Embodiments discussed herein are related to radio frequency locating and, more particularly, to systems, methods, apparatuses, computer readable media and other means for target location by high-resolution time-of-arrival (TOA) determination in a multiple receiver target location system.
A number of deficiencies and problems associated with UWB Real Time Locating Systems particularly related to bandwidth management are identified herein. Through applied effort, ingenuity, and innovation, exemplary solutions too many of these identified problems are embodied by Example embodiments of the present invention may include, which is described in detail below.
In some examples, systems, methods, apparatuses, and computer readable media are disclosed for providing a bandwidth management of a multiple receiver real-time target location system (RTLS). In some examples, a method, apparatus, and computer program product (CPP) for a bandwidth management of a multiple receiver target location system is described herein, comprising determining a buffer fullness level for a receive buffer in a receiver in a set of one or more receivers, determining by the processor hub a set of buffer elements to be removed from the receive buffer in at least one of the receivers based on the buffer fullness level, and communicating to the one or more receivers to remove from the receive buffers the set of receive buffer elements identified by a sequence number.
In some examples, the method, apparatus, and CPP further comprises determining a buffer fullness level for a receive buffer comprises determining a total number of sequence numbers in the buffer. The sequence numbers are associated with tag transmitters. The determining the buffer fullness level may comprise a mapping of a total number of sequence numbers associated with each tag.
In some examples, determining the, the buffer fullness level may comprise receiving the buffer fullness level at the processor hub on one or more of an RF communication channel and an RS-422 communication channel.
In some examples, the determining the set of buffer elements to be removed comprises determining of a time-of-arrival (TOA) invalidity at the multiple receivers. The TOA invalidity may comprise one or more of determining an out-of-range TOA, an intermittent TOA, and an indeterminate TOA or the like. The determining the set of buffer elements to be removed comprises, in some examples, a determining of a location estimate invalidity at a Central Processor/Hub.
In some examples, the method, apparatus, and CPP may be further specified, whereby the determining the location estimate invalidity comprises one or more of determining a non-physical location estimate, an out-of-range location estimate, a location estimate intermittently ‘skipping’ between two or more location estimates, and an under-determined location estimate. The determining the location estimate invalidity may further comprise a determining of an updated location estimate with a subset of the TOAs and receivers used make the location estimate. The determining the updated location estimate may comprise an iterative feedback loop. The iterative feedback loop, in some examples, compares an error function associated with the updated location estimate and the location estimate to determine a minimum error.
In some examples, communicating to remove the set of receiver buffer elements identified by the sequence number comprises one or more of a data compression command and a pruning command. The data compression command comprises, in some examples, one or more of a data word compression, an RFID transmitter identification (TX ID) compression, and a CRC compression. The pruning command comprises a pruning as a function of invalid TOAs, invalid locations, and updated locations. The pruning command may comprise a mapping of an RFID TX ID, a sequence number, and a set of receivers. The pruning command may be indexed to remove one or more sequence numbers from the receive buffers of one or more receivers.
Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
Example embodiments of the present invention may include now will be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the inventions are shown. Indeed, these inventions may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like numbers refer to like elements throughout.
Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the inventions are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Active radio frequency identification system (RFID) target location systems provide for transmitters incorporated with each target RFID tag and a grid of receivers to resolve a collection of time-of-arrival (TOA) measurements to locate a tag transmitter. Presently, active radio frequency identification (RFID) tag target location systems provide for approximately one nanosecond (ns) TOA accuracy and resolution at ranges up to 500 feet, depending on power requirements and regulations. In example embodiments, the present invention may include an active bandwidth management of a high-resolution TOA-based multiple receiver real-time location system (RTLS). A communication between a central processor or hub, responsible for converting the TOA packet data from the multiple receivers in a receiver grid into the RFID tag location estimates, and the receivers themselves, may direct which subset of receivers and which subset of packet data from each receiver is to be requested as a minimum TOA packet data for an accurate RFID tag location estimate for the one or more tags in the system.
The hub, in some examples, determines the minimum TOA packet data to request in conjunction with a channel capacity, a maximum bandwidth or data rate allowed by the communication channel associated with the multiple receiver target location system, and/or the like. The issues of correctly assembling critical and pertinent TOA packet data from each receiver, corresponding to location estimates for each RFID tag as a function of the data rate limitation are performed by the hub. As such, the hub may determine which TOA packet data to request from each receiver.
In some example embodiments, the subset of TOA packet data may exclude TOA packet data received from a subset of tags and/or the like. The subset of TOA packet data may exclude, in some examples, a combination of TOA packet data from a subset of receivers in the receiver grid, wherein the subset of packet data from the subset of the receivers itself may be receiver dependent and vary from receiver to receiver. In such an example exclusion, the hub may determine a minimum required packet data set from the multiple receivers necessary to determine an RFID tag location for the RTLS, wherein each minimum required TOA packet data set may correspond to a specific RFID tag or set of RFID tags.
A receiver 13a, for example, in the receiver grid (13a-i), processes the data packet 110 transmitted from and RFID tag 12a, for example, from the RFID tag field (12a-f), to determine a time-of-arrival (TOA) associated with the data packet 110. A collection of TOAs associated with the RFID tag 12a, attributed to one or more receivers, each similar to the receiver 13a, from the receiver grid (13a-i), is used by the Central Processor/Hub 11 to estimate the location of the RFID tag 12a. A detailed block diagram illustrating the receiver 13a functional blocks and communication with the Central Processor/Hub 11 is given in
A preamble code and a synchronization bits fields from the data packet 110 are grouped and identified as transmitted (TX) pulse data 120, used by the TOA determination function 24 to determine the TOA associated with the RFID tag 12a. A transmitter identification, a data words 1-2, and a CRC field are grouped and identified as transmitter identification data (TX ID) 130, used by the data recovery function 24 to identify the RFID tag 13a, for example, and provide for augmenting data.
Functional blocks for the bandwidth management system, as illustrated in
The message filtering function 27′ comprises a message queue 27A′, a message filtering functional block 27B′, and a transmit (TX) queue 27C′, whereby a queue of tag messages 27 is filtered and pruned such that a tag message subset 27 is sent to a buffering/repeating/formatting/decoding functional block 30 to activate synchronous communication with the Central Processor/Hub 11 on data lines 30A-B. Synchronous transmissions from the receiver 13a, for example, to the Central Processor/Hub 11 are summarized by the transmit (TX) TOA data block 140.
The bandwidth management system 100, as illustrated in
At the core of the bandwidth management system 100, illustrated in
The receiver 13a, for example, provides the Central Processor/Hub 11 with the TX TOA data block 140 that comprises at least an RFID tag identification (TX ID) and TOA, along with a sequence number (Seq. No.) to identify the TOA instance, the specific TOA defined by the RFID tag and time tag, any associated data contained in at least a data word header (00) and data words 01-04, and a TX queue size message indicating the relative fullness of the TX queue 27C′.
In some embodiments, the TX queue 27C′ may repeatedly and periodically provide for a fullness level, the TX queue size, to be accessed by the buffering function 30 for transmission to the Central Processor/Hub 11. The TX queue size may, in some examples, provide for a fullness level report that the TX queue 27C′ is 1/16, ⅛, ¼, and ½ full.
In some embodiments, the TOA TX data 140 may be transmitted from the buffering function 30 resident at the receiver 13a, for example, to the Central Processor/Hub 11 at a transmission (TX) rate approximately equal to a repetition rate associated with an RFID tag data packet. In this example, it is expected that the tag messages 27 generated from the RFID data packets may enter the message queue 27A′ at approximately the same rate that the tag messages exit the TX queue 27C′, and are subsequently transmitted to the Central Processor/Hub 11 as a TOA TX data block 140. As such, it is not expected that any type of message filtering would be required.
In some examples, the TX queue size may not be transmitted from the receiver 13a, for example, each and every time there is a TX TOA data 140 transmission from the receiver to the Central Processor/Hub 11. In some embodiments, both the TX queue size and TX TOA data 140 may be transmitted at approximately 1 Hz (1 TX/sec). In other embodiments, the TX queue size transmission rate and the TX TOA data 140 transmission rate may be 0.1 TX/sec and 1 TX/sec, respectively. In some embodiments, the TX queue size transmission rate and the TX TOA data 140 transmission rate may be 1 TX/sec and 12 Tx/sec, respectively.
In some embodiments, the TOA TX data 140 may be transmitted from the buffering function 30 resident at the receiver 13a, for example, to the Central Processor/Hub 11 at a transmission (TX) rate less than the repetition rate associated with an RFID tag data packet. In this example, it is expected that the tag messages 27 generated from the RFID data packets may enter the message queue 27A′ at a greater rate than the tag messages exit the TX queue 27C′, and subsequently transmitted to the Central Processor/Hub 11 as the TOA TX data block 140. As such, it is expected that, in time, one or more of the TX queue size fullness level reports is generated by the TX queue 27C′.
In response to the TX TOA message block 140 report from the receiver that the TX queue size is 1/16, ⅛, ¼, and ½ full, for example, the Central Processor/Hub 11 is activated to prepare a command block 150 message to feedback to the receiver 13a, for example, to perform a data compression on any or all tag message 27 entries in the TX queue 27C′ and to preempt the transmission of any and all TX TOA data and data blocks 140 deemed redundant or unnecessary in performing the RFID tag location estimates at the Central Processor/Hub 11.
At least two critical issues need be addressed: (1) conditions that require data compression and tag message 27 filtering, as dictated by the command block 150, and (2) message filtering 27B′ itself, the collection of commands comprising the command block 140, and their functions.
Firstly, the conditions that may require preemptively removing RFID tag message 27 entries from the TX queue 27C′ may be summarized by, but are not limited to, an insufficient channel capacity or data rate limit associated with the data lines 30A-B; that is, insufficient to transmit tag messages 27 to the Central Processor/Hub 11 at a data rate at least as fast as the tag messages 27 fill the message buffer 27A′.
The TX queue size, discussed previously with regard to the TX TOA data block 140, provides for an indication of the message buffer and TX queue fullness, and may trigger the Central Processor/Hub 11 to send a command in the command block 150 to the receiver 13a, for example, to perform a data compression on any or all the tag messages 27 or to reduce the number of tag messages 27 in the message queue 27A′. As such, the TX TOA data rate, coupled with the data compression of the tag messages 27 and the repeated removal from the message queue 27A′ of redundant or unnecessary tag messages 27, may effectively allow for the message queue 27A′ to empty at a rate comparable to the TX data rate, restoring both the message and TX queues 27A,C to a steady-state equilibrium.
Secondly, the message filtering method itself, the collection of commands comprising the command block 140, and their functions, may be selected strictly as a function of the TX queue size reported from the receiver 13a, for example, or may be a function of a combination of the data in the TX TOA data block 140 transmitted to the Central Processor/Hub 11. Specifically, the message filtering may be a combination of the TX queue size, the RFID tag TOA and associated ID and Seq. No., and an auxiliary data, all provided for by the TX TOA data block 140.
The third and fifth tag message 27 entries, as with all tag message entries in the message and TX queues 27A′,C′, are assigned a sequence number (seq. no.). The seq. nos. are assigned according to an arrival time at the receiver 13a, for example, of the TOA packet data 110 associated with the tag message 27. In some embodiments, the seq. no. may be assigned according to an arrival time of the associated TOA and tag message 27 at the head of the message queue 27A′. Seq. nos. are effectively synchronized across the receivers 13a-i in the receiver grid by the RFID tag 12a-f transmission, whereby for all practical purposes with respect to the tag messages 27, for each RFID tag 12a, for example, the TX pulse data 120, that is, the preamble code and synchronization bits from the TOA packet data 110, arrives at each of the receivers 13a-i in the receiver grid simultaneously.
The commands in the command block 150 to perform a data compression of the tag message 27 entries and to remove the tag message 27 entries from the message and TX queues 27A′,C′ include at least the following: (1) compact mode, (2) shorten ID, (3) CRC:LSB, and (4) pruning. Commands (1)-(3) comprise the data compression commands; command (4), the pruning command, provides for a tag message 27 removal process. The Central Processor/Hub 11 selects the appropriate command from the command block 150 according to one or more of the TX TOA block 140 data transmitted from the receivers 13a-i in the receiver grid. A description of the commands comprising the command block 140 is given the next set of paragraphs.
(1) The compact mode command removes all seq. nos. from the message and TX queues 27A′,C′ where the tag message 27 associated with the given seq. no. comprises a TX ID that is greater than four bytes (32 bits) long. Additionally, the compact mode command reduces the size of the header data field from 16 bits to 8 bits, and limits the number of data bytes transmitted from the receiver, for example receiver 13a, buffer 30, from a maximum of five data bytes 00-04, including the data byte header (00), to a minimum of zero data bytes (0 bits). A communication of a global and/or individual receiver line end command, transmitted from the last receiver in a daisy chain of receivers, echoes whether the compact mode has been invoked by the Central Processor/Hub 11, in some examples. Under normal operation, in the absence of a compact mode invocation, the data byte header includes, in some examples, an indication of the number of data bytes transmitted.
(2) The shorten ID format command removes one byte (8 bits) from the two byte header information in the TOA packet data 110, as indicated by the first bit of the header. Also, the shorten ID format command provides for a mask for the two most significant bytes (MSBs) for the TX ID in the TOA data packet 110, such that the seq. no. with TX ID MSBs that do not match the mask are removed from the message and TX queues 27A′,C′. Further, for seq. nos. remaining in the TX queue 27C′, only the two least significant bytes (LSBs) are transmitted from the receiver, for example receiver 13a, by buffer 30, to the Central Processor/Hub 11.
(3) The CRC:LSB mode removes the MSB (8 bits) from the CRC error correcting code from all seq. nos. in the message and TX queues 27A′,C′. The CRC:LSB command, in some examples, is given in conjunction with the compact mode and shorten ID format commands. The necessary length of the CRC is a function of the length of the full tag message. Shortening the tag message by enacting one or more of the compact mode and shorten ID format commands allows for a shorter CRC. The CRC:LSB command acknowledges this by explicitly commanding a shorter CRC for every seq. no. in the message and TX queues 27A′,C′.
(4) The pruning command provides for several options of pruning collections or groupings of seq. nos. from the message queue 27A′. A first option for pruning a collection of seq. nos. from the message queue 27A′ is for the Central Processor/Hub 11 to select a range of seq. nos for removal, whereby the seq. no. range directly corresponds to a time interval. In one embodiment, the time interval selected may be periodic. In another embodiment, the selected time range corresponding to the seq. no. range may coincide with a time frame deemed by the Central Processor/Hub 11 selection logic to be redundant or uninteresting. In still another embodiment, the selected time range corresponding to the seq. no. range may be arbitrary.
In one embodiment, the arbitrary seq. no. range or set of ranges may provide for a fractional reduction in the total no. of seq. nos. present in the TX queue 27C′. In an example embodiment, a six bit pruning code may be included as part of the pruning command in the command block 150 to encode the fractional reduction in seq. nos. In some examples, the pruning code may provide for a command to reduce the number of seq. nos. in the TX queue 27C′ by one of the fractional amounts 1/16, ⅛, and ¼.
Each of the aforementioned commands from the command block 150, in accordance with described embodiments, is provided for by the Central Processor/Hub 11 selection logic based strictly on the TX queue size data returned to the Central Processor/Hub 11 in the TX TOA data block 140 from the receivers 13a-f in the receiver grid. As previously described, the TX queue size provides for, at each of the receivers 13a-i in the receiver grid, a fullness level of 1/16, ⅛, ¼, and ½ full. Provided the TX queue size input from the receivers 13a-i, the Central Processor/Hub 11 selection logic determines which combination, if any, of the previously described commands from the command block 150 to prescribe to compress and reduce receiver 13a-i TX TOA data block 140 transmissions in an effort to manage the bandwidth of the RTLS.
A second option for pruning a collection of seq. nos. from the message queue 27A′ is for the Central Processor/hub 11 to select seq. nos. corresponding to unused and invalid RFID tags 12a-f. In one example, an RFID tag 12a-f may be determined unused if a location estimate associated with the RFID tag 12a, for example, is determined to be from an unused region. An example may be a static cargo inventory, whereby cargo located in a permanent storage may be no longer tracked.
In another example, an RFID tag 12a-f may be determined invalid if a location estimate associate with the RFID tag 12a, for example, is determined to be one or more of physically not possible, not stable, ‘skipping’ and ‘jumping’ intermittently between two or more location estimates, and indeterminate. In each of the invalid determinations, as with the unused determination, the seq. no. selection logic, as performed by the Central Processor/Hub 11, requires the formation of a location estimate for the examined RFID tags 12a-f.
The second option for the pruning command requires a location estimate for each of the RFID tags 12a-f represented in the TX queue 27C′, resident at each of the pertinent receivers 13a-i. The pruning command associated with the location estimates calculated by the Central Processor/Hub 11 requires the IDs and TOAs from the TX TOA data block 140, in addition to the TX queue size. The seq. nos. are required to tie the RFID tag identification and TOA back to the TX queue 27C′. The TX queue size provides an indication as to whether and when to activate the bandwidth management function 100.
Calculation of RFID tag 12a-f location estimates provided for by the Central Processor/Hub 11 may yield RFID tag location estimates that are one or more of physically not possible, not stable, ‘skipping’ and ‘jumping’ intermittently between two or more location estimates, and indeterminate. The results for the RFID tag location estimates, based on the TOAs encapsulated by the TX TOA data block 140, the several instantiations of the unused and invalid location estimates, map directly onto the pruning indicia.
Each of the aforementioned commands and embodiments of commands, associated with the command block 150, to assert a bandwidth management function 100, requires either the TX queue size or the RFID tag TOA, accompanied by the corresponding RFID tag IDs and seq. nos., or both. In yet another embodiment, a pruning command may be issued by the command block 150 from the Central Processor/Hub 11 to the receivers 13a-i, whereby the pruning may focus on seq. nos. determined or tagged as invalid by a data word in the TX TOA data block 140. The invalidity of a seq. no. or set of set of seq. nos. may be determined by the arbitrate buffer function 26 in the receiver 13a, for example, whereby the arbitrate buffer function 26 may determine that the TOA determination function 24 did not successfully converge to a solution or a realizable solution.
Rows in
In
The example embodiments given thus far provide for situations whereby like seq. nos. are removed from the TX queues 27C′ for each and every corresponding receiver 13a-i in the receiver grid. Another possibility exists that different combinations of seq. nos. are removed from different receivers 13a-i in the receiver grid, providing for a richer implementation of the bandwidth management function 100. Such an implementation of the bandwidth management function is addressed in the following paragraphs.
It can be appreciated that the receiver specific pruning outlined with respect to
In the bandwidth management function given in
Further, the invalidation of receivers 13a,e, as determined by data communicated to the Central Processor/Hub 11 in the TX TOA data block 140, may be specific to a limited number of RFID tags, RFID tags corresponding to seq. nos. 0002-3, 0006-8, in the example database 200B, given in
The invalidation of TOAs registered in the TX TOA data block 140, as previously suggested, may be determined by a location estimate, calculated at the Central Processor/Hub 11, whereby the location estimate may be one or more of physically not possible or out-of-range, not stable, ‘skipping’ and ‘jumping’ intermittently between two or more location estimates, and indeterminate. Additionally, the TOA as an output of the TOA determination function 24 resident at the receiver 13a, for example, may itself be determined invalid.
An invalid TOA may be due, for example, to excessive noise and echo or reverberation levels in the RF environment, which prevent an adaptive windowing function used at a detector to converge and register a TOA for the given RFID tag TX pulse data 120 associated with the RFID data packet 110. In another example, an invalid TOA may be due to a detection registered by the adaptive windowing function that represents a distance measurement that is clearly out-of-range.
In another example, the TOA registered by the TOA determination function 24 may itself ‘skip’ and ‘jump’ between two or more TOA registrations, providing for an intermittent TOA associated with a given RFID tag and receiver combination. In still another example, the signal-to-noise ratio (SNR) of the TX pulse data 120 may be too low to register a detection at the TOA determination function 24.
In each of these cases, the arbitration buffer function 26 determines an invalid TOA associated with the given RFID tag, receiver, and seq. no. combination, and encodes a data word in the TX TOA data block 140 accordingly for transmission to the Central Processor/Hub 11. The invalidity of the TOA data is provided for as a first layer error check, effectively preempting the series of error checks relying on location estimates made by the Central Processor/Hub 11, outlined previously, which may be considered as a second layer.
More specifically, the second layer error check for valid TOAs, TOAs as registered by the TOA determination function 24, relying on location estimates made at the Central Processor/Hub 11, may be categorized by one or more of a location estimate that is physically not possible or out-of-range, not stable or ‘skipping’ and ‘jumping’ intermittently, and indeterminate or under-defined.
In each of these cases, it may be such that it is not necessary to eliminate each and every seq. no. associated with bad TOAs that constitute invalid location estimates. That is, it may be possible that only a fraction of the constituent TOAs contribute to the location error, and as such, only a fraction of the constituent seq. nos. need be removed.
In an example embodiment, the second layer error check for TOA invalidity may function in conjunction with an iterative location estimate function, whereby the iterative location estimate function repeatedly estimates the location for the RFID tag 12a, for example, as indexed seq. no. 0001, which is constituted by TOAs from receivers 13a-b,e, in the example given in
In some examples, an iterative location estimate function, performed at the Central Processor/Hub 11, may not be provided with a sufficient number of TOAs to calculate a location estimate for the given RFID tag. As such, the location estimate for the given RFID tag is deemed indeterminate or under-defined.
At the other extreme, the iterative location estimate function at the Central Processor/Hub 11 may, in another example, be provided more TOAs than necessary to determine a location estimate for the given RFID tag. As such, the location estimate for the given RFID tag is deemed over-determined.
In the case of an over-determined location estimate, it may be determined that a subset of the TOAs, each associated with the given RFID tag 12a, for example, and a receiver 13a-i in the receiver grid, may be unnecessary, or moreover, even contribute to a location estimate error that was heretofore not detected by the first two error check layers.
The iterative location estimate function, acting effectively as a third layer error check, provides for redress of the TOAs that passed the first two error check layers, performed by the TOA arbitration function 26 and by the registration of gross location errors and anomalies by the Central Processor/Hub 11. That is, for an over-determined location estimate, the iterative location estimate function may pare away unnecessary and less accurate TOA measurements to make a more accurate location estimate. Upon removal of a subset of the TOAs used to constitute the location estimate for a given RFID tag 12a, for example, the Central Processor/Hub 11 may then collect all of the remaining associated seq. no. and receiver pairs in the pruning command for subsequent transmission as part of the command block 150 to the respective receivers.
The remaining seq. no. and receiver pairs necessary for the calculation of the location estimate may be considered a minimum subset of TOAs. The minimum subset TOA data packet 110 necessary for an accurate tag location estimate for each of the tags in the tag location system, the RTLS, alternatively or additionally, may be based on historical data, estimation, learning methods, Bayesian likelihood measures, messages from one or more receivers and/or some combination thereof.
Further, for each of the three layers of TOA error checks, as well as for each of the other pruning embodiments, and for the previously described data compression commands (1)-(3) comprising the command block 150, the functions described are dynamic. That is, the feedback loop between the receivers 13a-i in the receiver grid and the Central Processor/Hub 11, defined principally by the TX TOA data block 140 and the command block 150 exchange, changes in time to adjust for the dynamic environment associated with the RFID tag field.
One immediate advantage to a dynamic feedback system, according to the embodiments presented for the present invention, is the data rate may effectively be adjusted dynamically. This provides for a core tenet of the present active bandwidth management system. One example that demonstrates the advantage of a dynamic or active bandwidth management system is a simple level two pruning command to periodically remove seq. nos. associated with a given RFID tag 12a, for example, effectively lowering the TX TOA data block transmission rate for that given RFID tag. In this case, the periodic removal of seq. nos. may correspond to a lower velocity, as calculated by the Central Processor/Hub 11 for the given RFID tag, and as such, requires location estimate updates less frequently.
The process 401 starts with the receiver 13a, for example, receiving the data packet 110 transmitted from the RFID tag 12a, for example, step 405 in
Following the TOA determination function 24, the TOA arbitration buffer 26 selects from a set of parallel TOA determinations with varying threshold and detection levels. At this point, at least a detection failure, a detection inconsistency, a corrupted TOA, an out-of-range TOA, and combinations thereof provide for conditions whereby the TOA extracted and selected by the TOA determination 24 and arbitration 26 may be deemed invalid. The TOA validity check at the receiver 13a, for example, is incorporated in the TOA arbitration buffer function 26, and represented in the flow chart 400 as process 415A.
The TOA, TOA validity, and extracted TX ID and associated data words are collected in the tag message 27 and transferred serially to the message queue 27A′, message filtering function 27B′, and TX queue 27C′, as shown in
In parallel to the process that loads the tag messages 27 into the TX queue 27C′, a TX queue fullness 420A functions to continually provide for a measure of the TX queue 27C′ buffer fullness level. The TX queue fullness function 420A reports one of at least five discrete fullness levels, that of 0 full, 1/16 full, ⅛ full, ¼ full, and ½ full. The TX queue fullness level associated with the TX queue fullness function 420A is then combined in the TX TOA data block 140 with the tag messages 27, comprising at least the TOA, TX ID, associated data words and the CRC associated with the TX TOA data block 140 transmission, and an additional seq. no. corresponding to the specific TOA instantiation or timing. The TX TOA data block 140 is then transmitted in step 425A by respective receivers 13a-i to and received in step 425B by the Central Processor/Hub 11, as shown in
Upon reception of the TX TOA data block 140, the Central Processor/Hub 11 unpacks (not shown) the tag messages 27, including seq. nos. and the TX queue fullness level 420A, and immediately checks the TX queue fullness level 420A by process 420B to determine whether or not it is necessary to perform a pruning function on the TX queue 27C′.
Regardless of whether or not the TX queue fullness test 420B returns an actionable fullness level, the process 401 is directed to perform a location estimate calculation 435, a function to estimate the location of the RFID tag 12a, for example, associated with the TOA, TX ID, and seq. no. received from receiver 13a, for example, and from the multiple remaining receivers 13b-i, for example, in the receiver grid.
The location estimate 435, as described previously in regard to
Following a location estimate 435, the process 401 is directed to test the location estimate for accuracy by a location estimate validity check 440. The location estimate validity check 440, as performed immediately following a first location estimate 435, checks for an RFID tag location estimate inconsistency, comprising one or more of a physically not possible location, an out-of-range location, an unstable location, a location that ‘skips’ and ‘jumps’ intermittently between two or more location estimates, and an indeterminate or under-defined location. Each of the RFID tag location inconsistencies is described in detail in regard to
The occurrence of an invalid TOA 415B or an invalid location estimate 440 may prompt the process 401 to activate a remove TOAs function 430, whereby one or more TOAs associated with a specific tag message 27, a specific RFID TX ID, seq. no., and receiver combination, may be designated for removal from the TX queue 27C′ at the associated receiver. The removal, in some cases, may be dependent on the status returned by the TX queue fullness test 420B, described previously.
The process 401 response to the TX queue fullness test 420B, TOA validity test 415B, and location estimate or first location estimate validity test 440 comprises a variety of bandwidth management functions, including at least a compact mode, shorten ID, CRC:LSB, and pruning function. Each of the bandwidth management functions are encapsulated in a command block 150, transmitted from the Central Processor/Hub 11 to the correct, designated receivers, as summarized by the TX:prune command 455, provided for in
The TX:prune command 455 provides for commands in the command block 150 to remove tag messages, TOAs, TX IDs, and corresponding instantiations or seq. nos., from the specific receivers wherein the TOA was deemed invalid or corrupted. The Central Processor/Hub 11 TX:prune command 455 acts in anticipation of a TX queue 27C′ overflow condition, commanding removal of tag message 27 entries in the TX queue in accordance with the guidelines provided for in
Finally, the bandwidth management function may work in conjunction with an iterative location estimate function, whereby a new location estimate may be estimated with a subset of the original TOAs used to make the first location estimate, with the new location estimate compared to the first estimate and any preceding estimates by an error analysis. A feedback loop to summarize such an activity, described in regard to
Following completion of the iterative location estimate function, a remaining subset of TOAs is deemed sufficient to constitute the best location estimate for the given RFID tag and instantiation or seq. no. The remaining TOAs may be regarded as unnecessary for the location estimate functions 435, 450. As such, it may be possible at this point to remove the unnecessary TOAs, by the remove TOA function 430, from the receiver-side TX queue 27C′, by the TX:prune command 455 encapsulated in the command block 150.
The three layers of error check, the TOA validity 415A-B, the location estimate validity 440, and the recalculated or iterated location estimate comparison loop 445, 450, provides simple to sophisticated bandwidth control and management functions 100 to anticipate and prevent an overflow condition in the TX queues 27C′ at the respective receivers 13a-i in the receiver grid. These concepts are summarized by
In some examples, the active bandwidth management system may provide for accurate and consistent tag location estimates with resolutions less than one foot, corresponding to a TOA resolution of less than one nanosecond (<1 ns), and may provide for such tag location estimates in a high-density tag field.
In some examples, the system comprising at least the tags 12a-f and the receivers 13a-1 is configured to provide two dimensional and/or three dimensional precision localization (e.g., subfoot resolutions), even in the presence of multipath interference, due in part to the use of short nanosecond duration pulses whose TOF can be accurately determined using detection circuitry, such as in the receivers 13a-1, which can trigger on the leading edge of a received waveform. In some examples, this short pulse characteristic allows necessary data to be conveyed by the system at a higher peak power, but lower average power levels, than a wireless system configured for high data rate communications, yet still operate within local regulatory requirements.
In some examples, to provide a preferred performance level while complying with the overlap of regulatory restrictions (e.g. FCC and ETSI regulations), the tags 12a-f may operate with an instantaneous −3 dB bandwidth of approximately 400 MHz and an average transmission below 187 pulses in a 1 msec interval, provided that the rate is sufficiently low. In such examples, the predicted maximum range of the system, operating with a center frequency of 6.55 GHz, is roughly 200 meters in instances in which a 12 dbi directional antenna is used at the receiver, but the projected range will depend, in other examples, upon receiver antenna gain. Alternatively or additionally, the range of the system allows for one or more tags 12a-f to be detected with one or more receivers positioned throughout a football stadium used in a professional football context. Such a configuration advantageously satisfies constraints applied by regulatory bodies related to peak and average power densities (e.g., effective isotropic radiated power density (“EIRP”)), while still optimizing system performance related to range and interference. In further examples, tag transmissions with a −3 dB bandwidth of approximately 400 MHz yields, in some examples, an instantaneous pulse width of roughly 2 nanoseconds that enables a location resolution to better than 30 centimeters.
Referring again to
In some examples, the tag 12a-f may employ UWB waveforms (e.g., low data rate waveforms) to achieve extremely fine resolution because of their extremely short pulse (i.e., sub-nanosecond to nanosecond, such as a 2 nsec (1 nsec up and 1 nsec down)) durations. As such, the information packet may be of a short length (e.g. 112 bits of OOK at a rate of 1 Mb/sec, in some example embodiments), that advantageously enables a higher packet rate. If each information packet is unique, a higher packet rate results in a higher data rate; if each information packet is transmitted repeatedly, the higher packet rate results in a higher packet repetition rate. In some examples, higher packet repetition rate (e.g., 12 Hz) and/or higher data rates (e.g., 1 Mb/sec, 2 Mb/sec or the like) for each tag may result in larger datasets for filtering to achieve a more accurate location estimate. Alternatively or additionally, in some examples, the shorter length of the information packets, in conjunction with other packet rate, data rates and other system requirements, may also result in a longer battery life (e.g., 7 years battery life at a transmission rate of 1 Hz with a 300 mAh cell, in some present embodiments).
Tag signals may be received at a receiver directly from RTLS tags, or may be received after being reflected en route. Reflected signals travel a longer path from the RTLS tag to the receiver than would a direct signal, and are thus received later than the corresponding direct signal. This delay is known as an echo delay or multipath delay. If reflected signals are sufficiently strong enough to be detected by the receiver, they can corrupt a data transmission through inter-symbol interference. In some examples, the tag 12a-f may employ UWB waveforms to achieve extremely fine resolution because of their extremely short pulse (e.g., 2 nsec) durations. Furthermore, signals may comprise short information packets (e.g., 112 bits of OOK) at a somewhat high burst data rate (1 Mb/sec, in some example embodiments), that advantageously enable packet durations to be brief (e.g. 112 microsec) while allowing inter-pulse times (e.g., 998 nsec) sufficiently longer than expected echo delays. Echo (or multipath) delays result from reflections and, if sufficiently strong enough to be detected, avoiding data corruption
Reflected signals can be expected to become weaker as delay increases due to more reflections and the longer distances traveled. Thus, beyond some value of inter-pulse time (e.g., 998 nsec), corresponding to some path length difference (e.g., 299.4 m.), there will be no advantage to further increases in inter-pulse time (and, hence lowering of burst data rate) for any given level of transmit power. In this manner, minimization of packet duration allows the battery life of a tag to be maximized, since its digital circuitry need only be active for a brief time. It will be understood that different environments can have different expected echo delays, so that different burst data rates and, hence, packet durations, may be appropriate in different situations depending on the environment.
Minimization of the packet duration also allows a tag to transmit more packets in a given time period, although in practice, regulatory average EIRP limits may often provide an overriding constraint. However, brief packet duration also reduces the likelihood of packets from multiple tags overlapping in time, causing a data collision. Thus, minimal packet duration allows multiple tags to transmit a higher aggregate number of packets per second, allowing for the largest number of tags to be tracked, or a given number of tags to be tracked at the highest rate.
In one non-limiting example, a data packet length of 112 bits (e.g., OOK encoded), transmitted at a data rate of 1 Mb/sec (1 MHz), may be implemented with a transmit tag repetition rate of 1 transmission per second (1 TX/sec). Such an implementation may accommodate a battery life of up to seven years, wherein the battery itself may be, for example, a compact, 3-volt coin cell of the series no. BR2335 (Rayovac), with a battery charge rating of 300 mAhr. An alternate implementation may be a generic compact, 3-volt coin cell, series no. CR2032, with a battery charge rating of 220 mAhr, whereby the latter generic coin cell, as can be appreciated, may provide for a shorter battery life.
Alternatively or additionally, some applications may require higher transmit tag repetition rates to track a dynamic environment. In some examples, the transmit tag repetition rate may be 12 transmissions per second (12 TX/sec). In such applications, it can be further appreciated that the battery life may be shorter.
The high burst data transmission rate (e.g., 1 MHz), coupled with the short data packet length (e.g., 112 bits) and the relatively low repetition rates (e.g., 1 TX/sec), provide for two distinct advantages in some examples: (1) a greater number of tags may transmit independently from the field of tags with a lower collision probability, and/or (2) each independent tag transmit power may be increased, with proper consideration given to a battery life constraint, such that a total energy for a single data packet is less that an regulated average power for a given time interval (e.g., a 1 msec time interval for an FCC regulated transmission).
Alternatively or additionally, additional sensor or telemetry data may be transmitted from the tag 12a-f to provide the receivers 13a-1 with information about the environment and/or operating conditions of the tag. For example, the tag may transmit a temperature to the receivers 13a-1. Such information may be valuable, for example, in a system involving perishable goods or other refrigerant requirements. In this example embodiment, the temperature may be transmitted by the tag at a lower repetition rate than that of the rest of the data packet. For example, the temperature may be transmitted from the tag to the receivers at a rate of one time per minute (e.g., 1 TX/min.), or in some examples, once every 720 times the data packet is transmitted, whereby the data packet in this example is transmitted at an example rate of 12 TX/sec.
Alternatively or additionally, the tag 12a-f may be programmed to intermittently transmit data to the receivers 13a-1 in response to a signal from a magnetic command transmitter (not shown). The magnetic command transmitter may be a portable device, functioning to transmit a 125 kHz signal, in some example embodiments, with a range of approximately 15 feet or less, to one or more of the tags 12a-f. In some examples, the tags 12a-f may be equipped with at least a receiver tuned to the magnetic command transmitter transmit frequency (e.g., 125 kHz) and functional antenna to facilitate reception and decoding of the signal transmitted by the magnetic command transmitter.
In some examples, one or more other tags, such as a reference tag 14a-b, may be positioned within and/or about a monitored region. In some examples, the reference tag 14a-b may be configured to transmit a signal that is used to measure the relative phase (e.g., the count of free-running counters) of non-resettable counters within the receivers 13a-1.
One or more (e.g., preferably four or more) receivers 13a-1 are also positioned at predetermined coordinates within and/or around the monitored region. In some examples, the receivers 13a-1 may be connected in a “daisy chain” 19 fashion to advantageously allow for a large number of receivers 13a-1 to be interconnected over a significant monitored region in order to reduce and simplify cabling, provide power, and/or the like. Each of the receivers 13a-1 includes a receiver for receiving transmissions, such as UWB transmissions, and preferably, a packet decoding circuit that extracts a time of arrival (TOA) timing pulse train, transmitter ID, packet number, and/or other information that may have been encoded in the tag transmission signal (e.g., material description, personnel information, etc.) and is configured to sense signals transmitted by the tags 12a-f and one or more reference tags 14a-b.
Each receiver 13a-1 includes a time measuring circuit that measures times of arrival (TOA) of tag bursts, with respect to its internal counter. The time measuring circuit is phase-locked (e.g., phase differences do not change and therefore respective frequencies are identical) with a common digital reference clock signal distributed via cable connection from a Central Processor/Hub 11 having a central timing reference clock generator. The reference clock signal establishes a common timing reference for the receivers 13a-1. Thus, multiple time measuring circuits of the respective receivers 13a-1 are synchronized in frequency, but not necessarily in phase. While there typically may be a phase offset between any given pair of receivers in the receivers 13a-1, the phase offset is readily determined through use of a reference tag 14a-b. Alternatively or additionally, each receiver may be synchronized wirelessly via virtual synchronization without a dedicated physical timing channel.
In some example embodiments, the receivers 13a-1 are configured to determine various attributes of the received signal. Since measurements are determined at each receiver 13a-1, in a digital format, rather than analog in some examples, signals are transmittable to the Central Processor/Hub 11. Advantageously, because packet data and measurement results can be transferred at high speeds to a receiver memory, the receivers 13a-1 can receive and process tag (and corresponding object) locating signals on a nearly continuous basis. As such, in some examples, the receiver memory allows for a high burst rate of tag events (i.e., information packets) to be captured.
Data cables or wireless transmissions may convey measurement data from the receivers 13a-1 to the Central Processor/Hub 11 (e.g., the data cables may enable a transfer speed of 2 Mbps). In some examples, measurement data is transferred to the Central Processor/Hub at regular polling intervals.
As such, the Central Processor/Hub 11 determines or otherwise computes tag location (i.e., object location) by processing TOA measurements relative to multiple data packets detected by the receivers 13a-1. In some example embodiments, the Central Processor/Hub 11 may be configured to resolve the coordinates of a tag using nonlinear optimization techniques.
In some examples, TOA measurements from multiple receivers 13a-1 are processed by the Central Processor/Hub 11 to determine a location of the transmit tag 12a-f by a differential time-of-arrival (DTOA) analysis of the multiple TOAs. The DTOA analysis includes a determination of tag transmit time t0, whereby a time-of-flight (TOF), measured as the time elapsed from the estimate tag transmit time t0 to the TOA, represents graphically the radii of spheres centered at respective receivers 13a-1. The distance between the surfaces of the respective spheres to the estimated location coordinates (x0, y0, z0) of the transmit tag 12a-f represents the measurement error for each respective TOA, and the minimization of the sum of the squares of the TOA measurement errors from each receiver participating in the DTOA location estimate provides for both the location coordinates (x0, y0, z0) of the transmit tag and that tag's transmit time t0.
In some examples, the system described herein may be referred to as an “over-specified” or “over-determined” system. As such, the Central Processor/Hub 11 may calculate one or more valid (i.e., most correct) locations based on a set of measurements and/or one or more incorrect (i.e., less correct) locations. For example, a location may be calculated that is impossible due the laws of physics or may be an outlier when compared to other calculated locations. As such one or more algorithms or heuristics may be applied to minimize such error.
The starting point for the minimization may be obtained by first doing an area search on a coarse grid of x, y and z over an area defined by the user and followed by a localized steepest descent search. The starting location for this algorithm is fixed, in some examples, at the mean location of all active receivers. No initial area search is needed, and optimization proceeds through the use of a Davidon-Fletcher-Powell (DFP) quasi-Newton algorithm in some examples. In other examples, a steepest descent algorithm may be used.
One such algorithm for error minimization, which may be referred to as a time error minimization algorithm, may be described in Equation 1:
Where N is the number of receivers, c is the speed of light, (xj, yj, zj) are the coordinates of the jth receiver, tj is the arrival time at the jth receiver, and t0 is the tag transmit time. The variable t0 represents the time of transmission. Since t0 is not initially known, the arrival times, tj, as well as t0, are related to a common time base, which in some examples, is derived from the arrival times. As a result, differences between the various arrival times have significance for determining location as well as t0.
The optimization algorithm to minimize the error ε in Equation 1 may be the Davidon-Fletcher-Powell (DFP) quasi-Newton algorithm, for example. In some examples, the optimization algorithm to minimize the error ε in Equation 1 may be a steepest descent algorithm. In each case, the algorithms may be seeded with an initial location estimate (x, y, z) that represents the two-dimensional (2D) or three-dimensional (3D) mean of the receiver positions of the receivers 13a-1 that participate in the tag location determination.
In some examples, the RTLS system comprises a receiver grid, whereby each of the receivers 13a-1 in the receiver grid keeps a receiver clock that is synchronized, with an initially unknown phase offset, to the other receiver clocks. The phase offset between any receivers may be determined by use of a reference tag that is positioned at a known coordinate position (xT, yT, zT). The phase offset serves to resolve the constant offset between counters within the various receivers 13a-1, as described below.
In further example embodiments, a number N of receivers 13a-1 {Rj: j=1, . . . , N} are positioned at known coordinates (xR
dR
Each receiver Rj utilizes, for example, a synchronous clock signal derived from a common frequency time base, such as a clock generator. Because the receivers are not synchronously reset, an unknown, but constant offset Oj exists for each receiver's internal free running counter. The value of the constant offset Oj is measured in terms of the number of fine resolution count increments (e.g., a number of nanoseconds for a one nanosecond resolution system).
The reference tag is used, in some examples, to calibrate the radio frequency locating system as follows: The reference tag emits a signal burst at an unknown time τR. Upon receiving the signal burst from the reference tag, a count NR
NR
Where c is the speed of light and β is the number of fine resolution count increments per unit time (e.g., one per nanosecond). Similarly, each object tag Ti of each object to be located transmits a signal at an unknown time τi to produce a count Ni
Ni
At receiver Rj where di
Where Δjk is constant as long as dR
Each arrival time, tj, can be referenced to a particular receiver (receiver “1”) as given in Equation 7:
The minimization, described in Equation 1, may then be performed over variables (x,y,z,t0) to reach a solution (x′,y′,z′,t0′).
UWB receiver 22, provided for at receivers 13a-1, allows for an analog signal stream that is digitized, then processed by a UWB TOA and data recovery circuits 24. The analog stream is digitized by up to three or more parallel, concurrent, independent analog-to-digital convertors (ADCs) functioning with three distinct threshold levels, resulting in up to three or more digital data streams 23A-C that are sent to the UWB TOA and data recovery circuits 24. In some embodiments, the threshold levels applied to the analog signal stream in the UWB receiver 22 are a function of a signal-to-noise ratio (SNR) present in the communication channel. In some embodiments, the threshold levels are set dynamically as a function of one or more of an antenna preamp gain and an estimated RTLS tag range.
The UWB TOA and data recovery circuits 24 perform as many as three or more parallel, concurrent, identical signal processing functions on the three or more digital data streams 23A-C. The three or more UWB TOA and data recovery circuits 24 may be configured to receive data packets 120 that correspond to RTLS tags 12a-f. The UWB TOA and data recovery circuits 24 may provide for a packet framing and extraction function as part of the data recovery circuit, whereby an RTLS tag 12a-f identification may be extracted. The RTLS identification may be extracted by the TX identification field 120B of the data packet 120, as described previously. In some embodiments, the UWB TOA and data recovery circuits 24 are implemented by field programmable gate arrays (FPGAs). The TOA and extracted data packet is sent by TOA line 25 to an arbitrate/buffer function 26.
The arbitrate/buffer function 26 effectively selects the TOA line 25 data provided by the UWB TOA and data recovery circuits 24. The arbitrate/buffer function 26 selects the TOA line 25 that converges to the earliest TOA from the up to three or more TOA and data recovery circuits 24 driven by the digital data stream 23A-C. The arbitrate/buffer function 26 provides for a series of serial messages, or tag message 27, to send to a tag queue function 28, whereby each of the tag messages 27 is identified by an RTLS tag 12a-f and an associated TOA. The tag message 27 may be temporarily stored by a tag message FIFO or queue to be filtered by a message filtering function 27′, as discussed and detailed in
The tag queue function 28 provides for a formatting and ordering of the collection of RTLS tag identifiers and TOAs, effectively a first-in first-out (FIFO) memory buffer awaiting a transmission to the central processor/hub 11. Upon a tag queue function 28 trigger, a tag data packet 29 is sent to a formatting and data coding/decoding function 30 that, in turn, repackages the tag data packet 29 and transmits a synchronous tag data packet 30B to the central processor/hub 11.
The synchronous tag data packet 30B transmitted by the formatting and data coding/decoding function 30 to the central processor/hub 11 is synchronized by a 10 MHz receiver clock 40, received from the previous receiver clock in the “daisy chain” 19, and transmitted to the next receiver clock in the “daisy chain” 19 following a synchronous frequency up/down convert. The receiver clock 40 drives a phase-locked loop (PLL) 41, whereby a frequency divider in a feedback loop in conjunction with a voltage-controlled oscillator (VCO) provides for a 100 MHz receiver clock 42-43 that is synchronized in phase to the 10 MHz receiver clock 40. The 100 MHz receiver clock 42 is provided to synchronize all logic blocks in the UWB receiver 13a-1 and to provide for a TOA coarse time 45, sent by line 46 to the TOA and data recovery circuits 24 to be used in the TOA determination. The 100 MHz receiver clock 43 provides for the parallel set of fine detector windows 340, a basis of a set of receiver timing windows used to capture and register pulses transmitted by RTLS tags 12a-f in the TOA determination, as described previously with respect to
A second function of the formatting and data coding/decoding function 30 is a buffering, reformatting, and repeating of a central processor data 30A-B received and transmitted between the receiver 13a-1 and the central processor/hub 11 via the “daisy chain” 19 receiver network. The central processor data 30A-B received and transmitted from and to the formatting and data coding/decoding function 30 may provide for a series of commands that are decoded at a command decoder 44 to trigger receiver functions. A non-exhaustive list of such functions may include the following: an auto/manual control function 20, a series of telemetry functions 60, and the arbitrate/buffer function 26 to prune a data queue and to manage, delete, and reorder the data queue. The auto/manual control function 20 may be commanded—from manual mode—to report sensor information such as temperature and other telemetry data recorded in the telemetry function 60, and may be commanded to manually adjust one or more of an antenna preamp gain and the previously described threshold levels at the UWB receiver 22.
A power supply 50 may be configured to power the receiver 13a-1 by way of an AC-DC convertor, whereby the AC power may be provided as an input from the central processor/hub 11, shown in
An advantage, in some examples, to the present embodiment of the UWB receiver system 600 is that packet data and measurement results can be transferred at high speeds to TOA measurement buffers, the arbitrate/buffer function 26, such that the receivers 13a-1 can receive and process tag 12a-f (and corresponding object) locating signals on a nearly continuous basis. That is, multiple UWB data packets 120 can be processed in close succession, thereby allowing the use of hundreds to thousands of tag transmitters.
In some embodiments, data stored in TOA measurement buffers, the arbitrate/buffer function 26, is sent to a central processor/hub 11, shown in
In some embodiments, the collection of the central processor data 30A-B transmission lines, connecting a “daisy chain” 19 network of receivers, is comprised of two bi-directional data links. In some embodiments, these data links may be RS422 differential serial links. A network interface may receive command signals from a central processor/hub 11 on one link, for example, to instruct a transfer of the TOA measurement buffer, the arbitrate/buffer function 26, to the central processor/hub 11. Additional commands may include those to adjust UWB receiver 22 operating characteristics such as gain and detection thresholds. The bi-directional data links may also provide for a buffer for data signals linked between “daisy chain” 19 receivers, buffering sequential transmissions between the present and next receiver 13a-1 in a communications chain.
The synchronous frequency up/down convert performed on the 10 MHz receiver clock 40 provides for a driver for the receiver clock 40 transmitted to the next receiver in the “daisy chain” 19. An advantage of this approach, in some examples, is that the 10 MHz receiver clock 40 transmitted to the next receiver—as with the original 10 MHz receiver clock 40—may be made low enough in frequency so that it can be transmitted over low-cost cables (e.g., twisted pair wires). Since timing jitter of the local timing reference signal degrades as the PLL multiplier coefficient is increased, there is a necessary trade-off between frequency and jitter of the local timing reference signal and the frequency of the timing reference clock.
Utilizing a common 10 MHz receiver clock 40 for timing reference, a plurality of local timing reference signals (one in each receiver) can be precisely matched in frequency. Using this approach, additional receivers can be connected without concern for clock loading. Buffer delay is also not an issue since the timing reference clock is used for frequency only, and not phase reference.
In some embodiments, the 10 MHz receiver clock 40 may comprise differential signals. The use of differential clock signals is advantageous since they avoid clock duty cycle distortion which can occur with the transmission of relatively high-speed clocks (e.g., >10 MHz) on long cables (e.g., >100 feet).
The windowing/gating function 71 and the window control clock and data recovery (PLL) function 73 work as a feedback loop to recover the TX clock 101 and provide for the adjustable timing window function 200, as presented in
The TOA fine time—the registration code 350, the disjoint timing windows 231A-C, as determined by the adjustable timing window function 200, and the coarse time 46 are sent to the TOA averaging function 74, along with a latch TOA control signal indicating the end of a TOA determination. The TOA averaging function 74 is activated by a calculate TOA trigger 78, whereby the sub-window resolution function 400, as previously described with regard to
The data sync and extract functions (1 MHz-2 MHz) 75-76 are triggered upon phase lock of the PLL associated with the window control clock and data recovery (PLL) function 73. Phase lock of the PLL is determined by the previously described feedback loop comprising the windowing/gating function 71 and the window control clock and data recovery (PLL) function 73, whereby the feedback loop effectively recovers the TX clock 101 by tracking the RX pulses 111R′ corresponding to the preamble 110.
Upon phase lock, whereby the preamble 110 is synchronized to a recovered TX clock, the data packet 120, beginning with the remainder of the preamble 110, is extracted and unpacked by the data sync and extract function 75 (76) at a sampling rate of 1 Mhz (2 MHz), and sent to the tag data recovery and processing function 77. In another embodiment, the data sync and extract functions 75-76 are both set to sample the data packet 120 with a sampling rate of 2 MHz, but the two functions may differ by a data format. In one example, the data extracted by function 75 may follow a non-IOS format, where the data extracted by function 76 may follow an IOS format.
The tag data recovery and processing function 77 serves as a data processor for the data extracted by the data sync and extract functions 75-76 and as a communications control function, and also provides for data exchange associated with the arbitrate/buffer function 26, shown in
The tag data recovery and processing function 77 also serves as a controller for the timing of a triggering of the TOA averaging function 74 and a locking/unlocking 79 of the PLL in the window control clock and data recovery (PLL) function 73. The TOA averaging function 74 is initiated by the calculate TOA trigger 78 set by the tag data memory and processing controller 77, whereby the TOA trigger 78 is a function of a sync code 112 detection and a waiting interval associated with the data sync and extract function 75-76. The locking/unlocking 79 of the PLL is a function of a PLL lock indication initiated at the window control clock and data recovery (PLL) function 73, as described previously. And the locking/unlocking 79 of the PLL is reset to unlock the PLL upon detection in the sync and data extract functions 75-76 that the end of the data packet 120 has been reached, that the sampling of the data packet for the given tag transmission is complete.
The TOA averaging function 74 is elucidated by the sub-window resolution function 400, as described with regard to
Exemplary embodiments of the present invention have been described herein. The invention is not limited to these examples. These examples are presented herein for purposes of illustration, and not limitation. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) may be apparent to persons skilled in the relevant art(s) based in the teachings contained herein. Such alternatives fall within the scope and spirit of the invention.
All publications, patents, and patent applications mentioned in this specification are herein incorporated by reference to the same extent as if each individual publication, patent, or patent application was specifically and individually indicated to be incorporated by reference.
This application claims priority to U.S. Provisional Application Ser. No. 62/008,243, filed Jun. 5, 2014, the entire contents of each is incorporated by reference herein in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
3732500 | Dishal et al. | May 1973 | A |
5119104 | Heller | Jun 1992 | A |
5469409 | Anderson et al. | Nov 1995 | A |
5513854 | Daver | May 1996 | A |
5645077 | Foxlin | Jul 1997 | A |
5699244 | Clark et al. | Dec 1997 | A |
5901172 | Fontana et al. | May 1999 | A |
5920287 | Belcher et al. | Jul 1999 | A |
5930741 | Kramer | Jul 1999 | A |
5995046 | Belcher et al. | Nov 1999 | A |
6028626 | Aviv | Feb 2000 | A |
6121926 | Belcher et al. | Sep 2000 | A |
6176837 | Foxlin | Jan 2001 | B1 |
6204813 | Wadell et al. | Mar 2001 | B1 |
6366242 | Boyd et al. | Apr 2002 | B1 |
6380894 | Boyd et al. | Apr 2002 | B1 |
6593885 | Wisherd et al. | Jul 2003 | B2 |
6655582 | Wohl et al. | Dec 2003 | B2 |
6710713 | Russo | Mar 2004 | B1 |
6812884 | Richley et al. | Nov 2004 | B2 |
6836744 | Asphahani et al. | Dec 2004 | B1 |
6882315 | Richley et al. | Apr 2005 | B2 |
7009638 | Gruber et al. | Mar 2006 | B2 |
7190271 | Boyd | Mar 2007 | B2 |
7667604 | Ebert et al. | Feb 2010 | B2 |
7671802 | Walsh et al. | Mar 2010 | B2 |
7710322 | Ameti et al. | May 2010 | B1 |
7755541 | Wisherd et al. | Jul 2010 | B2 |
7899006 | Boyd | Mar 2011 | B2 |
7969348 | Baker et al. | Jun 2011 | B2 |
8077981 | Elangovan et al. | Dec 2011 | B2 |
8269835 | Grigsby | Sep 2012 | B2 |
8279051 | Khan | Oct 2012 | B2 |
8477046 | Alonso | Jul 2013 | B2 |
8568278 | Riley et al. | Oct 2013 | B2 |
8696458 | Foxlin et al. | Apr 2014 | B2 |
8705671 | Ameti et al. | Apr 2014 | B2 |
8775916 | Pulsipher et al. | Jul 2014 | B2 |
8780204 | DeAngelis et al. | Jul 2014 | B2 |
8795045 | Sorrells et al. | Aug 2014 | B2 |
8842002 | Rado | Sep 2014 | B2 |
8989880 | Wohl et al. | Mar 2015 | B2 |
9081076 | DeAngelis et al. | Jul 2015 | B2 |
9381645 | Yarlagadda et al. | Jul 2016 | B1 |
20010010541 | Fernandez et al. | Aug 2001 | A1 |
20010030625 | Doles et al. | Oct 2001 | A1 |
20020004398 | Ogino et al. | Jan 2002 | A1 |
20020041284 | Konishi et al. | Apr 2002 | A1 |
20020114493 | McNitt et al. | Aug 2002 | A1 |
20020116147 | Vock et al. | Aug 2002 | A1 |
20020130835 | Brosnan | Sep 2002 | A1 |
20020135479 | Belcher et al. | Sep 2002 | A1 |
20030090387 | Lestienne et al. | May 2003 | A1 |
20030095186 | Aman et al. | May 2003 | A1 |
20030128100 | Burkhardt et al. | Jul 2003 | A1 |
20030227453 | Beier et al. | Dec 2003 | A1 |
20040022227 | Lynch | Feb 2004 | A1 |
20040062216 | Nicholls et al. | Apr 2004 | A1 |
20040108954 | Richley et al. | Jun 2004 | A1 |
20040178960 | Sun | Sep 2004 | A1 |
20040249969 | Price | Dec 2004 | A1 |
20040260470 | Rast | Dec 2004 | A1 |
20040260828 | Price | Dec 2004 | A1 |
20050026563 | Leeper et al. | Feb 2005 | A1 |
20050031043 | Paquelet | Feb 2005 | A1 |
20050059998 | Norte et al. | Mar 2005 | A1 |
20050075079 | Jei et al. | Apr 2005 | A1 |
20050093976 | Valleriano | May 2005 | A1 |
20050148281 | Sanchez-Castro et al. | Jul 2005 | A1 |
20050207617 | Sarnoff | Sep 2005 | A1 |
20060067324 | Kim | Mar 2006 | A1 |
20060139167 | Davie et al. | Jun 2006 | A1 |
20060164213 | Burghard et al. | Jul 2006 | A1 |
20060252476 | Bahou | Nov 2006 | A1 |
20060271912 | Mickle | Nov 2006 | A1 |
20060281061 | Hightower et al. | Dec 2006 | A1 |
20070091292 | Cho et al. | Apr 2007 | A1 |
20070176749 | Boyd et al. | Aug 2007 | A1 |
20070296723 | Williams | Dec 2007 | A1 |
20080065684 | Zilberman | Mar 2008 | A1 |
20080106381 | Adamec | May 2008 | A1 |
20080113787 | Alderucci | May 2008 | A1 |
20080129825 | DeAngelis et al. | Jun 2008 | A1 |
20080140233 | Seacat | Jun 2008 | A1 |
20080186231 | Aljadeff et al. | Aug 2008 | A1 |
20080204248 | Winget et al. | Aug 2008 | A1 |
20080262885 | Jain | Oct 2008 | A1 |
20080266131 | Richardson et al. | Oct 2008 | A1 |
20080269016 | Ungari et al. | Oct 2008 | A1 |
20080281443 | Rodgers | Nov 2008 | A1 |
20080285805 | Luinge et al. | Nov 2008 | A1 |
20090048044 | Oleson et al. | Feb 2009 | A1 |
20090141736 | Becker | Jun 2009 | A1 |
20090231198 | Wlash et al. | Sep 2009 | A1 |
20100026809 | Curry | Feb 2010 | A1 |
20100045508 | Ekbal et al. | Feb 2010 | A1 |
20100054304 | Barnes et al. | Mar 2010 | A1 |
20100060452 | Schuster et al. | Mar 2010 | A1 |
20100150117 | Aweya et al. | Jun 2010 | A1 |
20100228314 | Goetz | Sep 2010 | A1 |
20100250305 | Lee et al. | Sep 2010 | A1 |
20100278386 | Hoeflinger | Nov 2010 | A1 |
20100283603 | Alonso | Nov 2010 | A1 |
20100283630 | Alonso | Nov 2010 | A1 |
20100328073 | Nikitin et al. | Dec 2010 | A1 |
20110002223 | Gross | Jan 2011 | A1 |
20110025847 | Park et al. | Feb 2011 | A1 |
20110054782 | Kaahui et al. | Mar 2011 | A1 |
20110063114 | Ikoyan | Mar 2011 | A1 |
20110084806 | Pekins et al. | Apr 2011 | A1 |
20110134240 | Anderson et al. | Jun 2011 | A1 |
20110140970 | Fukagawa et al. | Jun 2011 | A1 |
20110169959 | DeAngelis et al. | Jul 2011 | A1 |
20110188513 | Christoffersson et al. | Aug 2011 | A1 |
20110195701 | Cook et al. | Aug 2011 | A1 |
20110261195 | Martin et al. | Oct 2011 | A1 |
20110300905 | Levi | Dec 2011 | A1 |
20110320322 | Roslak et al. | Dec 2011 | A1 |
20120014278 | Ameti et al. | Jan 2012 | A1 |
20120015665 | Farley et al. | Jan 2012 | A1 |
20120024516 | Bhadurt et al. | Feb 2012 | A1 |
20120042326 | Jain et al. | Feb 2012 | A1 |
20120057634 | Shi et al. | Mar 2012 | A1 |
20120057640 | Shi et al. | Mar 2012 | A1 |
20120065483 | Chung | Mar 2012 | A1 |
20120081531 | DeAngelis et al. | Apr 2012 | A1 |
20120112904 | Nagy et al. | May 2012 | A1 |
20120126973 | DeAngelis et al. | May 2012 | A1 |
20120139708 | Paradiso et al. | Jun 2012 | A1 |
20120184878 | Najafi et al. | Jul 2012 | A1 |
20120212505 | Burroughs et al. | Aug 2012 | A1 |
20120218301 | Miller | Aug 2012 | A1 |
20120225676 | Boyd et al. | Sep 2012 | A1 |
20120246795 | Scheffler et al. | Oct 2012 | A1 |
20120256745 | Plett et al. | Oct 2012 | A1 |
20120268239 | Ljung et al. | Oct 2012 | A1 |
20130003860 | Sasai et al. | Jan 2013 | A1 |
20130021142 | Matsui et al. | Jan 2013 | A1 |
20130021206 | Hach et al. | Jan 2013 | A1 |
20130040574 | Hillyard | Feb 2013 | A1 |
20130041590 | Burich et al. | Feb 2013 | A1 |
20130066448 | Alonso | Mar 2013 | A1 |
20130076645 | Anantha et al. | Mar 2013 | A1 |
20130096704 | Case | Apr 2013 | A1 |
20130138386 | Jain et al. | May 2013 | A1 |
20130142384 | Ofek | Jun 2013 | A1 |
20130257598 | Kawaguchi et al. | Oct 2013 | A1 |
20130339156 | Sanjay et al. | Dec 2013 | A1 |
20140055588 | Bangera et al. | Feb 2014 | A1 |
20140145828 | Bassan-Eskenazi | May 2014 | A1 |
20140156036 | Huang | Jun 2014 | A1 |
20140170607 | Hsiao et al. | Jun 2014 | A1 |
20140221137 | Krysiak et al. | Aug 2014 | A1 |
20140320660 | DeAngelis et al. | Oct 2014 | A1 |
20140361875 | O'Hagan et al. | Dec 2014 | A1 |
20140361906 | Hughes et al. | Dec 2014 | A1 |
20140364141 | O'Hagan et al. | Dec 2014 | A1 |
20140365415 | Stelfox et al. | Dec 2014 | A1 |
20150002272 | Alonso et al. | Jan 2015 | A1 |
20150057981 | Gross | Feb 2015 | A1 |
20150085111 | Lavery | Mar 2015 | A1 |
20150097653 | Gibbs et al. | Apr 2015 | A1 |
20150355311 | O'Hagan et al. | Dec 2015 | A1 |
20150358852 | Richley | Dec 2015 | A1 |
20150360133 | MacCallum et al. | Dec 2015 | A1 |
20150375041 | Richley et al. | Dec 2015 | A1 |
20150375083 | Stelfox et al. | Dec 2015 | A1 |
20150378002 | Hughes et al. | Dec 2015 | A1 |
20150379387 | Richley | Dec 2015 | A1 |
20160097837 | Richley | Apr 2016 | A1 |
Number | Date | Country |
---|---|---|
1235077 | Aug 2002 | EP |
1241616 | Sep 2002 | EP |
1253438 | Oct 2002 | EP |
1503513 | Feb 2005 | EP |
2474939 | Nov 2012 | EP |
WO 9805977 | Feb 1998 | WO |
WO 9961936 | Dec 1999 | WO |
WO 0108417 | Feb 2001 | WO |
WO 2006022548 | Mar 2006 | WO |
WO-2010083943 | Jul 2010 | WO |
WO 2014197600 | Dec 2014 | WO |
WO 2015051813 | Apr 2015 | WO |
Entry |
---|
Defendant's Answer to Complaint before the United States District Court of Massachusetts, Civil Action No. 1:15-cv-12297, Lynx System Developers, Inc. et al. V. Zebra Enterprise Solutions Corporation et al., filed Apr. 6, 2016. |
International Search Report and Written opinion from International Application No. PCT/US2014/040881 dated Nov. 4, 2014. |
International Search Report and Written opinion from International Application No. PCT/US2014/040940 dated Dec. 17, 2014. |
International Search Report and Written Opinion from International Application No. PCT/US2014/041062 dated Oct. 1, 2014. |
International Search Report and Written Opinion from International Application No. PCT/US2014/040947 dated Oct. 9, 2014. |
Fontana, R.J., Richley, E., Barney, J., “Commercialization of an Ultra Wideband Precision Assest Location System”, 2003 IEEE Conference on Ultra Wideband Systems and Technologies, Nov. 16-19, 2003, pp. 369-373. |
Guéziec, A., “Tracking a Baseball Pitch for Broadcast Television,” Mar. 2002, <http://www.trianglesoftware.com/pitch—tracking. htm>, pp. 38-43. |
CattleLog Pro, eMerge Interactive, Inc., Sebastian, FL, 2004, pp. 1-2. |
Marchant, J., “Secure Animal Indetification and Source Verification”, JM Communications, UK, 2002, pp. 1-28. |
“A guide to Using NLIS Approved Ear Tags and Rumen Boluses”, National Livestock Identification Scheme, Meat & Livestock Australia Limited, North Sydney, Australia, May 2003, pp. 1-4. |
King L., “NAIS Cattle ID Pilot Projects Not Needed, Since Proven Advanced Technology Already Exisits”, ScoringSystem, Inc., Sarasota, FL, Dec. 27, 2005(www.prweb.com/releases2005/12prweb325888.htm), pp. 1-2. |
“RFID in the Australian Meat and Livestock Industry”, Allflex Australia Pty Ltd., Capalaba, QLD (AU), Data Capture Suppliers Guide, 2003-2004, pp. 1-3. |
U.S. Appl. No. 14/296,703, filed Jun. 5, 2014; In re: Alonso et al., entitled Method and Apparatus for Associating Radio Frequency Identification Tags with Participants. |
U.S. Appl. No. 61/895,548, filed Oct. 25, 2013, In re: Alonso et al., entitled “Method, Apparatus, and Computer Program Product for Collecting Sporting Event Data Based on Real Time Data for Proximity and Movement of Objects”. |
International Search Report and Written Opinion for International Application No. PCT/IB2015/059264 dated Feb. 10, 2016. |
Jinyun Zhang et al., “UWB Systems for Wireless Sensor Networks”, Proceedings of the IEEE, IEEE. New York, US, vol. 97, No. 2, Feb. 1, 2009 (Feb. 1, 2009), pp. 313-331. |
International Search Report and Written Opinion for International Application No. PCT/US2015/034267 dated Sep. 25, 2015. |
International Search Report and Written Opinion for International Application No. PCT/IB2015/054103 dated Aug. 14, 2015. |
Cheong, P. et al., “Synchronization, TOA and Position Estimation for Low-Complexity LDR UWB Devices”, Ultra-Wideband, 2005 IEEE International Conference, Zurich, Switzerland Sep. 05-08, 2005, Piscataway, NJ, USA, IEEE, Sep. 5, 2005, pp. 480-484. |
International Search Report and Written Opinion for International Application No. PCT/IB2015/054213 dated Aug. 6, 2015. |
Wang, Y. et al., “An Algorithmic and Systematic Approach from Improving Robustness of TOA-Based Localization”, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE, Nov. 13, 2013, pp. 2066-2073. |
Guvenc, I. et al., “A Survey on TOA Based Wireless Localization and NLOA Mitigation Techniques”, IEEE Communications Surveys, IEEE, New York, NY, US, vol. 11, No. 3, Oct. 1, 2009, pp. 107-124. |
International Search Report and Written Opinion for International Application PCT/IB2015/054102 dated Nov. 4, 2015. |
“Seattleite wins top prize in Microsoft's Super Bowl tech Contest”, San Francisco AP, Komonews.com, Feb. 6, 2016. <http://komonews.com/news/local/seattleite-wins-top-prize-in-micro softs-super-bowl-tech-contest>. |
Bahle et al., “I See You: How to Improve Wearable Activity Recognition by Leveraging Information from Environmental Cameras,” Pervasive Computing and Communications.Workshops, IEEE International Conference, (Mar. 18-22, 2013). |
Teixeira et al., “Tasking Networked CCTV Cameras and Mobile Phones to Identify and Localize Multiple People,” Ubicomp '10 Proceedings of the 12th ACM International Conference on Ubiquitous Computing, pp. 213-222 (Sep. 26-29, 2010). |
Complaint before the United States District Court of Massachusetts, Civil Action No. 1:15-cv-12297, Lynx System Developers, Inc. et al. V. Zebra Enterprise Solutions Corporation et al., filed Mar. 23, 2016. |
International Search Report for International Application No. PCT/US2014/053647 dated Dec. 19, 2014. |
International Search Report and Written Opinion for International Application No. PCT/US2016/035614 dated Sep. 15, 2016. |
Zhu et al., “A Real-Time Articulated Human Motion Tracking Using Tri-Axis Inertial/Magnetic Sensors Package,” IEEE Transactions on Neural Systems and Rehabilitation Engineering, vol. 12, No. 2, Jun. 2004, pp. 295-302. |
Swedberg, Claire, “USDA Researchers Develop System to Track Livestock Feeding Behavior Unobtrusively”, RFID Journal, Jul. 18, 2013, pp. 1-2. |
Invention to Pay Additional Fees/Partial International Search Report for PCT/IB2015/054099 dated Oct. 6, 2015. |
International Search Report and Written Opinion for International Application No. PCT/IB2015/054099 dated Dec. 9, 2015. |
Complaint before the United Stated District Court of Massachusetts, Civil Action No. 1:15-cv-12297, Lynx System Developers, Inc. et al. v. Zebra Enterprise Solutions Corporation et al., filed Jun. 10, 2015. |
European Search Report for European Patent Application No. 14806811.7 dated Dec. 9, 2016. |
Number | Date | Country | |
---|---|---|---|
20150358852 A1 | Dec 2015 | US |
Number | Date | Country | |
---|---|---|---|
62008243 | Jun 2014 | US |