herein need not be performed in any particular order. Furthermore, although elements of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
While the foregoing disclosure shows illustrative aspects and embodiments, those skilled in the art will appreciate that various changes and modifications could be made herein without departing from the scope of the disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the aspects and embodiments described herein need not be performed in any particular order. Furthermore, although elements may be described above or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
Number | Date | Country | |
---|---|---|---|
62193297 | Jul 2015 | US |